Code vulnerability checking method and device, equipment and storage medium

A code and loophole technology, applied in the field of computer software, can solve problems such as the inability to check code loopholes online, and achieve the effect of improving the efficiency and accuracy of loophole checking

Pending Publication Date: 2019-04-19
PINGAN CITY CONSTR TECH SHENZHEN CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a code loophole checking method, device, equipment and storage medium, aiming to solve the technical problem that the existing technology cannot simply and effectively check online code loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code vulnerability checking method and device, equipment and storage medium
  • Code vulnerability checking method and device, equipment and storage medium
  • Code vulnerability checking method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] refer to figure 1 , figure 1 It is a schematic structural diagram of the code vulnerability troubleshooting device for the hardware operating environment involved in the solution of the embodiment of the present invention.

[0046] Such as figure 1 As shown, the code vulnerability troubleshooting device may include: a processor 1001 , such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to security detection, and discloses a code vulnerability checking method and device, equipment and a storage medium, and the method comprises the steps: receiving a vulnerability checking instruction, extracting a request identifier contained in the instruction, and searching a corresponding log storage path in a mapping relation; Obtaining a target log file according to thelog storage path and reading in and out parameter data; Obtaining standard parameter data corresponding to the input parameter data; comparing the target output parameter data contained in the inputand output parameter data with the standard output parameter data; obtaining a comparison result;, According to the method, the log file during code calling and the input and output parameter data stored in the log file are obtained according to the request identifier carried in the instruction; and the target output parameter data contained in the input and output parameter data is compared withthe standard output parameter data, so that whether the code vulnerability exists in the code calling process or not can be accurately judged according to the comparison result, accurate troubleshooting of the code vulnerability is realized, and the vulnerability troubleshooting efficiency is improved.

Description

technical field [0001] The present invention relates to the technical field of computer software, in particular to a method, device, equipment and storage medium for checking code loopholes. Background technique [0002] In the actual application of software programs, there may be loopholes or defects (bugs). For offline program codes, developers can change and debug the code according to the bugs, but some bugs only occur online, and some scenarios are offline The above code cannot be changed and debugged at will, which makes bug troubleshooting more laborious and time-consuming. More importantly, because some open source scripting language frameworks (such as PHP's laravel development framework) correspond to many design patterns, once a bug occurs, debugging and tracking the code will consume a lot of manpower and material resources. Therefore, how to simply and effectively Checking for code vulnerabilities in online codes is an urgent problem to be solved. [0003] The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/577G06F21/566G06F2221/033
Inventor 杨军
Owner PINGAN CITY CONSTR TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products