Vulnerability scanning and maintenance method for computing device system

A vulnerability scanning and computing equipment technology, applied in the field of electronic communication, can solve problems such as complex organizational structure, multiple distribution points, complex network structure, etc., and achieve the effect of reducing waiting time and saving management and communication expenses

Inactive Publication Date: 2019-08-09
NAT UNIV OF DEFENSE TECH
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] For the government industry, industrial industry, electric power industry, telecom operators, financial industry, and some large-scale traditional enterprises, due to their complex organizational structure, many distribution points, and relatively scattered data, the network structure adopted is relatively complex.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning and maintenance method for computing device system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention is described in further detail below in conjunction with accompanying drawing:

[0059] see figure 1 , the vulnerability scanning and maintenance method of the present invention needs to capture and record a lot of new urls, requests and links, how to organize and apply these structures will have an impact on the performance of the program, and the preservation and management in the vulnerability scanning and maintenance method will be introduced below Data structures for urls, requests and links.

[0060] In this vulnerability scanning and maintenance method, url information will be stored in a pivot tree structure and stored in a tree structure. The pivot node is mainly composed of pointers to parent nodes and child nodes, pointers to the url request packet and response packet, and some detection status indication parameters of the node in the crawler module.

[0061] The process of building a pivot tree has three steps:

[0062] req->pivot->c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability scanning and maintenance method for a computing device system, and belongs to the field of electronic communication. Storing the captured and recorded url information in a pivot tree structure and storing the url information in a tree structure; wherein the pivot node is mainly composed of a pointer pointing to a father node and a child node, a pointer pointing to the url request packet and the response packet, and detection state indication parameters of some nodes in a crawler module; the technical problem that the operating system vulnerability and the common WEB system vulnerability of the computing device cannot be effectively maintained is solved. Vulnerability scanning and patch pushing are carried out on an operating system of the computing device, so that the computing device is effectively maintained; the scheme is powerful in function, high in adaptability and very effective for various systems.

Description

[0001] Technical field: [0002] The invention belongs to the field of electronic communication, and relates to a method for scanning and maintaining vulnerabilities for computing equipment systems, in particular to a high-speed vulnerability scanning and maintaining method for vulnerabilities. [0003] Background technique: [0004] Most of the computing devices run Microsoft Windows system. Based on the consideration of security and confidentiality, most devices are physically isolated from the external network, and there are many problems in the security protection of the WEB system running on them. There is an urgent need for a device that integrates system vulnerability scanning, vulnerability protection and vulnerability graphical analysis to solve the security protection problem of computing equipment. The hardware platform adopts a solution of vulnerability scanning and patch push to the operating system of the computing device to make the operation of the computing dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 荆锋计竞舟付璞吴波贺岳星白云徐莎莎
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products