Code security scanning method and system

A security scanning and code technology, applied in the field of code security scanning methods and systems, can solve the problem of insufficient accuracy and reliability of code security scanning results, and achieve the effect of improving accuracy and reliability and ensuring security.

Active Publication Date: 2019-12-27
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a code security scanning method and system to solve the problem that the accuracy and reliability of the code security scanning results in the prior art are not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code security scanning method and system
  • Code security scanning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] see figure 1 , figure 1 It is a schematic flowchart of a code security scanning method provided in the embodiment of the present application. Depend on figure 1 It can be seen that the code security scanning method in this embodiment mainly includes the following steps:

[0058] S1: Obtain the mapping relationship between source code and dynamic code through the conversion of source code to dynamic code.

[0059] Specifically, step S1 also includes the following process:

[0060] S11: Convert the source code to generate dynamic code.

[0061] In this embodiment, the conversion from source code to dynamic code includes the conversion between any two codes, and the source code is marked as source code A, and the dynamic code is marked as dynamic code B. In this embodiment, the conversion from source code A to dynamic code B uses the dynamic code conversion script of source code A. The dynamic code conversion script of the source code in this embodiment is a script f...

Embodiment 2

[0098] exist figure 1 On the basis of the illustrated embodiment see figure 2 , figure 2 It is a schematic structural diagram of a code security scanning system provided by the embodiment of the present application. Depend on figure 2 It can be seen that the code security scanning system in this embodiment mainly includes three parts: a mapping relationship acquisition module, an identification module and a scanning module. Among them, the mapping relationship acquisition module is used to obtain the mapping relationship between the source code and the dynamic code through the conversion of the source code to the dynamic code; the identification module is used to identify the dynamic code; the scanning module is used to scan the source code and the dynamic code to obtain the scanned result.

[0099] Wherein, the mapping relationship acquisition module further includes: a conversion unit, a first storage unit, a mapping relationship acquisition unit and a second storage ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code security scanning method and system, and the method comprises the steps: obtaining a mapping relation between a source code and a dynamic code through the conversion from the source code to the dynamic code; identifying a dynamic code; and scanning the source code and the dynamic code to obtain a scanning result. The system comprises a mapping relation acquisition module, an identification module and a scanning module. According to the method, on the basis of scanning the source code, the scanning step of the dynamic code is added, so that the code security scanning accuracy and reliability can be greatly improved.

Description

technical field [0001] The present application relates to the technical field of software security, in particular to a code security scanning method and system. Background technique [0002] Code security scanning refers to the detection of security vulnerabilities in the code through specific rules, discovering the security vulnerabilities in the code, and providing suggestions for modification, so as to avoid the problems caused by modification when security vulnerabilities are found in subsequent functional tests. various risks. Therefore, it is an important issue how to conduct code security scanning so as to discover security holes and modify them in time during the code development process. [0003] The current method of scanning code security is mainly to perform security scanning on currently existing codes. Specifically, the source code is compiled, an intermediate file generated by the source code is identified, and then the intermediate file is scanned to obtain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F8/41
CPCG06F8/41G06F21/562
Inventor 张忠伟
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products