Vulnerability processing and tracking method and device, computer system and readable storage medium

A vulnerability and identity information technology, applied in the field of communication, can solve the problems of low vulnerability processing completion rate, forgetting to process vulnerability data, and short online period, etc., to achieve the effect of ensuring the vulnerability processing completion rate, improving reminder efficiency, and short online period

Pending Publication Date: 2020-01-07
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When the current testers find a vulnerability, they will send the vulnerability data to the relevant developers. When personnel are under heavy workload or fatigue, it is easy to forget to process the vulnerability data;
[0003] Therefore, in order to solve this situation, testers constantly urge developers to process vulnerability data, which not only reduces the work efficiency of testers, but also easily causes developers to forget to process one or several vulnerabilities due to the large amount of vulnerability data. The occurrence of a vulnerability data, resulting in a low completion rate of vulnerability processing and poor timeliness; this situation is fatal for projects with a short online period and heavy workload.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability processing and tracking method and device, computer system and readable storage medium
  • Vulnerability processing and tracking method and device, computer system and readable storage medium
  • Vulnerability processing and tracking method and device, computer system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] see figure 1 with figure 2 , a vulnerability handling tracking method of the present embodiment, utilizing the vulnerability handling tracking device 1, comprising the following steps:

[0072] S1: Receive the vulnerability data output by the test client 2, and record the entry time of receiving the vulnerability data, obtain the test identity information and development identity information according to the vulnerability data; pack the entry time, the vulnerability data, the Obtain vulnerability packaging information through the test identity information and the development identity information;

[0073] S2: Judging the vulnerability level of the vulnerability packaging information according to the vulnerability rules;

[0074] S3: storing the vulnerability packaging information in a vulnerability database according to the vulnerability level;

[0075] S4: Utilize processing rules for the vulnerability packaging information to generate reminder information accordin...

Embodiment 2

[0168] see image 3 , a vulnerability handling tracking method 1 of the present embodiment, comprising the following steps:

[0169] Vulnerability packaging information generating module 11, used to receive the vulnerability data output by the test client 2, and record the entry time of receiving the vulnerability data, obtain test identity information and development identity information according to the vulnerability data; pack the entry time , the vulnerability data, the test identity information and the development identity information obtain vulnerability packaging information;

[0170] The vulnerability level evaluation module 12 is used to judge the vulnerability level of the vulnerability packaging information according to the vulnerability rules;

[0171] Vulnerability packaging information storage module 13, for storing the vulnerability packaging information in the vulnerability database according to the vulnerability level;

[0172] The reminder information gener...

Embodiment 3

[0176] In order to achieve the above object, the present invention also provides a computer system, the computer system includes a plurality of computer equipment 4, the components of the bug handling tracking device 1 in the second embodiment can be dispersed in different computer equipment, and the computer equipment can be executed Smartphones, tablet computers, laptops, desktop computers, rack servers, blade servers, tower servers or rack servers (including independent servers, or server clusters composed of multiple servers), etc. The computer equipment in this embodiment at least includes but is not limited to: a memory 41 and a processor 42 that can communicate with each other through a system bus, such as Figure 4 shown. It should be pointed out that, Figure 4 Only a computer device is shown with the components - but it should be understood that implementing all of the illustrated components is not a requirement and that more or fewer components may instead be imple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability processing tracking method and device, a computer system and a readable storage medium, and the method is based on artificial intelligence, and comprises the following steps: receiving vulnerability data outputted by a test client, recording the input time of receiving the vulnerability data, and obtaining test identity information and development identity information according to the vulnerability data; packaging the input time, the vulnerability data, the test identity information and the development identity information to obtain vulnerability packaging information; judging a vulnerability level of the vulnerability packaging information according to a vulnerability rule; storing the vulnerability packaging information in a vulnerability databaseaccording to the vulnerability level; and the vulnerability packaging information client generating reminding information according to the vulnerability packaging information by utilizing the processing rule, and outputting the reminding information to a development client corresponding to the development identity information. According to the invention, the development client is reminded in time,so that the situation that a programmer forgets to process previous vulnerabilities due to busy conditions is avoided, the reminding efficiency of a tester is improved, and the vulnerability processing completion rate is ensured.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a bug handling and tracking method, device, computer system and readable storage medium. Background technique [0002] When the current testers find a vulnerability, they will send the vulnerability data to the relevant developers. When personnel are under heavy workload or fatigue, it is easy to forget to process the vulnerability data; [0003] Therefore, currently, in order to solve this situation, testers constantly urge developers to process vulnerability data, which not only reduces the work efficiency of testers, but also easily causes developers to forget to process one or more vulnerabilities due to the large amount of vulnerability data. The occurrence of a loophole data, resulting in a low vulnerability processing completion rate and poor timeliness; this situation is fatal for projects with short online deadlines and heavy workloads. Contents of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 梅锦振华
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products