Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A code vulnerability processing method and device

A vulnerability and code technology, applied in the field of code security, can solve the problems of not being able to know what the business impact is, spending a lot of time, and R&D personnel not being able to deal with it, so as to improve the efficiency of vulnerability processing.

Active Publication Date: 2022-05-31
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the processing method for code security vulnerabilities is mainly to manually analyze the scanning results and analyze the code corresponding to the scanned vulnerabilities to determine whether there is a vulnerability. Although it can be directly repaired or judged as a false positive, but in the code In the case of many security vulnerabilities, it is impossible to judge the priority of the vulnerabilities, and can only be modified according to the vulnerability level provided by the tool. Moreover, when the amount of code is large, a single developer cannot solve the specific business corresponding to the code with vulnerabilities. What is it? It is impossible to know what the impact on the business will be after the modification. The modification is relatively blind. If it is confirmed one by one, it will take a lot of time and the efficiency is very low.
[0003] There is currently no effective solution to the problems of chaotic business relationships, long time-consuming and low efficiency in code security scanning in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A code vulnerability processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the objectives, technical solutions and advantages of the present invention more clearly understood, the embodiments of the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings.

[0027] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are for the purpose of distinguishing two entities with the same name but not the same or non-identical parameters. It can be seen that "first" and "second" It is only for the convenience of expression and should not be construed as a limitation to the embodiments of the present invention, and subsequent embodiments will not describe them one by one.

[0028] Based on the above objective, in a first aspect of the embodiments of the present invention, an embodiment of a code vulnerability processing method capable of improving vulnerability processing efficiency is provided. figure 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a code loophole processing method and device, comprising: using code security scanning rules to analyze the code, inserting a hint code for expressing loophole information into the loophole position determined by the rule in the code, and scanning the code inserted into the hint code to generate an intermediate file; publish the intermediate file in the container, perform business tests on the vulnerabilities in the intermediate file according to the information provided by the prompt code to obtain corresponding business processing opinions, and write back the business processing opinions to the vulnerability positions of the intermediate files; analyze For the intermediate file that has been written back, the business relationship of the vulnerability is determined according to the prompt code and the corresponding business processing opinion, and the processing priority of the vulnerability is determined according to the business relationship. The invention can clarify the relationship between code loopholes and actual business, and improve loophole processing efficiency.

Description

technical field [0001] The present invention relates to the field of code security, and more particularly, to a code vulnerability processing method and device. Background technique [0002] Code security scanning refers to a method of checking code for security vulnerabilities through specific rules. Through this method, security vulnerabilities existing in the code can be found and modification suggestions can be provided. Security vulnerabilities can be found and carried out during the development process. Revise. At present, the main method of dealing with code security vulnerabilities is to manually analyze the scan results and analyze the corresponding code of the scanned vulnerabilities to determine whether there is a vulnerability. Although it can be directly repaired or judged as a false positive, in the code When there are many security vulnerabilities, it is impossible to determine the priority of the vulnerabilities, and can only be modified according to the vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3612G06F11/3688
Inventor 张忠伟
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products