Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability risk prediction method, device, equipment and storage medium

A risk prediction and software vulnerability technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of short testing and vulnerability repair time, increased workload of developers and testers, late discovery, etc., to achieve The effect of avoiding vulnerability risks, improving development and testing efficiency, and reducing workload

Pending Publication Date: 2020-02-21
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the detection of vulnerabilities in software files can only be detected during the testing phase, and the timing of discovery is late, resulting in a short time for testing and repairing vulnerabilities, and later testing will consume additional time and labor costs. Increased workload for developers and testers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability risk prediction method, device, equipment and storage medium
  • Software vulnerability risk prediction method, device, equipment and storage medium
  • Software vulnerability risk prediction method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the specification of the application are only for the purpose of describing specific embodiments, and are not intended to limit the application.

[0050] It should be noted that the terms "comprising", "comprising" and "having" in the specification and claims of the present application and the above drawings and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or devices. In the claims, description and drawings of this application, re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a software vulnerability risk prediction method, a device, equipment and a storage medium, and relates to the technical field of information security detection. The method comprises the steps of receiving a to-be-predicted software file; selecting a preset evaluation model, and determining a target prediction factor required in the evaluation model; obtaining associated information corresponding to the software file based on the target prediction factor, and determining a parameter value of the target prediction factor according to statistical data recorded in the associated information; and combining the parameter value of the target prediction factor and the evaluation model to generate a prediction probability for evaluating the vulnerability risk of the software file. According to the method, the waste of time and resources in irrelevant data can be avoided; the purpose is clear, the workload is reduced, the risk prompt that the software file generates the vulnerability can be preposed, early warning can be realized in the development stage, and enough warning can be given to testers in advance, so that the vulnerability risk is avoidedmore effectively, the later workload is reduced, and the development and test efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of information security detection, in particular to a software vulnerability-based risk prediction method, device, equipment and storage medium. Background technique [0002] In the context of the booming software industry, we need to continuously improve the quality of software delivery to meet the increasing standards of users. Among them, the code is used to describe the software correctly and in detail, and it is the ultimate carrier of the software. The quality of the code is of great significance to the quality of the software. However, due to the uneven technical level of the programmers, the quality of the written code is also uneven. , usually, things written in code will have varying degrees of loopholes. Vulnerabilities in code often lead to many program loopholes in software, and code loopholes are the main source of loopholes in software files. [0003] At present, the detection of v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 王雪
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products