Open source software security vulnerability processing method and device

An open source software and processing method technology, applied in the computer field, can solve problems such as severe security situation and cost reduction, and achieve the effect of avoiding risks and improving security performance

Pending Publication Date: 2020-11-13
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the versatility of open source software, the cost for attackers to exploit open source vulnerabilities is also reduced, and the security situation is becoming increasingly severe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Open source software security vulnerability processing method and device
  • Open source software security vulnerability processing method and device
  • Open source software security vulnerability processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0057] Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an open source software security vulnerability processing method and device. The method comprises the steps: scanning a to-be-tested project source code to obtain an open sourcesoftware list referenced by the to-be-tested project source code; obtaining open source software vulnerability data; performing vulnerability early warning according to the vulnerability data and theopen source software list, thereby automatically performing timely early warning and upgrading on security vulnerabilities related to the open source software in software research and development andsubsequent operation and maintenance processes, preventing risks as soon as possible, and improving security performance.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for processing security vulnerabilities of open source software. Background technique [0002] Software security vulnerabilities refer to defects in software functions, performance, and security policies. Attackers take advantage of security holes to access software systems, read business data and even destroy the normal operation of software without authorization, causing heavy losses. [0003] With the increasing complexity of business architecture, the development of open source communities, and the introduction of various technical frameworks, the use of open source software in the software development process has increased significantly. Correspondingly, security vulnerabilities introduced by open source software have also frequently appeared. Due to the versatility of open source software, the cost for attackers to exploit open source vulnerabilities ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 陈肇权林海马泽政吴汉深
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products