Vulnerability repair state detection method and system

A state detection and vulnerability repair technology, applied in the field of network information security, can solve problems such as the inability to accurately obtain the repair status of the equipment to be detected

Active Publication Date: 2021-04-06
BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This disclosure provides a vulnerability repair status detection method and system to at least solve the problem that the repair status of the device to be detected cannot be accurately obtained in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability repair state detection method and system
  • Vulnerability repair state detection method and system
  • Vulnerability repair state detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to enable ordinary persons in the art to better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings.

[0076] It should be noted that the terms "first" and "second" in the specification and claims of the present disclosure and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a vulnerability repair state detection method and system, and the method comprises the steps: carrying out vulnerability detection of to-be-detected equipment, determining a current vulnerability identification corresponding to a vulnerability under the condition that to-be-detected equipment has the vulnerability, and executing the vulnerability repair corresponding to the current vulnerability identification of the to-be-detected equipment; monitoring a vulnerability utilization program publishing platform, and obtaining latest vulnerability utilization program information; wherein the latest vulnerability utilization program information comprises a plurality of vulnerability utilization programs and a plurality of corresponding vulnerability identifiers, and the vulnerability utilization programs are used for attacking the to-be-detected equipment by utilizing system vulnerabilities; judging whether a current vulnerability identifier exists in the plurality of vulnerability identifiers or not; and if so, determining a vulnerability utilization program corresponding to the current vulnerability identifier from the plurality of vulnerability utilization programs, and detecting the to-be-detected equipment by using the vulnerability utilization program and obtaining a repair state of the to-be-detected equipment. According to the invention, the real repair state of the to-be-detected equipment can be determined truly and accurately.

Description

technical field [0001] The present disclosure relates to the technical field of network information security, and in particular to a method and system for detecting a bug repair status. Background technique [0002] In the field of network security, there are three stages from discovery to resolution of vulnerabilities: 0DAY stage, 1DAY stage and 2DAY stage. In related technologies, in the 1DAY stage and 2DAY stage, some hackers will attack the device to be detected based on vulnerabilities, and the vulnerability detection server will perform vulnerability detection, vulnerability warning and vulnerability repair on the device to be detected to ensure that the device to be detected can resist attacks and operate normally . [0003] At present, for a vulnerability, after the vulnerability detection server repairs the vulnerability of the device to be detected, it considers that the vulnerability of the device to be detected has been repaired successfully, that is, the device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/20
Inventor 周延平
Owner BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products