Linkage scanning method for loopholes
A scanning method and linkage technology, applied in the field of network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] The specific technical solutions for realizing the technical purpose of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.
[0021] Such as figure 1 As shown, the linkage scanning method for vulnerabilities includes: monitoring the scanning request from the non-missing device; if the device is authenticated, receiving the linkage message in the scanning request, creating and starting the corresponding scanning task according to the content of the message, and checking the The target specified by the scanning request executes vulnerability scanning; the scanning result of the scanning task is returned to the requesting device, and corresponding processing actions are performed according to the scanning result.
[0022] The non-missed-scan device that has passed the authentication will no longer perform authentication on the scan request initiated by it within a preset time period.
[0023] The above-men...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com