Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Plug-in processing method and device

A processing method and plug-in technology, applied in the computer field, can solve the problems that the scanner cannot adapt to the vulnerability scanning scene, cannot accurately describe the vulnerability, cannot obtain the vulnerability scanning logic, etc., and achieve the effect of language compatibility and strong versatility

Active Publication Date: 2021-06-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when a scanner performs vulnerability scanning based on the vulnerability database, the vulnerability detection plug-in in the vulnerability database often cannot accurately describe the content of the vulnerability, making the scanner unable to adapt to more complex vulnerability scanning scenarios. Compatible with the vulnerability detection plug-in in the , it will also make the scanner unable to obtain the vulnerability scanning logic described by the vulnerability detection plug-in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plug-in processing method and device
  • Plug-in processing method and device
  • Plug-in processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0039] Cloud technology (Cloud technology) is a general term for network technology, information technology, integration technology, management platform technology, application technology, etc. based on cloud computing business model applications. Cloud computing technology will become an important support. The background services of technical network systems require a lot of computing and storage resources, such as video websites, picture websites and more portal websites. With the rapid ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a plug-in processing method and device, and relates to the technical field of computers, and the method comprises the following steps: obtaining configuration data of a target plug-in; packaging the configuration data by using a multilayer structure representation language to obtain a plug-in description file corresponding to the target plug-in, wherein the plug-in description file is used for describing vulnerability scanning logic of the target plug-in; and sending the plug-in description file to a scanning server, so that the scanning server performs vulnerability scanning on a scanned object according to the plug-in description file, the plug-in description file with rich description capability can be generated by utilizing a multilayer structure representation language to support a complex vulnerability scanning scene, and meanwhile, the compatibility is high, and the method can be used for vulnerability detection in a cloud security protection scene.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a plug-in processing method and device. Background technique [0002] Vulnerabilities are defects in the specific implementation of hardware, software, protocols or system security policies, which allow attackers to access or destroy the system without authorization. An inadvertently left unprotected entry point to a restricted computer, component, application, or other online resource. Vulnerability scanning refers to a security detection behavior in which a scanner detects security vulnerabilities of a specified remote or local computer system based on a vulnerability database and finds exploitable vulnerabilities through scanning and other means. [0003] At present, when a scanner performs vulnerability scanning based on the vulnerability database, the vulnerability detection plug-in in the vulnerability database often cannot accurately describe the content of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F8/30G06F8/73
CPCG06F8/31G06F8/73G06F21/577G06F2221/033
Inventor 李文虎陈少鹏李相垚
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products