Vulnerability reproduction method and device

A vulnerability and time-of-appearance technology, applied in the computer field, can solve problems such as low vulnerability reproduction efficiency, achieve the effects of reducing dependencies, accurate vulnerabilities, and improving efficiency

Pending Publication Date: 2021-08-06
ZHUHAI KINGSOFT ONLINE GAME TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This application also relates to a vulnerability reproduction device, a computing device, and a computer-readable storage medium, so as to solve the problem of low vulnerability reproduction efficiency in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability reproduction method and device
  • Vulnerability reproduction method and device
  • Vulnerability reproduction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0036] Terms used in one or more embodiments of the present application are for the purpose of describing specific embodiments only, and are not intended to limit the one or more embodiments of the present application. As used in one or more embodiments of this application and the appended claims, the singular forms "a", "the", and "the" are also intended to include the plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and / or" used in one or more embodiments of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability reproduction method and device, and the vulnerability reproduction method comprises the steps: receiving a vulnerability reproduction request which carries a target account number of a target user and preset time; obtaining target archived data of the target account within the preset time, and loading the target archived data; and according to the target archived data, playing historical operation of the target user back step by step, and enabling vulnerabilities to reappear. Therefore, the dependency on the description of the target user when the vulnerability is reproduced can be reduced, the scene when the vulnerability occurs can be restored to the maximum extent, the reproduced vulnerability is more accurate, and the vulnerability reproducing efficiency is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a bug reproduction method. The present application also relates to a bug reproduction device, a computing device, and a computer-readable storage medium. Background technique [0002] With the rapid development of computer technology, various application software emerge in endlessly. When users use application software, it is inevitable that there will be problems or loopholes, such as gold coin deduction errors, interface confusion, etc. When application software maintenance personnel deal with loopholes reported by users, in some cases, they need to reproduce the loopholes for analysis and resolution. [0003] In the existing technology, application software maintenance personnel need users to provide as many pictures and text details as possible, such as the time when the vulnerability occurred, screenshots, scene descriptions, etc., and then use the internal acco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/36
CPCG06F11/3672G06F21/577
Inventor 邹学黄飚
Owner ZHUHAI KINGSOFT ONLINE GAME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products