Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability repair confirmation method and device, terminal and storage medium

A vulnerability repair and verification device technology, which is applied to the generation of response errors, instruments, and electrical and digital data processing, etc., can solve the problem that code auditors cannot intuitively understand the vulnerability repair situation.

Pending Publication Date: 2022-01-04
SECZONE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Regarding the related technologies mentioned above, the inventor believes that after the modification by the R&D personnel, the code auditors cannot intuitively understand the repair status of the vulnerability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability repair confirmation method and device, terminal and storage medium
  • Vulnerability repair confirmation method and device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of this application clearer, the following in conjunction with the attached Figure 1-2 And embodiment, this application is described in further detail. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0044] The embodiment of the vulnerability repair confirmation terminal of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0045] The embodiment of this application provides a vulnerability repair confirmation terminal, such as figure 1 As shown, the terminal includes an input device 1, a vulnerability repair confirmation device 2 and a display device 3, the input end of the vulnerability repair confirmation device 2 is connected to the input device 1, and the output end of the vulnerability repair confirmation device 2 is connected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability repair confirmation method and device, a terminal and a storage medium, and relates to the field of code auditing, and the method comprises the steps: obtaining all vulnerability information in a to-be-audited code; according to each piece of acquired vulnerability information, establishing a vulnerability to-be-confirmed model; comparing a preset vulnerability model with each vulnerability to-be-confirmed model; and according to a comparison result, outputting a vulnerability repair condition. According to the method, the preset vulnerability model is compared with each vulnerability to-be-confirmed model obtained and established from the to-be-audited code one by one, and the vulnerability repair condition is output according to the comparison result, so that code auditing personnel can directly check the vulnerability repair condition, the repair condition of the vulnerability of the to-be-audited code can be intuitively known, and the code auditing can be smoothly carried out.

Description

technical field [0001] The invention relates to the field of code auditing, in particular to a vulnerability repair confirmation method, device, terminal and storage medium. Background technique [0002] Vulnerabilities are weaknesses or flaws in hardware, software, protocol implementation or system security policies, which allow attackers to access or destroy the system without authorization. Vulnerabilities may come from flaws in application software or operating system design or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These flaws, errors or irrationality may be exploited intentionally or unintentionally, thereby adversely affecting the assets or operation of an organization, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and systems being used as A springboard for intrusion into other host systems, etc. [0003] Code is an integ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/00G06F11/07
CPCG06F11/008G06F11/0751G06F11/079G06F11/0793
Inventor 万振华
Owner SECZONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products