Vulnerability repair confirmation method and device, terminal and storage medium
A vulnerability repair and verification device technology, which is applied to the generation of response errors, instruments, and electrical and digital data processing, etc., can solve the problem that code auditors cannot intuitively understand the vulnerability repair situation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] In order to make the purpose, technical solutions and advantages of this application clearer, the following in conjunction with the attached Figure 1-2 And embodiment, this application is described in further detail. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.
[0044] The embodiment of the vulnerability repair confirmation terminal of the present application will be further described in detail below in conjunction with the accompanying drawings.
[0045] The embodiment of this application provides a vulnerability repair confirmation terminal, such as figure 1 As shown, the terminal includes an input device 1, a vulnerability repair confirmation device 2 and a display device 3, the input end of the vulnerability repair confirmation device 2 is connected to the input device 1, and the output end of the vulnerability repair confirmation device 2 is connected ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com