Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System for detecting and repairing kylin operating system vulnerabilities based on USB flash disk

An operating system and vulnerability technology, applied in response to error generation, digital data authentication, etc., can solve problems such as large impact on the host system, high false alarm rate, inapplicability of the Kirin operating system and user groups, etc., to achieve accurate repair solutions, The effect of high-precision scanning

Pending Publication Date: 2022-07-08
KYLIN CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a system for detecting and repairing the vulnerabilities of the Kylin operating system based on a U disk, which is used to solve the problem that the existing vulnerability scanning technology is not suitable for the Kylin operating system and user groups, resulting in high false alarm rate and poor security , Technical issues that have a large impact on the host system and have no ability to repair Kylin system operating vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for detecting and repairing kylin operating system vulnerabilities based on USB flash disk
  • System for detecting and repairing kylin operating system vulnerabilities based on USB flash disk
  • System for detecting and repairing kylin operating system vulnerabilities based on USB flash disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0022] In the description of the embodiments of the present application, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" The orientation or positional relationship indicated by ” etc. is based on the orientation or positional relationship shown i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system for detecting and repairing kylin operating system vulnerabilities based on a USB flash disk. The system comprises an authentication encryption module, a scanning module, a report generation module and a vulnerability repairing module, the authentication encryption module is used for acquiring a USB flash disk starting key, authenticating the key, and starting the USB flash disk and opening an entrance of the scanning module if the authentication is passed; the scanning module is used for sampling, comparing and analyzing system software package information and system configuration feature information through the scanning module entrance, acquiring original data of software packages with vulnerabilities and influences and unsafe configuration items, and transmitting the original data to the report generation module; the report generation module performs system carding and data integration statistics on the original data output by the scanning module, generates a clear, visual and readable image-text vulnerability scanning report, and outputs the image-text vulnerability scanning report to a USB flash disk for storage; and the vulnerability repairing module is used for repairing patches and reinforcing measures for corresponding vulnerabilities.

Description

technical field [0001] The present application relates to the technical field of U disk detection and repair system loopholes, in particular to a system for detecting and repairing Kylin operating system loopholes based on U disk. Background technique [0002] Operating system is the cornerstone and foundation of information industry network security. The vulnerability detection and repair technology of the operating system is an important core technology to ensure the security of the operating system and the security of the upper-layer software and user information storage and transmission. Vulnerability refers to some functional or security logic defects in the system, including all factors that cause threats and damage the security of the computer system, and are the specific implementation of the computer system in hardware, software, protocols or system security policies. flaws and deficiencies. The emergence and existence of computer operating system vulnerabilities ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/07G06F21/34
CPCG06F11/0706G06F11/0796G06F21/34
Inventor 路明罗雨佳姬一文杨诏钧马桂才魏立峰孔金珠
Owner KYLIN CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products