Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer software security loophole repairing apparatus and method

A software security and vulnerability repair technology, applied in the computer field, can solve problems such as difficulty in ensuring normal use of the network, inability to play a decisive role, and harm

Active Publication Date: 2006-05-03
KINGSOFT
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At this stage, the threat of computer software security loopholes is becoming more and more serious, and for the computer networks of various enterprises and institutions, hacker invasion and virus damage caused by software security loopholes are more likely to cause huge harm
To prevent these hazards, it is fundamentally necessary to repair the security holes, and other technical means cannot play a decisive role
At present, the vulnerability repair for the network is still not reliable, stable, and easy to use, and is easily restricted by various conditions. The main manifestations are: usually based on a single computer, the unified repair management of the security vulnerabilities of each computer software on the network cannot be guaranteed; The download of the vulnerability repair program occupies a huge amount of external network bandwidth resources, and it is difficult to guarantee that it will not affect the normal use of the network; it is often limited by the authority management of the operating system, and the vulnerability cannot be repaired normally when the system is not logged in or logged in as a restricted user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer software security loophole repairing apparatus and method
  • Computer software security loophole repairing apparatus and method
  • Computer software security loophole repairing apparatus and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Such as figure 1 As shown, a computer software security vulnerability repairing device includes a central management module and at least one client module; the central management module contains a software security vulnerability repair program download center module, a control module and a software security vulnerability definition central database; The client module includes a client main module, a policy execution module, a software security vulnerability definition synchronization module, a client software security vulnerability definition database, a software security vulnerability repair module, a software security vulnerability scanning module, and a client software security vulnerability repair program download module ; The client software security loophole repair program download module and the software security loophole patch download center module in the central management module, the client main module and the control module in the central management module, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a computer software safety loophole restoring apparatus and method in the field of computer. It also provides a restoring method which comprises two achieving method: 1) first it uses the communication managing module to inform client end to scan the software safety loophole of the computer and restores the software safety loophole by the scanning result; 2) first it uses the client to scan the software safety loophole of the computer and restores the software safety loophole by the scanning result.

Description

technical field [0001] The invention relates to the field of computers, in particular to a device and method for repairing computer software security loopholes. Background technique [0002] At this stage, the threat of computer software security loopholes is becoming more and more serious, and for the computer networks of various enterprises and institutions, hacker invasion and virus damage caused by software security loopholes are more likely to cause huge harm. To prevent these hazards, it is fundamentally necessary to repair the security holes, and other technical means cannot play a decisive role. At present, the vulnerability repair for the network is still not reliable, stable, and easy to use, and is easily restricted by various conditions. The main manifestations are: usually based on a single computer, the unified repair management of the security vulnerabilities of each computer software on the network cannot be guaranteed; The download of the vulnerability repa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00G06F11/36
Inventor 陈勇刘桂峰王嗣恩杨晓东都斌孟槟榔陈睿
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products