Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection device and method for security vulnerability of software

A vulnerability detection and software security technology, applied in the computer field, can solve the problems of threats, personal privacy loss, Internet terminal attacks, etc., and achieve the effect of high use value

Inactive Publication Date: 2012-07-04
AVIATION IND INFORMATION CENT
View PDF5 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the information age, network leaks are increasing, and network security is getting more and more attention. From state secrets to personal privacy, there are risks and threats from network leaks. On the Internet, it is often the case that Internet terminals are attacked by exploiting software loopholes. For example, how to avoid such incidents requires the detection of software vulnerabilities. At present, there is no effective means to completely eliminate such phenomena, but the security vulnerability detection of the software itself has become a means of avoiding similar incidents, which is increasingly valued.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection device and method for security vulnerability of software
  • Detection device and method for security vulnerability of software
  • Detection device and method for security vulnerability of software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention is specifically described below in conjunction with the accompanying drawings, as figure 1 As shown, a large-scale design software security vulnerability detection device, the tester connects the test terminal to the target system, can connect the target system to the test network, and can also connect this product to the production system where the target system is located. Security testing service personnel can select and schedule corresponding attack scripts in the test case library according to the environment and version of the target system to conduct penetration testing. The system security analysis and test management platform is the core of the present invention, including a vulnerability discovery system, a vulnerability verification and analysis system, a penetration testing system, a vulnerability library, a test case library, a report output system, a user and authority management system, and a system management platform Wait. The ded...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computers, in particular to a detection device and method for a security vulnerability of a dedicated information system. According to the detection device and method disclosed by the invention, a tester can not only access a target system to a testing network but also access the detection device to a production system by connecting a test terminal with the target system, wherein the target system is located in the production system. As the core of the detection device, a system security analysis and test management platform comprises a vulnerability discovering system, a vulnerability authenticating and analyzing system, a permeability testing system, a vulnerability library, a test case library, a report outputting system, a user and permission management system, a system management platform and the like. When the detection device and method for the security vulnerability of the software, provided by the invention, are adopted, the vulnerability can be found before the application of the software, and corresponding strategies can be provided, so that the detection device and method meet the requirement on the emphasis on information security in the current society in a better manner; and moreover, the detection device and method have a higher application value.

Description

technical field [0001] The invention relates to the field of computers, in particular to a device and method for detecting security loopholes in large-scale design software. Background technique [0002] In the information age, network leaks are increasing, and network security is getting more and more attention. From state secrets to personal privacy, there are risks and threats from network leaks. On the Internet, it is often the case that Internet terminals are attacked by exploiting software loopholes. For example, how to avoid such incidents requires the detection of software vulnerabilities. At present, there is no effective means to completely eliminate such phenomena, but the security vulnerability detection of the software itself has become a means of avoiding similar incidents. Increasing attention has been paid. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a special application system software and g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
Inventor 田志民林奇张朝范久文任长伟罗雪莱孟庆浩
Owner AVIATION IND INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products