Method and device for automatically reinforcing application vulnerabilities

A loophole and automatic technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low reinforcement efficiency and easy omission, and achieve the effect of high reinforcement efficiency and automatic reinforcement process

Pending Publication Date: 2017-03-22
JIANGSU PAYEGIS TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and device for automatic reinforcement of application loopholes to solve the problems of low reinforcement efficiency and easy omission in the prior art.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for automatically reinforcing application vulnerabilities
  • Method and device for automatically reinforcing application vulnerabilities
  • Method and device for automatically reinforcing application vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0014] figure 1 A schematic flow diagram showing a method for automatic reinforcement of application vulnerabilities according to an embodiment of the present invention, as shown in figure 1 As shown, the method specifically includes the following steps:

[0015] Step S101 , detecting an application, and obtaining a result of vulnerability data of the application.

[0016] Wherein, the applications described herein may be mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for automatically reinforcing application vulnerabilities. The method comprises the following steps: detecting an application, and acquiring a vulnerability data result of the application; according to the vulnerability data result, acquiring a corresponding vulnerability security patch; and according to the vulnerability data result, using the vulnerability security patch to reinforce the application. By using the scheme of the invention, after detecting the application vulnerabilities, targeted reinforcement can be performed on the vulnerabilities automatically according to the vulnerability data result obtained by detecting. The whole reinforcement process is more automatic and intelligent, and the reinforcement efficiency is higher.

Description

technical field [0001] The invention relates to the field of software, in particular to a method and device for automatically reinforcing application vulnerabilities. Background technique [0002] With the development of science and technology, various smart terminals provide great convenience for users' life, work and entertainment, and terminal devices have been widely used. Subsequently, the types and quantities of application programs applied to each terminal device are also increasing, and the security problems of the applications are also becoming more and more prominent. Applications developed by different developers have a large number of high-risk vulnerabilities and are extremely vulnerable to attacks, which may cause privacy leakage and other problems when users use them. [0003] The number of application vulnerabilities is huge, and most of the existing technologies use manual traditional security detection, and after detection, use reinforcement methods to str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/554G06F21/577
Inventor 汪德嘉华保健宋超
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products