Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for bug repairing

A vulnerability repair and vulnerability technology, applied in the Internet field, can solve the problem of low accuracy of the risk level setting mechanism, and achieve the effect of avoiding miscalculation

Active Publication Date: 2017-12-15
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method, device and storage medium for repairing bugs, which can solve the problem of low accuracy of the risk level setting mechanism of work orders in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for bug repairing
  • Method and device for bug repairing
  • Method and device for bug repairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or modules is not necessarily limited to the expressly listed Those steps or modules, but may include other steps or modules that are not clearly listed or inherent to these processes, methods, products or equipment, and the division of modules presented in this application is only a logical division , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for bug repairing and a storage medium. The method includes the following steps that safety bug information sent by an application is obtained, wherein the safety bug information includes a bug assembly having bugs in the application and the bug risk level; at least two copies of historical data associated with the safety bug information are searched out from a historical database; according to the at least two copies of historical data, a weighted assessment is conducted on the bug risk level of the bug assembly, and the weighted average is obtained and used for representing the level of risk assessment of the bug assembly; according to the weighted average, safety work order information is generated and transmitted to the application, so that the application conducts bug repairing on the bug assembly according to the safety work order information. By means of the scheme, the risk level of the bugs needing to be reported currently can be truly and accurately reflected, and misestimation is avoided.

Description

technical field [0001] The present application relates to the field of Internet technologies, and in particular to a method, device and device for repairing bugs. Background technique [0002] For the assessment of vulnerability risk level, the policy personnel generally evaluate the vulnerability risk level according to the exploitability of the vulnerability (mainly including three attributes: attack path, attack complexity, and authentication). Set a corresponding policy in the security policy. In the subsequent vulnerability detection process for work orders, the security policy will be matched in real time according to the detected vulnerability report. When the policy corresponding to a certain risk level in the security policy is matched, the vulnerability risk level of the ticket will be directly defaulted to the vulnerability risk level corresponding to the policy, and then the early warning operation will be performed according to the policy. [0003] It can be s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 张栋陈龙辉唐艳平唐雪姣金朝林张东蕊李伟添
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products