Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for monitoring bug attack and terminal equipment

A vulnerability and cloud server technology, applied in the field of network security, can solve the problems of not being able to know the vulnerability attack, not being able to obtain the vulnerability attack information in time, and achieve the effect of improving timeliness

Inactive Publication Date: 2018-04-27
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the installation of the patch package can effectively prevent possible attacks to a certain extent, it cannot obtain some information about vulnerability attacks. In order to obtain some information about vulnerability attacks, it is necessary to develop some other related programs or use some other technologies However, developing some other related programs or adopting some other technologies not only requires a certain amount of development time, resulting in the inability to obtain information about vulnerability attacks in a timely manner, but also requires a certain amount of manpower and material resources. Therefore, how to obtain information quickly and efficiently Information about vulnerability attacks, timely analysis and early warning of vulnerability attacks have become a difficult problem for those skilled in the art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring bug attack and terminal equipment
  • Method and device for monitoring bug attack and terminal equipment
  • Method and device for monitoring bug attack and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, in which the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary, and are only used to explain the present invention, and cannot be construed as limiting the present invention.

[0049] Those skilled in the art can understand that, unless specifically stated otherwise, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the term "comprising" used in the specification of the present invention refers to the presence of the described features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, eleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for monitoring a bug attack and terminal equipment. The bug attack monitoring method comprises the steps that a hotfix matched with a process bug is obtained; when the installation triggering condition is detected, the bug is repaired by installing the hotfix; related information that the bug is attacked is monitored on the basis of theinstalled hotfix. According to the method, a user or a hotfix developer can learn the related information of the bug attack in time on the basis of the hotfix, complex operations of additionally developing other related programs or adopting other technologies or the like are not needed, and the time effect of learning the bug attack information is greatly improved.

Description

Technical field [0001] The present invention relates to the technical field of network security. Specifically, the present invention relates to a method, device and terminal equipment for monitoring vulnerability attacks. Background technique [0002] Vulnerabilities may come from defects in application or operating system design or errors in coding, or from design flaws in the interactive processing of the business or unreasonable logic flow. These flaws, errors or unreasonable points may be maliciously exploited by hackers, which will have an unfavorable impact on the operation of an application. For example, the information system is attacked or controlled, important information is stolen, user data is tampered with, and the system is used as an intrusion into other host systems The springboard and so on. [0003] In order to prevent vulnerabilities from causing adverse effects on user terminals or cloud servers, currently, vulnerabilities are usually fixed by installing corres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57G06F8/61
CPCG06F8/61G06F21/552G06F21/577G06F2221/033
Inventor 程博张建新
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products