Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device, electronic device and storage medium for improving system security

A system security and file technology, applied in the field of information processing, can solve problems such as limited effects, achieve the effect of ensuring the quality of experience and reducing the risk of exploiting vulnerabilities

Active Publication Date: 2021-10-22
深圳市腾讯网域计算机网络有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of vulnerability prevention, programmers mainly consider minimizing the occurrence of loopholes in the program development process, but this method will be limited by many conditions and the effect is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, electronic device and storage medium for improving system security
  • Method, device, electronic device and storage medium for improving system security
  • Method, device, electronic device and storage medium for improving system security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure relates to a method and device for improving system security, electronic equipment and a storage medium, and belongs to the technical field of information processing. The method for improving system security includes receiving a first file in a first encoding format uploaded from a first client; decoding the first file based on the first encoding format to obtain a decoded file; Encoding is performed in the second encoding format of the encoding format to generate a second file; in response to the file acquisition request of the second client, the second file is sent to the second client. The invention can reduce or avoid the risk of loopholes being exploited.

Description

technical field [0001] The present disclosure relates to the technical field of information processing, and in particular, relates to a method for improving system security, a device for improving system security, electronic equipment, and a computer-readable storage medium. Background technique [0002] With the development of computer technology and Internet technology, the problem of how to improve system security has become increasingly prominent. [0003] Usually, the loopholes always exist from the time when a program develops a loophole until the program is put into operation. Vulnerability exploiters will find vulnerabilities through vulnerability discovery, and use the vulnerabilities to attack the system or other terminals. In general, the process of vulnerability generation and utilization includes program development, vulnerability generation, vulnerability discovery, and vulnerability utilization. In terms of vulnerability prevention, programmers mainly consid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 曹飞殷赵辉盛子骁谢能淳宋青原卢正军
Owner 深圳市腾讯网域计算机网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products