Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security scanning function implementation method based on graphical programming

A graphical programming and network security technology, applied in the field of network security scanning function based on graphical programming, can solve problems such as no design method, and achieve the effect of improving timeliness

Active Publication Date: 2019-09-17
NAT UNIV OF DEFENSE TECH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] All of the above solutions have developed corresponding graphical programming environments for specific applications. Since the module design, function implementation, code generation, and interface operations of graphical programming are closely related to specific applications, there is no similar graphical programming environment in the field of network security. programming design method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security scanning function implementation method based on graphical programming
  • Network security scanning function implementation method based on graphical programming
  • Network security scanning function implementation method based on graphical programming

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0061] Glossary:

[0062] Atomic load: The atomic load in the present invention refers to the atomic function module, and the program is directly assembled from the atomic load and logical relations.

[0063] Graphic element / graphic module / visual display icon: The graphic element, graphical module and visual display icon in the present invention have the same meaning and can be interchanged, and all represent the representation of the atomic function module in the graphical interface.

[0064] Graphical programming: refers to the process of using basic graphic elements as programming elements to implement specific function software programming by adding, dragging and splicing graphic elements. This programming method frees users from tedious code writing, pays more attention to the realization of business functions, and can effectively improve progr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security scanning function implementation method based on graphical programming. The network security scanning function implementation method comprises the steps: constructing a graphical module based on name + parameter, realizing basic atomic functions in a network security scanning tool, wherein the function of each atomic function module is indicated through the names, and double-clicking primitives corresponding to the atomic function modules to pop up a parameter configuration interface to realize self-defined configuration of the parameters; compiling each constructed graphical module into a code logic sequence which can be normally executed by constructing a logic generation tree; and performing automatic error detection processing on a result constructed by the graphical module, thereby realizing a network security scanning function based on graphical programming. According to the scheme, on one hand, rapid generation and diversified configuration of an existing scanning tool can be achieved; and on the other hand, a new scanning tool can be flexibly customized and generated for newly appearing security problems and vulnerabilities, and the timeliness of the tool is improved.

Description

Technical field [0001] The invention belongs to the technical field of network security and relates to a method for implementing network security scanning functions based on graphical programming. Background technique [0002] Graphical programming is a new programming method produced after software programming technology has gone through machine code and assembly language to the stage of high-level language programming. It mainly uses graphical modules as programming elements. By simply adding and dragging several graphical modules for configuration, the required program can be generated, thereby freeing users from tedious code writing and focusing more on business functions. Realize, effectively improve the development efficiency and maintenance level of the program. [0003] Because of the strong correlation between the interface graphics module and the underlying code in graphical programming, graphical programming is mainly used in some special business areas. The most typic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/34
CPCG06F8/34
Inventor 杨国正刘京菊陆余良王永杰钟晓峰卢灿举
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products