System vulnerability detection method, device, terminal equipment and medium
A detection method and vulnerability technology, which is applied in the security field, can solve the problems of low vulnerability detection efficiency and detection accuracy, reduce the verification of repeated vulnerabilities, improve detection efficiency and detection accuracy, and ensure stable operation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
[0029] It should be understood that although the terms "first", "second", etc. are used in the text to describe various elements in some embodiments of the present invention, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
[0030] In order to illustrate the technical solutions of the present invention, specific examples are ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com