Vulnerability processing and tracking method and device, computer system and readable storage medium
A vulnerability and identity information technology, applied in the field of communication, can solve the problems of low vulnerability processing completion rate, forgetting to process vulnerability data, and short online period, etc., to achieve the effect of ensuring the vulnerability processing completion rate, improving reminder efficiency, and short online period
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] see figure 1 with figure 2 , a vulnerability handling tracking method of the present embodiment, utilizing the vulnerability handling tracking device 1, comprising the following steps:
[0072] S1: Receive the vulnerability data output by the test client 2, and record the entry time of receiving the vulnerability data, obtain the test identity information and development identity information according to the vulnerability data; pack the entry time, the vulnerability data, the Obtain vulnerability packaging information through the test identity information and the development identity information;
[0073] S2: Judging the vulnerability level of the vulnerability packaging information according to the vulnerability rules;
[0074] S3: storing the vulnerability packaging information in a vulnerability database according to the vulnerability level;
[0075] S4: Utilize processing rules for the vulnerability packaging information to generate reminder information accordin...
Embodiment 2
[0168] see image 3 , a vulnerability handling tracking method 1 of the present embodiment, comprising the following steps:
[0169] Vulnerability packaging information generating module 11, used to receive the vulnerability data output by the test client 2, and record the entry time of receiving the vulnerability data, obtain test identity information and development identity information according to the vulnerability data; pack the entry time , the vulnerability data, the test identity information and the development identity information obtain vulnerability packaging information;
[0170] The vulnerability level evaluation module 12 is used to judge the vulnerability level of the vulnerability packaging information according to the vulnerability rules;
[0171] Vulnerability packaging information storage module 13, for storing the vulnerability packaging information in the vulnerability database according to the vulnerability level;
[0172] The reminder information gener...
Embodiment 3
[0176] In order to achieve the above object, the present invention also provides a computer system, the computer system includes a plurality of computer equipment 4, the components of the bug handling tracking device 1 in the second embodiment can be dispersed in different computer equipment, and the computer equipment can be executed Smartphones, tablet computers, laptops, desktop computers, rack servers, blade servers, tower servers or rack servers (including independent servers, or server clusters composed of multiple servers), etc. The computer equipment in this embodiment at least includes but is not limited to: a memory 41 and a processor 42 that can communicate with each other through a system bus, such as Figure 4 shown. It should be pointed out that, Figure 4 Only a computer device is shown with the components - but it should be understood that implementing all of the illustrated components is not a requirement and that more or fewer components may instead be imple...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com