Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Program vulnerability repair method and device, storage medium and server

A vulnerability repair and program technology, applied in the computer field, can solve problems such as incompatibility of large-scale projects, interruption of business operations, impact on user experience, etc., to avoid interruption and the impact of program operation, and to achieve the effect of simple and convenient operation

Pending Publication Date: 2020-02-14
SHANGHAI MIHOYO TIANMING TECH CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method uses shared memory, which brings many restrictions to programming work, which greatly affects development efficiency, and will cause a short-term suspension of business during the restart process, affecting user experience
2. Use scripts to write logic, because the script files are interpreted and executed, and the new script files are reloaded into the process when the vulnerability is repaired, so as to achieve the purpose of repairing the vulnerability. This solution makes most of the business code be placed in the script It is very unsuitable for large-scale projects, which greatly increases the difficulty of project maintainability and expansion
[0004] The current bug fix methods for servers and server clusters have the following problems: affecting development efficiency, causing interruption of current running business, and increasing maintenance difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program vulnerability repair method and device, storage medium and server
  • Program vulnerability repair method and device, storage medium and server
  • Program vulnerability repair method and device, storage medium and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 It is a schematic flowchart of a method for repairing program vulnerabilities provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of repairing program vulnerabilities for server clusters. This method can be executed by the device for repairing program vulnerabilities provided by the embodiment of the present invention. The vulnerability repairing device can be realized by means of software and / or hardware, and can be integrated into at least one server in the server cluster, and specifically includes the following steps:

[0028] S110. When it is detected that there is a dynamic library update in the patch directory file, determine at least one target function to be repaired according to the updated dynamic library.

[0029] S120. Adaptively load the updated dynamic library.

[0030] S130. Based on the loaded updated dynamic library, establish a jump connection between the at least one target function and the updated dy...

Embodiment 2

[0041] image 3 It is a schematic flow diagram of a method for repairing program bugs provided in Embodiment 2 of the present invention, which is optimized on the basis of the above embodiments, and the method specifically includes:

[0042] S210. When it is detected that there is a dynamic library update in the patch directory file, determine at least one target function to be repaired according to the updated dynamic library.

[0043] S220. Adaptively load the updated dynamic library.

[0044] S230. Verify the updated dynamic library.

[0045] S240. When the verification fails, uninstall the updated dynamic library, and generate prompt information for the updated dynamic library.

[0046] S250. When the verification is successful, set the lock variable including each thread in the target function process to a locked state, and based on the loaded updated dynamic library, establish a relationship between the at least one target function and the updated dynamic library The ...

Embodiment 3

[0054] Figure 4 It is a schematic structural diagram of a program vulnerability repairing device provided in Embodiment 3 of the present invention. The device includes a target function determination module 310, a dynamic library loading module 320, and a target function repairing module 330, wherein:

[0055] The target function determination module 310 is used to determine at least one target function to be repaired according to the updated dynamic library when it is detected that there is a dynamic library update in the patch directory file;

[0056] A dynamic library loading module 320, configured to adaptively load the updated dynamic library;

[0057] The target function repair module 330 is configured to establish a jump connection between the at least one target function and the updated dynamic library based on the loaded updated dynamic library, wherein the jump connection is used to execute any When the target function is described, the update dynamic library is ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a program vulnerability repairing method and device, a storage medium and a server. The program vulnerability repairing method comprises the steps: when it is detected that a dynamic library update exists in a patch directory file, determining at least one to-be-repaired target function according to the update dynamic library; loading the updating dynamic library in a self-adaptive mode; and on the basis of the loaded update dynamic library, establishing a skip connection between the at least one target function and the update dynamic library, the skip connection beingused for calling the update dynamic library when any target function is executed so as to repair the target function. According to the program vulnerability repair method, a server does not need to berestarted, meanwhile, script logic does not need to be modified, and operation is easy and convenient, and interruption of service logic and influences on program running are avoided.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method, device, storage medium and server for repairing program vulnerabilities. Background technique [0002] With the continuous development of computer technology, online games also develop rapidly and are accepted by the majority of users. [0003] For the game server cluster, if there is a loophole in the system, the online game may fail when it is running, causing the online game to run incorrectly. At present, the repair of vulnerabilities in game server clusters generally adopts the following methods: 1. Set up shared memory to save the old process data, then shut down for maintenance, restart the new process after replacing the application, and the new process reads from the shared memory. The old process data is retrieved, so that the process business can be continued. This method uses shared memory, which brings many restrictions to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/65G06F8/61G06F9/445G06F21/57
CPCG06F8/65G06F8/61G06F9/44521G06F21/577G06F2221/033Y02D10/00
Inventor 沈正义汪正东李强
Owner SHANGHAI MIHOYO TIANMING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products