Code scanning method and terminal equipment
A scanning method and code technology, applied in the field of information security, can solve the problems of low efficiency of manual review, high risk of information leakage, and low detection coverage, so as to improve the efficiency of code scanning, detection code coverage, and reduce the risk of information leakage Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
[0037] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.
[0038] figure 1 It is a schematic flowchart of the implementation flow of the code scanning method provided by the embodiment of the present invention, and is described in detail as follows.
[0039] Step 101, obtain the software package to be scanned, and decompress ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com