Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Code scanning method and terminal equipment

A scanning method and code technology, applied in the field of information security, can solve the problems of low efficiency of manual review, high risk of information leakage, and low detection coverage, so as to improve the efficiency of code scanning, detection code coverage, and reduce the risk of information leakage Effect

Pending Publication Date: 2020-08-28
SHENZHEN JIESHUN SCI & TECH IND
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a code scanning method and a terminal device to solve the problems of low efficiency of manual review, low detection coverage and high risk of information leakage in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code scanning method and terminal equipment
  • Code scanning method and terminal equipment
  • Code scanning method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0037] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0038] figure 1 It is a schematic flowchart of the implementation flow of the code scanning method provided by the embodiment of the present invention, and is described in detail as follows.

[0039] Step 101, obtain the software package to be scanned, and decompress ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of information security, and provides a code scanning method and terminal equipment, and the method comprises the steps: obtaining a to-be-scanned software package, decompressing all compressed files in the to-be-scanned software package, obtaining decompressed files, and marking the compressed files which cannot be decompressed as risk files; scanning the decompressed files in sequence according to a preset file type detection rule and a preset file content detection rule to obtain a scanning result. The software package to be scanned can be automatically decompressed, the decompressed file can be automatically scanned and detected, the code scanning efficiency and the detection code coverage rate are improved, and the information leakagerisk is reduced.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a code scanning method and terminal equipment. Background technique [0002] When the software is released, it is necessary to review whether the outgoing software contains other entrained files and whether there is a risk of information leakage. Therefore, an information security audit is required to prevent entrainment, code leakage, and other behaviors. At present, when auditing software to be sent out, it is usually necessary to manually audit each text and each node of the software in turn. Risk of leakage is high. Contents of the invention [0003] In view of this, an embodiment of the present invention provides a code scanning method and a terminal device to solve the problems in the prior art of low efficiency of manual review, low detection coverage, and high risk of information leakage. [0004] The first aspect of the embodiments of the pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 唐健朱小良黄龙明梁锋
Owner SHENZHEN JIESHUN SCI & TECH IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products