CN103885808A - Hotfix processing method and device - Google Patents

Hotfix processing method and device Download PDF

Info

Publication number
CN103885808A
CN103885808A CN201410139346.XA CN201410139346A CN103885808A CN 103885808 A CN103885808 A CN 103885808A CN 201410139346 A CN201410139346 A CN 201410139346A CN 103885808 A CN103885808 A CN 103885808A
Authority
CN
China
Prior art keywords
patch
program module
module
information
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410139346.XA
Other languages
Chinese (zh)
Inventor
张聪
郑文彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410139346.XA priority Critical patent/CN103885808A/en
Publication of CN103885808A publication Critical patent/CN103885808A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a hotfix processing method and device. The method includes the steps of monitoring whether a new program module is loaded or not, if yes, obtaining patch information corresponding to the program module, and conducting hotfix processing on the program module according to the patch information before the program module runs. According to the technical scheme, by monitoring the loading condition of the new program module, the patch information corresponding to the program module is obtained after the program module is loaded, hotfix processing is conducted on the program module according to the patch information before the program module runs, and therefore a system program or an application can be repaired or upgraded under the condition that program running is not interrupted, and patch processing efficiency is improved.

Description

Hot patch disposal route and device
Technical field
The present invention relates to a kind of computer realm, particularly relate to a kind of hot patch disposal route and device.
Background technology
At present, Microsoft (Microsoft Corporation) will stop the support service of the Windows XP system that its company is produced comprehensively, no longer issues the leak patch about Windows XP system to personal user.But show according to relevant industries mechanism statistics, Windows XP system still has 25% in the occupation rate of world market, and has exceeded especially 70% in the occupation rate of China.For existing Windows XP system user, there is no like this support service of official, hacker will inevitably utilize system vulnerability to propagate trojan horse, and user computer is attacked, and forms security threat.
Therefore, a kind of technical scheme need to be provided, support the system program of service or application program to carry out the method for hot patch to realize to the existing official that can not get, in the process of not interrupt routine operation, system program or application program are repaired or to be upgraded, improve patch treatment effeciency.
Summary of the invention
In view of the above problems, the present invention has been proposed so that a kind of hot patch disposal route and device that overcomes the problems referred to above or address the above problem is at least in part provided.
According to one aspect of the present invention, a kind of hot patch disposal route is provided, comprising:
Whether monitoring has new program module to load;
If have, obtain patch information corresponding to described program module;
Before described program module operation, according to described patch information, described program module is carried out to hot patch processing.
Optionally, aforesaid hot patch disposal route, wherein, described in obtain patch information corresponding to described program module, comprising:
Extract the characteristic information of described program module;
According to default characteristic information and the corresponding relation of patch information, obtain the patch information that described characteristic information is corresponding.
Optionally, aforesaid hot patch disposal route, wherein, described characteristic information comprises: the filename of program module, the file path of program module, one or any number of combinations in the version information VersionInfo field of the time stamp T imeStamp field of program module, the verification of program module and CheckSum field and program module.
Optionally, aforesaid hot patch disposal route, wherein, described patch information comprises: patch function address and by patch function address; Accordingly,
Describedly before the operation of described program module, according to described patch information, described program module is carried out to hot patch processing, comprising:
Before described program module operation, according to described patch function address and described by patch function address, structure jump instruction;
To described in described program module, be replaced with described jump instruction by the instruction at patch function address place.
Optionally, aforesaid hot patch disposal route, described before described program module operation, according to described patch information, after described program module is carried out to hot patch processing, also comprise:
Carry out described program module, and in the process of implementation in the time calling described in described program module by the instruction at patch function address place, jump to the patch function at described patch function address place according to described jump instruction, carry out described patch function.
Optionally, aforesaid hot patch disposal route, also comprises:
Obtain the address of adding hook Hook function, wherein, whether described Hook function has new program module to load for monitoring;
Articulate described Hook function at described address place.
According to another aspect of the present invention, provide a kind of hot patch treating apparatus, having comprised:
Whether monitoring modular, have new program module to load for monitoring;
The first acquisition module, for when described monitoring module monitors is when having new program module to load, obtains patch information corresponding to described program module;
Processing module, for before described program module operation, according to described patch information, carries out hot patch processing to described program module.
Optionally, aforesaid hot patch treating apparatus, wherein, described the first acquisition module comprises:
Extraction unit, for extracting the characteristic information of described program module;
Acquiring unit, for according to default characteristic information and the corresponding relation of patch information, obtains the patch information that described characteristic information is corresponding.
Optionally, aforesaid hot patch treating apparatus, wherein, described patch information comprises: patch function address and by patch function address; Accordingly, described processing module comprises:
Tectonic element, for before described program module operation, according to described patch function address and described by patch function address, structure jump instruction;
Replacement unit, for being replaced with described jump instruction by the instruction at patch function address place described in described program module.
Optionally, aforesaid hot patch treating apparatus, also comprises:
Execution module, be used for carrying out described program module, and in the process of implementation in the time calling described in described program module by the instruction at patch function address place, jump to the patch function at described patch function address place according to described jump instruction, carry out described patch function.
Optionally, aforesaid hot patch treating apparatus, also comprises:
The second acquisition module, for obtaining the address of adding hook Hook function, wherein, whether described Hook function has new program module to load for monitoring;
Knock-down module, for articulating described Hook function at described address place.
By technique scheme, the technical scheme that the embodiment of the present invention provides at least has following advantages:
The technical scheme that the embodiment of the present invention provides is by the load condition of monitoring new procedures module, with after loading in program module, obtain the patch information of described program module, then before program module operation, according to described patch information, described program module is carried out to hot patch processing, so just can be in the situation that interrupt routine move, system program or application program are repaired or upgraded, improved the efficiency of patch processing.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, below with preferred embodiment of the present invention and coordinate accompanying drawing to be described in detail as follows.
Brief description of the drawings
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skill in the art.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows a kind of schematic flow sheet of realizing of the hot patch disposal route that the embodiment of the present invention one provides;
Fig. 2 shows the schematic flow sheet that the another kind of the hot patch disposal route that the embodiment of the present invention one provides is realized;
Fig. 3 shows a kind of structural representation of realizing of the hot patch treating apparatus that the embodiment of the present invention two provides;
Fig. 4 shows the implementation structure schematic diagram of the first acquisition module described in the hot patch treating apparatus that the embodiment of the present invention two provides;
Fig. 5 shows the implementation structure schematic diagram of processing module described in the hot patch treating apparatus that the embodiment of the present invention two provides;
Fig. 6 shows the structural representation that the another kind of the hot patch treating apparatus that the embodiment of the present invention two provides is realized.
Embodiment
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
The schematic flow sheet of the hot patch disposal route that as shown in Figure 1, the embodiment of the present invention one provides.As shown in Figure 1, the executive agent of the described method of the present embodiment can be hot patch treating apparatus.Wherein, described hot patch treating apparatus can be specially the client application software being arranged on client device.User is after hot patch treating apparatus described in local installation, in local computer, stored the patch information for carrying out hot patch processing, or local computer can carry out alternately to obtain corresponding patch information in real time by internet and server end.As shown in Figure 1, the hot patch disposal route described in the present embodiment comprises:
Whether step 101, monitoring have new program module to load.
Concrete, this step can adopt the message processing facility of existing Windows, and HOOK mechanism realizes.Wherein, the message processing facility of Windows for can be in application program the variety of event message of supervisory system, the function that articulates various hooks (also or claim readjustment or instead adjust English Hook) function is provided.HOOK function is used for monitoring the transmittance process of message, and before it arrives object process or object module, by its intercepting and capturing.
If step 102 has, obtain patch information corresponding to described program module.
Concrete, described patch information can be stored in default hot patch application configuration file.For example, in described hot patch application configuration file, include characteristic information and the corresponding patch information of at least one program module.Wherein, the characteristic information of described program module can comprise: the filename of program module, the file path of program module, one or any number of combinations in the version information field (VersionInfo) of the timestamp field (TimeStamp) of program module, the checksum field (CheckSum) of program module and program module.
Corresponding, this step can be adopted with the following method and be realized:
First, extract the characteristic information of described program module.
Then,, according to default characteristic information and the corresponding relation of patch information, obtain the patch information that described characteristic information is corresponding.
Here you need to add is that: described hot patch application configuration file is loaded and resolved by service processes, and preserve with Memory Mapping File and its (File Mapping) object of sharing, follow-up each process is only responsible for reading File Mapping, and need not reload and resolve described hot patch application configuration file.In addition, also it should be noted that: described hot patch application configuration file also comprises check information (as cyclic redundancy check (CRC) information and version information etc.) herein.Therefore patch information corresponding to described program module that, this step gets also should meet by the integrity checking based on CRC calculating and the security inspection of version information.
Step 103, before the operation of described program module, according to described patch information, described program module is carried out to hot patch processing.
Concrete, described patch information can comprise: patch function address and by patch function address.Corresponding this step 103 specifically can be adopted with the following method and be realized:
First, before described program module operation, according to described patch function address and described by patch function address, structure jump instruction.
For example, described patch function address is 0x1600000, is 0x300080 by patch function address, adopts jump instruction operational character JMP TO, and the jump instruction that structure obtains is JMP0x12fff7b.
Then, will described in described program module, be replaced with described jump instruction by the instruction at patch function address place.
The instruction by patch function address 0x300080 place in described program module is replaced with to the jump instruction JMP0x12fff7b that previous step obtains, completed the replacement of instruction.Like this in described program module implementation, in the time carrying out described 0x300080 address place, will jump to corresponding patch function by described jump instruction JMP0x12fff7b, carry out this patch function, so just realized in the operation of interrupt routine not and just can carry out the object of reparation in real time to program.
Further, described in the method described in the present embodiment, after step 103, also comprise the steps:
Carry out described program module, and in the process of implementation in the time calling described in described program module by the instruction at patch function address place, jump to the patch function at described patch function address place according to described jump instruction, carry out described patch function.
Here you need to add is that: described patch function is read in patch file buffer zone in advance.Described patch function address can be the address of described patch file in described buffer zone.
The technical scheme that the present embodiment provides is by the load condition of monitoring new procedures module, with after loading in program module, obtain the patch information of described program module, then before program module operation, according to described patch information, described program module is carried out to hot patch processing, so just can be in the situation that interrupt routine move, system program or application program are repaired or upgraded, improved the efficiency of patch processing.
Further, as shown in Figure 2, the method described in above-described embodiment, except comprising above steps, also comprises the steps:
Step 201, the address that obtains interpolation hook Hook function.
Wherein, whether described Hook function has new program module to load for monitoring.The address of LdrpCallInitRoutine can be used as the address of described Hook function.
Step 202, articulate described Hook function at described address place.
The principle that the present embodiment articulates described Hook function is: system program normally calls and load other program modules successively according to the loading sequence of oneself.In all program modules, may there is part to have leak, also may all have leak.When present procedure module one is loaded but does not also carry out, the hot patch disposal route providing according to the present embodiment has just been carried out hot patch processing.But, after the program module of current new loading, system program does not know to load any program module, so will add Hook function after the program module loading, monitor with the program module described program module newly being loaded by described Hook function later, system program is as long as one call so below, and system program just can be known and have new module loading at first.
It should be noted that: for aforesaid each embodiment of the method, for simple description, therefore it is all expressed as to a series of combination of actions, but those skilled in the art should know, the present invention is not subject to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and related action and module might not be that the present invention is necessary.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can complete by the relevant hardware of programmed instruction, aforesaid program can be stored in a computer read/write memory medium, this program, in the time carrying out, is carried out the step that comprises said method embodiment; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
The structural representation of the hot patch treating apparatus that as shown in Figure 3, the embodiment of the present invention two provides.As shown in Figure 3, the device described in the present embodiment two comprises: monitoring modular 1, the first acquisition module 2 and processing module 3.Wherein, whether described monitoring modular has new program module to load for monitoring.When described the first acquisition module 2 loads for monitor new program module when described monitoring modular 1, obtain patch information corresponding to described program module.Described processing module 3, for before described program module operation, according to described patch information, is carried out hot patch processing to described program module.The described hot patch treating apparatus that the present embodiment provides can be realized the described hot patch disposal route that above-described embodiment provides.
The technical scheme that the present embodiment provides is by the load condition of monitoring new procedures module, with after loading in program module, obtain the patch information of described program module, then before program module operation, according to described patch information, described program module is carried out to hot patch processing, so just can be in the situation that interrupt routine move, system program or application program are repaired or upgraded, improved the efficiency of patch processing.
Further, the acquisition module described in above-described embodiment can adopt the structure shown in Fig. 4 to realize.Concrete, as shown in Figure 4, described the first acquisition module 2 comprises: extraction unit 21 and acquiring unit 22.Wherein, described extraction unit 21 is for extracting the characteristic information of described program module.Described acquiring unit 22, for according to default characteristic information and the corresponding relation of patch information, obtains the patch information that described characteristic information is corresponding, and wherein, the described patch information getting is patch information corresponding to described program module.The characteristic information of described program module comprises: the filename of program module, the file path of program module, one or any number of combinations in the version information field (VersionInfo) of the timestamp field (TimeStamp) of program module, the checksum field (CheckSum) of program module and program module.
Further, the patch information described in above-described embodiment comprises: patch function address and by patch function address.Accordingly, the processing module described in above-described embodiment can adopt the structure shown in Fig. 5 to realize.Concrete, as shown in Figure 5, described processing module 3 comprises: tectonic element 31 and replacement unit 32.Wherein, described tectonic element 31, for before described program module operation, according to described patch function address and described by patch function address, is constructed jump instruction.Described replacement unit 32 is for being replaced with described jump instruction by the instruction at patch function address place described in described program module.
Further, based on the processing module of said structure, described hot patch treating apparatus also comprises as shown in Figure 6: execution module 4.Described execution module 4 is for carrying out described program module, and in the process of implementation in the time calling described in described program module by the instruction at patch function address place, jump to the patch function at described patch function address place according to described jump instruction, carry out described patch function.
Further, as shown in Figure 6, described hot patch treating apparatus also comprises: the second acquisition module 5 and knock-down module 6.Wherein, described the second acquisition module 5 is for obtaining the address of adding hook Hook function, and wherein, whether described Hook function has new program module to load for monitoring.Described knock-down module 6 is for articulating described Hook function at described address place.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part of detailed description, can be referring to the associated description of other embodiment.
Be understandable that the reference mutually of the correlated characteristic in said method and switch.In addition, " first ", " second " etc. in above-described embodiment are for distinguishing each embodiment, and do not represent the quality of each embodiment.
Those skilled in the art can be well understood to, for convenience and simplicity of description, the system of foregoing description, the specific works process of device and unit, can, with reference to the corresponding process in preceding method embodiment, not repeat them here.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the instructions that provided herein, a large amount of details are described.But, can understand, embodiments of the invention can be put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.But, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them in addition multiple submodules or subelement or sub-component.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature instead of further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module of moving on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to the some or all functions of the some or all parts in the hot patch treating apparatus of the embodiment of the present invention.The present invention can also be embodied as part or all equipment or the device program (for example, computer program and computer program) for carrying out method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described instead of limit the invention, and those skilled in the art can design alternative embodiment in the case of not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has multiple such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim of having enumerated some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.

Claims (10)

1. a hot patch disposal route, is characterized in that, comprising:
Whether monitoring has new program module to load;
If have, obtain patch information corresponding to described program module;
Before described program module operation, according to described patch information, described program module is carried out to hot patch processing.
2. method according to claim 1, is characterized in that, described in obtain patch information corresponding to described program module, comprising:
Extract the characteristic information of described program module;
According to default characteristic information and the corresponding relation of patch information, obtain the patch information that described characteristic information is corresponding.
3. method according to claim 1 and 2, is characterized in that, described patch information comprises: patch function address and by patch function address; Accordingly,
Describedly before the operation of described program module, according to described patch information, described program module is carried out to hot patch processing, comprising:
Before described program module operation, according to described patch function address and described by patch function address, structure jump instruction;
To described in described program module, be replaced with described jump instruction by the instruction at patch function address place.
4. method according to claim 3, is characterized in that, described before described program module operation, according to described patch information, after described program module is carried out to hot patch processing, also comprises:
Carry out described program module, and in the process of implementation in the time calling described in described program module by the instruction at patch function address place, jump to the patch function at described patch function address place according to described jump instruction, carry out described patch function.
5. method according to claim 1 and 2, is characterized in that, also comprises:
Obtain the address of adding hook Hook function, wherein, whether described Hook function has new program module to load for monitoring;
Articulate described Hook function at described address place.
6. a hot patch treating apparatus, is characterized in that, comprising:
Whether monitoring modular, have new program module to load for monitoring;
The first acquisition module, for when described monitoring module monitors is when having new program module to load, obtains patch information corresponding to described program module;
Processing module, for before described program module operation, according to described patch information, carries out hot patch processing to described program module.
7. hot patch treating apparatus according to claim 6, is characterized in that, described the first acquisition module comprises:
Extraction unit, for extracting the characteristic information of described program module;
Acquiring unit, for according to default characteristic information and the corresponding relation of patch information, obtains the patch information that described characteristic information is corresponding.
8. according to the hot patch treating apparatus described in claim 6 or 7, it is characterized in that, described patch information comprises: patch function address and by patch function address; Accordingly, described processing module comprises:
Tectonic element, for before described program module operation, according to described patch function address and described by patch function address, structure jump instruction;
Replacement unit, for being replaced with described jump instruction by the instruction at patch function address place described in described program module.
9. hot patch treating apparatus according to claim 8, is characterized in that, also comprises:
Execution module, be used for carrying out described program module, and in the process of implementation in the time calling described in described program module by the instruction at patch function address place, jump to the patch function at described patch function address place according to described jump instruction, carry out described patch function.
10. according to the hot patch treating apparatus described in claim 6 or 7, it is characterized in that, also comprise:
The second acquisition module, for obtaining the address of adding hook Hook function, wherein, whether described Hook function has new program module to load for monitoring;
Knock-down module, for articulating described Hook function at described address place.
CN201410139346.XA 2014-04-08 2014-04-08 Hotfix processing method and device Pending CN103885808A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410139346.XA CN103885808A (en) 2014-04-08 2014-04-08 Hotfix processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410139346.XA CN103885808A (en) 2014-04-08 2014-04-08 Hotfix processing method and device

Publications (1)

Publication Number Publication Date
CN103885808A true CN103885808A (en) 2014-06-25

Family

ID=50954718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410139346.XA Pending CN103885808A (en) 2014-04-08 2014-04-08 Hotfix processing method and device

Country Status (1)

Country Link
CN (1) CN103885808A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915595A (en) * 2015-06-30 2015-09-16 北京奇虎科技有限公司 Virtualization bug fixing method and device through cloud platform
WO2016127566A1 (en) * 2015-02-12 2016-08-18 中兴通讯股份有限公司 Patch processing method and device
CN106815049A (en) * 2016-12-29 2017-06-09 杭州迪普科技股份有限公司 The method and device of feature database upgrading
CN107967155A (en) * 2016-10-18 2018-04-27 腾讯科技(深圳)有限公司 Method, apparatus, the server of program operation are realized based on Hook shared libraries
CN109492406A (en) * 2018-11-15 2019-03-19 百度在线网络技术(北京)有限公司 Monitor the methods, devices and systems of kernel loophole attack
CN109753793A (en) * 2017-11-07 2019-05-14 华为终端(东莞)有限公司 A kind of hot patch method and hot patch device
CN110196730A (en) * 2018-08-30 2019-09-03 腾讯科技(深圳)有限公司 Hot patch management method, device and the storage medium of application program
CN111258841A (en) * 2018-12-03 2020-06-09 中兴通讯股份有限公司 Application hot patch monitoring method and device
CN111399892A (en) * 2020-03-18 2020-07-10 深圳Tcl数字技术有限公司 Middleware program repairing method and device and computer readable storage medium
CN111562934A (en) * 2020-04-03 2020-08-21 深圳震有科技股份有限公司 Software system upgrading method based on hot patch, terminal and storage medium
CN111694594A (en) * 2020-05-18 2020-09-22 成都盛芯微科技有限公司 Control method and system of patch program
CN112631639A (en) * 2020-12-23 2021-04-09 苏州三六零智能安全科技有限公司 Patch code adding method, device, equipment and computer readable storage medium
CN112906008A (en) * 2018-11-15 2021-06-04 百度在线网络技术(北京)有限公司 Kernel vulnerability repairing method, device, server and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5619698A (en) * 1995-05-05 1997-04-08 Apple Computer, Inc. Method and apparatus for patching operating systems
US5938766A (en) * 1997-03-21 1999-08-17 Apple Computer, Inc. System for extending functionality of a digital ROM using RAM/ROM jump tables and patch manager for updating the tables
CN1475909A (en) * 2002-08-16 2004-02-18 华为技术有限公司 realization of isertion type system soft ware patch and control method
US6745385B1 (en) * 1999-09-01 2004-06-01 Microsoft Corporation Fixing incompatible applications by providing stubs for APIs
CN102722387A (en) * 2012-05-29 2012-10-10 华为技术有限公司 Dynamic patching method and device
CN102737188A (en) * 2012-06-27 2012-10-17 北京奇虎科技有限公司 Method and device for detecting malicious webpage
CN103218241A (en) * 2013-04-19 2013-07-24 华为技术有限公司 Method and device for patch loading
CN103473505A (en) * 2012-06-06 2013-12-25 腾讯科技(深圳)有限公司 Scanning prompt method and device for software vulnerabilities

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5619698A (en) * 1995-05-05 1997-04-08 Apple Computer, Inc. Method and apparatus for patching operating systems
US5938766A (en) * 1997-03-21 1999-08-17 Apple Computer, Inc. System for extending functionality of a digital ROM using RAM/ROM jump tables and patch manager for updating the tables
US6745385B1 (en) * 1999-09-01 2004-06-01 Microsoft Corporation Fixing incompatible applications by providing stubs for APIs
CN1475909A (en) * 2002-08-16 2004-02-18 华为技术有限公司 realization of isertion type system soft ware patch and control method
CN102722387A (en) * 2012-05-29 2012-10-10 华为技术有限公司 Dynamic patching method and device
CN103473505A (en) * 2012-06-06 2013-12-25 腾讯科技(深圳)有限公司 Scanning prompt method and device for software vulnerabilities
CN102737188A (en) * 2012-06-27 2012-10-17 北京奇虎科技有限公司 Method and device for detecting malicious webpage
CN103218241A (en) * 2013-04-19 2013-07-24 华为技术有限公司 Method and device for patch loading

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
兰雨晴: "《从windows到linux的应用移植实现-平台技术与接口篇》", 31 January 2013, 国防工业出版社 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016127566A1 (en) * 2015-02-12 2016-08-18 中兴通讯股份有限公司 Patch processing method and device
CN104915595B (en) * 2015-06-30 2018-08-14 北京奇安信科技有限公司 Cloud platform virtualizes the method and device of loophole reparation
CN104915595A (en) * 2015-06-30 2015-09-16 北京奇虎科技有限公司 Virtualization bug fixing method and device through cloud platform
CN107967155A (en) * 2016-10-18 2018-04-27 腾讯科技(深圳)有限公司 Method, apparatus, the server of program operation are realized based on Hook shared libraries
CN107967155B (en) * 2016-10-18 2022-01-07 腾讯科技(深圳)有限公司 Method, device, server and medium for realizing program operation based on Hook shared library
CN106815049A (en) * 2016-12-29 2017-06-09 杭州迪普科技股份有限公司 The method and device of feature database upgrading
CN106815049B (en) * 2016-12-29 2020-01-03 杭州迪普科技股份有限公司 Method and device for upgrading feature library
CN109753793B (en) * 2017-11-07 2021-05-18 华为终端有限公司 Hot patching method and hot patching device
CN109753793A (en) * 2017-11-07 2019-05-14 华为终端(东莞)有限公司 A kind of hot patch method and hot patch device
CN110196730A (en) * 2018-08-30 2019-09-03 腾讯科技(深圳)有限公司 Hot patch management method, device and the storage medium of application program
CN112906008A (en) * 2018-11-15 2021-06-04 百度在线网络技术(北京)有限公司 Kernel vulnerability repairing method, device, server and system
CN109492406A (en) * 2018-11-15 2019-03-19 百度在线网络技术(北京)有限公司 Monitor the methods, devices and systems of kernel loophole attack
CN112906008B (en) * 2018-11-15 2023-07-25 百度在线网络技术(北京)有限公司 Kernel vulnerability restoration method, device, server and system
CN111258841A (en) * 2018-12-03 2020-06-09 中兴通讯股份有限公司 Application hot patch monitoring method and device
CN111399892A (en) * 2020-03-18 2020-07-10 深圳Tcl数字技术有限公司 Middleware program repairing method and device and computer readable storage medium
CN111562934A (en) * 2020-04-03 2020-08-21 深圳震有科技股份有限公司 Software system upgrading method based on hot patch, terminal and storage medium
CN111562934B (en) * 2020-04-03 2023-08-11 深圳震有科技股份有限公司 Software system upgrading method based on hot patch, terminal and storage medium
CN111694594A (en) * 2020-05-18 2020-09-22 成都盛芯微科技有限公司 Control method and system of patch program
CN111694594B (en) * 2020-05-18 2023-03-03 成都盛芯微科技有限公司 Patch control method and system
CN112631639A (en) * 2020-12-23 2021-04-09 苏州三六零智能安全科技有限公司 Patch code adding method, device, equipment and computer readable storage medium
CN112631639B (en) * 2020-12-23 2022-11-04 苏州三六零智能安全科技有限公司 Patch code adding method, device, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN103885808A (en) Hotfix processing method and device
CN103942073A (en) Method and device for realizing system hot patching
US9886266B2 (en) Updating software based on utilized functions
KR101699981B1 (en) Memory optimization of virtual machine code by partitioning extraneous information
CN104537309A (en) Application program bug detection method, application program bug detection device and server
CN104283719A (en) Log processing method and device and server
CN104462583A (en) Browser device for advertisement blocking processing and mobile terminal
CN104537308A (en) System and method for providing application security auditing function
CN110806978A (en) Defect management method and device for third-party component
CN105099755A (en) Method, device and system for monitoring performance of website system
CN102982121A (en) File scanning method and file scanning device and file detecting system
CN102868694A (en) Method, device and system for detecting whether to control client to visit network
US10917428B2 (en) Holistic computer system cybersecurity evaluation and scoring
CN110069929B (en) Vulnerability disposal analysis method and construction method and device of analysis model thereof
CN105204916A (en) Environment variable-based project process operation method and device
US9134975B1 (en) Determining which computer programs are candidates to be recompiled after application of updates to a compiler
CN102982281A (en) Program condition detecting method and system
CN103559447A (en) Detection method, detection device and detection system based on virus sample characteristics
CN104346206A (en) Method and system for recovering installation of unloaded software
CN105204963A (en) Data caching method and device
CN102902921A (en) Method and device for detecting and eliminating computer viruses
KR102045772B1 (en) Electronic system and method for detecting malicious code
CN104899505A (en) Software detection method and software detection device
CN107229867A (en) Kernel bug excavation method, device, computing device and computer-readable storage medium
CN104915239A (en) Method and device for carrying out multi-process startup by container

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140625