CN106295334A - Ile repair method and device - Google Patents

Ile repair method and device Download PDF

Info

Publication number
CN106295334A
CN106295334A CN201510307070.6A CN201510307070A CN106295334A CN 106295334 A CN106295334 A CN 106295334A CN 201510307070 A CN201510307070 A CN 201510307070A CN 106295334 A CN106295334 A CN 106295334A
Authority
CN
China
Prior art keywords
apocrypha
file
leak
repair procedure
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510307070.6A
Other languages
Chinese (zh)
Other versions
CN106295334B (en
Inventor
郑瀚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510307070.6A priority Critical patent/CN106295334B/en
Publication of CN106295334A publication Critical patent/CN106295334A/en
Application granted granted Critical
Publication of CN106295334B publication Critical patent/CN106295334B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application discloses a kind of Ile repair method and device.Wherein, the method includes: obtain the apocrypha with the first form that request unit is uploaded;According to the grammar property of each field in described apocrypha, field identical for grammar property is formed at least one field groups;According to the grammar property of each field groups, obtain the sequence of tokens feature that each grammar property is corresponding;According to described sequence of tokens feature, determine the leak at least one field groups described;Described leak is replaced with default reparation code sequence, at least one field groups described after being repaired;At least one field groups described in after repairing is reassembled as the reparation file with described first form corresponding to described apocrypha.Present application addresses and repair, owing to prior art uses same set of Patch code to carry out the leak caused, the technical problem that accuracy is poor.

Description

Ile repair method and device
Technical field
The application relates to internet arena, in particular to a kind of Ile repair method and device.
Background technology
Along with the fast development of the Internet, the server of each operator runs substantial amounts of web site, for technology On consideration, these web site great majority CMS (Content that directly employings are increased income in the market or charged Management System, Content Management System) carry out building of web station system.And these CMS hold due to source code Easily obtaining, usually suffer the bug excavation of hacker, after being found that available leak, hacker can utilize oneself hands On ODAY (zero day) leak web site is attacked, and then obtain substantial amounts of business material.
In the antagonism of web attacking and defending, for traditional binary vulnerability file or website text Patch In (patch) technology, prior art is generally adopted by the unified method replacing masterplate, i.e. no matter leak file or Bug code has how many kinds of mutation, all uses same set of Patch code to carry out leak reparation at server end, and this just leads Cause leak and repair the problem that accuracy is poor, security of system is relatively low.
For above-mentioned problem, effective solution is the most not yet proposed.
Summary of the invention
The embodiment of the present application provides a kind of Ile repair method and device, at least to solve owing to prior art uses same A set of Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
An aspect according to the embodiment of the present application, it is provided that a kind of Ile repair method, including: obtain request unit The apocrypha with the first form uploaded;According to the grammar property of each field in above-mentioned apocrypha, by grammer The field that feature is identical forms at least one field groups;According to the grammar property of each field groups, obtain each grammer special Levy the sequence of tokens feature of correspondence;According to above-mentioned sequence of tokens feature, determine the leak at least one field groups above-mentioned; Above-mentioned leak is replaced with default reparation code sequence, at least one field groups above-mentioned after being repaired;To repair After at least one field groups above-mentioned be reassembled as the reparation file with above-mentioned first form corresponding to above-mentioned apocrypha.
According to the another aspect of the embodiment of the present application, additionally provide a kind of Ile repair method, including: will have first The apocrypha of form sends to file prosthetic device, wherein, by above-mentioned file prosthetic device according to above-mentioned apocrypha In the grammar property of each field, field identical for grammar property is formed at least one field groups, according to each field The grammar property of group, obtains the sequence of tokens feature that each grammar property is corresponding, according to above-mentioned sequence of tokens feature, really Leak in fixed at least one field groups above-mentioned, replaces with above-mentioned leak default reparation code sequence, is repaired After at least one field groups above-mentioned, will repair after at least one field groups above-mentioned be reassembled as corresponding to above-mentioned suspicious literary composition The reparation file with above-mentioned first form of part;Obtain corresponding to above-mentioned apocrypha from above-mentioned file prosthetic device The reparation file with above-mentioned first form.
According to the another aspect of the embodiment of the present application, additionally provide a kind of file prosthetic device, including: acquiring unit, For obtaining the apocrypha with the first form that request unit is uploaded;Processing unit, for according to above-mentioned suspicious literary composition The grammar property of each field in part, forms at least one field groups by field identical for grammar property;First determines list Unit, for the grammar property according to each field groups, obtains the sequence of tokens feature that each grammar property is corresponding;Second Determine unit, for according to above-mentioned sequence of tokens feature, determine the leak at least one field groups above-mentioned;Repair single Unit, for above-mentioned leak being replaced with the reparation code sequence being pre-configured with, at least one word above-mentioned after being repaired Section group;Recomposition unit, at least one field groups above-mentioned after repairing is reassembled as corresponding to above-mentioned apocrypha There is the reparation file of above-mentioned first form.
According to the another aspect of the embodiment of the present application, additionally provide a kind of request unit, including: the 3rd transmitting element, For the apocrypha with the first form is sent to file prosthetic device, wherein, press above-mentioned file prosthetic device According to the grammar property of each field in above-mentioned apocrypha, field identical for grammar property is formed at least one field groups, According to the grammar property of each field groups, obtain the sequence of tokens feature that each grammar property is corresponding, according to above-mentioned token Sequence signature, determines the leak at least one field groups above-mentioned, and above-mentioned leak replaces with default reparation code sequence Row, at least one field groups above-mentioned after being repaired, at least one field groups above-mentioned after repairing is reassembled as correspondence The reparation file with above-mentioned first form in above-mentioned apocrypha;Control unit, for filling from above-mentioned file reparation Put the middle acquisition reparation file with above-mentioned first form corresponding to above-mentioned apocrypha.
In the embodiment of the present application, the apocrypha with the first form that acquisition request unit is uploaded is used;According to can Doubt the grammar property of each field in file, field identical for grammar property is formed at least one field groups;According to often The grammar property of individual field groups, obtains the sequence of tokens feature that each grammar property is corresponding;According to sequence of tokens feature, Determine the leak at least one field groups;Leak is replaced with default reparation code sequence, after being repaired extremely A few field groups;At least one field groups after repairing is reassembled as first form of having corresponding to apocrypha Repair the mode of file, by apocrypha being carried out after fractionation obtains at least one field groups according to grammar property, Carry out lookup and the reparation of leak according to each grammar property correspondence sequence of tokens feature and reparation code sequence, reach Leak is carried out the purpose automatically repaired of 1: 1, it is achieved thereby that improve accuracy and security of system that leak is repaired Technique effect, and then solve and repair standard owing to prior art uses same set of Patch code to carry out the leak that causes The technical problem that really property is poor.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen Schematic description and description please is used for explaining the application, is not intended that the improper restriction to the application.At accompanying drawing In:
Fig. 1 is the hardware block diagram of the terminal of a kind of operating file detection method according to the embodiment of the present application;
Fig. 2 is the schematic flow sheet of a kind of optional Ile repair method according to the embodiment of the present application;
Fig. 3 is the schematic flow sheet of the another kind of optional Ile repair method according to the embodiment of the present application;
Fig. 4 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 5 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 6 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 7 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 8 is the structural representation of a kind of optional file prosthetic device according to the embodiment of the present application;
Fig. 9 is the structural representation of the another kind of optional file prosthetic device according to the embodiment of the present application;
Figure 10 is the structural representation of a kind of optional duplicate removal unit according to the embodiment of the present application;
Figure 11 is the structural representation of another the optional file prosthetic device according to the embodiment of the present application;
Figure 12 is the structural representation of another the optional file prosthetic device according to the embodiment of the present application;
Figure 13 is the structural representation of a kind of optional request unit according to the embodiment of the present application.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the application scheme, below in conjunction with in the embodiment of the present application Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present application, it is clear that described embodiment It is only the embodiment of the application part rather than whole embodiments.Based on the embodiment in the application, ability The every other embodiment that territory those of ordinary skill is obtained under not making creative work premise, all should belong to The scope of the application protection.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, " Two " it is etc. for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that this Sample use data can exchange in the appropriate case, in order to embodiments herein described herein can with except Here the order beyond those illustrating or describing is implemented.Additionally, term " includes " and " having " and they Any deformation, it is intended that cover non-exclusive comprising, such as, contain series of steps or the process of unit, side Method, system, product or equipment are not necessarily limited to those steps or the unit clearly listed, but can include the clearest List or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment 1
According to the embodiment of the present application, additionally provide the embodiment of the method for a kind of Ile repair method, it should be noted that Can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, And, although show logical order in flow charts, but in some cases, can be suitable be different from herein Step shown or described by sequence execution.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune Calculate in device and perform.As a example by running on computer terminals, Fig. 1 is a kind of file reparation side of the embodiment of the present application The hardware block diagram of the terminal of method.As it is shown in figure 1, terminal 10 can include one or more (figure In only illustrate one) (processor 102 can include but not limited to Micro-processor MCV or able to programme patrol for processor 102 The processing means of volume device FPGA etc.), for storing the memorizer 104 of data and for the transmission of communication function Device 106.It will appreciated by the skilled person that the structure shown in Fig. 1 is only signal, it is not to above-mentioned The structure of electronic installation causes restriction.Such as, terminal 10 may also include more more or less than shown in Fig. 1 Assembly, or there is the configuration different from shown in Fig. 1.
Memorizer 104 can be used for storing software program and the module of application software, such as the file in the embodiment of the present application Programmed instruction/module that restorative procedure is corresponding, processor 102 is stored in the software program in memorizer 104 by operation And module, thus perform the application of various function and data process, i.e. realize the Hole Detection of above-mentioned application program Method.Memorizer 104 can include high speed random access memory, may also include nonvolatile memory, such as one or many Individual magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, memorizer 104 Can farther include the memorizer remotely located relative to processor 102, these remote memories can by network even It is connected to terminal 10.The example of above-mentioned network includes but not limited to the Internet, intranet, LAN, shifting Dynamic communication network and combinations thereof.
Transmitting device 106 is for receiving via a network or sending data.Above-mentioned network instantiation can include The wireless network that the communication providers of terminal 10 provides.In an example, transmitting device 106 includes one Network adapter (Network Interface Controller, NIC), they can be by base station and other network equipments It is connected thus communication can be carried out with the Internet.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, it is for wirelessly carrying out communication with the Internet.
Under above-mentioned running environment, this application provides Ile repair method as shown in Figure 2.Fig. 2 is according to this Shen Please the flow chart of Ile repair method of embodiment one.
As in figure 2 it is shown, this document restorative procedure can include step implemented as described below:
Step S202, obtains the apocrypha with the first form that request unit is uploaded.
In the application above-mentioned steps S202, request unit may refer to the application program installed on a user device (such as client), subscriber equipment can be scanned by this request unit according to the configuration of server end, start by set date, When finding apocrypha, upload this apocrypha to file prosthetic device, request unit by the passage being pre-configured with Can also be terminal or similar arithmetic unit, self disk file be scanned by start by set date, when sending out During existing apocrypha, by the passage that is pre-configured with, apocrypha is sent to file prosthetic device.
Wherein, file prosthetic device receives after the apocrypha with the first form of request unit, permissible Resolving this apocrypha, to realize the reparation of apocrypha, file prosthetic device can be such as AliYunDun Server.
With request unit as AliYunDun as a example by (Ali's cloud shield), AliYunDun based on C/S (Client/Server, Client/server) the network architecture, every subscriber equipment is all deployed with an independent AliYunDun program, And keep long connection by encrypted tunnel and AliYunDun server.According to the configuration of server, AliYunDun is fixed Time download up-to-date AliVulfix (cloud shield attachment component) leak repair procedure from server, replace local leak reparation Program.According to the configuration of server, AliYunDun can control AliVulfix leak repair procedure start by set date, All disk directories on subscriber equipment are carried out overall traverse scanning, and the configuration information issued according to server is collected The file of assigned catalogue, such as configuration item have one :/plus/mytag_js.php, then AliVulfix can scan And by the encryption of AliYunDun by reporting this apocrypha.
Step S204, according to the grammar property of each field in apocrypha, forms field identical for grammar property extremely A few field groups.
In the application above-mentioned steps S204, file prosthetic device is after obtaining this apocrypha, in order to take leak Specific aim reparation and improve remediation efficiency, in order to avoid the long hacker of causing repair time utilizes this time slot to enter one to one Invading subscriber equipment, file prosthetic device can be according to the grammar property of each field in apocrypha, by grammar property phase Same field forms at least one field groups.
As a example by file prosthetic device is for AliYunDun server, because user's major part is electricity business, net on Ali's cloud Stand user, and user usually has the situation that oneself network site code file makes customization amendment, in order to ensure that leak is repaired not Affecting the properly functioning of these user websites, AliYunDun server takes the strategy that specific aim is repaired one to one, But, reparation can produce a problem one to one, after using 1: 1 reparation, at the number of users of the hundreds thousand of scale of construction of Ali's cloud Under, the substantial amounts of file that there is leak can be received at server end, even if filtering, quantity of documents is the most a lot, Therefore, above-mentioned apocrypha can be resolved to syntax tree structure by AliYunDun server.
In the embodiment of the present application, file prosthetic device first has to apocrypha is carried out syntactic analysis, determines apocrypha In the grammar property of each field, wherein, syntactic analysis refers in code scans a to container, then to this Field groups is synthesized all kinds of grammatical phrases on the basis of morphological analysis by the character in container.Determining each field After grammar property, field identical for grammar property can be formed at least one field groups by file prosthetic device, enters one Step ground, at least one field groups can be resolved to language according to the filiation between each field by file prosthetic device Method tree construction.
Step S206, according to the grammar property of each field groups, obtains the sequence of tokens feature that each grammar property is corresponding.
In the application above-mentioned steps S206, sequence of tokens feature can be pre-configured with by safe operation personnel, file Prosthetic device utilizes the sequence of tokens feature corresponding to each grammar property, it is achieved the lookup of leak.
Step S208, according to sequence of tokens feature, determines the leak at least one field groups.
In the application above-mentioned steps S208, file prosthetic device is getting the sequence of tokens spy that each grammar property is corresponding After levying, the location of leak can be carried out at least one field groups according to sequence of tokens feature.
This sentences popular example and illustrates, if there being 100 people, it is therefore an objective to determine the people of eyeball color blue, i.e. Sequence of tokens feature is " eyeball-blueness ", then according to the thinking of the Ile repair method that the embodiment of the present application provides, The various piece of these hundred people is first grouped by we, such as, the eyes of 100 people is divided into one group, nose Be divided into one group, face be divided into one group etc., then, according to sequence of tokens feature carry out leak search time, it is only necessary to This group of eyes makes a look up, it is not necessary to search again for other parts, reach to improve the purpose of leak search efficiency.
Alternatively, according to sequence of tokens feature, determine that the leak at least one field groups includes: at least one word Duan Zuzhong searches the field identical with sequence of tokens feature, and the field identical with sequence of tokens feature is defined as leak.
In the embodiment of the present application, safe operation personnel only need to configure the most above-mentioned sequence of tokens feature, file prosthetic device Then can carry out the location of leak with automatization, improve the time cost of safe operation.
Step S210, replaces with default reparation code sequence by leak, at least one field groups after being repaired.
In the application above-mentioned steps S210, the code sequence of repairing preset can also be that safe operation personnel are pre-configured with. File prosthetic device, according to sequence of tokens feature, after determining the leak at least one field groups, can obtain this The reparation code sequence preset, and then, leak is replaced with this reparation code sequence preset, it is achieved apocrypha Repair.
The pinpoint recovery technique of the 1: 1 of the file prosthetic device employing of the embodiment of the present application, the most all of suspicious literary composition Part is all directly based upon request unit original document and revises targetedly, so can farthest avoid because leaking Hole reparation causes the inconsistent of code logic thus causes the regular traffic logic of user to be affected, and even can not use. Meanwhile, safe operation personnel have only to configure one and repair code sequence, when file prosthetic device determines leak, and will Leak replaces with default reparation code sequence, at least one field groups after being repaired.
Step S212, at least one field groups after repairing is reassembled as first form of having corresponding to apocrypha Repair file.
In the application above-mentioned steps S212, owing to, in above-mentioned file repair procedures, file prosthetic device will have the first lattice The apocrypha of formula splits at least one field groups, therefore after being repaired according to the grammar property of each field At least one field groups after, file prosthetic device can at least one field according to its inverse process, after repairing Group is reassembled as the reparation file with the first form corresponding to apocrypha.
Alternatively, at least one field groups after repairing is reassembled as having repairing of the first form corresponding to apocrypha Multiple file includes: according to the filiation of each field at least one field groups after repairing, after repairing at least One field groups is reassembled as the reparation file with the first form corresponding to apocrypha.
As a example by file prosthetic device is for AliYunDun server, AliYunDun server can be by above-mentioned suspicious literary composition After part resolves to syntax tree structure, according to token sequence signature (sequence of tokens feature) location leak, Jin Er After syntax tree inserts default reparation code sequence, then rebuild apocrypha, complete this apocrypha Leak is repaired, and obtains above-mentioned reparation file.
The Ile repair method that the embodiment of the present application provides, owing to the quantity of apocrypha may be thousands of, therefore adopts Automatization can be realized by program code, it is achieved whole leak reparation by the above-mentioned whole process of Ile repair method. From discovery, to examination & verification, to the full process automatization repaired, the subscriber equipment that can realize Ali's cloud the whole network in theory exists Some leak is all repaired in 20 minutes.
The Ile repair method of the embodiment of the present application at least has following technical effect that
1, accurately for the specific transactions reparation leak therein of each user;
2, leak repairs full process automatization, and safe operation personnel have only to be absorbed in the research of leak, and carry out once Configuration, the whole network repair action afterwards is entirely full-automation;
3, some leak all repaired in 20 minutes by the machine realizing Ali's cloud the whole network;
4, use the mode of syntax tree to carry out location and the reparation of leak, canonical, character string search can be avoided to bring Wrong report, has the highest accuracy rate and the lowest rate of false alarm;
5, the properly functioning of request unit program to be repaired is not affected.
From the foregoing, it will be observed that the scheme that the above embodiments of the present application one are provided, by apocrypha being entered according to grammar property After row fractionation obtains at least one field groups, according to each grammar property correspondence sequence of tokens feature and reparation code sequence Row carry out lookup and the reparation of leak, have reached to carry out leak the purpose automatically repaired of 1: 1, it is achieved thereby that carry The accuracy of high leak reparation and the technique effect of security of system, and then solve owing to prior art uses same set of Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
In a kind of alternative that the above embodiments of the present application provide, as it is shown on figure 3, the quantity of apocrypha be to In the case of few two, after above-mentioned steps S202 obtains the apocrypha with the first form that request unit is uploaded, Field identical for grammar property, according to the grammar property of each field in apocrypha, is formed at least by above-mentioned steps S204 Before one field groups, Ile repair method can also include:
Step S302, extracts the metamessage of each apocrypha, and wherein, metamessage includes the file of corresponding apocrypha Path and Message Digest 5 MD5, file path refers to apocrypha road on the subscriber equipment at request unit place Footpath.
In the application above-mentioned steps S302, the quantity of the apocrypha that file prosthetic device gets may be thousands of, Wherein there may be some files repeated, therefore, in the case of the quantity of apocrypha is at least two, File prosthetic device can carry out duplicate removal process to apocrypha.
So, in the case of the quantity of apocrypha is at least two, it is suspicious that file prosthetic device can extract each The metamessage of file, and metamessage is saved in distributed fingerprint database.Wherein, metamessage can include right Answer file path and MD5 (Message Digest Algorithm, Message Digest 5), the file road of apocrypha Footpath refers to apocrypha path on the subscriber equipment at request unit place.
Step S304, according to file path and MD5, carries out duplicate removal process to each apocrypha.
In the application above-mentioned steps S304, duplicate removal processes and refers to remove the apocrypha of repetition.File prosthetic device is carrying After having taken file path and the MD5 of each apocrypha, can according to file path and MD5 judge this each suspicious Whether there is the file of repetition among file, and then each apocrypha is carried out duplicate removal process.
In a kind of alternative that the above embodiments of the present application provide, as shown in Figure 4, above-mentioned steps S304, according to literary composition Part path and MD5, carry out duplicate removal process and may include that each apocrypha
Step S402, determines the apocrypha repeated in each apocrypha, and wherein, the apocrypha of repetition refers to literary composition The file that part path is identical and MD5 is identical.
In the application above-mentioned steps S402, for how according to file path and MD5, each apocrypha is gone Heavily processing, the method that the embodiment of the present application provides is that file prosthetic device is by judging the file path of each apocrypha The most identical, and the MD5 of each apocrypha is the most identical, if file path is identical and MD5 is identical, it is determined that For the apocrypha repeated.
Such as, file prosthetic device is after the file path extracting each apocrypha and MD5, it is judged that suspicious literary composition The file path of part 1, apocrypha 7, apocrypha 24 and apocrypha 30 is identical and MD5 is identical, then file Prosthetic device determines that this apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha 30 are the suspicious literary composition repeated Part.
Step S404, retains the first file in the apocrypha repeated, suspicious by the repetition in addition to the first file File is deleted, and wherein, the first file is any one in the apocrypha repeated.
In the application above-mentioned steps S404, the apocrypha that file prosthetic device repeats in determining each apocrypha Afterwards, need only to retain one of them apocrypha, delete other apocryphas repeated and process to realize duplicate removal.
Such as, file prosthetic device is determining apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha After 30 apocryphas for repetition, apocrypha 1, apocrypha 7, apocrypha 24 and suspicious literary composition can be retained Any one file in part 30, such as retain apocrypha 1, and then by the repetition in addition to apocrypha 1 can Doubt file to delete, i.e. delete apocrypha 7, apocrypha 24 and apocrypha 30, it is achieved the duplicate removal to apocrypha Process.
In a kind of alternative that the above embodiments of the present application provide, as it is shown in figure 5, above-mentioned steps S212, will repair After at least one field groups be reassembled as corresponding to the reparation file with the first form of apocrypha after, file is repaiied Compound recipe method can also include:
Step S502, receives the first request that request unit sends, first request leak reparation after down loading updating Program.
In the application above-mentioned steps S502, request unit can regularly be downloaded up-to-date leak according to configuration and repair again, And then, file prosthetic device can receive the of the leak repair procedure after down loading updating that request unit sends One request.
With request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, AliYunDun Based on the C/S network architecture, keep long by encrypted tunnel and AliYunDun server and connect, according to AliYunDun The configuration of server, AliYunDun timing is downloaded up-to-date AliVulfix leak from AliYunDun server and is repaired journey Sequence.
Step S504, sends the leak repair procedure after updating to request unit, and wherein, the leak after renewal repairs journey Sequence comprises reparation file, in order to apocrypha is repaired by request unit according to repairing file.
In the application above-mentioned steps S504, file prosthetic device, after completing the reparation to apocrypha, can obtain one The leak repair procedure that part is up-to-date, such as, the form of this leak repair procedure is permissible For: { " filename ": "/webapps/manager/WEB-INF/web.xml ", " md5 ": " bc5ef661b746b0c55 462353583a7eb34 ", " action ": " delete " };{ " filename ": "/webapps/manager/WEB-INF/ Web.xml ", " md5 ": " bc5ef661b746b0c55462353583a7eb55 ", " action ": " replace " }.This Up-to-date leak repair procedure is accurately positioned under the file path of above-mentioned apocrypha, the apocrypha of corresponding MD5, After request unit leak repair procedure after having downloaded this renewal, can be according in the leak repair procedure after updating The above-mentioned reparation file comprised, repairs apocrypha, such as, be above-mentioned reparation file by apocrypha.
In a kind of alternative that the above embodiments of the present application provide, as shown in Figure 6, above-mentioned steps S502, receiving please Ask the first request that device sends, before first request leak repair procedure after down loading updating, file reparation side Method can also include:
Step S602, receives the second request sent from request unit, second request leak after obtaining renewal The identification information of repair procedure.
In the application above-mentioned steps S602, owing to request unit is according to configuration timing download flaw repair procedure, therefore Whether the leak repair procedure after request unit can first judge this renewal is up-to-date.
Still with request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, according to The configuration of AliYunDun server, AliYunDun timing downloads up-to-date AliVulfix from AliYunDun server Leak repair procedure, it may be judged whether be for up-to-date standard, checks the AliVulfix being saved in AliYunDun server The MD5 of leak repair procedure whether with the machine before the MD5 of AliVulfix leak repair procedure that downloaded whether phase With, if it is different, explanation AliYunDun server is modified variation, then re-download the most up-to-date AliVulfix leak repair procedure, replaces local AliVulfix leak repair procedure.
Step S604, sends the MD5 of the leak repair procedure after updating, wherein, by request unit root to request unit MD5 according to the leak repair procedure after updating, it is judged that the leakage that the leak repair procedure after renewal and request unit have stored Hole repair procedure is the most identical, if identical, the first request then initiated by request unit.
Alternatively, request unit is according to the MD5 of the leak repair procedure after updating, it is judged that the leak after renewal repairs journey The most identical leak that may include that request unit acquisition has stored of leak repair procedure that sequence and request unit have stored The MD5 of repair procedure;Request unit judges that the MD5 of the leak repair procedure after updating repairs journey with the leak stored The MD5 of sequence is the most identical;If the MD5 of the MD5 of the leak repair procedure after Geng Xining and the leak repair procedure stored Identical, it is determined that the leak repair procedure that the leak repair procedure after renewal has stored with request unit is identical;If updating After the MD5 of leak repair procedure differ with the MD5 of the leak repair procedure stored, it is determined that the leakage after renewal The leak repair procedure that hole repair procedure and request unit have stored differs.
Under above-mentioned running environment, present invention also provides a kind of Ile repair method.This document restorative procedure can wrap Include step implemented as described below:
Step S10, sends the apocrypha with the first form to file prosthetic device, wherein, repairs file Field identical for grammar property, according to the grammar property of each field in apocrypha, is formed at least one field by device Group, according to the grammar property of each field groups, obtains the sequence of tokens feature that each grammar property is corresponding, according to token Sequence signature, determines the leak at least one field groups, leak replaces with default reparation code sequence, obtains At least one field groups after reparation, at least one field groups after repairing is reassembled as having corresponding to apocrypha The reparation file of the first form.
In the application above-mentioned steps S10, request unit may refer to the application program (example installed on a user device Such as client), subscriber equipment can be scanned by this request unit according to the configuration of server end, start by set date, when When finding apocrypha, uploading this apocrypha to file prosthetic device by the passage being pre-configured with, request unit is also Can be terminal or similar arithmetic unit, self disk file be scanned, works as discovery by start by set date During apocrypha, by the passage that is pre-configured with, apocrypha is sent to file prosthetic device.
Step S12, obtains the reparation file with the first form corresponding to apocrypha from file prosthetic device.
Alternatively, step S12 obtains the reparation with the first form corresponding to apocrypha from file prosthetic device File includes:
Step S20, sends the first request, first request leak reparation after down loading updating to file prosthetic device Program.
In the application above-mentioned steps S20, request unit can regularly be downloaded up-to-date leak according to configuration and repair again, And then, file prosthetic device can receive the of the leak repair procedure after down loading updating that request unit sends One request.
With request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, AliYunDun Based on the C/S network architecture, keep long by encrypted tunnel and AliYunDun server and connect, according to AliYunDun The configuration of server, AliYunDun timing is downloaded up-to-date AliVulfix leak from AliYunDun server and is repaired journey Sequence.
Step S22, receives the leak repair procedure after the renewal that file prosthetic device returns, wherein, the leakage after renewal Hole repair procedure comprises reparation file.
In the application above-mentioned steps S22, file prosthetic device, after completing the reparation to apocrypha, can obtain one The leak repair procedure that part is up-to-date, such as, the form of this leak repair procedure is permissible For: { " filename ": "/webapps/manager/WEB-INF/web.xml ", " md5 ": " bc5ef661b746b0c55 462353583a7eb34 ", " action ": " delete " };{ " filename ": "/webapps/manager/WEB-INF/ Web.xml ", " md5 ": " bc5ef661b746b0c55462353583a7eb55 ", " action ": " replace " }.This Up-to-date leak repair procedure is accurately positioned under the file path of above-mentioned apocrypha, the apocrypha of corresponding MD5, After request unit leak repair procedure after having downloaded this renewal, can be according in the leak repair procedure after updating The above-mentioned reparation file comprised, repairs apocrypha, such as, be above-mentioned reparation file by apocrypha.
Alternatively, in step S20, before file prosthetic device sends the first request, Ile repair method also includes:
Step S30, sends the second request, second request leak reparation after obtaining renewal to file prosthetic device The identification information of program.
In the application above-mentioned steps S30, owing to request unit is according to configuration timing download flaw repair procedure, therefore Whether the leak repair procedure after request unit can first judge this renewal is up-to-date.
Still with request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, according to The configuration of AliYunDun server, AliYunDun timing downloads up-to-date AliVulfix from AliYunDun server Leak repair procedure, it may be judged whether be for up-to-date standard, checks the AliVulfix being saved in AliYunDun server The MD5 of leak repair procedure whether with the machine before the MD5 of AliVulfix leak repair procedure that downloaded whether phase With, if it is different, explanation AliYunDun server is modified variation, then re-download the most up-to-date AliVulfix leak repair procedure, replaces local AliVulfix leak repair procedure.
Step S32, receives the MD5 of the leak repair procedure after the renewal that file prosthetic device returns.
Step S34, according to the MD5 of the leak repair procedure after updating, it is judged that the leak repair procedure after renewal and request The leak repair procedure that device has stored is the most identical, if identical, the first request then initiated by request unit.
Alternatively, request unit is according to the MD5 of the leak repair procedure after updating, it is judged that the leak after renewal repairs journey The most identical leak that may include that request unit acquisition has stored of leak repair procedure that sequence and request unit have stored The MD5 of repair procedure;Request unit judges that the MD5 of the leak repair procedure after updating repairs journey with the leak stored The MD5 of sequence is the most identical;If the MD5 of the MD5 of the leak repair procedure after Geng Xining and the leak repair procedure stored Identical, it is determined that the leak repair procedure that the leak repair procedure after renewal has stored with request unit is identical;If updating After the MD5 of leak repair procedure differ with the MD5 of the leak repair procedure stored, it is determined that the leakage after renewal The leak repair procedure that hole repair procedure and request unit have stored differs.
In the optional scheme of one, as a example by AliYunDun, in conjunction with Fig. 7, to the application above-mentioned file reparation side Method is described:
Step A, the AliYunDun network architecture based on C/S, every subscriber equipment is all deployed with one independent AliYunDun program, and keep long connection by encrypted tunnel and AliYunDun server.
In the application above-mentioned steps A, AliYunDun is equivalent to above-mentioned request unit, and AliYunDun server is suitable In above-mentioned file prosthetic device, subscriber equipment can be entered by request unit according to the configuration of server end, start by set date Row scanning, when finding apocrypha, uploads this apocrypha by the passage being pre-configured with.
Step B, according to the configuration of AliYunDun server, AliYunDun timing is downloaded from AliYunDun server Up-to-date AliVulfix leak repair procedure.
In the application above-mentioned steps B, it may be judged whether for up-to-date standard be, check and be saved in AliYunDun server AliVulfix leak repair procedure MD5 whether with the machine before the AliVulfix leak repair procedure downloaded MD5 the most identical, if it is different, explanation AliYunDun server be modified variation, then re-download one Secondary up-to-date AliVulfix leak repair procedure, replaces local AliVulfix leak repair procedure.
Owing to request unit is that therefore request unit can first judge that this is more according to configuration timing download flaw repair procedure Whether the leak repair procedure after Xin is up-to-date, and request unit, according to the MD5 of the leak repair procedure after updating, is sentenced Disconnected update after leak repair procedure the most identical with the leak repair procedure that request unit has stored may include that request Device obtains the MD5 of the leak repair procedure stored;Request unit judges the MD5 of the leak repair procedure after updating The most identical with the MD5 of the leak repair procedure stored;If the MD5 of the leak repair procedure after Geng Xining with store The MD5 of leak repair procedure identical, it is determined that the leak that the leak repair procedure after renewal and request unit have stored Repair procedure is identical;If the MD5 not phase of the MD5 of the leak repair procedure after Geng Xining and the leak repair procedure stored With, it is determined that the leak repair procedure that the leak repair procedure after renewal and request unit have stored differs.
When the leak repair procedure that leak repair procedure after determining renewal and request unit have stored differs, file Prosthetic device can receive the first request of the leak repair procedure after down loading updating that request unit sends, and Send the leak repair procedure after updating to request unit, wherein, the leak repair procedure after renewal comprises reparation literary composition Part, in order to apocrypha is repaired by request unit according to repairing file.
Step C, according to the configuration of AliYunDun server, the AliVulfix leak repair procedure on subscriber equipment Can perform by start by set date.
In the application above-mentioned steps C, user can be set by AliYunDun according to the configuration of server end, start by set date For being scanned, when finding apocrypha, upload this apocrypha by the passage being pre-configured with.
Step D, AliVulfix carries out overall traverse scanning to all disk directories on user's machine.
In the application above-mentioned steps D, the configuration information issued according to AliYunDun server collects the literary composition of assigned catalogue Part, such as configuration item have one :/plus/mytag_js.php, then AliVulfix can scan and pass through AliYunDun Encryption by reporting this apocrypha.
Step E, after AliYunDun server receives the apocrypha that AliYunDun reports, extracts the unit of apocrypha Information.
In the application above-mentioned steps E, the quantity of the apocrypha that file prosthetic device gets may be thousands of, that Wherein there may be some files repeated, therefore, in the case of the quantity of apocrypha is at least two, literary composition Part prosthetic device can carry out duplicate removal process to apocrypha.So, in the feelings that quantity is at least two of apocrypha Under condition, file prosthetic device can extract the metamessage of each apocrypha, and metamessage is saved in distributed finger In stricture of vagina data base.Wherein, metamessage can include file path and the MD5 of corresponding apocrypha, and file path refers to Apocrypha path on the subscriber equipment at request unit place.
Duplicate removal processes and refers to remove the apocrypha of repetition.File prosthetic device is being extracted the file of each apocrypha After path and MD5, can judge whether there is repetition among this each apocrypha according to file path and MD5 File, and then each apocrypha is carried out duplicate removal process.For how according to file path and MD5, can to each Doubtful file carries out duplicate removal process, and the method that the embodiment of the present application provides is that file prosthetic device is by judging each suspicious literary composition The file path of part is the most identical, and the MD5 of each apocrypha is the most identical, if file path is identical and MD5 Identical, it is determined that for the apocrypha repeated.
Such as, file prosthetic device is after the file path extracting each apocrypha and MD5, it is judged that suspicious literary composition The file path of part 1, apocrypha 7, apocrypha 24 and apocrypha 30 is identical and MD5 is identical, then file Prosthetic device determines that this apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha 30 are the suspicious literary composition repeated Part.
Alternatively, after the apocrypha that file prosthetic device repeats in determining each apocrypha, need only to protect Stay one of them apocrypha, delete other apocryphas repeated and process to realize duplicate removal.
Such as, file prosthetic device is determining apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha After 30 apocryphas for repetition, apocrypha 1, apocrypha 7, apocrypha 24 and suspicious literary composition can be retained Any one file in part 30, such as retain apocrypha 1, and then by the repetition in addition to apocrypha 1 can Doubt file to delete, i.e. delete apocrypha 7, apocrypha 24 and apocrypha 30, it is achieved the duplicate removal to apocrypha Process.
Alternatively, metamessage, after the metamessage being extracted apocrypha, can be preserved by AliYunDun server In distributed fingerprint database.
Step F, resolves to token syntax tree structure apocrypha.
In the application above-mentioned steps F, because user's major part is electricity business, website user on Ali's cloud, user usually has Oneself network site code file is made the situation customizing amendment, in order to ensure that leak reparation does not affect these user websites Properly functioning, AliYunDun server takes the strategy that specific aim is repaired one to one, but, repair meeting one to one Produce a problem, after using 1: 1 reparation, under the number of users of the hundreds thousand of scale of construction of Ali's cloud, can receive at server end To the substantial amounts of file that there is leak, even if filtering, quantity of documents is the most a lot, and therefore, AliYunDun takes Above-mentioned apocrypha can be resolved to syntax tree structure by business device.
In the embodiment of the present application, file prosthetic device first has to apocrypha is carried out syntactic analysis, determines apocrypha In the grammar property of each field, wherein, syntactic analysis refers in code scans a to container, then to this Field groups is synthesized all kinds of grammatical phrases on the basis of morphological analysis by the character in container.Determining each field After grammar property, field identical for grammar property can be formed at least one field groups by file prosthetic device, enters one Step ground, at least one field groups can be resolved to language according to the filiation between each field by file prosthetic device Method tree construction.
Step G, safe operation personnel have only to configure a token sequence signature, are used for positioning present in file Leak.
In the application above-mentioned steps G, token sequence signature is equivalent to above-mentioned sequence of tokens feature, and sequence of tokens is special Levying and can be pre-configured with by safe operation personnel, file prosthetic device utilizes the token corresponding to each grammar property Sequence signature, it is achieved the lookup of leak.
File prosthetic device, can be according to token sequence after getting the sequence of tokens feature that each grammar property is corresponding Row feature carries out the location of leak at least one field groups.
This sentences popular example and illustrates, if there being 100 people, it is therefore an objective to determine the people of eyeball color blue, i.e. Sequence of tokens feature is " eyeball-blueness ", then according to the thinking of the Ile repair method that the embodiment of the present application provides, The various piece of these hundred people is first grouped by we, such as, the eyes of 100 people is divided into one group, nose Be divided into one group, face be divided into one group etc., then, according to sequence of tokens feature carry out leak search time, it is only necessary to This group of eyes makes a look up, it is not necessary to search again for other parts, reach to improve the purpose of leak search efficiency.
Alternatively, according to sequence of tokens feature, determine that the leak at least one field groups includes: at least one word Duan Zuzhong searches the field identical with sequence of tokens feature, and the field identical with sequence of tokens feature is defined as leak.
In the embodiment of the present application, safe operation personnel only need to configure the most above-mentioned sequence of tokens feature, file prosthetic device Then can carry out the location of leak with automatization, improve the time cost of safe operation.
Step H, safe operation personnel have only to configure a patch token sequence simultaneously, at location leak Rear insertion patch token sequence.
In the application above-mentioned steps H, patch token sequence is equivalent to the above-mentioned reparation code sequence preset.In advance If repair code sequence can also be that safe operation personnel are pre-configured with.File prosthetic device is according to sequence of tokens Feature, after determining the leak at least one field groups, can obtain this reparation code sequence preset, and then, Leak is replaced with this reparation code sequence preset, it is achieved the reparation of apocrypha.
The pinpoint recovery technique of the 1: 1 of the file prosthetic device employing of the embodiment of the present application, the most all of suspicious literary composition Part is all directly based upon request unit original document and revises targetedly, so can farthest avoid because leaking Hole reparation causes the inconsistent of code logic thus causes the regular traffic logic of user to be affected, and even can not use. Meanwhile, safe operation personnel have only to configure one and repair code sequence, when file prosthetic device determines leak, and will Leak replaces with default reparation code sequence, at least one field groups after being repaired.
Step I, after inserting patch token sequence, then rebuilds apocrypha in token syntax tree, Complete the leak reparation of this file.
In the application above-mentioned steps I, above-mentioned apocrypha can be resolved to syntax tree structure by AliYunDun server Afterwards, according to token sequence signature (sequence of tokens feature) location leak, and then insert default in syntax tree Reparation code sequence after, then rebuild apocrypha, complete the leak reparation of this apocrypha, obtain above-mentioned Reparation file.
Owing to, in above-mentioned file repair procedures, file prosthetic device will have the apocrypha of the first form according to each word The grammar property of section splits at least one field groups, therefore after at least one field groups after being repaired, File prosthetic device can be according to its inverse process, and at least one field groups after repairing is reassembled as corresponding to apocrypha The reparation file with the first form.
Alternatively, at least one field groups after repairing is reassembled as having repairing of the first form corresponding to apocrypha Multiple file includes: according to the filiation of each field at least one field groups after repairing, after repairing at least One field groups is reassembled as the reparation file with the first form corresponding to apocrypha.
Step J, after completing apocrypha examination & verification, will obtain a up-to-date leak at AliYunDun server Repair procedure.
In the application above-mentioned steps J, file prosthetic device, after completing the reparation to apocrypha, can obtain portion Up-to-date leak repair procedure, such as, the form of this leak repair procedure is permissible For: { " filename ": "/webapps/manager/WEB-INF/web.xml ", " md5 ": " bc5ef661b746b0c55 462353583a7eb34 ", " action ": " delete " };{ " filename ": "/webapps/manager/WEB-INF/ Web.xml ", " md5 ": " bc5ef661b746b0c55462353583a7eb55 ", " action ": " replace " }.This Up-to-date leak repair procedure is accurately positioned under the file path of above-mentioned apocrypha, the apocrypha of corresponding MD5, After request unit leak repair procedure after having downloaded this renewal, can be according in the leak repair procedure after updating The above-mentioned reparation file comprised, repairs apocrypha, such as, be above-mentioned reparation file by apocrypha.
Step K, the when that each start by set date of AliVulfix running, can be up-to-date from AliYunDun server pull Leak rule base file, and scan full hard disk when to Corresponding matching in the machine to file carry out repair operation (bag Include deletion, replacement operation).
Step L, completes the leak reparation to Ali's cloud user website script.
In the application above-mentioned steps L, AliYunDun server collects the true CMS subscriber equipment from AliYunDun Leak file (i.e. apocrypha), and carry out man-to-man specific aim reparation, after ensure that reparation to greatest extent and repair Business before Fu is compatible, is unlikely to occur because leak reparation causes web site traffic unavailable;Take at AliYunDun Business device takes automatization's examination & verification and based on Token syntax tree autofile repair mode, the process being greatly improved Speed;AliYunDun positions apocrypha based on file path, MD5, it is to avoid because there is maloperation, to user's Website impacts.
The Ile repair method of the embodiment of the present application at least has following technical effect that
1, accurately for the specific transactions reparation leak therein of each user;
2, leak repairs full process automatization, and safe operation personnel have only to be absorbed in the research of leak, and carry out once Configuration, the whole network repair action afterwards is entirely full-automation;
3, some leak all repaired in 20 minutes by the machine realizing Ali's cloud the whole network;
4, use the mode of syntax tree to carry out location and the reparation of leak, canonical, character string search can be avoided to bring Wrong report, has the highest accuracy rate and the lowest rate of false alarm.
From the foregoing, it will be observed that the scheme that the above embodiments of the present application one are provided, by apocrypha being entered according to grammar property After row fractionation obtains at least one field groups, according to each grammar property correspondence sequence of tokens feature and reparation code sequence Row carry out lookup and the reparation of leak, have reached to carry out leak the purpose automatically repaired of 1: 1, it is achieved thereby that carry The accuracy of high leak reparation and the technique effect of security of system, and then solve owing to prior art uses same set of Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
It follows that the same set of Patch code that uses that prior art exists carries out the leak reparation accuracy caused relatively The problem of difference, the application proposes a kind of method split the field of apocrypha based on grammar property, Jin Eryi Carry out lookup and the reparation of leak according to each grammar property correspondence sequence of tokens feature and reparation code sequence, reached right Leak carries out the purpose automatically repaired of 1: 1, it is achieved thereby that improve accuracy that leak repairs and security of system Technique effect.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all expressed as one it be The combination of actions of row, but those skilled in the art should know, the application not limiting by described sequence of movement System, because according to the application, some step can use other orders or carry out simultaneously.Secondly, art technology Personnel also should know, embodiment described in this description belongs to preferred embodiment, involved action and module Not necessarily necessary to the application.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive according to above-mentioned enforcement The method of example can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but In the case of Hen Duo, the former is more preferably embodiment.Based on such understanding, the technical scheme of the application substantially or Saying that the part contributing prior art can embody with the form of software product, this computer software product is deposited Storage is in a storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal Equipment (can be mobile phone, computer, server, or the network equipment etc.) performs described in each embodiment of the application Method.
Embodiment 2
According to the embodiment of the present application, additionally provide a kind of device embodiment for implementing said method embodiment, such as figure Shown in 8, this device includes:
Fig. 8 is the structural representation of the file prosthetic device according to the embodiment of the present application.
As shown in Figure 8, this document prosthetic device can include acquiring unit 802, processing unit 804, first determine list Unit 806, second determines unit 808, repairs unit 810 and recomposition unit 812.
Wherein, acquiring unit 802, for obtaining the apocrypha with the first form that request unit is uploaded;Process Unit 804, for according to the grammar property of each field in described apocrypha, by field groups identical for grammar property Become at least one field groups;First determines unit 806, for the grammar property according to each field groups, obtains each The sequence of tokens feature that grammar property is corresponding;Second determines unit 808, is used for according to described sequence of tokens feature, really Leak in fixed at least one field groups described;Repair unit 810, be pre-configured with for described leak replaced with Repair code sequence, at least one field groups described after being repaired;Recomposition unit 812, after repairing At least one field groups described is reassembled as the reparation file with described first form corresponding to described apocrypha.
From the foregoing, it will be observed that the scheme that the above embodiments of the present application one are provided, by apocrypha being entered according to grammar property After row fractionation obtains at least one field groups, according to each grammar property correspondence sequence of tokens feature and reparation code sequence Row carry out lookup and the reparation of leak, have reached to carry out leak the purpose automatically repaired of 1: 1, it is achieved thereby that carry The accuracy of high leak reparation and the technique effect of security of system, and then solve owing to prior art uses same set of Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
Herein it should be noted that above-mentioned acquiring unit 802, processing unit 804, first determine unit 806, second Determine unit 808, repair unit 810 and recomposition unit 812 corresponding to step S202 in embodiment one to step S212, six modules are identical with the example that corresponding step is realized and application scenarios, but are not limited to above-described embodiment one Disclosure of that.It should be noted that above-mentioned module may operate in embodiment one offer as the part of device Terminal 10 in, can be realized by software, it is also possible to realized by hardware.
Alternatively, as it is shown in figure 9, file prosthetic device can also include: extraction unit 902 and duplicate removal unit 904.
Wherein, extraction unit 902, for extracting the metamessage of each apocrypha, wherein, described metamessage includes The file path of corresponding apocrypha and Message Digest 5 MD5, described file path refers to that described apocrypha is in institute State the path on the subscriber equipment at request unit place;Duplicate removal unit 904, for according to described file path and described MD5, carries out duplicate removal process to each apocrypha described.
Herein it should be noted that said extracted unit 902 and duplicate removal unit 904 are corresponding to the step in embodiment one S302 is to step S304, and this module is identical with the example that corresponding step is realized and application scenarios, but is not limited to above-mentioned Embodiment one disclosure of that.It should be noted that above-mentioned module may operate in enforcement as the part of device In the terminal 10 that example one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, as shown in Figure 10, duplicate removal unit 904 may include that and determines module 1002 and processing module 1004.
Wherein it is determined that module 1002, for determining the apocrypha repeated in each apocrypha described, wherein, institute State the apocrypha of repetition and refer to that described file path is identical and described file identical for MD5;Processing module 1004, uses The first file in the apocrypha retaining described repetition, suspicious by the described repetition in addition to described first file File is deleted, and wherein, described first file is any one in the apocrypha of described repetition.
Herein it should be noted that above-mentioned determine that module 1002 and processing module 1004 are corresponding to the step in embodiment one Rapid S402 is to step S404, and this module is identical with the example that corresponding step is realized and application scenarios, but is not limited to Above-described embodiment one disclosure of that.It should be noted that above-mentioned module may operate in as the part of device In the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, described first determines that unit 806, for performing following steps according to described sequence of tokens feature, determines Leak at least one field groups described: search and described sequence of tokens feature phase at least one field groups described Same field, is defined as described leak by field identical for described and described sequence of tokens feature.
Alternatively, described recomposition unit 812 is used for performing at least one field groups weight described in after following steps will be repaired Group is the reparation file with described first form corresponding to described apocrypha: according to described in after described reparation extremely The filiation of each field in a few field groups, it is right at least one field groups described in after described reparation to be reassembled as The reparation file with described first form of apocrypha described in Ying Yu.
Alternatively, as shown in figure 11, file prosthetic device can also include: the first reception unit 1102 and first Send unit 1104.
Wherein, first receives unit 1102, and for receiving the first request that described request unit sends, described first please Seek the leak repair procedure after down loading updating;First transmitting element 1104, for sending institute to described request unit State the leak repair procedure after renewal, wherein, the leak repair procedure after described renewal comprise described reparation file, So that described apocrypha is repaired by described request unit according to described reparation file.
Herein it should be noted that above-mentioned first receives unit 1102 and the first transmitting element 1104 corresponding to embodiment Step S502 in one is to step S504, and this module is identical with the example that corresponding step is realized and application scenarios, But it is not limited to above-described embodiment one disclosure of that.It should be noted that above-mentioned module can as the part of device To operate in the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, as shown in figure 12, file prosthetic device can also include: the second reception unit 1202 and second Send unit 1204.
Wherein, second receives unit 1202, for receiving the second request sent from described request unit, and described the The identification information of two requests leak repair procedure after obtaining described renewal;Second transmitting element 1204, for Described request unit sends the MD5 of the leak repair procedure after described renewal, wherein, by described request unit according to institute State the MD5 of the leak repair procedure after renewal, it is judged that the leak repair procedure after described renewal is with described request unit The leak repair procedure of storage is the most identical, if identical, described first request then initiated by described request unit.
Herein it should be noted that above-mentioned second receives unit 1202 and the second transmitting element 1204 corresponding to embodiment Step S602 in one is to step S604, and this module is identical with the example that corresponding step is realized and application scenarios, But it is not limited to above-described embodiment one disclosure of that.It should be noted that above-mentioned module can as the part of device To operate in the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, described request unit is according to the MD5 of the leak repair procedure after described renewal, it is judged that after described renewal The leak repair procedure that stored of leak repair procedure and described request unit the most identical may include that described request The MD5 of the leak repair procedure stored described in device acquisition;Leak after described request unit judges described renewal is repaiied The MD5 of multiple program is the most identical with the MD5 of the described leak repair procedure stored;If the leak after described renewal is repaiied The MD5 of multiple program is identical with the MD5 of the described leak repair procedure stored, it is determined that the leak after described renewal is repaiied Multiple program is identical with the leak repair procedure that described request unit has stored;If the leak repair procedure after described renewal MD5 differs with the MD5 of the described leak repair procedure stored, it is determined that the leak repair procedure after described renewal The leak repair procedure stored with described request unit differs.
According to the embodiment of the present application, additionally provide a kind of device embodiment for implementing said method embodiment, such as figure Shown in 13, this device includes:
Figure 13 is the structural representation of the request unit according to the embodiment of the present application.
As shown in figure 13, this request unit can include the 3rd transmitting element 1302 and control unit 1304.
Wherein, the 3rd transmitting element 1302, for the apocrypha with the first form is sent to file prosthetic device, Wherein, by described file prosthetic device according to the grammar property of each field in described apocrypha, by grammar property phase Same field forms at least one field groups, according to the grammar property of each field groups, obtains each grammar property corresponding Sequence of tokens feature, according to described sequence of tokens feature, determine the leak at least one field groups described, by institute Stating leak and replace with default reparation code sequence, at least one field groups described after being repaired, after repairing At least one field groups described is reassembled as the reparation file with described first form corresponding to described apocrypha;Control Unit 1304 processed, has described first lattice for obtaining from described file prosthetic device corresponding to described apocrypha The reparation file of formula.
Herein it should be noted that above-mentioned 3rd transmitting element 1302 and control unit 1304 are corresponding in embodiment one Step S10 to step S12, this module is identical with the example that corresponding step is realized and application scenarios, but does not limits In above-described embodiment one disclosure of that.It should be noted that above-mentioned module can be run as the part of device In the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, described control unit 1304 is used for performing following steps and obtains corresponding to described from file prosthetic device The reparation file with described first form of apocrypha: send the first request to described file prosthetic device, described First request leak repair procedure after down loading updating;After receiving the described renewal that described file prosthetic device returns Leak repair procedure, wherein, the leak repair procedure after described renewal comprises described reparation file.
Alternatively, described control unit 1304, it is additionally operable to send the second request to described file prosthetic device, described the The identification information of two requests leak repair procedure after obtaining described renewal;Receive described file prosthetic device to return Described renewal after the MD5 of leak repair procedure;MD5 according to the leak repair procedure after described renewal, it is judged that institute State the leak repair procedure after renewal the most identical with the leak repair procedure that described request unit has stored, if identical, Described first request then initiated by described request unit.
It follows that the same set of Patch code that uses that prior art exists carries out the leak reparation accuracy caused relatively The problem of difference, the application proposes a kind of method split the field of apocrypha based on grammar property, Jin Eryi Carry out lookup and the reparation of leak according to each grammar property correspondence sequence of tokens feature and reparation code sequence, reached right Leak carries out the purpose automatically repaired of 1: 1, it is achieved thereby that improve accuracy that leak repairs and security of system Technique effect.
Embodiment 3
Embodiments herein additionally provides a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium May be used for preserving the program code performed by Ile repair method that above-described embodiment one is provided.
Alternatively, in the present embodiment, during above-mentioned storage medium may be located at computer network Computer terminal group In any one terminal, or it is positioned in any one mobile terminal in mobile terminal group.
Alternatively, in the present embodiment, storage medium is arranged to storage for the program code performing following steps: Obtain the apocrypha with the first form that request unit is uploaded;According to the grammer of each field in described apocrypha Feature, forms at least one field groups by field identical for grammar property;According to the grammar property of each field groups, obtain Take the sequence of tokens feature that each grammar property is corresponding;According to described sequence of tokens feature, determine at least one word described The leak of Duan Zuzhong;Described leak is replaced with default reparation code sequence, after being repaired described at least one Field groups;At least one field groups described in after repairing is reassembled as having described first corresponding to described apocrypha The reparation file of form.
Alternatively, storage medium is also configured to storage for the program code performing following steps: extract each suspicious The metamessage of file, wherein, described metamessage includes file path and the Message Digest 5 MD5 of corresponding apocrypha, Described file path refers to described apocrypha path on the subscriber equipment at described request unit place;According to described File path and described MD5, carry out duplicate removal process to each apocrypha described.
Alternatively, storage medium is also configured to storage for the program code performing following steps: determine described each The apocrypha repeated in apocrypha, wherein, the apocrypha of described repetition refers to that described file path is identical and institute State the identical file of MD5;Retain the first file in the apocrypha of described repetition, will be in addition to described first file The apocrypha of described repetition delete, wherein, described first file is any one in the apocrypha of described repetition Individual.
Alternatively, storage medium is also configured to storage for the program code performing following steps: described at least one Individual field groups is searched the field identical with described sequence of tokens feature, by identical for described and described sequence of tokens feature Field is defined as described leak.
Alternatively, storage medium is also configured to storage for the program code performing following steps: according to described reparation After at least one field groups described in the filiation of each field, by least one field described in after described reparation Group is reassembled as the reparation file with described first form corresponding to described apocrypha.
Alternatively, storage medium is also configured to storage for the program code performing following steps: receive described request The first request that device sends, described first request leak repair procedure after down loading updating;To described request dress Put and send the leak repair procedure after described renewal, wherein, the leak repair procedure after described renewal comprises described in repair Multiple file, in order to described apocrypha is repaired by described request unit according to described reparation file.
Alternatively, storage medium is also configured to storage for the program code performing following steps: receive from described The second request that request unit sends, the mark of described second request leak repair procedure after obtaining described renewal Information;The MD5 of the leak repair procedure after described request unit sends described renewal, wherein, by described request dress The MD5 of the leak repair procedure after putting according to described renewal, it is judged that the leak repair procedure after described renewal is asked with described The leak repair procedure asking device to store is the most identical, if identical, described first request then initiated by described request unit.
Alternatively, storage medium is also configured to storage for the program code performing following steps: described request unit The MD5 of the leak repair procedure stored described in acquisition;Described request unit judges that the leak after described renewal repairs journey The MD5 of sequence is the most identical with the MD5 of the described leak repair procedure stored;If the leak after described renewal repairs journey The MD5 of sequence is identical with the MD5 of the described leak repair procedure stored, it is determined that the leak after described renewal repairs journey Sequence is identical with the leak repair procedure that described request unit has stored;If the MD5 of the leak repair procedure after described renewal Differ with the MD5 of the described leak repair procedure stored, it is determined that the leak repair procedure after described renewal and institute State the leak repair procedure that request unit stored to differ.
Above-mentioned the embodiment of the present application sequence number, just to describing, does not represent the quality of embodiment.
In above-described embodiment of the application, the description to each embodiment all emphasizes particularly on different fields, and does not has in certain embodiment The part described in detail, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that the processing means of disclosed sequence information, Can realize by another way.Wherein, device embodiment described above is only schematically, such as described The division of unit, is only a kind of logic function and divides, and actual can have other dividing mode when realizing, the most Individual unit or assembly can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs. Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, Unit or the INDIRECT COUPLING of module or communication connection, can be being electrical or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to On multiple NEs.Some or all of unit therein can be selected according to the actual needs to realize the present embodiment The purpose of scheme.
It addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit is using the form realization of SFU software functional unit and as independent production marketing or use, Can be stored in a computer read/write memory medium.Based on such understanding, the technical scheme essence of the application On the part that in other words prior art contributed or this technical scheme completely or partially can be with software product Form embodies, and this computer software product is stored in a storage medium, including some instructions with so that one Platform computer equipment (can be for personal computer, server or the network equipment etc.) performs each embodiment institute of the application State all or part of step of method.And aforesaid storage medium includes: USB flash disk, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic disc or CD Etc. the various media that can store program code.
The above is only the preferred implementation of the application, it is noted that for the ordinary skill people of the art For Yuan, on the premise of without departing from the application principle, it is also possible to make some improvements and modifications, these improve and profit Decorations also should be regarded as the protection domain of the application.

Claims (21)

1. an Ile repair method, it is characterised in that including:
Obtain the apocrypha with the first form that request unit is uploaded;
According to the grammar property of each field in described apocrypha, field identical for grammar property is formed at least One field groups;
According to the grammar property of each field groups, obtain the sequence of tokens feature that each grammar property is corresponding;
According to described sequence of tokens feature, determine the leak at least one field groups described;
Described leak is replaced with default reparation code sequence, at least one field groups described after being repaired;
At least one field groups described in after repairing is reassembled as having described first corresponding to described apocrypha The reparation file of form.
Method the most according to claim 1, it is characterised in that the quantity at described apocrypha is at least two In the case of, after the apocrypha with the first form that described acquisition request unit is uploaded, described according to institute State the grammar property of each field in apocrypha, field identical for grammar property is formed at least one field groups; Before, described method also includes:
Extracting the metamessage of each apocrypha, wherein, described metamessage includes the file road of corresponding apocrypha Footpath and Message Digest 5 MD5, described file path refers to that described apocrypha is at described request unit place Path on subscriber equipment;
According to described file path and described MD5, each apocrypha described is carried out duplicate removal process.
Method the most according to claim 2, it is characterised in that described according to described file path and described MD5, Each apocrypha described carries out duplicate removal process include:
Determining the apocrypha repeated in each apocrypha described, wherein, the apocrypha of described repetition refers to Described file path is identical and described file identical for MD5;
Retain the first file in the apocrypha of described repetition, by the described repetition in addition to described first file Apocrypha delete, wherein, described first file is any one in the apocrypha of described repetition.
Method the most according to claim 1, it is characterised in that described according to described sequence of tokens feature, determines institute The leak stated at least one field groups includes:
The field identical with described sequence of tokens feature is searched, by described and institute at least one field groups described State the identical field of sequence of tokens feature and be defined as described leak.
Method the most according to claim 1, it is characterised in that described will repair after described at least one field groups It is reassembled as including corresponding to the reparation file with described first form of described apocrypha:
According to the filiation of each field at least one field groups described in after described reparation, by described reparation After at least one field groups described be reassembled as the reparation with described first form corresponding to described apocrypha File.
Method the most according to claim 1, it is characterised in that described will repair after described at least one field After group is reassembled as corresponding to the reparation file with described first form of described apocrypha, described method is also Including:
Receiving the first request that described request unit sends, described first request leak after down loading updating is repaiied Multiple program;
Leak repair procedure after described request unit sends described renewal, wherein, the leak after described renewal Repair procedure comprises described reparation file, in order to described request unit according to described reparation file to described suspicious File is repaired.
Method the most according to claim 6, it is characterised in that first sent at the described request unit of described reception Before request, described method also includes:
Receive the second request sent from described request unit, after described second request is used for obtaining described renewal The identification information of leak repair procedure;
The MD5 of the leak repair procedure after described request unit sends described renewal, wherein, by described request Device is according to the MD5 of the leak repair procedure after described renewal, it is judged that the leak repair procedure after described renewal with The leak repair procedure that described request unit has stored is the most identical, if identical, institute then initiated by described request unit State the first request.
Method the most according to claim 7, it is characterised in that described request unit is according to the leak after described renewal The MD5 of repair procedure, it is judged that the leak that the leak repair procedure after described renewal and described request unit have stored Repair procedure is the most identical to be included:
The MD5 of the leak repair procedure stored described in the acquisition of described request unit;
The MD5 of leak repair procedure after described request unit judges described renewal repaiies with the described leak stored The MD5 of multiple program is the most identical;
If the MD5 phase of the MD5 of the leak repair procedure after described renewal and the described leak repair procedure stored With, it is determined that the leak repair procedure phase that the leak repair procedure after described renewal and described request unit have stored With;
If the MD5 of the MD5 of the leak repair procedure after described renewal and the described leak repair procedure stored is not Identical, it is determined that the leak repair procedure that the leak repair procedure after described renewal and described request unit have stored Differ.
9. an Ile repair method, it is characterised in that including:
The apocrypha with the first form is sent to file prosthetic device, wherein, described file reparation fills Put according to the grammar property of each field in described apocrypha, by field composition at least identical for grammar property Individual field groups, according to the grammar property of each field groups, obtains the sequence of tokens feature that each grammar property is corresponding, According to described sequence of tokens feature, determine the leak at least one field groups described, described leak is replaced with The reparation code sequence preset, at least one field groups described after being repaired, described in after repairing at least One field groups is reassembled as the reparation file with described first form corresponding to described apocrypha;
The reparation with described first form corresponding to described apocrypha is obtained from described file prosthetic device File.
Method the most according to claim 9, it is characterised in that described acquisition correspondence from described file prosthetic device The reparation file with described first form in described apocrypha includes:
Sending the first request to described file prosthetic device, described first request leak after down loading updating is repaiied Multiple program;
Receive the leak repair procedure after the described renewal that described file prosthetic device returns, wherein, described renewal After leak repair procedure in comprise described reparation file.
11. methods according to claim 10, it is characterised in that sending the first request to described file prosthetic device Before, described method also includes:
The second request, described second request leakage after obtaining described renewal is sent to described file prosthetic device The identification information of hole repair procedure;
Receive the MD5 of the leak repair procedure after the described renewal that described file prosthetic device returns;
MD5 according to the leak repair procedure after described renewal, it is judged that the leak repair procedure after described renewal with The leak repair procedure that described request unit has stored is the most identical, if identical, institute then initiated by described request unit State the first request.
12. 1 kinds of file prosthetic devices, it is characterised in that including:
Acquiring unit, for obtaining the apocrypha with the first form that request unit is uploaded;
Processing unit is for according to the grammar property of each field in described apocrypha, identical by grammar property Field form at least one field groups;
First determines unit, for the grammar property according to each field groups, obtains each grammar property corresponding Sequence of tokens feature;
Second determines unit, for according to described sequence of tokens feature, determines at least one field groups described Leak;
Repair unit, for described leak being replaced with the reparation code sequence being pre-configured with, after being repaired At least one field groups described;
Recomposition unit, at least one field groups described in after repairing is reassembled as corresponding to described apocrypha The reparation file with described first form.
13. devices according to claim 12, it is characterised in that also include:
Extraction unit, for extracting the metamessage of each apocrypha, wherein, described metamessage includes that correspondence can Doubting file path and the Message Digest 5 MD5 of file, described file path refers to that described apocrypha is described Path on the subscriber equipment at request unit place;
Duplicate removal unit, for according to described file path and described MD5, goes each apocrypha described Heavily process.
14. devices according to claim 13, it is characterised in that described duplicate removal unit includes:
Determine module, for determining the apocrypha repeated in each apocrypha described, wherein, described repetition Apocrypha refer to that described file path is identical and described file identical for MD5;
Processing module, the first file in the apocrypha retaining described repetition, will be except described first file The apocrypha of described repetition in addition is deleted, and wherein, described first file is in the apocrypha of described repetition Any one.
15. devices according to claim 12, it is characterised in that described first determines that unit is for performing following steps According to described sequence of tokens feature, determine the leak at least one field groups described:
The field identical with described sequence of tokens feature is searched, by described and institute at least one field groups described State the identical field of sequence of tokens feature and be defined as described leak.
16. devices according to claim 12, it is characterised in that described recomposition unit is used for performing following steps and will repair At least one field groups described after Fu is reassembled as having repairing of described first form corresponding to described apocrypha Multiple file:
According to the filiation of each field at least one field groups described in after described reparation, by described reparation After at least one field groups described be reassembled as the reparation with described first form corresponding to described apocrypha File.
17. devices according to claim 12, it is characterised in that also include:
First receives unit, and for receiving the first request that described request unit sends, described first request is used for Leak repair procedure after down loading updating;
First transmitting element, the leak repair procedure after sending described renewal to described request unit, wherein, Leak repair procedure after described renewal comprises described reparation file, in order to described request unit according to described in repair Described apocrypha is repaired by multiple file.
18. devices according to claim 17, it is characterised in that also include:
Second receives unit, for receiving the second request sent from described request unit, and described second request The identification information of the leak repair procedure after obtaining described renewal;
Second transmitting element, the MD5 of the leak repair procedure after sending described renewal to described request unit, Wherein, by described request unit according to the MD5 of the leak repair procedure after described renewal, it is judged that after described renewal Leak repair procedure the most identical with the leak repair procedure that described request unit has stored, if identical, described Described first request then initiated by request unit.
19. 1 kinds of request units, it is characterised in that including:
3rd transmitting element, for the apocrypha with the first form is sent to file prosthetic device, wherein, By described file prosthetic device according to the grammar property of each field in described apocrypha, grammar property is identical Field form at least one field groups, according to the grammar property of each field groups, obtain each grammar property pair The sequence of tokens feature answered, according to described sequence of tokens feature, determines the leak at least one field groups described, Described leak is replaced with default reparation code sequence, at least one field groups described after being repaired, will At least one field groups described after reparation is reassembled as described first form that has corresponding to described apocrypha Repair file;
Control unit, described for obtaining from described file prosthetic device corresponding to having of described apocrypha The reparation file of the first form.
20. devices according to claim 19, it is characterised in that described control unit is used for performing following steps from literary composition Part prosthetic device obtains the reparation file with described first form corresponding to described apocrypha:
Sending the first request to described file prosthetic device, described first request leak after down loading updating is repaiied Multiple program;
Receive the leak repair procedure after the described renewal that described file prosthetic device returns, wherein, described renewal After leak repair procedure in comprise described reparation file.
21. devices according to claim 20, it is characterised in that described control unit, are additionally operable to repair to described file Apparatus for coating sends the second request, the mark of described second request leak repair procedure after obtaining described renewal Information;Receive the MD5 of the leak repair procedure after the described renewal that described file prosthetic device returns;According to institute State the MD5 of the leak repair procedure after renewal, it is judged that the leak repair procedure after described renewal and described request dress Putting the leak repair procedure stored the most identical, if identical, described first request then initiated by described request unit.
CN201510307070.6A 2015-06-05 2015-06-05 Ile repair method and device Active CN106295334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510307070.6A CN106295334B (en) 2015-06-05 2015-06-05 Ile repair method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510307070.6A CN106295334B (en) 2015-06-05 2015-06-05 Ile repair method and device

Publications (2)

Publication Number Publication Date
CN106295334A true CN106295334A (en) 2017-01-04
CN106295334B CN106295334B (en) 2019-07-26

Family

ID=57659427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510307070.6A Active CN106295334B (en) 2015-06-05 2015-06-05 Ile repair method and device

Country Status (1)

Country Link
CN (1) CN106295334B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255243A (en) * 2018-09-28 2019-01-22 深信服科技股份有限公司 Restorative procedure, system, device and the storage medium of potential threat in a kind of terminal
CN113852602A (en) * 2021-08-11 2021-12-28 奇安信科技集团股份有限公司 File reconstruction method, file reconstruction device, transmission equipment, electronic device, program product and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622556A (en) * 2011-12-22 2012-08-01 南京邮电大学 Web service security analysis method based on program slicing technique
CN103886258A (en) * 2014-03-10 2014-06-25 珠海市君天电子科技有限公司 Method and device for detecting viruses
CN103955449A (en) * 2014-04-21 2014-07-30 安一恒通(北京)科技有限公司 Target sample positioning method and device
CN104182689A (en) * 2013-05-24 2014-12-03 阿里巴巴集团控股有限公司 Method and device for repairing and protecting system
CN104199925A (en) * 2014-09-01 2014-12-10 安一恒通(北京)科技有限公司 File repair method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622556A (en) * 2011-12-22 2012-08-01 南京邮电大学 Web service security analysis method based on program slicing technique
CN104182689A (en) * 2013-05-24 2014-12-03 阿里巴巴集团控股有限公司 Method and device for repairing and protecting system
CN103886258A (en) * 2014-03-10 2014-06-25 珠海市君天电子科技有限公司 Method and device for detecting viruses
CN103955449A (en) * 2014-04-21 2014-07-30 安一恒通(北京)科技有限公司 Target sample positioning method and device
CN104199925A (en) * 2014-09-01 2014-12-10 安一恒通(北京)科技有限公司 File repair method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255243A (en) * 2018-09-28 2019-01-22 深信服科技股份有限公司 Restorative procedure, system, device and the storage medium of potential threat in a kind of terminal
CN113852602A (en) * 2021-08-11 2021-12-28 奇安信科技集团股份有限公司 File reconstruction method, file reconstruction device, transmission equipment, electronic device, program product and medium
CN113852602B (en) * 2021-08-11 2023-12-08 奇安信科技集团股份有限公司 File reconstruction method, device, transmission equipment, electronic equipment and medium

Also Published As

Publication number Publication date
CN106295334B (en) 2019-07-26

Similar Documents

Publication Publication Date Title
CN109800258B (en) Data file deployment method, device, computer equipment and storage medium
CN111104579A (en) Identification method and device for public network assets and storage medium
CN104809404A (en) Data layer system of information security attack-defense platform
CN104951480A (en) Resource storage indexing device and method in CDN system
CN107634931A (en) Processing method, cloud server, gateway and the terminal of abnormal data
CN105117544A (en) Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing
CN106874768A (en) The method and device of penetration testing
CN106815135A (en) leak detection method and device
CN113496033B (en) Access behavior recognition method and device and storage medium
CN107294924A (en) Detection method, the device and system of leak
CN110177114A (en) The recognition methods of network security threats index, unit and computer readable storage medium
CN111783105B (en) Penetration test method, device, equipment and storage medium
CN109104421B (en) Website content tampering detection method, device, equipment and readable storage medium
CN103685598A (en) Method and device for discovering active IP address in IPv6 network
CN105095207A (en) Methods for retrieving and obtaining contents of application software, and devices for retrieving and obtaining contents of application software
CN112528181B (en) Two-dimensional code management method, device, computer equipment and readable storage medium
CN114386853B (en) Data audit processing method, device and equipment based on general audit model
CN106067879A (en) The detection method of information and device
CN106778264A (en) The application program analysis method and analysis system of a kind of mobile client
CN106295334A (en) Ile repair method and device
CN106714179A (en) Method for identifying pseudo base station information and device thereof
CN109101232A (en) A kind of method, apparatus of product development, computer equipment and storage medium
CN104486337A (en) Data validity verification method and device
Ferraz et al. Biological monitoring in the Amazon: recent progress and future needs
CN111107552B (en) Method and system for identifying pseudo base station

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant