CN106295334A - Ile repair method and device - Google Patents
Ile repair method and device Download PDFInfo
- Publication number
- CN106295334A CN106295334A CN201510307070.6A CN201510307070A CN106295334A CN 106295334 A CN106295334 A CN 106295334A CN 201510307070 A CN201510307070 A CN 201510307070A CN 106295334 A CN106295334 A CN 106295334A
- Authority
- CN
- China
- Prior art keywords
- apocrypha
- file
- leak
- repair procedure
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This application discloses a kind of Ile repair method and device.Wherein, the method includes: obtain the apocrypha with the first form that request unit is uploaded;According to the grammar property of each field in described apocrypha, field identical for grammar property is formed at least one field groups;According to the grammar property of each field groups, obtain the sequence of tokens feature that each grammar property is corresponding;According to described sequence of tokens feature, determine the leak at least one field groups described;Described leak is replaced with default reparation code sequence, at least one field groups described after being repaired;At least one field groups described in after repairing is reassembled as the reparation file with described first form corresponding to described apocrypha.Present application addresses and repair, owing to prior art uses same set of Patch code to carry out the leak caused, the technical problem that accuracy is poor.
Description
Technical field
The application relates to internet arena, in particular to a kind of Ile repair method and device.
Background technology
Along with the fast development of the Internet, the server of each operator runs substantial amounts of web site, for technology
On consideration, these web site great majority CMS (Content that directly employings are increased income in the market or charged
Management System, Content Management System) carry out building of web station system.And these CMS hold due to source code
Easily obtaining, usually suffer the bug excavation of hacker, after being found that available leak, hacker can utilize oneself hands
On ODAY (zero day) leak web site is attacked, and then obtain substantial amounts of business material.
In the antagonism of web attacking and defending, for traditional binary vulnerability file or website text Patch
In (patch) technology, prior art is generally adopted by the unified method replacing masterplate, i.e. no matter leak file or
Bug code has how many kinds of mutation, all uses same set of Patch code to carry out leak reparation at server end, and this just leads
Cause leak and repair the problem that accuracy is poor, security of system is relatively low.
For above-mentioned problem, effective solution is the most not yet proposed.
Summary of the invention
The embodiment of the present application provides a kind of Ile repair method and device, at least to solve owing to prior art uses same
A set of Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
An aspect according to the embodiment of the present application, it is provided that a kind of Ile repair method, including: obtain request unit
The apocrypha with the first form uploaded;According to the grammar property of each field in above-mentioned apocrypha, by grammer
The field that feature is identical forms at least one field groups;According to the grammar property of each field groups, obtain each grammer special
Levy the sequence of tokens feature of correspondence;According to above-mentioned sequence of tokens feature, determine the leak at least one field groups above-mentioned;
Above-mentioned leak is replaced with default reparation code sequence, at least one field groups above-mentioned after being repaired;To repair
After at least one field groups above-mentioned be reassembled as the reparation file with above-mentioned first form corresponding to above-mentioned apocrypha.
According to the another aspect of the embodiment of the present application, additionally provide a kind of Ile repair method, including: will have first
The apocrypha of form sends to file prosthetic device, wherein, by above-mentioned file prosthetic device according to above-mentioned apocrypha
In the grammar property of each field, field identical for grammar property is formed at least one field groups, according to each field
The grammar property of group, obtains the sequence of tokens feature that each grammar property is corresponding, according to above-mentioned sequence of tokens feature, really
Leak in fixed at least one field groups above-mentioned, replaces with above-mentioned leak default reparation code sequence, is repaired
After at least one field groups above-mentioned, will repair after at least one field groups above-mentioned be reassembled as corresponding to above-mentioned suspicious literary composition
The reparation file with above-mentioned first form of part;Obtain corresponding to above-mentioned apocrypha from above-mentioned file prosthetic device
The reparation file with above-mentioned first form.
According to the another aspect of the embodiment of the present application, additionally provide a kind of file prosthetic device, including: acquiring unit,
For obtaining the apocrypha with the first form that request unit is uploaded;Processing unit, for according to above-mentioned suspicious literary composition
The grammar property of each field in part, forms at least one field groups by field identical for grammar property;First determines list
Unit, for the grammar property according to each field groups, obtains the sequence of tokens feature that each grammar property is corresponding;Second
Determine unit, for according to above-mentioned sequence of tokens feature, determine the leak at least one field groups above-mentioned;Repair single
Unit, for above-mentioned leak being replaced with the reparation code sequence being pre-configured with, at least one word above-mentioned after being repaired
Section group;Recomposition unit, at least one field groups above-mentioned after repairing is reassembled as corresponding to above-mentioned apocrypha
There is the reparation file of above-mentioned first form.
According to the another aspect of the embodiment of the present application, additionally provide a kind of request unit, including: the 3rd transmitting element,
For the apocrypha with the first form is sent to file prosthetic device, wherein, press above-mentioned file prosthetic device
According to the grammar property of each field in above-mentioned apocrypha, field identical for grammar property is formed at least one field groups,
According to the grammar property of each field groups, obtain the sequence of tokens feature that each grammar property is corresponding, according to above-mentioned token
Sequence signature, determines the leak at least one field groups above-mentioned, and above-mentioned leak replaces with default reparation code sequence
Row, at least one field groups above-mentioned after being repaired, at least one field groups above-mentioned after repairing is reassembled as correspondence
The reparation file with above-mentioned first form in above-mentioned apocrypha;Control unit, for filling from above-mentioned file reparation
Put the middle acquisition reparation file with above-mentioned first form corresponding to above-mentioned apocrypha.
In the embodiment of the present application, the apocrypha with the first form that acquisition request unit is uploaded is used;According to can
Doubt the grammar property of each field in file, field identical for grammar property is formed at least one field groups;According to often
The grammar property of individual field groups, obtains the sequence of tokens feature that each grammar property is corresponding;According to sequence of tokens feature,
Determine the leak at least one field groups;Leak is replaced with default reparation code sequence, after being repaired extremely
A few field groups;At least one field groups after repairing is reassembled as first form of having corresponding to apocrypha
Repair the mode of file, by apocrypha being carried out after fractionation obtains at least one field groups according to grammar property,
Carry out lookup and the reparation of leak according to each grammar property correspondence sequence of tokens feature and reparation code sequence, reach
Leak is carried out the purpose automatically repaired of 1: 1, it is achieved thereby that improve accuracy and security of system that leak is repaired
Technique effect, and then solve and repair standard owing to prior art uses same set of Patch code to carry out the leak that causes
The technical problem that really property is poor.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen
Schematic description and description please is used for explaining the application, is not intended that the improper restriction to the application.At accompanying drawing
In:
Fig. 1 is the hardware block diagram of the terminal of a kind of operating file detection method according to the embodiment of the present application;
Fig. 2 is the schematic flow sheet of a kind of optional Ile repair method according to the embodiment of the present application;
Fig. 3 is the schematic flow sheet of the another kind of optional Ile repair method according to the embodiment of the present application;
Fig. 4 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 5 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 6 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 7 is the schematic flow sheet of another the optional Ile repair method according to the embodiment of the present application;
Fig. 8 is the structural representation of a kind of optional file prosthetic device according to the embodiment of the present application;
Fig. 9 is the structural representation of the another kind of optional file prosthetic device according to the embodiment of the present application;
Figure 10 is the structural representation of a kind of optional duplicate removal unit according to the embodiment of the present application;
Figure 11 is the structural representation of another the optional file prosthetic device according to the embodiment of the present application;
Figure 12 is the structural representation of another the optional file prosthetic device according to the embodiment of the present application;
Figure 13 is the structural representation of a kind of optional request unit according to the embodiment of the present application.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the application scheme, below in conjunction with in the embodiment of the present application
Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present application, it is clear that described embodiment
It is only the embodiment of the application part rather than whole embodiments.Based on the embodiment in the application, ability
The every other embodiment that territory those of ordinary skill is obtained under not making creative work premise, all should belong to
The scope of the application protection.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, "
Two " it is etc. for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that this
Sample use data can exchange in the appropriate case, in order to embodiments herein described herein can with except
Here the order beyond those illustrating or describing is implemented.Additionally, term " includes " and " having " and they
Any deformation, it is intended that cover non-exclusive comprising, such as, contain series of steps or the process of unit, side
Method, system, product or equipment are not necessarily limited to those steps or the unit clearly listed, but can include the clearest
List or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment 1
According to the embodiment of the present application, additionally provide the embodiment of the method for a kind of Ile repair method, it should be noted that
Can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing,
And, although show logical order in flow charts, but in some cases, can be suitable be different from herein
Step shown or described by sequence execution.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune
Calculate in device and perform.As a example by running on computer terminals, Fig. 1 is a kind of file reparation side of the embodiment of the present application
The hardware block diagram of the terminal of method.As it is shown in figure 1, terminal 10 can include one or more (figure
In only illustrate one) (processor 102 can include but not limited to Micro-processor MCV or able to programme patrol for processor 102
The processing means of volume device FPGA etc.), for storing the memorizer 104 of data and for the transmission of communication function
Device 106.It will appreciated by the skilled person that the structure shown in Fig. 1 is only signal, it is not to above-mentioned
The structure of electronic installation causes restriction.Such as, terminal 10 may also include more more or less than shown in Fig. 1
Assembly, or there is the configuration different from shown in Fig. 1.
Memorizer 104 can be used for storing software program and the module of application software, such as the file in the embodiment of the present application
Programmed instruction/module that restorative procedure is corresponding, processor 102 is stored in the software program in memorizer 104 by operation
And module, thus perform the application of various function and data process, i.e. realize the Hole Detection of above-mentioned application program
Method.Memorizer 104 can include high speed random access memory, may also include nonvolatile memory, such as one or many
Individual magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, memorizer 104
Can farther include the memorizer remotely located relative to processor 102, these remote memories can by network even
It is connected to terminal 10.The example of above-mentioned network includes but not limited to the Internet, intranet, LAN, shifting
Dynamic communication network and combinations thereof.
Transmitting device 106 is for receiving via a network or sending data.Above-mentioned network instantiation can include
The wireless network that the communication providers of terminal 10 provides.In an example, transmitting device 106 includes one
Network adapter (Network Interface Controller, NIC), they can be by base station and other network equipments
It is connected thus communication can be carried out with the Internet.In an example, transmitting device 106 can be radio frequency (Radio
Frequency, RF) module, it is for wirelessly carrying out communication with the Internet.
Under above-mentioned running environment, this application provides Ile repair method as shown in Figure 2.Fig. 2 is according to this Shen
Please the flow chart of Ile repair method of embodiment one.
As in figure 2 it is shown, this document restorative procedure can include step implemented as described below:
Step S202, obtains the apocrypha with the first form that request unit is uploaded.
In the application above-mentioned steps S202, request unit may refer to the application program installed on a user device
(such as client), subscriber equipment can be scanned by this request unit according to the configuration of server end, start by set date,
When finding apocrypha, upload this apocrypha to file prosthetic device, request unit by the passage being pre-configured with
Can also be terminal or similar arithmetic unit, self disk file be scanned by start by set date, when sending out
During existing apocrypha, by the passage that is pre-configured with, apocrypha is sent to file prosthetic device.
Wherein, file prosthetic device receives after the apocrypha with the first form of request unit, permissible
Resolving this apocrypha, to realize the reparation of apocrypha, file prosthetic device can be such as AliYunDun
Server.
With request unit as AliYunDun as a example by (Ali's cloud shield), AliYunDun based on C/S (Client/Server,
Client/server) the network architecture, every subscriber equipment is all deployed with an independent AliYunDun program,
And keep long connection by encrypted tunnel and AliYunDun server.According to the configuration of server, AliYunDun is fixed
Time download up-to-date AliVulfix (cloud shield attachment component) leak repair procedure from server, replace local leak reparation
Program.According to the configuration of server, AliYunDun can control AliVulfix leak repair procedure start by set date,
All disk directories on subscriber equipment are carried out overall traverse scanning, and the configuration information issued according to server is collected
The file of assigned catalogue, such as configuration item have one :/plus/mytag_js.php, then AliVulfix can scan
And by the encryption of AliYunDun by reporting this apocrypha.
Step S204, according to the grammar property of each field in apocrypha, forms field identical for grammar property extremely
A few field groups.
In the application above-mentioned steps S204, file prosthetic device is after obtaining this apocrypha, in order to take leak
Specific aim reparation and improve remediation efficiency, in order to avoid the long hacker of causing repair time utilizes this time slot to enter one to one
Invading subscriber equipment, file prosthetic device can be according to the grammar property of each field in apocrypha, by grammar property phase
Same field forms at least one field groups.
As a example by file prosthetic device is for AliYunDun server, because user's major part is electricity business, net on Ali's cloud
Stand user, and user usually has the situation that oneself network site code file makes customization amendment, in order to ensure that leak is repaired not
Affecting the properly functioning of these user websites, AliYunDun server takes the strategy that specific aim is repaired one to one,
But, reparation can produce a problem one to one, after using 1: 1 reparation, at the number of users of the hundreds thousand of scale of construction of Ali's cloud
Under, the substantial amounts of file that there is leak can be received at server end, even if filtering, quantity of documents is the most a lot,
Therefore, above-mentioned apocrypha can be resolved to syntax tree structure by AliYunDun server.
In the embodiment of the present application, file prosthetic device first has to apocrypha is carried out syntactic analysis, determines apocrypha
In the grammar property of each field, wherein, syntactic analysis refers in code scans a to container, then to this
Field groups is synthesized all kinds of grammatical phrases on the basis of morphological analysis by the character in container.Determining each field
After grammar property, field identical for grammar property can be formed at least one field groups by file prosthetic device, enters one
Step ground, at least one field groups can be resolved to language according to the filiation between each field by file prosthetic device
Method tree construction.
Step S206, according to the grammar property of each field groups, obtains the sequence of tokens feature that each grammar property is corresponding.
In the application above-mentioned steps S206, sequence of tokens feature can be pre-configured with by safe operation personnel, file
Prosthetic device utilizes the sequence of tokens feature corresponding to each grammar property, it is achieved the lookup of leak.
Step S208, according to sequence of tokens feature, determines the leak at least one field groups.
In the application above-mentioned steps S208, file prosthetic device is getting the sequence of tokens spy that each grammar property is corresponding
After levying, the location of leak can be carried out at least one field groups according to sequence of tokens feature.
This sentences popular example and illustrates, if there being 100 people, it is therefore an objective to determine the people of eyeball color blue, i.e.
Sequence of tokens feature is " eyeball-blueness ", then according to the thinking of the Ile repair method that the embodiment of the present application provides,
The various piece of these hundred people is first grouped by we, such as, the eyes of 100 people is divided into one group, nose
Be divided into one group, face be divided into one group etc., then, according to sequence of tokens feature carry out leak search time, it is only necessary to
This group of eyes makes a look up, it is not necessary to search again for other parts, reach to improve the purpose of leak search efficiency.
Alternatively, according to sequence of tokens feature, determine that the leak at least one field groups includes: at least one word
Duan Zuzhong searches the field identical with sequence of tokens feature, and the field identical with sequence of tokens feature is defined as leak.
In the embodiment of the present application, safe operation personnel only need to configure the most above-mentioned sequence of tokens feature, file prosthetic device
Then can carry out the location of leak with automatization, improve the time cost of safe operation.
Step S210, replaces with default reparation code sequence by leak, at least one field groups after being repaired.
In the application above-mentioned steps S210, the code sequence of repairing preset can also be that safe operation personnel are pre-configured with.
File prosthetic device, according to sequence of tokens feature, after determining the leak at least one field groups, can obtain this
The reparation code sequence preset, and then, leak is replaced with this reparation code sequence preset, it is achieved apocrypha
Repair.
The pinpoint recovery technique of the 1: 1 of the file prosthetic device employing of the embodiment of the present application, the most all of suspicious literary composition
Part is all directly based upon request unit original document and revises targetedly, so can farthest avoid because leaking
Hole reparation causes the inconsistent of code logic thus causes the regular traffic logic of user to be affected, and even can not use.
Meanwhile, safe operation personnel have only to configure one and repair code sequence, when file prosthetic device determines leak, and will
Leak replaces with default reparation code sequence, at least one field groups after being repaired.
Step S212, at least one field groups after repairing is reassembled as first form of having corresponding to apocrypha
Repair file.
In the application above-mentioned steps S212, owing to, in above-mentioned file repair procedures, file prosthetic device will have the first lattice
The apocrypha of formula splits at least one field groups, therefore after being repaired according to the grammar property of each field
At least one field groups after, file prosthetic device can at least one field according to its inverse process, after repairing
Group is reassembled as the reparation file with the first form corresponding to apocrypha.
Alternatively, at least one field groups after repairing is reassembled as having repairing of the first form corresponding to apocrypha
Multiple file includes: according to the filiation of each field at least one field groups after repairing, after repairing at least
One field groups is reassembled as the reparation file with the first form corresponding to apocrypha.
As a example by file prosthetic device is for AliYunDun server, AliYunDun server can be by above-mentioned suspicious literary composition
After part resolves to syntax tree structure, according to token sequence signature (sequence of tokens feature) location leak, Jin Er
After syntax tree inserts default reparation code sequence, then rebuild apocrypha, complete this apocrypha
Leak is repaired, and obtains above-mentioned reparation file.
The Ile repair method that the embodiment of the present application provides, owing to the quantity of apocrypha may be thousands of, therefore adopts
Automatization can be realized by program code, it is achieved whole leak reparation by the above-mentioned whole process of Ile repair method.
From discovery, to examination & verification, to the full process automatization repaired, the subscriber equipment that can realize Ali's cloud the whole network in theory exists
Some leak is all repaired in 20 minutes.
The Ile repair method of the embodiment of the present application at least has following technical effect that
1, accurately for the specific transactions reparation leak therein of each user;
2, leak repairs full process automatization, and safe operation personnel have only to be absorbed in the research of leak, and carry out once
Configuration, the whole network repair action afterwards is entirely full-automation;
3, some leak all repaired in 20 minutes by the machine realizing Ali's cloud the whole network;
4, use the mode of syntax tree to carry out location and the reparation of leak, canonical, character string search can be avoided to bring
Wrong report, has the highest accuracy rate and the lowest rate of false alarm;
5, the properly functioning of request unit program to be repaired is not affected.
From the foregoing, it will be observed that the scheme that the above embodiments of the present application one are provided, by apocrypha being entered according to grammar property
After row fractionation obtains at least one field groups, according to each grammar property correspondence sequence of tokens feature and reparation code sequence
Row carry out lookup and the reparation of leak, have reached to carry out leak the purpose automatically repaired of 1: 1, it is achieved thereby that carry
The accuracy of high leak reparation and the technique effect of security of system, and then solve owing to prior art uses same set of
Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
In a kind of alternative that the above embodiments of the present application provide, as it is shown on figure 3, the quantity of apocrypha be to
In the case of few two, after above-mentioned steps S202 obtains the apocrypha with the first form that request unit is uploaded,
Field identical for grammar property, according to the grammar property of each field in apocrypha, is formed at least by above-mentioned steps S204
Before one field groups, Ile repair method can also include:
Step S302, extracts the metamessage of each apocrypha, and wherein, metamessage includes the file of corresponding apocrypha
Path and Message Digest 5 MD5, file path refers to apocrypha road on the subscriber equipment at request unit place
Footpath.
In the application above-mentioned steps S302, the quantity of the apocrypha that file prosthetic device gets may be thousands of,
Wherein there may be some files repeated, therefore, in the case of the quantity of apocrypha is at least two,
File prosthetic device can carry out duplicate removal process to apocrypha.
So, in the case of the quantity of apocrypha is at least two, it is suspicious that file prosthetic device can extract each
The metamessage of file, and metamessage is saved in distributed fingerprint database.Wherein, metamessage can include right
Answer file path and MD5 (Message Digest Algorithm, Message Digest 5), the file road of apocrypha
Footpath refers to apocrypha path on the subscriber equipment at request unit place.
Step S304, according to file path and MD5, carries out duplicate removal process to each apocrypha.
In the application above-mentioned steps S304, duplicate removal processes and refers to remove the apocrypha of repetition.File prosthetic device is carrying
After having taken file path and the MD5 of each apocrypha, can according to file path and MD5 judge this each suspicious
Whether there is the file of repetition among file, and then each apocrypha is carried out duplicate removal process.
In a kind of alternative that the above embodiments of the present application provide, as shown in Figure 4, above-mentioned steps S304, according to literary composition
Part path and MD5, carry out duplicate removal process and may include that each apocrypha
Step S402, determines the apocrypha repeated in each apocrypha, and wherein, the apocrypha of repetition refers to literary composition
The file that part path is identical and MD5 is identical.
In the application above-mentioned steps S402, for how according to file path and MD5, each apocrypha is gone
Heavily processing, the method that the embodiment of the present application provides is that file prosthetic device is by judging the file path of each apocrypha
The most identical, and the MD5 of each apocrypha is the most identical, if file path is identical and MD5 is identical, it is determined that
For the apocrypha repeated.
Such as, file prosthetic device is after the file path extracting each apocrypha and MD5, it is judged that suspicious literary composition
The file path of part 1, apocrypha 7, apocrypha 24 and apocrypha 30 is identical and MD5 is identical, then file
Prosthetic device determines that this apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha 30 are the suspicious literary composition repeated
Part.
Step S404, retains the first file in the apocrypha repeated, suspicious by the repetition in addition to the first file
File is deleted, and wherein, the first file is any one in the apocrypha repeated.
In the application above-mentioned steps S404, the apocrypha that file prosthetic device repeats in determining each apocrypha
Afterwards, need only to retain one of them apocrypha, delete other apocryphas repeated and process to realize duplicate removal.
Such as, file prosthetic device is determining apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha
After 30 apocryphas for repetition, apocrypha 1, apocrypha 7, apocrypha 24 and suspicious literary composition can be retained
Any one file in part 30, such as retain apocrypha 1, and then by the repetition in addition to apocrypha 1 can
Doubt file to delete, i.e. delete apocrypha 7, apocrypha 24 and apocrypha 30, it is achieved the duplicate removal to apocrypha
Process.
In a kind of alternative that the above embodiments of the present application provide, as it is shown in figure 5, above-mentioned steps S212, will repair
After at least one field groups be reassembled as corresponding to the reparation file with the first form of apocrypha after, file is repaiied
Compound recipe method can also include:
Step S502, receives the first request that request unit sends, first request leak reparation after down loading updating
Program.
In the application above-mentioned steps S502, request unit can regularly be downloaded up-to-date leak according to configuration and repair again,
And then, file prosthetic device can receive the of the leak repair procedure after down loading updating that request unit sends
One request.
With request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, AliYunDun
Based on the C/S network architecture, keep long by encrypted tunnel and AliYunDun server and connect, according to AliYunDun
The configuration of server, AliYunDun timing is downloaded up-to-date AliVulfix leak from AliYunDun server and is repaired journey
Sequence.
Step S504, sends the leak repair procedure after updating to request unit, and wherein, the leak after renewal repairs journey
Sequence comprises reparation file, in order to apocrypha is repaired by request unit according to repairing file.
In the application above-mentioned steps S504, file prosthetic device, after completing the reparation to apocrypha, can obtain one
The leak repair procedure that part is up-to-date, such as, the form of this leak repair procedure is permissible
For: { " filename ": "/webapps/manager/WEB-INF/web.xml ", " md5 ": " bc5ef661b746b0c55
462353583a7eb34 ", " action ": " delete " };{ " filename ": "/webapps/manager/WEB-INF/
Web.xml ", " md5 ": " bc5ef661b746b0c55462353583a7eb55 ", " action ": " replace " }.This
Up-to-date leak repair procedure is accurately positioned under the file path of above-mentioned apocrypha, the apocrypha of corresponding MD5,
After request unit leak repair procedure after having downloaded this renewal, can be according in the leak repair procedure after updating
The above-mentioned reparation file comprised, repairs apocrypha, such as, be above-mentioned reparation file by apocrypha.
In a kind of alternative that the above embodiments of the present application provide, as shown in Figure 6, above-mentioned steps S502, receiving please
Ask the first request that device sends, before first request leak repair procedure after down loading updating, file reparation side
Method can also include:
Step S602, receives the second request sent from request unit, second request leak after obtaining renewal
The identification information of repair procedure.
In the application above-mentioned steps S602, owing to request unit is according to configuration timing download flaw repair procedure, therefore
Whether the leak repair procedure after request unit can first judge this renewal is up-to-date.
Still with request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, according to
The configuration of AliYunDun server, AliYunDun timing downloads up-to-date AliVulfix from AliYunDun server
Leak repair procedure, it may be judged whether be for up-to-date standard, checks the AliVulfix being saved in AliYunDun server
The MD5 of leak repair procedure whether with the machine before the MD5 of AliVulfix leak repair procedure that downloaded whether phase
With, if it is different, explanation AliYunDun server is modified variation, then re-download the most up-to-date
AliVulfix leak repair procedure, replaces local AliVulfix leak repair procedure.
Step S604, sends the MD5 of the leak repair procedure after updating, wherein, by request unit root to request unit
MD5 according to the leak repair procedure after updating, it is judged that the leakage that the leak repair procedure after renewal and request unit have stored
Hole repair procedure is the most identical, if identical, the first request then initiated by request unit.
Alternatively, request unit is according to the MD5 of the leak repair procedure after updating, it is judged that the leak after renewal repairs journey
The most identical leak that may include that request unit acquisition has stored of leak repair procedure that sequence and request unit have stored
The MD5 of repair procedure;Request unit judges that the MD5 of the leak repair procedure after updating repairs journey with the leak stored
The MD5 of sequence is the most identical;If the MD5 of the MD5 of the leak repair procedure after Geng Xining and the leak repair procedure stored
Identical, it is determined that the leak repair procedure that the leak repair procedure after renewal has stored with request unit is identical;If updating
After the MD5 of leak repair procedure differ with the MD5 of the leak repair procedure stored, it is determined that the leakage after renewal
The leak repair procedure that hole repair procedure and request unit have stored differs.
Under above-mentioned running environment, present invention also provides a kind of Ile repair method.This document restorative procedure can wrap
Include step implemented as described below:
Step S10, sends the apocrypha with the first form to file prosthetic device, wherein, repairs file
Field identical for grammar property, according to the grammar property of each field in apocrypha, is formed at least one field by device
Group, according to the grammar property of each field groups, obtains the sequence of tokens feature that each grammar property is corresponding, according to token
Sequence signature, determines the leak at least one field groups, leak replaces with default reparation code sequence, obtains
At least one field groups after reparation, at least one field groups after repairing is reassembled as having corresponding to apocrypha
The reparation file of the first form.
In the application above-mentioned steps S10, request unit may refer to the application program (example installed on a user device
Such as client), subscriber equipment can be scanned by this request unit according to the configuration of server end, start by set date, when
When finding apocrypha, uploading this apocrypha to file prosthetic device by the passage being pre-configured with, request unit is also
Can be terminal or similar arithmetic unit, self disk file be scanned, works as discovery by start by set date
During apocrypha, by the passage that is pre-configured with, apocrypha is sent to file prosthetic device.
Step S12, obtains the reparation file with the first form corresponding to apocrypha from file prosthetic device.
Alternatively, step S12 obtains the reparation with the first form corresponding to apocrypha from file prosthetic device
File includes:
Step S20, sends the first request, first request leak reparation after down loading updating to file prosthetic device
Program.
In the application above-mentioned steps S20, request unit can regularly be downloaded up-to-date leak according to configuration and repair again,
And then, file prosthetic device can receive the of the leak repair procedure after down loading updating that request unit sends
One request.
With request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, AliYunDun
Based on the C/S network architecture, keep long by encrypted tunnel and AliYunDun server and connect, according to AliYunDun
The configuration of server, AliYunDun timing is downloaded up-to-date AliVulfix leak from AliYunDun server and is repaired journey
Sequence.
Step S22, receives the leak repair procedure after the renewal that file prosthetic device returns, wherein, the leakage after renewal
Hole repair procedure comprises reparation file.
In the application above-mentioned steps S22, file prosthetic device, after completing the reparation to apocrypha, can obtain one
The leak repair procedure that part is up-to-date, such as, the form of this leak repair procedure is permissible
For: { " filename ": "/webapps/manager/WEB-INF/web.xml ", " md5 ": " bc5ef661b746b0c55
462353583a7eb34 ", " action ": " delete " };{ " filename ": "/webapps/manager/WEB-INF/
Web.xml ", " md5 ": " bc5ef661b746b0c55462353583a7eb55 ", " action ": " replace " }.This
Up-to-date leak repair procedure is accurately positioned under the file path of above-mentioned apocrypha, the apocrypha of corresponding MD5,
After request unit leak repair procedure after having downloaded this renewal, can be according in the leak repair procedure after updating
The above-mentioned reparation file comprised, repairs apocrypha, such as, be above-mentioned reparation file by apocrypha.
Alternatively, in step S20, before file prosthetic device sends the first request, Ile repair method also includes:
Step S30, sends the second request, second request leak reparation after obtaining renewal to file prosthetic device
The identification information of program.
In the application above-mentioned steps S30, owing to request unit is according to configuration timing download flaw repair procedure, therefore
Whether the leak repair procedure after request unit can first judge this renewal is up-to-date.
Still with request unit as AliYunDun, file prosthetic device for AliYunDun server as a example by, according to
The configuration of AliYunDun server, AliYunDun timing downloads up-to-date AliVulfix from AliYunDun server
Leak repair procedure, it may be judged whether be for up-to-date standard, checks the AliVulfix being saved in AliYunDun server
The MD5 of leak repair procedure whether with the machine before the MD5 of AliVulfix leak repair procedure that downloaded whether phase
With, if it is different, explanation AliYunDun server is modified variation, then re-download the most up-to-date
AliVulfix leak repair procedure, replaces local AliVulfix leak repair procedure.
Step S32, receives the MD5 of the leak repair procedure after the renewal that file prosthetic device returns.
Step S34, according to the MD5 of the leak repair procedure after updating, it is judged that the leak repair procedure after renewal and request
The leak repair procedure that device has stored is the most identical, if identical, the first request then initiated by request unit.
Alternatively, request unit is according to the MD5 of the leak repair procedure after updating, it is judged that the leak after renewal repairs journey
The most identical leak that may include that request unit acquisition has stored of leak repair procedure that sequence and request unit have stored
The MD5 of repair procedure;Request unit judges that the MD5 of the leak repair procedure after updating repairs journey with the leak stored
The MD5 of sequence is the most identical;If the MD5 of the MD5 of the leak repair procedure after Geng Xining and the leak repair procedure stored
Identical, it is determined that the leak repair procedure that the leak repair procedure after renewal has stored with request unit is identical;If updating
After the MD5 of leak repair procedure differ with the MD5 of the leak repair procedure stored, it is determined that the leakage after renewal
The leak repair procedure that hole repair procedure and request unit have stored differs.
In the optional scheme of one, as a example by AliYunDun, in conjunction with Fig. 7, to the application above-mentioned file reparation side
Method is described:
Step A, the AliYunDun network architecture based on C/S, every subscriber equipment is all deployed with one independent
AliYunDun program, and keep long connection by encrypted tunnel and AliYunDun server.
In the application above-mentioned steps A, AliYunDun is equivalent to above-mentioned request unit, and AliYunDun server is suitable
In above-mentioned file prosthetic device, subscriber equipment can be entered by request unit according to the configuration of server end, start by set date
Row scanning, when finding apocrypha, uploads this apocrypha by the passage being pre-configured with.
Step B, according to the configuration of AliYunDun server, AliYunDun timing is downloaded from AliYunDun server
Up-to-date AliVulfix leak repair procedure.
In the application above-mentioned steps B, it may be judged whether for up-to-date standard be, check and be saved in AliYunDun server
AliVulfix leak repair procedure MD5 whether with the machine before the AliVulfix leak repair procedure downloaded
MD5 the most identical, if it is different, explanation AliYunDun server be modified variation, then re-download one
Secondary up-to-date AliVulfix leak repair procedure, replaces local AliVulfix leak repair procedure.
Owing to request unit is that therefore request unit can first judge that this is more according to configuration timing download flaw repair procedure
Whether the leak repair procedure after Xin is up-to-date, and request unit, according to the MD5 of the leak repair procedure after updating, is sentenced
Disconnected update after leak repair procedure the most identical with the leak repair procedure that request unit has stored may include that request
Device obtains the MD5 of the leak repair procedure stored;Request unit judges the MD5 of the leak repair procedure after updating
The most identical with the MD5 of the leak repair procedure stored;If the MD5 of the leak repair procedure after Geng Xining with store
The MD5 of leak repair procedure identical, it is determined that the leak that the leak repair procedure after renewal and request unit have stored
Repair procedure is identical;If the MD5 not phase of the MD5 of the leak repair procedure after Geng Xining and the leak repair procedure stored
With, it is determined that the leak repair procedure that the leak repair procedure after renewal and request unit have stored differs.
When the leak repair procedure that leak repair procedure after determining renewal and request unit have stored differs, file
Prosthetic device can receive the first request of the leak repair procedure after down loading updating that request unit sends, and
Send the leak repair procedure after updating to request unit, wherein, the leak repair procedure after renewal comprises reparation literary composition
Part, in order to apocrypha is repaired by request unit according to repairing file.
Step C, according to the configuration of AliYunDun server, the AliVulfix leak repair procedure on subscriber equipment
Can perform by start by set date.
In the application above-mentioned steps C, user can be set by AliYunDun according to the configuration of server end, start by set date
For being scanned, when finding apocrypha, upload this apocrypha by the passage being pre-configured with.
Step D, AliVulfix carries out overall traverse scanning to all disk directories on user's machine.
In the application above-mentioned steps D, the configuration information issued according to AliYunDun server collects the literary composition of assigned catalogue
Part, such as configuration item have one :/plus/mytag_js.php, then AliVulfix can scan and pass through AliYunDun
Encryption by reporting this apocrypha.
Step E, after AliYunDun server receives the apocrypha that AliYunDun reports, extracts the unit of apocrypha
Information.
In the application above-mentioned steps E, the quantity of the apocrypha that file prosthetic device gets may be thousands of, that
Wherein there may be some files repeated, therefore, in the case of the quantity of apocrypha is at least two, literary composition
Part prosthetic device can carry out duplicate removal process to apocrypha.So, in the feelings that quantity is at least two of apocrypha
Under condition, file prosthetic device can extract the metamessage of each apocrypha, and metamessage is saved in distributed finger
In stricture of vagina data base.Wherein, metamessage can include file path and the MD5 of corresponding apocrypha, and file path refers to
Apocrypha path on the subscriber equipment at request unit place.
Duplicate removal processes and refers to remove the apocrypha of repetition.File prosthetic device is being extracted the file of each apocrypha
After path and MD5, can judge whether there is repetition among this each apocrypha according to file path and MD5
File, and then each apocrypha is carried out duplicate removal process.For how according to file path and MD5, can to each
Doubtful file carries out duplicate removal process, and the method that the embodiment of the present application provides is that file prosthetic device is by judging each suspicious literary composition
The file path of part is the most identical, and the MD5 of each apocrypha is the most identical, if file path is identical and MD5
Identical, it is determined that for the apocrypha repeated.
Such as, file prosthetic device is after the file path extracting each apocrypha and MD5, it is judged that suspicious literary composition
The file path of part 1, apocrypha 7, apocrypha 24 and apocrypha 30 is identical and MD5 is identical, then file
Prosthetic device determines that this apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha 30 are the suspicious literary composition repeated
Part.
Alternatively, after the apocrypha that file prosthetic device repeats in determining each apocrypha, need only to protect
Stay one of them apocrypha, delete other apocryphas repeated and process to realize duplicate removal.
Such as, file prosthetic device is determining apocrypha 1, apocrypha 7, apocrypha 24 and apocrypha
After 30 apocryphas for repetition, apocrypha 1, apocrypha 7, apocrypha 24 and suspicious literary composition can be retained
Any one file in part 30, such as retain apocrypha 1, and then by the repetition in addition to apocrypha 1 can
Doubt file to delete, i.e. delete apocrypha 7, apocrypha 24 and apocrypha 30, it is achieved the duplicate removal to apocrypha
Process.
Alternatively, metamessage, after the metamessage being extracted apocrypha, can be preserved by AliYunDun server
In distributed fingerprint database.
Step F, resolves to token syntax tree structure apocrypha.
In the application above-mentioned steps F, because user's major part is electricity business, website user on Ali's cloud, user usually has
Oneself network site code file is made the situation customizing amendment, in order to ensure that leak reparation does not affect these user websites
Properly functioning, AliYunDun server takes the strategy that specific aim is repaired one to one, but, repair meeting one to one
Produce a problem, after using 1: 1 reparation, under the number of users of the hundreds thousand of scale of construction of Ali's cloud, can receive at server end
To the substantial amounts of file that there is leak, even if filtering, quantity of documents is the most a lot, and therefore, AliYunDun takes
Above-mentioned apocrypha can be resolved to syntax tree structure by business device.
In the embodiment of the present application, file prosthetic device first has to apocrypha is carried out syntactic analysis, determines apocrypha
In the grammar property of each field, wherein, syntactic analysis refers in code scans a to container, then to this
Field groups is synthesized all kinds of grammatical phrases on the basis of morphological analysis by the character in container.Determining each field
After grammar property, field identical for grammar property can be formed at least one field groups by file prosthetic device, enters one
Step ground, at least one field groups can be resolved to language according to the filiation between each field by file prosthetic device
Method tree construction.
Step G, safe operation personnel have only to configure a token sequence signature, are used for positioning present in file
Leak.
In the application above-mentioned steps G, token sequence signature is equivalent to above-mentioned sequence of tokens feature, and sequence of tokens is special
Levying and can be pre-configured with by safe operation personnel, file prosthetic device utilizes the token corresponding to each grammar property
Sequence signature, it is achieved the lookup of leak.
File prosthetic device, can be according to token sequence after getting the sequence of tokens feature that each grammar property is corresponding
Row feature carries out the location of leak at least one field groups.
This sentences popular example and illustrates, if there being 100 people, it is therefore an objective to determine the people of eyeball color blue, i.e.
Sequence of tokens feature is " eyeball-blueness ", then according to the thinking of the Ile repair method that the embodiment of the present application provides,
The various piece of these hundred people is first grouped by we, such as, the eyes of 100 people is divided into one group, nose
Be divided into one group, face be divided into one group etc., then, according to sequence of tokens feature carry out leak search time, it is only necessary to
This group of eyes makes a look up, it is not necessary to search again for other parts, reach to improve the purpose of leak search efficiency.
Alternatively, according to sequence of tokens feature, determine that the leak at least one field groups includes: at least one word
Duan Zuzhong searches the field identical with sequence of tokens feature, and the field identical with sequence of tokens feature is defined as leak.
In the embodiment of the present application, safe operation personnel only need to configure the most above-mentioned sequence of tokens feature, file prosthetic device
Then can carry out the location of leak with automatization, improve the time cost of safe operation.
Step H, safe operation personnel have only to configure a patch token sequence simultaneously, at location leak
Rear insertion patch token sequence.
In the application above-mentioned steps H, patch token sequence is equivalent to the above-mentioned reparation code sequence preset.In advance
If repair code sequence can also be that safe operation personnel are pre-configured with.File prosthetic device is according to sequence of tokens
Feature, after determining the leak at least one field groups, can obtain this reparation code sequence preset, and then,
Leak is replaced with this reparation code sequence preset, it is achieved the reparation of apocrypha.
The pinpoint recovery technique of the 1: 1 of the file prosthetic device employing of the embodiment of the present application, the most all of suspicious literary composition
Part is all directly based upon request unit original document and revises targetedly, so can farthest avoid because leaking
Hole reparation causes the inconsistent of code logic thus causes the regular traffic logic of user to be affected, and even can not use.
Meanwhile, safe operation personnel have only to configure one and repair code sequence, when file prosthetic device determines leak, and will
Leak replaces with default reparation code sequence, at least one field groups after being repaired.
Step I, after inserting patch token sequence, then rebuilds apocrypha in token syntax tree,
Complete the leak reparation of this file.
In the application above-mentioned steps I, above-mentioned apocrypha can be resolved to syntax tree structure by AliYunDun server
Afterwards, according to token sequence signature (sequence of tokens feature) location leak, and then insert default in syntax tree
Reparation code sequence after, then rebuild apocrypha, complete the leak reparation of this apocrypha, obtain above-mentioned
Reparation file.
Owing to, in above-mentioned file repair procedures, file prosthetic device will have the apocrypha of the first form according to each word
The grammar property of section splits at least one field groups, therefore after at least one field groups after being repaired,
File prosthetic device can be according to its inverse process, and at least one field groups after repairing is reassembled as corresponding to apocrypha
The reparation file with the first form.
Alternatively, at least one field groups after repairing is reassembled as having repairing of the first form corresponding to apocrypha
Multiple file includes: according to the filiation of each field at least one field groups after repairing, after repairing at least
One field groups is reassembled as the reparation file with the first form corresponding to apocrypha.
Step J, after completing apocrypha examination & verification, will obtain a up-to-date leak at AliYunDun server
Repair procedure.
In the application above-mentioned steps J, file prosthetic device, after completing the reparation to apocrypha, can obtain portion
Up-to-date leak repair procedure, such as, the form of this leak repair procedure is permissible
For: { " filename ": "/webapps/manager/WEB-INF/web.xml ", " md5 ": " bc5ef661b746b0c55
462353583a7eb34 ", " action ": " delete " };{ " filename ": "/webapps/manager/WEB-INF/
Web.xml ", " md5 ": " bc5ef661b746b0c55462353583a7eb55 ", " action ": " replace " }.This
Up-to-date leak repair procedure is accurately positioned under the file path of above-mentioned apocrypha, the apocrypha of corresponding MD5,
After request unit leak repair procedure after having downloaded this renewal, can be according in the leak repair procedure after updating
The above-mentioned reparation file comprised, repairs apocrypha, such as, be above-mentioned reparation file by apocrypha.
Step K, the when that each start by set date of AliVulfix running, can be up-to-date from AliYunDun server pull
Leak rule base file, and scan full hard disk when to Corresponding matching in the machine to file carry out repair operation (bag
Include deletion, replacement operation).
Step L, completes the leak reparation to Ali's cloud user website script.
In the application above-mentioned steps L, AliYunDun server collects the true CMS subscriber equipment from AliYunDun
Leak file (i.e. apocrypha), and carry out man-to-man specific aim reparation, after ensure that reparation to greatest extent and repair
Business before Fu is compatible, is unlikely to occur because leak reparation causes web site traffic unavailable;Take at AliYunDun
Business device takes automatization's examination & verification and based on Token syntax tree autofile repair mode, the process being greatly improved
Speed;AliYunDun positions apocrypha based on file path, MD5, it is to avoid because there is maloperation, to user's
Website impacts.
The Ile repair method of the embodiment of the present application at least has following technical effect that
1, accurately for the specific transactions reparation leak therein of each user;
2, leak repairs full process automatization, and safe operation personnel have only to be absorbed in the research of leak, and carry out once
Configuration, the whole network repair action afterwards is entirely full-automation;
3, some leak all repaired in 20 minutes by the machine realizing Ali's cloud the whole network;
4, use the mode of syntax tree to carry out location and the reparation of leak, canonical, character string search can be avoided to bring
Wrong report, has the highest accuracy rate and the lowest rate of false alarm.
From the foregoing, it will be observed that the scheme that the above embodiments of the present application one are provided, by apocrypha being entered according to grammar property
After row fractionation obtains at least one field groups, according to each grammar property correspondence sequence of tokens feature and reparation code sequence
Row carry out lookup and the reparation of leak, have reached to carry out leak the purpose automatically repaired of 1: 1, it is achieved thereby that carry
The accuracy of high leak reparation and the technique effect of security of system, and then solve owing to prior art uses same set of
Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
It follows that the same set of Patch code that uses that prior art exists carries out the leak reparation accuracy caused relatively
The problem of difference, the application proposes a kind of method split the field of apocrypha based on grammar property, Jin Eryi
Carry out lookup and the reparation of leak according to each grammar property correspondence sequence of tokens feature and reparation code sequence, reached right
Leak carries out the purpose automatically repaired of 1: 1, it is achieved thereby that improve accuracy that leak repairs and security of system
Technique effect.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all expressed as one it be
The combination of actions of row, but those skilled in the art should know, the application not limiting by described sequence of movement
System, because according to the application, some step can use other orders or carry out simultaneously.Secondly, art technology
Personnel also should know, embodiment described in this description belongs to preferred embodiment, involved action and module
Not necessarily necessary to the application.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive according to above-mentioned enforcement
The method of example can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but
In the case of Hen Duo, the former is more preferably embodiment.Based on such understanding, the technical scheme of the application substantially or
Saying that the part contributing prior art can embody with the form of software product, this computer software product is deposited
Storage is in a storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal
Equipment (can be mobile phone, computer, server, or the network equipment etc.) performs described in each embodiment of the application
Method.
Embodiment 2
According to the embodiment of the present application, additionally provide a kind of device embodiment for implementing said method embodiment, such as figure
Shown in 8, this device includes:
Fig. 8 is the structural representation of the file prosthetic device according to the embodiment of the present application.
As shown in Figure 8, this document prosthetic device can include acquiring unit 802, processing unit 804, first determine list
Unit 806, second determines unit 808, repairs unit 810 and recomposition unit 812.
Wherein, acquiring unit 802, for obtaining the apocrypha with the first form that request unit is uploaded;Process
Unit 804, for according to the grammar property of each field in described apocrypha, by field groups identical for grammar property
Become at least one field groups;First determines unit 806, for the grammar property according to each field groups, obtains each
The sequence of tokens feature that grammar property is corresponding;Second determines unit 808, is used for according to described sequence of tokens feature, really
Leak in fixed at least one field groups described;Repair unit 810, be pre-configured with for described leak replaced with
Repair code sequence, at least one field groups described after being repaired;Recomposition unit 812, after repairing
At least one field groups described is reassembled as the reparation file with described first form corresponding to described apocrypha.
From the foregoing, it will be observed that the scheme that the above embodiments of the present application one are provided, by apocrypha being entered according to grammar property
After row fractionation obtains at least one field groups, according to each grammar property correspondence sequence of tokens feature and reparation code sequence
Row carry out lookup and the reparation of leak, have reached to carry out leak the purpose automatically repaired of 1: 1, it is achieved thereby that carry
The accuracy of high leak reparation and the technique effect of security of system, and then solve owing to prior art uses same set of
Patch code is carried out the leak caused and is repaired the technical problem that accuracy is poor.
Herein it should be noted that above-mentioned acquiring unit 802, processing unit 804, first determine unit 806, second
Determine unit 808, repair unit 810 and recomposition unit 812 corresponding to step S202 in embodiment one to step
S212, six modules are identical with the example that corresponding step is realized and application scenarios, but are not limited to above-described embodiment one
Disclosure of that.It should be noted that above-mentioned module may operate in embodiment one offer as the part of device
Terminal 10 in, can be realized by software, it is also possible to realized by hardware.
Alternatively, as it is shown in figure 9, file prosthetic device can also include: extraction unit 902 and duplicate removal unit 904.
Wherein, extraction unit 902, for extracting the metamessage of each apocrypha, wherein, described metamessage includes
The file path of corresponding apocrypha and Message Digest 5 MD5, described file path refers to that described apocrypha is in institute
State the path on the subscriber equipment at request unit place;Duplicate removal unit 904, for according to described file path and described
MD5, carries out duplicate removal process to each apocrypha described.
Herein it should be noted that said extracted unit 902 and duplicate removal unit 904 are corresponding to the step in embodiment one
S302 is to step S304, and this module is identical with the example that corresponding step is realized and application scenarios, but is not limited to above-mentioned
Embodiment one disclosure of that.It should be noted that above-mentioned module may operate in enforcement as the part of device
In the terminal 10 that example one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, as shown in Figure 10, duplicate removal unit 904 may include that and determines module 1002 and processing module 1004.
Wherein it is determined that module 1002, for determining the apocrypha repeated in each apocrypha described, wherein, institute
State the apocrypha of repetition and refer to that described file path is identical and described file identical for MD5;Processing module 1004, uses
The first file in the apocrypha retaining described repetition, suspicious by the described repetition in addition to described first file
File is deleted, and wherein, described first file is any one in the apocrypha of described repetition.
Herein it should be noted that above-mentioned determine that module 1002 and processing module 1004 are corresponding to the step in embodiment one
Rapid S402 is to step S404, and this module is identical with the example that corresponding step is realized and application scenarios, but is not limited to
Above-described embodiment one disclosure of that.It should be noted that above-mentioned module may operate in as the part of device
In the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, described first determines that unit 806, for performing following steps according to described sequence of tokens feature, determines
Leak at least one field groups described: search and described sequence of tokens feature phase at least one field groups described
Same field, is defined as described leak by field identical for described and described sequence of tokens feature.
Alternatively, described recomposition unit 812 is used for performing at least one field groups weight described in after following steps will be repaired
Group is the reparation file with described first form corresponding to described apocrypha: according to described in after described reparation extremely
The filiation of each field in a few field groups, it is right at least one field groups described in after described reparation to be reassembled as
The reparation file with described first form of apocrypha described in Ying Yu.
Alternatively, as shown in figure 11, file prosthetic device can also include: the first reception unit 1102 and first
Send unit 1104.
Wherein, first receives unit 1102, and for receiving the first request that described request unit sends, described first please
Seek the leak repair procedure after down loading updating;First transmitting element 1104, for sending institute to described request unit
State the leak repair procedure after renewal, wherein, the leak repair procedure after described renewal comprise described reparation file,
So that described apocrypha is repaired by described request unit according to described reparation file.
Herein it should be noted that above-mentioned first receives unit 1102 and the first transmitting element 1104 corresponding to embodiment
Step S502 in one is to step S504, and this module is identical with the example that corresponding step is realized and application scenarios,
But it is not limited to above-described embodiment one disclosure of that.It should be noted that above-mentioned module can as the part of device
To operate in the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, as shown in figure 12, file prosthetic device can also include: the second reception unit 1202 and second
Send unit 1204.
Wherein, second receives unit 1202, for receiving the second request sent from described request unit, and described the
The identification information of two requests leak repair procedure after obtaining described renewal;Second transmitting element 1204, for
Described request unit sends the MD5 of the leak repair procedure after described renewal, wherein, by described request unit according to institute
State the MD5 of the leak repair procedure after renewal, it is judged that the leak repair procedure after described renewal is with described request unit
The leak repair procedure of storage is the most identical, if identical, described first request then initiated by described request unit.
Herein it should be noted that above-mentioned second receives unit 1202 and the second transmitting element 1204 corresponding to embodiment
Step S602 in one is to step S604, and this module is identical with the example that corresponding step is realized and application scenarios,
But it is not limited to above-described embodiment one disclosure of that.It should be noted that above-mentioned module can as the part of device
To operate in the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, described request unit is according to the MD5 of the leak repair procedure after described renewal, it is judged that after described renewal
The leak repair procedure that stored of leak repair procedure and described request unit the most identical may include that described request
The MD5 of the leak repair procedure stored described in device acquisition;Leak after described request unit judges described renewal is repaiied
The MD5 of multiple program is the most identical with the MD5 of the described leak repair procedure stored;If the leak after described renewal is repaiied
The MD5 of multiple program is identical with the MD5 of the described leak repair procedure stored, it is determined that the leak after described renewal is repaiied
Multiple program is identical with the leak repair procedure that described request unit has stored;If the leak repair procedure after described renewal
MD5 differs with the MD5 of the described leak repair procedure stored, it is determined that the leak repair procedure after described renewal
The leak repair procedure stored with described request unit differs.
According to the embodiment of the present application, additionally provide a kind of device embodiment for implementing said method embodiment, such as figure
Shown in 13, this device includes:
Figure 13 is the structural representation of the request unit according to the embodiment of the present application.
As shown in figure 13, this request unit can include the 3rd transmitting element 1302 and control unit 1304.
Wherein, the 3rd transmitting element 1302, for the apocrypha with the first form is sent to file prosthetic device,
Wherein, by described file prosthetic device according to the grammar property of each field in described apocrypha, by grammar property phase
Same field forms at least one field groups, according to the grammar property of each field groups, obtains each grammar property corresponding
Sequence of tokens feature, according to described sequence of tokens feature, determine the leak at least one field groups described, by institute
Stating leak and replace with default reparation code sequence, at least one field groups described after being repaired, after repairing
At least one field groups described is reassembled as the reparation file with described first form corresponding to described apocrypha;Control
Unit 1304 processed, has described first lattice for obtaining from described file prosthetic device corresponding to described apocrypha
The reparation file of formula.
Herein it should be noted that above-mentioned 3rd transmitting element 1302 and control unit 1304 are corresponding in embodiment one
Step S10 to step S12, this module is identical with the example that corresponding step is realized and application scenarios, but does not limits
In above-described embodiment one disclosure of that.It should be noted that above-mentioned module can be run as the part of device
In the terminal 10 that embodiment one provides, can be realized by software, it is also possible to realized by hardware.
Alternatively, described control unit 1304 is used for performing following steps and obtains corresponding to described from file prosthetic device
The reparation file with described first form of apocrypha: send the first request to described file prosthetic device, described
First request leak repair procedure after down loading updating;After receiving the described renewal that described file prosthetic device returns
Leak repair procedure, wherein, the leak repair procedure after described renewal comprises described reparation file.
Alternatively, described control unit 1304, it is additionally operable to send the second request to described file prosthetic device, described the
The identification information of two requests leak repair procedure after obtaining described renewal;Receive described file prosthetic device to return
Described renewal after the MD5 of leak repair procedure;MD5 according to the leak repair procedure after described renewal, it is judged that institute
State the leak repair procedure after renewal the most identical with the leak repair procedure that described request unit has stored, if identical,
Described first request then initiated by described request unit.
It follows that the same set of Patch code that uses that prior art exists carries out the leak reparation accuracy caused relatively
The problem of difference, the application proposes a kind of method split the field of apocrypha based on grammar property, Jin Eryi
Carry out lookup and the reparation of leak according to each grammar property correspondence sequence of tokens feature and reparation code sequence, reached right
Leak carries out the purpose automatically repaired of 1: 1, it is achieved thereby that improve accuracy that leak repairs and security of system
Technique effect.
Embodiment 3
Embodiments herein additionally provides a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium
May be used for preserving the program code performed by Ile repair method that above-described embodiment one is provided.
Alternatively, in the present embodiment, during above-mentioned storage medium may be located at computer network Computer terminal group
In any one terminal, or it is positioned in any one mobile terminal in mobile terminal group.
Alternatively, in the present embodiment, storage medium is arranged to storage for the program code performing following steps:
Obtain the apocrypha with the first form that request unit is uploaded;According to the grammer of each field in described apocrypha
Feature, forms at least one field groups by field identical for grammar property;According to the grammar property of each field groups, obtain
Take the sequence of tokens feature that each grammar property is corresponding;According to described sequence of tokens feature, determine at least one word described
The leak of Duan Zuzhong;Described leak is replaced with default reparation code sequence, after being repaired described at least one
Field groups;At least one field groups described in after repairing is reassembled as having described first corresponding to described apocrypha
The reparation file of form.
Alternatively, storage medium is also configured to storage for the program code performing following steps: extract each suspicious
The metamessage of file, wherein, described metamessage includes file path and the Message Digest 5 MD5 of corresponding apocrypha,
Described file path refers to described apocrypha path on the subscriber equipment at described request unit place;According to described
File path and described MD5, carry out duplicate removal process to each apocrypha described.
Alternatively, storage medium is also configured to storage for the program code performing following steps: determine described each
The apocrypha repeated in apocrypha, wherein, the apocrypha of described repetition refers to that described file path is identical and institute
State the identical file of MD5;Retain the first file in the apocrypha of described repetition, will be in addition to described first file
The apocrypha of described repetition delete, wherein, described first file is any one in the apocrypha of described repetition
Individual.
Alternatively, storage medium is also configured to storage for the program code performing following steps: described at least one
Individual field groups is searched the field identical with described sequence of tokens feature, by identical for described and described sequence of tokens feature
Field is defined as described leak.
Alternatively, storage medium is also configured to storage for the program code performing following steps: according to described reparation
After at least one field groups described in the filiation of each field, by least one field described in after described reparation
Group is reassembled as the reparation file with described first form corresponding to described apocrypha.
Alternatively, storage medium is also configured to storage for the program code performing following steps: receive described request
The first request that device sends, described first request leak repair procedure after down loading updating;To described request dress
Put and send the leak repair procedure after described renewal, wherein, the leak repair procedure after described renewal comprises described in repair
Multiple file, in order to described apocrypha is repaired by described request unit according to described reparation file.
Alternatively, storage medium is also configured to storage for the program code performing following steps: receive from described
The second request that request unit sends, the mark of described second request leak repair procedure after obtaining described renewal
Information;The MD5 of the leak repair procedure after described request unit sends described renewal, wherein, by described request dress
The MD5 of the leak repair procedure after putting according to described renewal, it is judged that the leak repair procedure after described renewal is asked with described
The leak repair procedure asking device to store is the most identical, if identical, described first request then initiated by described request unit.
Alternatively, storage medium is also configured to storage for the program code performing following steps: described request unit
The MD5 of the leak repair procedure stored described in acquisition;Described request unit judges that the leak after described renewal repairs journey
The MD5 of sequence is the most identical with the MD5 of the described leak repair procedure stored;If the leak after described renewal repairs journey
The MD5 of sequence is identical with the MD5 of the described leak repair procedure stored, it is determined that the leak after described renewal repairs journey
Sequence is identical with the leak repair procedure that described request unit has stored;If the MD5 of the leak repair procedure after described renewal
Differ with the MD5 of the described leak repair procedure stored, it is determined that the leak repair procedure after described renewal and institute
State the leak repair procedure that request unit stored to differ.
Above-mentioned the embodiment of the present application sequence number, just to describing, does not represent the quality of embodiment.
In above-described embodiment of the application, the description to each embodiment all emphasizes particularly on different fields, and does not has in certain embodiment
The part described in detail, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that the processing means of disclosed sequence information,
Can realize by another way.Wherein, device embodiment described above is only schematically, such as described
The division of unit, is only a kind of logic function and divides, and actual can have other dividing mode when realizing, the most
Individual unit or assembly can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.
Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces,
Unit or the INDIRECT COUPLING of module or communication connection, can be being electrical or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to
On multiple NEs.Some or all of unit therein can be selected according to the actual needs to realize the present embodiment
The purpose of scheme.
It addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit is using the form realization of SFU software functional unit and as independent production marketing or use,
Can be stored in a computer read/write memory medium.Based on such understanding, the technical scheme essence of the application
On the part that in other words prior art contributed or this technical scheme completely or partially can be with software product
Form embodies, and this computer software product is stored in a storage medium, including some instructions with so that one
Platform computer equipment (can be for personal computer, server or the network equipment etc.) performs each embodiment institute of the application
State all or part of step of method.And aforesaid storage medium includes: USB flash disk, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic disc or CD
Etc. the various media that can store program code.
The above is only the preferred implementation of the application, it is noted that for the ordinary skill people of the art
For Yuan, on the premise of without departing from the application principle, it is also possible to make some improvements and modifications, these improve and profit
Decorations also should be regarded as the protection domain of the application.
Claims (21)
1. an Ile repair method, it is characterised in that including:
Obtain the apocrypha with the first form that request unit is uploaded;
According to the grammar property of each field in described apocrypha, field identical for grammar property is formed at least
One field groups;
According to the grammar property of each field groups, obtain the sequence of tokens feature that each grammar property is corresponding;
According to described sequence of tokens feature, determine the leak at least one field groups described;
Described leak is replaced with default reparation code sequence, at least one field groups described after being repaired;
At least one field groups described in after repairing is reassembled as having described first corresponding to described apocrypha
The reparation file of form.
Method the most according to claim 1, it is characterised in that the quantity at described apocrypha is at least two
In the case of, after the apocrypha with the first form that described acquisition request unit is uploaded, described according to institute
State the grammar property of each field in apocrypha, field identical for grammar property is formed at least one field groups;
Before, described method also includes:
Extracting the metamessage of each apocrypha, wherein, described metamessage includes the file road of corresponding apocrypha
Footpath and Message Digest 5 MD5, described file path refers to that described apocrypha is at described request unit place
Path on subscriber equipment;
According to described file path and described MD5, each apocrypha described is carried out duplicate removal process.
Method the most according to claim 2, it is characterised in that described according to described file path and described MD5,
Each apocrypha described carries out duplicate removal process include:
Determining the apocrypha repeated in each apocrypha described, wherein, the apocrypha of described repetition refers to
Described file path is identical and described file identical for MD5;
Retain the first file in the apocrypha of described repetition, by the described repetition in addition to described first file
Apocrypha delete, wherein, described first file is any one in the apocrypha of described repetition.
Method the most according to claim 1, it is characterised in that described according to described sequence of tokens feature, determines institute
The leak stated at least one field groups includes:
The field identical with described sequence of tokens feature is searched, by described and institute at least one field groups described
State the identical field of sequence of tokens feature and be defined as described leak.
Method the most according to claim 1, it is characterised in that described will repair after described at least one field groups
It is reassembled as including corresponding to the reparation file with described first form of described apocrypha:
According to the filiation of each field at least one field groups described in after described reparation, by described reparation
After at least one field groups described be reassembled as the reparation with described first form corresponding to described apocrypha
File.
Method the most according to claim 1, it is characterised in that described will repair after described at least one field
After group is reassembled as corresponding to the reparation file with described first form of described apocrypha, described method is also
Including:
Receiving the first request that described request unit sends, described first request leak after down loading updating is repaiied
Multiple program;
Leak repair procedure after described request unit sends described renewal, wherein, the leak after described renewal
Repair procedure comprises described reparation file, in order to described request unit according to described reparation file to described suspicious
File is repaired.
Method the most according to claim 6, it is characterised in that first sent at the described request unit of described reception
Before request, described method also includes:
Receive the second request sent from described request unit, after described second request is used for obtaining described renewal
The identification information of leak repair procedure;
The MD5 of the leak repair procedure after described request unit sends described renewal, wherein, by described request
Device is according to the MD5 of the leak repair procedure after described renewal, it is judged that the leak repair procedure after described renewal with
The leak repair procedure that described request unit has stored is the most identical, if identical, institute then initiated by described request unit
State the first request.
Method the most according to claim 7, it is characterised in that described request unit is according to the leak after described renewal
The MD5 of repair procedure, it is judged that the leak that the leak repair procedure after described renewal and described request unit have stored
Repair procedure is the most identical to be included:
The MD5 of the leak repair procedure stored described in the acquisition of described request unit;
The MD5 of leak repair procedure after described request unit judges described renewal repaiies with the described leak stored
The MD5 of multiple program is the most identical;
If the MD5 phase of the MD5 of the leak repair procedure after described renewal and the described leak repair procedure stored
With, it is determined that the leak repair procedure phase that the leak repair procedure after described renewal and described request unit have stored
With;
If the MD5 of the MD5 of the leak repair procedure after described renewal and the described leak repair procedure stored is not
Identical, it is determined that the leak repair procedure that the leak repair procedure after described renewal and described request unit have stored
Differ.
9. an Ile repair method, it is characterised in that including:
The apocrypha with the first form is sent to file prosthetic device, wherein, described file reparation fills
Put according to the grammar property of each field in described apocrypha, by field composition at least identical for grammar property
Individual field groups, according to the grammar property of each field groups, obtains the sequence of tokens feature that each grammar property is corresponding,
According to described sequence of tokens feature, determine the leak at least one field groups described, described leak is replaced with
The reparation code sequence preset, at least one field groups described after being repaired, described in after repairing at least
One field groups is reassembled as the reparation file with described first form corresponding to described apocrypha;
The reparation with described first form corresponding to described apocrypha is obtained from described file prosthetic device
File.
Method the most according to claim 9, it is characterised in that described acquisition correspondence from described file prosthetic device
The reparation file with described first form in described apocrypha includes:
Sending the first request to described file prosthetic device, described first request leak after down loading updating is repaiied
Multiple program;
Receive the leak repair procedure after the described renewal that described file prosthetic device returns, wherein, described renewal
After leak repair procedure in comprise described reparation file.
11. methods according to claim 10, it is characterised in that sending the first request to described file prosthetic device
Before, described method also includes:
The second request, described second request leakage after obtaining described renewal is sent to described file prosthetic device
The identification information of hole repair procedure;
Receive the MD5 of the leak repair procedure after the described renewal that described file prosthetic device returns;
MD5 according to the leak repair procedure after described renewal, it is judged that the leak repair procedure after described renewal with
The leak repair procedure that described request unit has stored is the most identical, if identical, institute then initiated by described request unit
State the first request.
12. 1 kinds of file prosthetic devices, it is characterised in that including:
Acquiring unit, for obtaining the apocrypha with the first form that request unit is uploaded;
Processing unit is for according to the grammar property of each field in described apocrypha, identical by grammar property
Field form at least one field groups;
First determines unit, for the grammar property according to each field groups, obtains each grammar property corresponding
Sequence of tokens feature;
Second determines unit, for according to described sequence of tokens feature, determines at least one field groups described
Leak;
Repair unit, for described leak being replaced with the reparation code sequence being pre-configured with, after being repaired
At least one field groups described;
Recomposition unit, at least one field groups described in after repairing is reassembled as corresponding to described apocrypha
The reparation file with described first form.
13. devices according to claim 12, it is characterised in that also include:
Extraction unit, for extracting the metamessage of each apocrypha, wherein, described metamessage includes that correspondence can
Doubting file path and the Message Digest 5 MD5 of file, described file path refers to that described apocrypha is described
Path on the subscriber equipment at request unit place;
Duplicate removal unit, for according to described file path and described MD5, goes each apocrypha described
Heavily process.
14. devices according to claim 13, it is characterised in that described duplicate removal unit includes:
Determine module, for determining the apocrypha repeated in each apocrypha described, wherein, described repetition
Apocrypha refer to that described file path is identical and described file identical for MD5;
Processing module, the first file in the apocrypha retaining described repetition, will be except described first file
The apocrypha of described repetition in addition is deleted, and wherein, described first file is in the apocrypha of described repetition
Any one.
15. devices according to claim 12, it is characterised in that described first determines that unit is for performing following steps
According to described sequence of tokens feature, determine the leak at least one field groups described:
The field identical with described sequence of tokens feature is searched, by described and institute at least one field groups described
State the identical field of sequence of tokens feature and be defined as described leak.
16. devices according to claim 12, it is characterised in that described recomposition unit is used for performing following steps and will repair
At least one field groups described after Fu is reassembled as having repairing of described first form corresponding to described apocrypha
Multiple file:
According to the filiation of each field at least one field groups described in after described reparation, by described reparation
After at least one field groups described be reassembled as the reparation with described first form corresponding to described apocrypha
File.
17. devices according to claim 12, it is characterised in that also include:
First receives unit, and for receiving the first request that described request unit sends, described first request is used for
Leak repair procedure after down loading updating;
First transmitting element, the leak repair procedure after sending described renewal to described request unit, wherein,
Leak repair procedure after described renewal comprises described reparation file, in order to described request unit according to described in repair
Described apocrypha is repaired by multiple file.
18. devices according to claim 17, it is characterised in that also include:
Second receives unit, for receiving the second request sent from described request unit, and described second request
The identification information of the leak repair procedure after obtaining described renewal;
Second transmitting element, the MD5 of the leak repair procedure after sending described renewal to described request unit,
Wherein, by described request unit according to the MD5 of the leak repair procedure after described renewal, it is judged that after described renewal
Leak repair procedure the most identical with the leak repair procedure that described request unit has stored, if identical, described
Described first request then initiated by request unit.
19. 1 kinds of request units, it is characterised in that including:
3rd transmitting element, for the apocrypha with the first form is sent to file prosthetic device, wherein,
By described file prosthetic device according to the grammar property of each field in described apocrypha, grammar property is identical
Field form at least one field groups, according to the grammar property of each field groups, obtain each grammar property pair
The sequence of tokens feature answered, according to described sequence of tokens feature, determines the leak at least one field groups described,
Described leak is replaced with default reparation code sequence, at least one field groups described after being repaired, will
At least one field groups described after reparation is reassembled as described first form that has corresponding to described apocrypha
Repair file;
Control unit, described for obtaining from described file prosthetic device corresponding to having of described apocrypha
The reparation file of the first form.
20. devices according to claim 19, it is characterised in that described control unit is used for performing following steps from literary composition
Part prosthetic device obtains the reparation file with described first form corresponding to described apocrypha:
Sending the first request to described file prosthetic device, described first request leak after down loading updating is repaiied
Multiple program;
Receive the leak repair procedure after the described renewal that described file prosthetic device returns, wherein, described renewal
After leak repair procedure in comprise described reparation file.
21. devices according to claim 20, it is characterised in that described control unit, are additionally operable to repair to described file
Apparatus for coating sends the second request, the mark of described second request leak repair procedure after obtaining described renewal
Information;Receive the MD5 of the leak repair procedure after the described renewal that described file prosthetic device returns;According to institute
State the MD5 of the leak repair procedure after renewal, it is judged that the leak repair procedure after described renewal and described request dress
Putting the leak repair procedure stored the most identical, if identical, described first request then initiated by described request unit.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510307070.6A CN106295334B (en) | 2015-06-05 | 2015-06-05 | Ile repair method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510307070.6A CN106295334B (en) | 2015-06-05 | 2015-06-05 | Ile repair method and device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106295334A true CN106295334A (en) | 2017-01-04 |
| CN106295334B CN106295334B (en) | 2019-07-26 |
Family
ID=57659427
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510307070.6A Active CN106295334B (en) | 2015-06-05 | 2015-06-05 | Ile repair method and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106295334B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109255243A (en) * | 2018-09-28 | 2019-01-22 | 深信服科技股份有限公司 | Restorative procedure, system, device and the storage medium of potential threat in a kind of terminal |
| CN113852602A (en) * | 2021-08-11 | 2021-12-28 | 奇安信科技集团股份有限公司 | File reconstruction method, file reconstruction device, transmission equipment, electronic device, program product and medium |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102622556A (en) * | 2011-12-22 | 2012-08-01 | 南京邮电大学 | Web service security analysis method based on program slicing technique |
| CN103886258A (en) * | 2014-03-10 | 2014-06-25 | 珠海市君天电子科技有限公司 | Method and device for detecting viruses |
| CN103955449A (en) * | 2014-04-21 | 2014-07-30 | 安一恒通(北京)科技有限公司 | Target sample positioning method and device |
| CN104182689A (en) * | 2013-05-24 | 2014-12-03 | 阿里巴巴集团控股有限公司 | Method and device for repairing and protecting system |
| CN104199925A (en) * | 2014-09-01 | 2014-12-10 | 安一恒通(北京)科技有限公司 | File repair method and device |
-
2015
- 2015-06-05 CN CN201510307070.6A patent/CN106295334B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102622556A (en) * | 2011-12-22 | 2012-08-01 | 南京邮电大学 | Web service security analysis method based on program slicing technique |
| CN104182689A (en) * | 2013-05-24 | 2014-12-03 | 阿里巴巴集团控股有限公司 | Method and device for repairing and protecting system |
| CN103886258A (en) * | 2014-03-10 | 2014-06-25 | 珠海市君天电子科技有限公司 | Method and device for detecting viruses |
| CN103955449A (en) * | 2014-04-21 | 2014-07-30 | 安一恒通(北京)科技有限公司 | Target sample positioning method and device |
| CN104199925A (en) * | 2014-09-01 | 2014-12-10 | 安一恒通(北京)科技有限公司 | File repair method and device |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109255243A (en) * | 2018-09-28 | 2019-01-22 | 深信服科技股份有限公司 | Restorative procedure, system, device and the storage medium of potential threat in a kind of terminal |
| CN113852602A (en) * | 2021-08-11 | 2021-12-28 | 奇安信科技集团股份有限公司 | File reconstruction method, file reconstruction device, transmission equipment, electronic device, program product and medium |
| CN113852602B (en) * | 2021-08-11 | 2023-12-08 | 奇安信科技集团股份有限公司 | File reconstruction method, device, transmission equipment, electronic equipment and medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106295334B (en) | 2019-07-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109800258B (en) | Data file deployment method, device, computer equipment and storage medium | |
| CN111104579A (en) | Identification method and device for public network assets and storage medium | |
| CN104809404A (en) | Data layer system of information security attack-defense platform | |
| CN104951480A (en) | Resource storage indexing device and method in CDN system | |
| CN107634931A (en) | Processing method, cloud server, gateway and the terminal of abnormal data | |
| CN105117544A (en) | Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing | |
| CN106874768A (en) | The method and device of penetration testing | |
| CN106815135A (en) | leak detection method and device | |
| CN113496033B (en) | Access behavior recognition method and device and storage medium | |
| CN107294924A (en) | Detection method, the device and system of leak | |
| CN110177114A (en) | The recognition methods of network security threats index, unit and computer readable storage medium | |
| CN111783105B (en) | Penetration test method, device, equipment and storage medium | |
| CN109104421B (en) | Website content tampering detection method, device, equipment and readable storage medium | |
| CN103685598A (en) | Method and device for discovering active IP address in IPv6 network | |
| CN105095207A (en) | Methods for retrieving and obtaining contents of application software, and devices for retrieving and obtaining contents of application software | |
| CN112528181B (en) | Two-dimensional code management method, device, computer equipment and readable storage medium | |
| CN114386853B (en) | Data audit processing method, device and equipment based on general audit model | |
| CN106067879A (en) | The detection method of information and device | |
| CN106778264A (en) | The application program analysis method and analysis system of a kind of mobile client | |
| CN106295334A (en) | Ile repair method and device | |
| CN106714179A (en) | Method for identifying pseudo base station information and device thereof | |
| CN109101232A (en) | A kind of method, apparatus of product development, computer equipment and storage medium | |
| CN104486337A (en) | Data validity verification method and device | |
| Ferraz et al. | Biological monitoring in the Amazon: recent progress and future needs | |
| CN111107552B (en) | Method and system for identifying pseudo base station |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |