CN106845244A - A kind of detection method and device - Google Patents

A kind of detection method and device Download PDF

Info

Publication number
CN106845244A
CN106845244A CN201611178967.4A CN201611178967A CN106845244A CN 106845244 A CN106845244 A CN 106845244A CN 201611178967 A CN201611178967 A CN 201611178967A CN 106845244 A CN106845244 A CN 106845244A
Authority
CN
China
Prior art keywords
safety detection
detection project
project
security baseline
configuration item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611178967.4A
Other languages
Chinese (zh)
Inventor
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201611178967.4A priority Critical patent/CN106845244A/en
Publication of CN106845244A publication Critical patent/CN106845244A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The invention provides a kind of detection method and device, wherein, methods described includes:S1:Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding security baseline;S2:Obtain the configuration information of computer system to be detected;S3:The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;S4:Detect whether corresponding configuration item reaches the corresponding security baseline of presently described safety detection project to each described safety detection project respectively.The technical scheme provided by the present invention, can improve detection efficiency.

Description

A kind of detection method and device
Technical field
The present invention relates to field of computer technology, more particularly to a kind of detection method and device.
Background technology
In recent years, information security events take place frequently, and information security is increasingly valued by people.Security baseline refers to meter In calculation machine system (such as, operating system and application program), the minimalist configuration that security-related configuration item should reach.
At present, before each computer system is reached the standard grade, it usually needs manually verify its security-related each and match somebody with somebody Item is put, to detect whether each configuration item reaches security baseline, detection efficiency is extremely low.
The content of the invention
A kind of detection method and device are the embodiment of the invention provides, detection efficiency can be improved.
In a first aspect, the invention provides a kind of detection method, including:
S1:Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding peace Full baseline;
S2:Obtain the configuration information of computer system to be detected;
S3:The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;
S4:Detect whether corresponding configuration item reaches presently described safety detection to each described safety detection project respectively The corresponding security baseline of project.
Preferably,
In described each described safety detection project of detection, whether corresponding configuration item reaches presently described safety respectively After the corresponding security baseline of detection project, also include:
When at least one safety detection project, there is the corresponding configuration item of at least one target detection project When being not reaching to the corresponding security baseline, using the corresponding security baseline of at least one target detection project and The configuration item generates alarm information, and provides the alarm information.
Preferably,
At least one safety detection project, including:One in key form, software environment and network environment or It is multiple.
Preferably,
When at least one safety detection project include the key form when, the setting each it is described safety inspection Survey project distinguishes corresponding security baseline, including:The corresponding key length of the key form, key rule of combination are set;
And/or,
When at least one safety detection project include the software environment when, the setting each it is described safety inspection Survey project distinguishes corresponding security baseline, including:The software name of the corresponding at least one sample software of the software environment is set Claim;
And/or,
When at least one safety detection project includes network environment, the setting each described safety detection Mesh distinguishes corresponding security baseline, including:The corresponding network address sampling interval of the network environment is set.
Second aspect, the embodiment of the invention provides a kind of detection means, including:
Setup module, for determining at least one safety detection project, and sets each described safety detection project point Not corresponding security baseline;
Acquisition module, the configuration information for obtaining computer system to be detected;
Parsing module, it is corresponding to obtain each described safety detection project difference for parsing the configuration information Configuration item;
Detection module, for detecting whether corresponding configuration item reaches current institute to each described safety detection project respectively State the corresponding security baseline of safety detection project.
Preferably,
Processing module, for when at least one safety detection project, there is at least one target detection project pair It is corresponding using at least one target detection project when configuration item answered is not reaching to the corresponding security baseline The security baseline and configuration item generation alarm information, and the alarm information is provided.
Preferably,
At least one safety detection project, including:One in key form, software environment and network environment or It is multiple.
Preferably,
The setup module, for when at least one safety detection project includes the key form, setting institute State the corresponding key length of key form, key rule of combination;And/or, when at least one safety detection project includes institute When stating software environment, the dbase of the corresponding at least one sample software of the software environment is set;And/or, when it is described extremely When a few safety detection project includes network environment, the corresponding network address sampling interval of the network environment is set.
A kind of detection method and device are the embodiment of the invention provides, in the method, it is determined that at least one safety inspection Survey project, and set after each safety detection project distinguishes corresponding security baseline, you can obtain department of computer science to be detected The configuration information of system, parses by the configuration information for obtaining, corresponding to obtain each safety detection project difference Configuration item, you can detect whether corresponding configuration item reaches current safety detection project correspondence to each safety detection project respectively Security baseline.It can be seen that, in technical scheme provided in an embodiment of the present invention, it is no longer necessary to manually verify computer system to be detected Each configuration item, you can detect whether corresponding configuration item reaches corresponding safe base in computer system to be detected Line, can improve detection efficiency.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of detection method that one embodiment of the invention is provided;
Fig. 2 is the flow chart of another detection method that one embodiment of the invention is provided;
Fig. 3 is a kind of structure chart of detection means that one embodiment of the invention is provided;
Fig. 4 is the structure chart of another detection means that one embodiment of the invention is provided.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments, based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained on the premise of creative work is not made, belongs to the scope of protection of the invention.
As shown in figure 1, a kind of detection method is the embodiment of the invention provides, including:
S1:Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding peace Full baseline;
S2:Obtain the configuration information of computer system to be detected;
S3:The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;
S4:Detect whether corresponding configuration item reaches presently described safety detection to each described safety detection project respectively The corresponding security baseline of project.
In the above embodiment of the present invention, it is determined that at least one safety detection project, and each safety detection is set Mesh is distinguished after corresponding security baseline, you can obtain the configuration information of computer system to be detected, by the configuration to obtaining Information is parsed, and distinguishes corresponding configuration item to obtain each safety detection project, you can detect each safety detection Whether corresponding configuration item reaches the corresponding security baseline of current safety detection project to project respectively.It can be seen that, the embodiment of the present invention In the technical scheme of offer, it is no longer necessary to manually verify each configuration item of computer system to be detected, you can detect and treat Whether corresponding configuration item reaches corresponding security baseline in detection computer system, can improve detection efficiency.
It should be appreciated that computer system to be measured includes corresponding operating system or application program.
In one embodiment of the invention, at least one safety detection project, including but not limited to key form, software One or more in environment and network environment.
Further, for convenience staff to being not reaching to the configuration of corresponding security baseline in computer system to be measured Item is modified, and in one embodiment of the invention, in the detection, each described safety detection project distinguishes corresponding configuration Whether item is reached after the corresponding security baseline of presently described safety detection project, is also included:
When at least one safety detection project, there is the corresponding configuration item of at least one target detection project When being not reaching to the corresponding security baseline, using the corresponding security baseline of at least one target detection project and The configuration item generates alarm information, and provides the alarm information.
For example, when safety detection project includes key form, if correspondence in detecting computer system to be measured The configuration item of key form is:AAABBBBBB, the corresponding security baseline of key form is AAABBBCCC, characterizes key combination rule It is then:3 big numerals of lowercase+2 of minuscule+3 or symbol, the corresponding configuration item of key form is:AAABBBBBB, Characterizing key rule of combination is ,+6 lowercases of 3 big minuscules, wherein, A characterizes capitalization, and B characterizes lowercase, C Characterize data or character;It can be seen that, in computer system to be measured, the corresponding configuration item of key form does not reach corresponding safety Baseline.Therefore, using configuration item AAABBBBBB and security baseline AAABBBCCC generation warning information, staff can be facilitated to lead to The configuration item AAABBBBBB and security baseline AAABBBCCC carried in contrast warning information are crossed, will be secret in computer system to be measured Last three of the corresponding configuration item AAABBBBBB of key form are revised as CCC.
It is described when at least one safety detection project includes the key form in one embodiment of the invention Each described safety detection project is set and distinguishes corresponding security baseline, including:The corresponding key of the key form is set Length, key rule of combination;
And/or,
When at least one safety detection project include the software environment when, the setting each it is described safety inspection Survey project distinguishes corresponding security baseline, including:The software name of the corresponding at least one sample software of the software environment is set Claim;
And/or,
When at least one safety detection project includes network environment, the setting each described safety detection Mesh distinguishes corresponding security baseline, including:The corresponding network address sampling interval of the network environment is set.
For example, by software environment it is corresponding simply dbase for sample software includes a, b, c when, if obtained Get in computer system to be measured, the corresponding configuration item of software environment is a, b, then illustrate that the corresponding configuration item of software environment does not have Corresponding security baseline is reached, when utilizing sample dbase a, b, c, and configuration item a, b to generate warning information and provide, Staff can modify to configuration item, specifically, such as installing sample software c in computer systems to realize treating Survey in computer system, the corresponding configuration item of software environment is revised as a, b, c from a, b.
And for example, network address sampling interval is set to:123.115.102.197~123.115.255.197, when to be measured In computer system, when the network address of map network environment is 123.115.101.197, then illustrates that network environment is corresponding and match somebody with somebody Put item and be not reaching to corresponding security baseline.
In order to more clearly illustrate the technical scheme and advantage of the embodiment of the present invention, lower mask body is detecting calculating to be measured As a example by whether the corresponding configuration item of key form meets corresponding security baseline in machine system, as shown in Fig. 2 can include as follows Each step:
Step 201, determines at least one safety detection project, and set the corresponding peace of each safety detection project difference Full baseline.
In the embodiment of the present invention, safety detection project includes but is not limited to key form, software environment and network environment In one or more, following each step clothes made of brocade safety detection project of the embodiment of the present invention are included as a example by key form.
In the embodiment of the present invention, the security baseline of key form is set, including sets the corresponding key combination of key form Rule and key length etc..For example, the corresponding security baseline of key form can be set to AxxBxxCxx, is characterized secret Key length is 9, and key rule of combination is to include at least one capitalization, a lowercase and a data or symbol, Wherein, A characterizes capitalization, and B characterizes lowercase, C characterize datas or character.
Step 202, obtains the configuration information of computer system to be detected.
Step 203, parses the configuration information for obtaining, to obtain the corresponding configuration item of key form.
In the embodiment of the present invention, here so that the configuration item for obtaining is AxxBxxxxx as an example.
Whether step 204, detection configuration item AxxBxxxxx reaches security baseline AxxBxxCxx.
In the embodiment of the present invention, by comparing configuration item AxxBxxxxx and security baseline AxxBxxCxx, it is not difficult to find out, matches somebody with somebody The corresponding length of item is put to lack character or numeral in 9, but configuration item, accordingly, it can be determined that go out configuration item AxxBxxxxx not having Reach security baseline AxxBxxCxx.
Step 205, using configuration item AxxBxxxxx and security baseline AxxBxxCxx generation warning information, and provides.
In the embodiment of the present invention, staff can be facilitated by contrasting the configuration item AxxBxxxxx carried in warning information With security baseline AxxBxxCxx, the corresponding configuration item AxxBxxxxx of key form in computer system to be measured is revised as AxxBxxCxx。
As shown in figure 3, a kind of detection means is the embodiment of the invention provides, including:
Setup module 301, for determining at least one safety detection project, and sets each described safety detection project The corresponding security baseline of difference;
Acquisition module 302, the configuration information for obtaining computer system to be detected;
Parsing module 303, for parsing the configuration information, is corresponded to respectively with obtaining each described safety detection project Configuration item;
Detection module 304, for detect each described safety detection project respectively corresponding configuration item whether reach work as The corresponding security baseline of the preceding safety detection project.
Further, for convenience staff to being not reaching to the configuration of corresponding security baseline in computer system to be measured Item is modified, as shown in figure 4, in one embodiment of the invention, also including:Processing module 401, for when described at least one In safety detection project, there is the corresponding configuration item of at least one target detection project and be not reaching to the corresponding safety During baseline, disappeared using the corresponding security baseline of at least one target detection project and configuration item generation alarm Breath, and the alarm information is provided.
In one embodiment of the invention, at least one safety detection project, including:Key form, software environment with And one or more in network environment.
In one embodiment of the invention, the setup module 301, for including when at least one safety detection project During the key form, the corresponding key length of the key form, key rule of combination are set;And/or, when described at least one When individual safety detection project includes the software environment, the software of the corresponding at least one sample software of the software environment is set Title;And/or, when at least one safety detection project includes network environment, the corresponding net of the network environment is set Network address sampling interval.
The contents such as the information exchange between each unit, implementation procedure in said apparatus, due to implementing with the inventive method Example is based on same design, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
In sum, each embodiment of the invention at least has the advantages that:
1st, in one embodiment of the invention, it is determined that at least one safety detection project, and each safety detection is set Mesh is distinguished after corresponding security baseline, you can obtain the configuration information of computer system to be detected, by the configuration to obtaining Information is parsed, and distinguishes corresponding configuration item to obtain each safety detection project, you can detect each safety detection Whether corresponding configuration item reaches the corresponding security baseline of current safety detection project to project respectively.It can be seen that, the embodiment of the present invention In the technical scheme of offer, it is no longer necessary to manually verify each configuration item of computer system to be detected, you can detect and treat Whether corresponding configuration item reaches corresponding security baseline in detection computer system, can improve detection efficiency.
2nd, in one embodiment of the invention, exist the corresponding configuration item of at least one target detection project be not reaching to it is corresponding During security baseline, using the corresponding security baseline of at least one target detection project and configuration item generation alarm information, and provide Alarm information, can facilitate staff to repair the configuration item that corresponding security baseline is not reaching in computer system to be measured Change.
It should be noted that herein, such as first and second etc relational terms are used merely to an entity Or operation makes a distinction with another entity or operation, and not necessarily require or imply these entities or exist between operating Any this actual relation or order.And, term " including ", "comprising" or its any other variant be intended to it is non- It is exclusive to include, so that process, method, article or equipment including a series of key elements not only include those key elements, But also other key elements including being not expressly set out, or also include by this process, method, article or equipment are solid Some key elements.In the absence of more restrictions, the key element limited by sentence " including ", does not arrange Except also there is other identical factor in the process including the key element, method, article or equipment.
It is last it should be noted that:Presently preferred embodiments of the present invention is the foregoing is only, skill of the invention is merely to illustrate Art scheme, is not intended to limit the scope of the present invention.All any modifications made within the spirit and principles in the present invention, Equivalent, improvement etc., are all contained in protection scope of the present invention.

Claims (8)

1. a kind of detection method, it is characterised in that including:
Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding security baseline;
Obtain the configuration information of computer system to be detected;
The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;
Detect whether corresponding configuration item reaches presently described safety detection project pair to each described safety detection project respectively The security baseline answered.
2. detection method according to claim 1, it is characterised in that
In described each described safety detection project of detection, whether corresponding configuration item reaches presently described safety detection respectively After the corresponding security baseline of project, also include:
Do not have when at least one safety detection project, there is the corresponding configuration item of at least one target detection project When reaching the corresponding security baseline, using the corresponding security baseline of at least one target detection project and described Configuration item generates alarm information, and provides the alarm information.
3. detection method according to claim 1, it is characterised in that
At least one safety detection project, including:One or many in key form, software environment and network environment It is individual.
4. detection method according to claim 3, it is characterised in that
When at least one safety detection project includes the key form, the setting each described safety detection Mesh distinguishes corresponding security baseline, including:The corresponding key length of the key form, key rule of combination are set;
And/or,
When at least one safety detection project includes the software environment, the setting each described safety detection Mesh distinguishes corresponding security baseline, including:The dbase of the corresponding at least one sample software of the software environment is set;
And/or,
When at least one safety detection project includes network environment, the setting each described safety detection project point Not corresponding security baseline, including:The corresponding network address sampling interval of the network environment is set.
5. a kind of detection means, it is characterised in that including:
Setup module, for determining at least one safety detection project, and it is right respectively to set each described safety detection project The security baseline answered;
Acquisition module, the configuration information for obtaining computer system to be detected;
Parsing module, for parsing the configuration information, corresponding configuration is distinguished to obtain each described safety detection project ;
Detection module, for detecting whether corresponding configuration item reaches presently described peace to each described safety detection project respectively The corresponding security baseline of full detection project.
6. detection means according to claim 5, it is characterised in that
Processing module, for when at least one safety detection project, there is at least one target detection project corresponding It is corresponding described using at least one target detection project when configuration item is not reaching to the corresponding security baseline Security baseline and configuration item generation alarm information, and the alarm information is provided.
7. where basis requires the detection means described in 6, it is characterised in that
At least one safety detection project, including:One or many in key form, software environment and network environment It is individual.
8. detection means according to claim 7, it is characterised in that
The setup module, for when at least one safety detection project includes the key form, setting described secret The corresponding key length of key form, key rule of combination;And/or, when at least one safety detection project is including described soft During part environment, the dbase of the corresponding at least one sample software of the software environment is set;And/or, when described at least one When individual safety detection project includes network environment, the corresponding network address sampling interval of the network environment is set.
CN201611178967.4A 2016-12-19 2016-12-19 A kind of detection method and device Pending CN106845244A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611178967.4A CN106845244A (en) 2016-12-19 2016-12-19 A kind of detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611178967.4A CN106845244A (en) 2016-12-19 2016-12-19 A kind of detection method and device

Publications (1)

Publication Number Publication Date
CN106845244A true CN106845244A (en) 2017-06-13

Family

ID=59140753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611178967.4A Pending CN106845244A (en) 2016-12-19 2016-12-19 A kind of detection method and device

Country Status (1)

Country Link
CN (1) CN106845244A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109582387A (en) * 2018-11-26 2019-04-05 郑州云海信息技术有限公司 Service recognition methods and the device of class baseline project
CN110008711A (en) * 2019-04-15 2019-07-12 苏州浪潮智能科技有限公司 A kind of security baseline detection method, device, equipment and readable storage medium storing program for executing
CN114629690A (en) * 2022-02-24 2022-06-14 广东电网有限责任公司 Equipment safety baseline compliance detection method and device and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414585A (en) * 2013-08-01 2013-11-27 华南师范大学 Method and device for building safety baselines of service system
CN103746988A (en) * 2013-12-31 2014-04-23 曙光云计算技术有限公司 Security management method and system of cloud host machine
CN104125197A (en) * 2013-04-24 2014-10-29 阿里巴巴集团控股有限公司 Security baseline system and method thereof for implementing security checks
CN106055984A (en) * 2016-05-27 2016-10-26 浪潮电子信息产业股份有限公司 Classified management method applied to security baseline software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125197A (en) * 2013-04-24 2014-10-29 阿里巴巴集团控股有限公司 Security baseline system and method thereof for implementing security checks
CN103414585A (en) * 2013-08-01 2013-11-27 华南师范大学 Method and device for building safety baselines of service system
CN103746988A (en) * 2013-12-31 2014-04-23 曙光云计算技术有限公司 Security management method and system of cloud host machine
CN106055984A (en) * 2016-05-27 2016-10-26 浪潮电子信息产业股份有限公司 Classified management method applied to security baseline software

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109582387A (en) * 2018-11-26 2019-04-05 郑州云海信息技术有限公司 Service recognition methods and the device of class baseline project
CN109582387B (en) * 2018-11-26 2022-06-07 郑州云海信息技术有限公司 Service class baseline item identification method and device
CN110008711A (en) * 2019-04-15 2019-07-12 苏州浪潮智能科技有限公司 A kind of security baseline detection method, device, equipment and readable storage medium storing program for executing
CN114629690A (en) * 2022-02-24 2022-06-14 广东电网有限责任公司 Equipment safety baseline compliance detection method and device and computer equipment
CN114629690B (en) * 2022-02-24 2023-12-29 广东电网有限责任公司 Device safety baseline compliance detection method and device and computer device

Similar Documents

Publication Publication Date Title
CN107659570A (en) Webshell detection methods and system based on machine learning and static and dynamic analysis
US20120311709A1 (en) Automatic management system for group and mutant information of malicious codes
CN101751530B (en) Method for detecting loophole aggressive behavior and device
CN102467633A (en) Method and system for safely browsing webpage
CN106294102A (en) The method of testing of application program, client, server and system
CN102984128B (en) A kind of network computer information security detection method
CN106845244A (en) A kind of detection method and device
CN105306463A (en) Modbus TCP intrusion detection method based on support vector machine
CN105243252A (en) Account risk evaluation method and apparatus
CN108769070A (en) One kind is gone beyond one's commission leak detection method and device
US11184313B1 (en) Message content cleansing
CN116842531B (en) Code vaccine-based vulnerability real-time verification method, device, equipment and medium
CN107577944A (en) Website malicious code detecting method and device based on code syntax analyzer
CN113124328A (en) Natural gas pipeline leakage detection method and system
CN106650454A (en) SQL injection attack detection method and apparatus
CN104766016A (en) Software vulnerability detection method based on short system call sequences
CN106095413A (en) The collocation method of a kind of bluetooth driver and device
CN103368970B (en) A kind of automation safety detection method for network objectives
CN104702598A (en) Distributed network protocol security detection method for smart power grid
CN106354636A (en) Method and device for code testing
CN105046154A (en) Webshell detection method and device
CN107392027A (en) A kind of website vulnerability method of testing, test system, electronic equipment and storage medium
CN104966019B (en) A kind of heuristic document threat detection method and system
CN107995167B (en) Equipment identification method and server
CN108763053B (en) Method for generating buried point name and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication