CN107992320A - A kind of method and device for repairing loophole - Google Patents

A kind of method and device for repairing loophole Download PDF

Info

Publication number
CN107992320A
CN107992320A CN201711311836.3A CN201711311836A CN107992320A CN 107992320 A CN107992320 A CN 107992320A CN 201711311836 A CN201711311836 A CN 201711311836A CN 107992320 A CN107992320 A CN 107992320A
Authority
CN
China
Prior art keywords
file
fileinfo
called
loophole
alternate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711311836.3A
Other languages
Chinese (zh)
Inventor
高永岗
张建新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201711311836.3A priority Critical patent/CN107992320A/en
Publication of CN107992320A publication Critical patent/CN107992320A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/73Program documentation

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Library & Information Science (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of method and device for repairing loophole, repairs loophole in the case where not depending on OTA upgradings to realize, ensures the safety of user information.This method includes:Obtain the fileinfo of called file;In the file filter list pre-established, inquire about whether the called file is file there are loophole according to the fileinfo of the called file;If the called file is the file there are loophole, then according to the correspondence between the default original there are loophole and the alternate file there is no loophole, the fileinfo of the called file is replaced with to the fileinfo of corresponding target alternate file.

Description

A kind of method and device for repairing loophole
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method and device for repairing loophole.
Background technology
In android system, for some read-only catalogues, such as the class libraries below/system/lib catalogues, text therein Part is all read-only, then, the upgrading of these files just relies only on over the air (OTA, the Over-the- of manufacturer Air Technology) upgrading.Since OTA upgradings have cycle certain time, for some high-risk loopholes, hacker completely can profit With this time interval, user mobile phone is broken through, wooden horse is implanted into or completes information stealth, user information safety cannot ensure.
The content of the invention
In view of the above problems, the present invention provides a kind of method and device for repairing loophole, and OTA liters are not being depended on to realize Loophole is repaired in the case of level, ensures the safety of user information.
In a first aspect, the embodiment of the present invention provides a kind of method for repairing loophole, including:Obtain the text of called file Part information;In the file filter list pre-established, adjusted according to the inquiry of the fileinfo of the called file is described Whether file is file there are loophole;If the called file is the file there are loophole, according to default The original there are loophole and the alternate file there is no loophole between correspondence, by the text of the called file Part information replaces with the fileinfo of corresponding target alternate file.
Second aspect, the embodiment of the present invention provide a kind of device for repairing loophole, including:Module is obtained, for obtaining quilt The fileinfo of the file of calling;Enquiry module, in the file filter list pre-established, according to described called The fileinfo of file inquires about whether the called file is file there are loophole;Replacement module, if for described Called file is the file there are loophole, then according to the default original there are loophole and the replacement text that loophole is not present Correspondence between part, the file that the fileinfo of the called file is replaced with to corresponding target alternate file are believed Breath.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, including:Memory and processor, wherein, store it In be stored with one or more programmed instruction, the processor performs described program instruction to realize such as said one or more Method and step described in a technical solution.
Fourth aspect, the embodiment of the present invention provide a kind of computer-readable recording medium, are deposited on the readable storage medium storing program for executing Program is contained, the method and step as described in one or more above-mentioned technical solution is realized when described program is executed by processor.
The method and device of repairing loophole provided by the invention, first, obtains the fileinfo of called file;So Afterwards, in the file filter list pre-established, whether called file is inquired about according to the fileinfo of called file For there are the file of loophole;If called file is the file there are loophole, according to the default original text there are loophole Part and there is no the correspondence between the alternate file of loophole, corresponding mesh is replaced with by the fileinfo of called file Mark the fileinfo of alternate file.As it can be seen that in the case where not depending on OTA, the repairing of loophole still can be realized, in this way, Loophole can be repaired in time, ensure the information security of user.
Further, since the process of above-mentioned repairing loophole is all transparent for a user, so, above-mentioned loophole is repaiied Compensating method can reach the noninductive replacement of file, realize the heat upgrading of file.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to make simply to introduce, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the method flow schematic diagram of the repairing loophole in the embodiment of the present invention;
Fig. 2 is the storage method flow diagram of the file filter list in the embodiment of the present invention;
Fig. 3 is the apparatus structure schematic diagram of the repairing loophole in the embodiment of the present invention;
Fig. 4 is the structure diagram of the electronic equipment in the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
An embodiment of the present invention provides a kind of method for repairing loophole, this method can be applied to be provided with linux system Electronic equipment or other systems based on Linux, such as the electronic equipment of android system.
Shown in Figure 1, the method for the repairing loophole may comprise steps of:
S101:Obtain the fileinfo of called file;
S102:In the file filter list pre-established, inquired about according to the fileinfo of called file called File whether be file there are loophole;
S103:If called file is the file there are loophole, according to the default original there are loophole with There is no the correspondence between the alternate file of loophole, and the fileinfo of called file is replaced with corresponding target and is replaced The fileinfo of exchange of notes part.
Wherein, in S101, first, a certain file is called, a certain class libraries below such as/system/lib, at this point it is possible to The fileinfo of this document is obtained, such as the complete trails information of this document, i.e. file path and filename.
In other embodiments of the present invention, since android system is to run APP by virtual machine, each APP pairs Answer an Android virtual machine, then, when electronic equipment is started shooting, can be created first in start process a zygote into Journey, then (fork) is bred by zygote processes and goes out system service (SystemServer) process, zygote processes are creating When can create a virtual machine, zygote can also create a virtual machine when creating SystemServer processes. There is an ActivityManagerService in SystemServer, when creating APP, ActivityManagerService is received Request, then initiate to ask to zygote, fork goes out a process to zygote again, while creates corresponding virtual machine.In order to save Memory headroom, zygote is for those public resources, such as class libraries, there is provided Resources Sharing Mechanism between a kind of APP, therefore, needs S101 is performed before zygote start-up loadings, in this way, after APP starts below, the resource of loading is exactly to have repaired loophole Resource.So, S101 can include:In starting up, called file is called, and obtain the file of called file Information.As it can be seen that being accomplished that starting up loads in the present invention, the timely replacement of file ensure that.
Next S102 is performed, in the file filter list pre-established, according to the fileinfo of called file Whether the called file of inquiry is file there are loophole.
In practical applications, security firm completes mending option, compiles out the replacement for repairing loophole according to loophole principle File, it is determined that the unit type that can be loaded, and local verification by, above-mentioned electronic equipment is issued to after being signed by manufacturer, At this time, electronic equipment receives and stores the alternate file by repairing loophole that server-side issues;Obtain the file of alternate file Information;According to the fileinfo of alternate file and the fileinfo of corresponding original, file filter list is established.Here, it is former File is the file there are loophole.
Specifically, electronic equipment stores this document, so after multiple alternate files that server-side issues are received Alternate file is just obtained in local fileinfo, i.e. complete trails information, that is, file path and filename.Then, build The mapping relations of vertical alternate file and original, and then establish file filter list.
For example, the file path of original is " C according to the fileinfo of original:\Program Files (x86) addr A " and file are entitled " A ", and correspondingly, the local path for the alternate file that cell phone manufacturer issues can be " C:\ Program Files (x86)s addr B " and file it is entitled " B ", get original and alternate file file path and After filename, original index value (i.e. i_ino in inode structure body can be obtained respectively by kern_path functions Value), and corresponding alternate file i_ino values in inode structure body.
In Linux, each file i_ino values in inode structure body are unique, and operating system passes through i_ino Value identifies different files.
In embodiments of the present invention, can include in file filter list original mark, open file quantity, The index value and alternate file of the filename of original, the filename of alternate file, original in index node are indexing Index value in node, then, file filter list can be with specific as follows shown:
It is assumed that the i_ino values of original A are 1001, and the i_ino values of corresponding alternate file B are 1201, according to original text The file filter list that part A and alternate file B are created can be:
It follows that after file filter list as implied above is created, it is possible to according to this document filter list With the fileinfo of called file, inquire about called file whether there are loophole file.
Next S103 is performed, if called file is the file there are loophole, that is to say, that called file Filename can be found in file filter list, at this point it is possible to according to original and alternate file in file filter list Correspondence, determine the called corresponding target alternate file of file, and obtain the fileinfo of the target alternate file, The namely file path and filename of target alternate file.Next, file path and text using the target alternate file Part name replaces the file path and filename of called file, and at this time, File Open function can open target and replace text The file path of part, reaches the noninductive replacement of file.
It should be noted that since tradition is for the read-only catalogue of some Androids, such as the class below/system/lib catalogues Storehouse, these files are all read-only, these document upgradings, just rely only on OTA upgradings, so, in embodiments of the present invention, S101 can be:Obtain the filename and file path for the called file being located under read-only record;Correspondingly, S103 can be with For:The filename of called file and file path are replaced with to the filename and file path of target alternate file.In this way, In the case where not depending on OTA, the repairing of loophole still can be realized, in this way, loophole can be repaired in time, ensure user Information security.
In other embodiments of the present invention, shown in Figure 2, after file filter list is established, this method further includes:
S201:Whether the list quantity in detection file filter list is more than predetermined threshold value;
S202:If detecting, the list quantity in file filter list is not more than predetermined threshold value, control file filter row List in table is stored with chain sheet form;
S203:If detecting, the list quantity in file filter list is more than predetermined threshold value, controls file filter list In list to store without locking direct sheet form.
Specifically, predetermined threshold value be able to can also be set by the user by system sets itself, can also be according to hardware Performance is set, and the application is not specifically limited.
Specifically, when the list quantity in file filter list is more than predetermined threshold value, that is, show in file filter list List it is long, at this time, the time for searching alternate file can be elongated.In this way, in order to improve search efficiency, data knot can be optimized Structure, that is, select without direct table replacement chained list is locked, in the case of not clashing, can once hit, can effectively improve lookup Efficiency.
For example, by taking predetermined threshold value is 100 as an example, if the list quantity in file filter list is represented with L, if L=90< 100, then the list in file filter list is stored using chain sheet form;If L=102>100, then row in file filter list Table is used without the direct sheet form storage of lock.
The method of repairing loophole provided by the invention, first, obtains the fileinfo of called file;Then, pre- Whether it is that there are leakage according to the file that the inquiry of the fileinfo of called file is called in the file filter list first established The file in hole;If called file is the file there are loophole, according to the default original there are loophole with not depositing Correspondence between the alternate file of loophole, replaces with corresponding target by the fileinfo of called file and replaces text The fileinfo of part.As it can be seen that in the case where not depending on OTA, still can realize the repairing of loophole, in this way, can and When repair loophole, ensure the information security of user.
Further, since the process of above-mentioned repairing loophole is all transparent for a user, so, above-mentioned loophole is repaiied Compensating method can reach the noninductive replacement of file, realize the heat upgrading of file.
Based on same inventive concept, the embodiment of the present invention provides a kind of device for repairing loophole, as shown in figure 3, the repairing The device 300 of loophole, including:Module 301 is obtained, for obtaining the fileinfo of called file;Enquiry module 302, is used In in the file filter list pre-established, according to the called file of the fileinfo of called file inquiry whether be There are the file of loophole;Replacement module 303, if being the file there are loophole for called file, according to default Correspondence between original there are loophole and the alternate file there is no loophole, by the fileinfo of called file Replace with the fileinfo of corresponding target alternate file.
In other embodiments of the present invention, module is obtained, for obtaining the text for the called file being located under read-only record Part name and file path;Correspondingly, replacement module, for the filename of called file and file path to be replaced with target The filename and file path of alternate file.
In other embodiments of the present invention, above device further includes:Module is established, for being called in acquisition module File fileinfo before, receive and store the alternate file by repairing loophole that server-side issues;Obtain and replace text The fileinfo of part;According to the fileinfo of alternate file and the fileinfo of original, file filter list is established.
In other embodiments of the present invention, include in file filter list original mark, open file quantity, The index value and alternate file of the filename of original, the filename of alternate file, original in index node are indexing Index value in node.
In other embodiments of the present invention, the fileinfo of called file is obtained, including:In starting up, adjust With called file, and obtain the fileinfo of called file.
In other embodiments of the present invention, unit is established, is additionally operable to after file filter list is established, detects file mistake Whether the list quantity in filter list is more than predetermined threshold value;If detect the list quantity in file filter list no more than default Threshold value, then control the list in file filter list to be stored with chain sheet form;If detect the list number in file filter list Amount is more than predetermined threshold value, then controls the list in file filter list to be stored without the direct sheet form of lock.
Based on same inventive concept, the embodiment of the present invention provides a kind of electronic equipment, as shown in figure 4, the electronic equipment 400 Including:Memory 401 and processor 402, wherein, one or more programmed instruction 403 is stored with memory 401, is handled 402 execute program instructions 403 of device are to realize the side of the control method of said one or the access file described in multiple embodiments Method step.
Based on same inventive concept, the embodiment of the present invention provides a kind of computer-readable recording medium, readable storage medium storing program for executing On have program stored therein, the control of said one or the access file described in multiple embodiments is realized when program is executed by processor The method and step of method.
One or more embodiment of the invention, at least has the advantages that:
After fileinfo due in embodiments of the present invention, obtaining called file, in the file mistake pre-established Filter in list, whether be file there are loophole according to the called file of the fileinfo of called file inquiry;If Called file is the file there are loophole, then according to the default original there are loophole and the replacement text that loophole is not present The fileinfo of called file, is replaced with the fileinfo of corresponding target alternate file by the correspondence between part. As it can be seen that in the case where not depending on OTA, the repairing of loophole still can be realized, in this way, loophole can be repaired in time, protect Hinder the information security of user.
Further, since the process of above-mentioned repairing loophole is all transparent for a user, so, above-mentioned loophole is repaiied Compensating method can reach the noninductive replacement of file, realize the heat upgrading of file.Provided herein algorithm and display not with it is any Certain computer, virtual system or miscellaneous equipment are inherently related.Various general-purpose systems can also be with teaching one based on this Rise and use.As described above, the structure required by constructing this kind of system is obvious.In addition, the present invention also not pin To any certain programmed language.It should be understood that the content of invention described herein can be realized using various programming languages, and And the description done above to language-specific is to disclose the preferred forms of the present invention.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make these embodiments other change and modification.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these modification and variations.

Claims (10)

  1. A kind of 1. method for repairing loophole, it is characterised in that including:
    Obtain the fileinfo of called file;
    In the file filter list pre-established, inquired about according to the fileinfo of the called file described called Whether file is file there are loophole;
    If the called file is the file there are loophole, according to the default original there are loophole with being not present Correspondence between the alternate file of loophole, replaces with corresponding target by the fileinfo of the called file and replaces The fileinfo of file.
  2. 2. according to the method described in claim 1, it is characterized in that, the fileinfo for obtaining called file, including:
    Obtain the filename and file path for the called file being located under read-only record;
    Correspondingly, the fileinfo by the called file replaces with the file letter of corresponding target alternate file Breath, including:
    The filename of the called file and file path are replaced with to the filename and file of the target alternate file Path.
  3. 3. according to the method described in claim 1, it is characterized in that, the fileinfo for obtaining called file it Before, the method further includes:
    Receive and store the alternate file by repairing loophole that server-side issues;
    Obtain the fileinfo of the alternate file;
    According to the fileinfo of the alternate file and the fileinfo of original, the file filter list is established.
  4. 4. according to the method described in claim 3, it is characterized in that, include the mark of original in the file filter list Know, open the index value of the quantity of file, the filename of original, the filename, original of alternate file in index node And index value of the alternate file in index node.
  5. 5. method according to any one of claims 1 to 4, it is characterised in that the file for obtaining called file Information, including:
    In starting up, the called file is called, and obtain the fileinfo of the called file.
  6. A kind of 6. device for repairing loophole, it is characterised in that including:
    Module is obtained, for obtaining the fileinfo of called file;
    Enquiry module, in the file filter list pre-established, being looked into according to the fileinfo of the called file Ask whether the called file is file there are loophole;
    Replacement module, if being the file there are loophole for the called file, according to default there are loophole Original and there is no the correspondence between the alternate file of loophole, the fileinfo of the called file is replaced with The fileinfo of corresponding target alternate file.
  7. 7. device according to claim 6, it is characterised in that the acquisition module, is located under read-only record for obtaining The filename and file path of the called file;
    Correspondingly, the replacement module, for the filename of the called file and file path to be replaced with the mesh Mark the filename and file path of alternate file.
  8. 8. device according to claim 6, it is characterised in that described device further includes, and establishes module, for being obtained described Before obtaining the fileinfo that module obtains called file, the replacement by repairing loophole that server-side issues is received and stored File;Obtain the fileinfo of the alternate file;According to the fileinfo of the alternate file and the fileinfo of original, Establish the file filter list.
  9. 9. a kind of electronic equipment, it is characterised in that including:Memory and processor, wherein, storage be wherein stored with one or Multiple programmed instruction, the processor perform described program instruction to realize that claim 1 to 5 any one of them method such as walks Suddenly.
  10. 10. a kind of computer-readable recording medium, have program stored therein on the readable storage medium storing program for executing, it is characterised in that the journey Such as claim 1 to 5 any one of them method and step is realized when sequence is executed by processor.
CN201711311836.3A 2017-12-11 2017-12-11 A kind of method and device for repairing loophole Pending CN107992320A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711311836.3A CN107992320A (en) 2017-12-11 2017-12-11 A kind of method and device for repairing loophole

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711311836.3A CN107992320A (en) 2017-12-11 2017-12-11 A kind of method and device for repairing loophole

Publications (1)

Publication Number Publication Date
CN107992320A true CN107992320A (en) 2018-05-04

Family

ID=62037636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711311836.3A Pending CN107992320A (en) 2017-12-11 2017-12-11 A kind of method and device for repairing loophole

Country Status (1)

Country Link
CN (1) CN107992320A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672349A (en) * 2021-08-20 2021-11-19 绿盟科技集团股份有限公司 Mirror image updating method, device, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677937A (en) * 2013-12-23 2014-03-26 腾讯科技(深圳)有限公司 Method and device for upgrading and running software
CN103745158A (en) * 2014-01-26 2014-04-23 北京奇虎科技有限公司 Method and device for repairing system bugs
US20170131996A1 (en) * 2014-06-10 2017-05-11 Arm Ip Limited Method and device for updating software executed from non-volatile memory

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677937A (en) * 2013-12-23 2014-03-26 腾讯科技(深圳)有限公司 Method and device for upgrading and running software
CN103745158A (en) * 2014-01-26 2014-04-23 北京奇虎科技有限公司 Method and device for repairing system bugs
US20170131996A1 (en) * 2014-06-10 2017-05-11 Arm Ip Limited Method and device for updating software executed from non-volatile memory

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672349A (en) * 2021-08-20 2021-11-19 绿盟科技集团股份有限公司 Mirror image updating method, device, equipment and medium
CN113672349B (en) * 2021-08-20 2024-10-01 绿盟科技集团股份有限公司 Mirror image updating method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN102520948B (en) Application maintenance update method and device
US8495621B2 (en) Catalog-based software component management
US11797692B2 (en) Tool for generating security policies for containers
CN105320554A (en) Program updating method as well as client and system for program updating
US20130332981A1 (en) Method and system for extending selinux policy with enforcement of file name translations
US9158930B2 (en) Facilitating secure file creation
EP3374857B1 (en) Dashboard as remote computing services
US10379894B1 (en) Lineage-based trust for virtual machine images
JP2011529606A (en) Computer application package with customization
CN103064717B (en) A kind of apparatus and method of parallel installation of software for cluster system
CN105704188A (en) Deployment method and apparatus of applications and services
US10705829B2 (en) Software discovery using exclusion
US10572371B2 (en) Generating valid use cases from a parsed configuration file describing use case options
US10176319B2 (en) Maintaining secure clustered software with a container-based architecture
US20190158367A1 (en) Selection of cloud service providers to host applications
CN104036194B (en) Vulnerability detection method and device for revealing private data in application program
US20190278929A1 (en) Federated Configuration of Distributed Access, Authentication, and Authorization Systems
EP3121750B1 (en) System and method for antivirus checking of native images of software assemblies
CN108694049B (en) Method and equipment for updating software
CN108255735A (en) Associated environment test method, electronic device and computer readable storage medium
US9495342B2 (en) System and method for automatically inserting correct escaping functions for field references in a multi-tenant computing environment
CN111177703A (en) Method and device for determining data integrity of operating system
CN107992320A (en) A kind of method and device for repairing loophole
CN107861751A (en) The amending method and device of configuration file
CN106529281A (en) Executable file processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504