CN107992320A - A kind of method and device for repairing loophole - Google Patents
A kind of method and device for repairing loophole Download PDFInfo
- Publication number
- CN107992320A CN107992320A CN201711311836.3A CN201711311836A CN107992320A CN 107992320 A CN107992320 A CN 107992320A CN 201711311836 A CN201711311836 A CN 201711311836A CN 107992320 A CN107992320 A CN 107992320A
- Authority
- CN
- China
- Prior art keywords
- file
- fileinfo
- called
- loophole
- alternate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/73—Program documentation
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Library & Information Science (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention provides a kind of method and device for repairing loophole, repairs loophole in the case where not depending on OTA upgradings to realize, ensures the safety of user information.This method includes:Obtain the fileinfo of called file;In the file filter list pre-established, inquire about whether the called file is file there are loophole according to the fileinfo of the called file;If the called file is the file there are loophole, then according to the correspondence between the default original there are loophole and the alternate file there is no loophole, the fileinfo of the called file is replaced with to the fileinfo of corresponding target alternate file.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method and device for repairing loophole.
Background technology
In android system, for some read-only catalogues, such as the class libraries below/system/lib catalogues, text therein
Part is all read-only, then, the upgrading of these files just relies only on over the air (OTA, the Over-the- of manufacturer
Air Technology) upgrading.Since OTA upgradings have cycle certain time, for some high-risk loopholes, hacker completely can profit
With this time interval, user mobile phone is broken through, wooden horse is implanted into or completes information stealth, user information safety cannot ensure.
The content of the invention
In view of the above problems, the present invention provides a kind of method and device for repairing loophole, and OTA liters are not being depended on to realize
Loophole is repaired in the case of level, ensures the safety of user information.
In a first aspect, the embodiment of the present invention provides a kind of method for repairing loophole, including:Obtain the text of called file
Part information;In the file filter list pre-established, adjusted according to the inquiry of the fileinfo of the called file is described
Whether file is file there are loophole;If the called file is the file there are loophole, according to default
The original there are loophole and the alternate file there is no loophole between correspondence, by the text of the called file
Part information replaces with the fileinfo of corresponding target alternate file.
Second aspect, the embodiment of the present invention provide a kind of device for repairing loophole, including:Module is obtained, for obtaining quilt
The fileinfo of the file of calling;Enquiry module, in the file filter list pre-established, according to described called
The fileinfo of file inquires about whether the called file is file there are loophole;Replacement module, if for described
Called file is the file there are loophole, then according to the default original there are loophole and the replacement text that loophole is not present
Correspondence between part, the file that the fileinfo of the called file is replaced with to corresponding target alternate file are believed
Breath.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, including:Memory and processor, wherein, store it
In be stored with one or more programmed instruction, the processor performs described program instruction to realize such as said one or more
Method and step described in a technical solution.
Fourth aspect, the embodiment of the present invention provide a kind of computer-readable recording medium, are deposited on the readable storage medium storing program for executing
Program is contained, the method and step as described in one or more above-mentioned technical solution is realized when described program is executed by processor.
The method and device of repairing loophole provided by the invention, first, obtains the fileinfo of called file;So
Afterwards, in the file filter list pre-established, whether called file is inquired about according to the fileinfo of called file
For there are the file of loophole;If called file is the file there are loophole, according to the default original text there are loophole
Part and there is no the correspondence between the alternate file of loophole, corresponding mesh is replaced with by the fileinfo of called file
Mark the fileinfo of alternate file.As it can be seen that in the case where not depending on OTA, the repairing of loophole still can be realized, in this way,
Loophole can be repaired in time, ensure the information security of user.
Further, since the process of above-mentioned repairing loophole is all transparent for a user, so, above-mentioned loophole is repaiied
Compensating method can reach the noninductive replacement of file, realize the heat upgrading of file.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is attached drawing needed in technology description to make simply to introduce, it should be apparent that, drawings in the following description are this hairs
Some bright embodiments, for those of ordinary skill in the art, without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the method flow schematic diagram of the repairing loophole in the embodiment of the present invention;
Fig. 2 is the storage method flow diagram of the file filter list in the embodiment of the present invention;
Fig. 3 is the apparatus structure schematic diagram of the repairing loophole in the embodiment of the present invention;
Fig. 4 is the structure diagram of the electronic equipment in the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
An embodiment of the present invention provides a kind of method for repairing loophole, this method can be applied to be provided with linux system
Electronic equipment or other systems based on Linux, such as the electronic equipment of android system.
Shown in Figure 1, the method for the repairing loophole may comprise steps of:
S101:Obtain the fileinfo of called file;
S102:In the file filter list pre-established, inquired about according to the fileinfo of called file called
File whether be file there are loophole;
S103:If called file is the file there are loophole, according to the default original there are loophole with
There is no the correspondence between the alternate file of loophole, and the fileinfo of called file is replaced with corresponding target and is replaced
The fileinfo of exchange of notes part.
Wherein, in S101, first, a certain file is called, a certain class libraries below such as/system/lib, at this point it is possible to
The fileinfo of this document is obtained, such as the complete trails information of this document, i.e. file path and filename.
In other embodiments of the present invention, since android system is to run APP by virtual machine, each APP pairs
Answer an Android virtual machine, then, when electronic equipment is started shooting, can be created first in start process a zygote into
Journey, then (fork) is bred by zygote processes and goes out system service (SystemServer) process, zygote processes are creating
When can create a virtual machine, zygote can also create a virtual machine when creating SystemServer processes.
There is an ActivityManagerService in SystemServer, when creating APP, ActivityManagerService is received
Request, then initiate to ask to zygote, fork goes out a process to zygote again, while creates corresponding virtual machine.In order to save
Memory headroom, zygote is for those public resources, such as class libraries, there is provided Resources Sharing Mechanism between a kind of APP, therefore, needs
S101 is performed before zygote start-up loadings, in this way, after APP starts below, the resource of loading is exactly to have repaired loophole
Resource.So, S101 can include:In starting up, called file is called, and obtain the file of called file
Information.As it can be seen that being accomplished that starting up loads in the present invention, the timely replacement of file ensure that.
Next S102 is performed, in the file filter list pre-established, according to the fileinfo of called file
Whether the called file of inquiry is file there are loophole.
In practical applications, security firm completes mending option, compiles out the replacement for repairing loophole according to loophole principle
File, it is determined that the unit type that can be loaded, and local verification by, above-mentioned electronic equipment is issued to after being signed by manufacturer,
At this time, electronic equipment receives and stores the alternate file by repairing loophole that server-side issues;Obtain the file of alternate file
Information;According to the fileinfo of alternate file and the fileinfo of corresponding original, file filter list is established.Here, it is former
File is the file there are loophole.
Specifically, electronic equipment stores this document, so after multiple alternate files that server-side issues are received
Alternate file is just obtained in local fileinfo, i.e. complete trails information, that is, file path and filename.Then, build
The mapping relations of vertical alternate file and original, and then establish file filter list.
For example, the file path of original is " C according to the fileinfo of original:\Program Files
(x86) addr A " and file are entitled " A ", and correspondingly, the local path for the alternate file that cell phone manufacturer issues can be " C:\
Program Files (x86)s addr B " and file it is entitled " B ", get original and alternate file file path and
After filename, original index value (i.e. i_ino in inode structure body can be obtained respectively by kern_path functions
Value), and corresponding alternate file i_ino values in inode structure body.
In Linux, each file i_ino values in inode structure body are unique, and operating system passes through i_ino
Value identifies different files.
In embodiments of the present invention, can include in file filter list original mark, open file quantity,
The index value and alternate file of the filename of original, the filename of alternate file, original in index node are indexing
Index value in node, then, file filter list can be with specific as follows shown:
It is assumed that the i_ino values of original A are 1001, and the i_ino values of corresponding alternate file B are 1201, according to original text
The file filter list that part A and alternate file B are created can be:
It follows that after file filter list as implied above is created, it is possible to according to this document filter list
With the fileinfo of called file, inquire about called file whether there are loophole file.
Next S103 is performed, if called file is the file there are loophole, that is to say, that called file
Filename can be found in file filter list, at this point it is possible to according to original and alternate file in file filter list
Correspondence, determine the called corresponding target alternate file of file, and obtain the fileinfo of the target alternate file,
The namely file path and filename of target alternate file.Next, file path and text using the target alternate file
Part name replaces the file path and filename of called file, and at this time, File Open function can open target and replace text
The file path of part, reaches the noninductive replacement of file.
It should be noted that since tradition is for the read-only catalogue of some Androids, such as the class below/system/lib catalogues
Storehouse, these files are all read-only, these document upgradings, just rely only on OTA upgradings, so, in embodiments of the present invention,
S101 can be:Obtain the filename and file path for the called file being located under read-only record;Correspondingly, S103 can be with
For:The filename of called file and file path are replaced with to the filename and file path of target alternate file.In this way,
In the case where not depending on OTA, the repairing of loophole still can be realized, in this way, loophole can be repaired in time, ensure user
Information security.
In other embodiments of the present invention, shown in Figure 2, after file filter list is established, this method further includes:
S201:Whether the list quantity in detection file filter list is more than predetermined threshold value;
S202:If detecting, the list quantity in file filter list is not more than predetermined threshold value, control file filter row
List in table is stored with chain sheet form;
S203:If detecting, the list quantity in file filter list is more than predetermined threshold value, controls file filter list
In list to store without locking direct sheet form.
Specifically, predetermined threshold value be able to can also be set by the user by system sets itself, can also be according to hardware
Performance is set, and the application is not specifically limited.
Specifically, when the list quantity in file filter list is more than predetermined threshold value, that is, show in file filter list
List it is long, at this time, the time for searching alternate file can be elongated.In this way, in order to improve search efficiency, data knot can be optimized
Structure, that is, select without direct table replacement chained list is locked, in the case of not clashing, can once hit, can effectively improve lookup
Efficiency.
For example, by taking predetermined threshold value is 100 as an example, if the list quantity in file filter list is represented with L, if L=90<
100, then the list in file filter list is stored using chain sheet form;If L=102>100, then row in file filter list
Table is used without the direct sheet form storage of lock.
The method of repairing loophole provided by the invention, first, obtains the fileinfo of called file;Then, pre-
Whether it is that there are leakage according to the file that the inquiry of the fileinfo of called file is called in the file filter list first established
The file in hole;If called file is the file there are loophole, according to the default original there are loophole with not depositing
Correspondence between the alternate file of loophole, replaces with corresponding target by the fileinfo of called file and replaces text
The fileinfo of part.As it can be seen that in the case where not depending on OTA, still can realize the repairing of loophole, in this way, can and
When repair loophole, ensure the information security of user.
Further, since the process of above-mentioned repairing loophole is all transparent for a user, so, above-mentioned loophole is repaiied
Compensating method can reach the noninductive replacement of file, realize the heat upgrading of file.
Based on same inventive concept, the embodiment of the present invention provides a kind of device for repairing loophole, as shown in figure 3, the repairing
The device 300 of loophole, including:Module 301 is obtained, for obtaining the fileinfo of called file;Enquiry module 302, is used
In in the file filter list pre-established, according to the called file of the fileinfo of called file inquiry whether be
There are the file of loophole;Replacement module 303, if being the file there are loophole for called file, according to default
Correspondence between original there are loophole and the alternate file there is no loophole, by the fileinfo of called file
Replace with the fileinfo of corresponding target alternate file.
In other embodiments of the present invention, module is obtained, for obtaining the text for the called file being located under read-only record
Part name and file path;Correspondingly, replacement module, for the filename of called file and file path to be replaced with target
The filename and file path of alternate file.
In other embodiments of the present invention, above device further includes:Module is established, for being called in acquisition module
File fileinfo before, receive and store the alternate file by repairing loophole that server-side issues;Obtain and replace text
The fileinfo of part;According to the fileinfo of alternate file and the fileinfo of original, file filter list is established.
In other embodiments of the present invention, include in file filter list original mark, open file quantity,
The index value and alternate file of the filename of original, the filename of alternate file, original in index node are indexing
Index value in node.
In other embodiments of the present invention, the fileinfo of called file is obtained, including:In starting up, adjust
With called file, and obtain the fileinfo of called file.
In other embodiments of the present invention, unit is established, is additionally operable to after file filter list is established, detects file mistake
Whether the list quantity in filter list is more than predetermined threshold value;If detect the list quantity in file filter list no more than default
Threshold value, then control the list in file filter list to be stored with chain sheet form;If detect the list number in file filter list
Amount is more than predetermined threshold value, then controls the list in file filter list to be stored without the direct sheet form of lock.
Based on same inventive concept, the embodiment of the present invention provides a kind of electronic equipment, as shown in figure 4, the electronic equipment 400
Including:Memory 401 and processor 402, wherein, one or more programmed instruction 403 is stored with memory 401, is handled
402 execute program instructions 403 of device are to realize the side of the control method of said one or the access file described in multiple embodiments
Method step.
Based on same inventive concept, the embodiment of the present invention provides a kind of computer-readable recording medium, readable storage medium storing program for executing
On have program stored therein, the control of said one or the access file described in multiple embodiments is realized when program is executed by processor
The method and step of method.
One or more embodiment of the invention, at least has the advantages that:
After fileinfo due in embodiments of the present invention, obtaining called file, in the file mistake pre-established
Filter in list, whether be file there are loophole according to the called file of the fileinfo of called file inquiry;If
Called file is the file there are loophole, then according to the default original there are loophole and the replacement text that loophole is not present
The fileinfo of called file, is replaced with the fileinfo of corresponding target alternate file by the correspondence between part.
As it can be seen that in the case where not depending on OTA, the repairing of loophole still can be realized, in this way, loophole can be repaired in time, protect
Hinder the information security of user.
Further, since the process of above-mentioned repairing loophole is all transparent for a user, so, above-mentioned loophole is repaiied
Compensating method can reach the noninductive replacement of file, realize the heat upgrading of file.Provided herein algorithm and display not with it is any
Certain computer, virtual system or miscellaneous equipment are inherently related.Various general-purpose systems can also be with teaching one based on this
Rise and use.As described above, the structure required by constructing this kind of system is obvious.In addition, the present invention also not pin
To any certain programmed language.It should be understood that the content of invention described herein can be realized using various programming languages, and
And the description done above to language-specific is to disclose the preferred forms of the present invention.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided
The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make these embodiments other change and modification.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these modification and variations.
Claims (10)
- A kind of 1. method for repairing loophole, it is characterised in that including:Obtain the fileinfo of called file;In the file filter list pre-established, inquired about according to the fileinfo of the called file described called Whether file is file there are loophole;If the called file is the file there are loophole, according to the default original there are loophole with being not present Correspondence between the alternate file of loophole, replaces with corresponding target by the fileinfo of the called file and replaces The fileinfo of file.
- 2. according to the method described in claim 1, it is characterized in that, the fileinfo for obtaining called file, including:Obtain the filename and file path for the called file being located under read-only record;Correspondingly, the fileinfo by the called file replaces with the file letter of corresponding target alternate file Breath, including:The filename of the called file and file path are replaced with to the filename and file of the target alternate file Path.
- 3. according to the method described in claim 1, it is characterized in that, the fileinfo for obtaining called file it Before, the method further includes:Receive and store the alternate file by repairing loophole that server-side issues;Obtain the fileinfo of the alternate file;According to the fileinfo of the alternate file and the fileinfo of original, the file filter list is established.
- 4. according to the method described in claim 3, it is characterized in that, include the mark of original in the file filter list Know, open the index value of the quantity of file, the filename of original, the filename, original of alternate file in index node And index value of the alternate file in index node.
- 5. method according to any one of claims 1 to 4, it is characterised in that the file for obtaining called file Information, including:In starting up, the called file is called, and obtain the fileinfo of the called file.
- A kind of 6. device for repairing loophole, it is characterised in that including:Module is obtained, for obtaining the fileinfo of called file;Enquiry module, in the file filter list pre-established, being looked into according to the fileinfo of the called file Ask whether the called file is file there are loophole;Replacement module, if being the file there are loophole for the called file, according to default there are loophole Original and there is no the correspondence between the alternate file of loophole, the fileinfo of the called file is replaced with The fileinfo of corresponding target alternate file.
- 7. device according to claim 6, it is characterised in that the acquisition module, is located under read-only record for obtaining The filename and file path of the called file;Correspondingly, the replacement module, for the filename of the called file and file path to be replaced with the mesh Mark the filename and file path of alternate file.
- 8. device according to claim 6, it is characterised in that described device further includes, and establishes module, for being obtained described Before obtaining the fileinfo that module obtains called file, the replacement by repairing loophole that server-side issues is received and stored File;Obtain the fileinfo of the alternate file;According to the fileinfo of the alternate file and the fileinfo of original, Establish the file filter list.
- 9. a kind of electronic equipment, it is characterised in that including:Memory and processor, wherein, storage be wherein stored with one or Multiple programmed instruction, the processor perform described program instruction to realize that claim 1 to 5 any one of them method such as walks Suddenly.
- 10. a kind of computer-readable recording medium, have program stored therein on the readable storage medium storing program for executing, it is characterised in that the journey Such as claim 1 to 5 any one of them method and step is realized when sequence is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711311836.3A CN107992320A (en) | 2017-12-11 | 2017-12-11 | A kind of method and device for repairing loophole |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711311836.3A CN107992320A (en) | 2017-12-11 | 2017-12-11 | A kind of method and device for repairing loophole |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107992320A true CN107992320A (en) | 2018-05-04 |
Family
ID=62037636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711311836.3A Pending CN107992320A (en) | 2017-12-11 | 2017-12-11 | A kind of method and device for repairing loophole |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107992320A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113672349A (en) * | 2021-08-20 | 2021-11-19 | 绿盟科技集团股份有限公司 | Mirror image updating method, device, equipment and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103677937A (en) * | 2013-12-23 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method and device for upgrading and running software |
CN103745158A (en) * | 2014-01-26 | 2014-04-23 | 北京奇虎科技有限公司 | Method and device for repairing system bugs |
US20170131996A1 (en) * | 2014-06-10 | 2017-05-11 | Arm Ip Limited | Method and device for updating software executed from non-volatile memory |
-
2017
- 2017-12-11 CN CN201711311836.3A patent/CN107992320A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103677937A (en) * | 2013-12-23 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method and device for upgrading and running software |
CN103745158A (en) * | 2014-01-26 | 2014-04-23 | 北京奇虎科技有限公司 | Method and device for repairing system bugs |
US20170131996A1 (en) * | 2014-06-10 | 2017-05-11 | Arm Ip Limited | Method and device for updating software executed from non-volatile memory |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113672349A (en) * | 2021-08-20 | 2021-11-19 | 绿盟科技集团股份有限公司 | Mirror image updating method, device, equipment and medium |
CN113672349B (en) * | 2021-08-20 | 2024-10-01 | 绿盟科技集团股份有限公司 | Mirror image updating method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102520948B (en) | Application maintenance update method and device | |
US8495621B2 (en) | Catalog-based software component management | |
US11797692B2 (en) | Tool for generating security policies for containers | |
CN105320554A (en) | Program updating method as well as client and system for program updating | |
US20130332981A1 (en) | Method and system for extending selinux policy with enforcement of file name translations | |
US9158930B2 (en) | Facilitating secure file creation | |
EP3374857B1 (en) | Dashboard as remote computing services | |
US10379894B1 (en) | Lineage-based trust for virtual machine images | |
JP2011529606A (en) | Computer application package with customization | |
CN103064717B (en) | A kind of apparatus and method of parallel installation of software for cluster system | |
CN105704188A (en) | Deployment method and apparatus of applications and services | |
US10705829B2 (en) | Software discovery using exclusion | |
US10572371B2 (en) | Generating valid use cases from a parsed configuration file describing use case options | |
US10176319B2 (en) | Maintaining secure clustered software with a container-based architecture | |
US20190158367A1 (en) | Selection of cloud service providers to host applications | |
CN104036194B (en) | Vulnerability detection method and device for revealing private data in application program | |
US20190278929A1 (en) | Federated Configuration of Distributed Access, Authentication, and Authorization Systems | |
EP3121750B1 (en) | System and method for antivirus checking of native images of software assemblies | |
CN108694049B (en) | Method and equipment for updating software | |
CN108255735A (en) | Associated environment test method, electronic device and computer readable storage medium | |
US9495342B2 (en) | System and method for automatically inserting correct escaping functions for field references in a multi-tenant computing environment | |
CN111177703A (en) | Method and device for determining data integrity of operating system | |
CN107992320A (en) | A kind of method and device for repairing loophole | |
CN107861751A (en) | The amending method and device of configuration file | |
CN106529281A (en) | Executable file processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |