CN110807198B - Method for acquiring information for repairing bugs and patch processing system - Google Patents
Method for acquiring information for repairing bugs and patch processing system Download PDFInfo
- Publication number
- CN110807198B CN110807198B CN201911065582.0A CN201911065582A CN110807198B CN 110807198 B CN110807198 B CN 110807198B CN 201911065582 A CN201911065582 A CN 201911065582A CN 110807198 B CN110807198 B CN 110807198B
- Authority
- CN
- China
- Prior art keywords
- patch
- information
- vulnerability
- repairing
- mirror image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/63—Image based installation; Cloning; Build to order
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Abstract
The application provides a method for acquiring vulnerability repair information and a patch processing system, which are used for repairing the vulnerability of a mirror image by establishing the mirror image of a service system and using a patch, and recording information, wherein the information is the information of a process running in the mirror image and/or the parameters of the mirror image and the change caused by repairing the vulnerability by the patch. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method for acquiring information for repairing a vulnerability and a patch processing system.
Background
At present, in order to improve the security of a business system, many enterprises can carry out system vulnerability scanning on the business system and use patch upgrading on discovered system vulnerabilities.
Because the patch is used to repair the bug, the influence on the business system is unknown, and therefore, the operation risk of the business system is increased.
Disclosure of Invention
The application provides an acquisition method of bug fixing information and a patch processing system, and aims to solve the problem that the influence on a service system caused by using a patch to fix a bug cannot be predicted.
In order to achieve the above object, the present application provides the following technical solutions:
a method for acquiring information of repairing a vulnerability includes:
establishing a mirror image of a service system;
repairing the vulnerability of the image by using a patch;
and recording information, wherein the information is the information of the process running in the mirror image and/or the parameters of the mirror image and the change caused by the patch repairing the vulnerability.
Optionally, in the method for obtaining information of repairing a vulnerability, before the using a patch to repair the vulnerability of the image, the method further includes:
and downloading and storing the patch from a preset patch library.
Optionally, in the method for obtaining information of repairing a vulnerability, the method further includes:
and displaying the information of the patch matched with the retrieval information based on the retrieval information.
Optionally, the using the patch to repair the bug of the image includes:
searching for the vulnerability of the mirror image;
searching a target patch from the patches, wherein the target patch is a patch for repairing the vulnerability;
and repairing the vulnerability of the image by using the target patch.
Optionally, in the method for obtaining information of repairing a vulnerability, before the using a patch to repair the vulnerability of the image, the method further includes:
detecting the security of the patch;
the using the patch to fix the bug of the image includes:
and repairing the vulnerability of the image by using the patch passing the security detection.
Optionally, in the method for acquiring information of repairing the vulnerability, the recording information includes:
and recording the corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and the patch generated by the changed information.
A patch processing system, comprising:
the mirror image creating unit is used for creating a mirror image of the service system;
a repairing unit, configured to repair a bug of the image using a patch;
and the recording unit is used for recording information, wherein the information is information of a process running in the mirror image and/or parameters of the mirror image, and the change information is caused by the patch repairing the vulnerability.
Optionally, in the patch processing system, the patch processing system further includes: and the storage unit is used for downloading and storing the patch from a preset patch library.
Optionally, in the patch processing system, the patch processing system further includes: and the retrieval unit is used for displaying the information of the patch matched with the retrieval information based on the retrieval information.
Optionally, in the patch processing system, the patch processing system further includes: and the detection unit is used for detecting the safety of the patch.
According to the method for acquiring the information for repairing the bug and the patch processing system, the bug of the image is repaired by the patch by establishing the image of the service system, and the information is recorded, wherein the information is the information of the change caused by the bug repair by the patch, and is the information of the process running in the image and/or the parameter of the image. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an obtaining method for bug repair information according to an embodiment of the present application;
fig. 2 is a schematic diagram of another method for acquiring information for repairing a vulnerability, provided by an embodiment of the present application;
fig. 3 is a schematic diagram of another method for acquiring information for repairing a vulnerability, provided in an embodiment of the present application;
fig. 4 is a schematic diagram of another method for acquiring information of repairing a vulnerability, provided in the embodiment of the present application;
fig. 5 is a schematic diagram of another method for acquiring information for repairing a vulnerability, provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a patch processing system according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As can be seen from the background art, in the prior art, the effect on the service system cannot be predicted because a patch is used to fix a bug. Therefore, the embodiment of the application provides an obtaining method of information for repairing a vulnerability, which is used for obtaining the information for repairing the vulnerability after the vulnerability is repaired by using a patch, and the information can help a user to know the influence of the repaired patch on a service system, so that the operation risk of the service system is effectively avoided. In the following embodiments, the patch may be a hot patch or other patches, which are hereinafter referred to as patches.
As shown in fig. 1, a schematic diagram of an obtaining method for bug repair information provided in an embodiment of the present application includes the following steps:
s101: and establishing a mirror image of the service system.
The mirror image of the service system is used for simulating a real service system, so that the influence of using a patch to repair a bug on the service system is tested in a real service environment.
It should be noted that, in the process of creating the mirror image of the business system, the parameter of the business system is copied and used, so as to create the mirror image of the business system. Specific parameters include, but are not limited to: parameters such as a start parameter (indicating whether the service system is restarted), a configuration parameter (indicating the configuration requirements of software and hardware of the service system), and an installation environment parameter (indicating the installation environment required by the service system), and specific parameters can be set by technicians according to actual conditions.
S102: and repairing the vulnerability of the image by using the patch.
The patching of the bug of the image by using the patch is substantially a simulation of patching the bug of the service system by using the patch, and certainly, patching the bug of the service system by using the patch is common knowledge familiar to those skilled in the art, and is not described herein again.
S103: information is recorded.
The information is the parameters of the process running in the mirror image and/or the mirror image, and the changed information caused by the patch repair vulnerability. The processes running in the image include at least any one of a system process and an application process.
It should be noted that, for a process running in an image, the information of the change caused by a patch repair bug specifically refers to: after the patch is used to repair the vulnerability, the running process in the image is changed, so that information indicating the change is generated, for example, when the firewall process is originally running, and when the firewall process is suspended after the patch is used to repair the vulnerability, the information indicating that the firewall is suspended within the time of repairing the vulnerability is generated.
Parameters in the image, the changed information caused by patch repair vulnerabilities specifically refer to: after the patch is used to repair the bug, the parameter in the image is changed, so that information for indicating the change is generated, for example, the starting parameter originally indicates that the service system does not need to be restarted, and when the patch is used to repair the bug and the service system is restarted, the information for indicating that the service system is restarted after the bug is repaired is generated.
It should be emphasized that, in the embodiment of the present application, the recorded information may be stored in the preset information base, and the patch downloaded locally may be stored in the preset patch base, so that the recorded information and the patch corresponding to the information can be queried.
Optionally, in addition to recording the information, in the embodiment of the present application, a corresponding relationship is further recorded, where the corresponding relationship includes any piece of changed information and a corresponding relationship of a patch that is generated by the changed information.
Therefore, based on the corresponding relation, the parameters of the process and/or the image which cause the operation in the image can be searched, and the changed patch can be generated.
In the embodiment of the application, the mirror image of the service system is established, the patch is used for repairing the vulnerability of the mirror image, and information is recorded, wherein the information is the parameters of the process running in the mirror image and/or the mirror image, and the information is changed due to the patch repairing vulnerability. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
Optionally, as shown in fig. 2, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s201: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S201 are consistent with the specific implementation process and implementation principle of S101 shown in fig. 1, and are not described herein again.
S202: and downloading and storing the patch from a preset patch library.
The patch includes but is not limited to a hot patch and other patch types, and the hot patch specifically refers to: and generating the patch with the time length not exceeding the preset time length, wherein the preset time length is set by technical personnel according to the actual situation, in other words, the patch is updated recently by a patch release channel of the Internet.
It should be noted that, in the embodiment of the present application, a patch may be downloaded from a patch library of a patch distribution website through an internet channel, and the downloaded patch is stored in a local patch library.
S203: and repairing the vulnerability of the image by using the patch.
The specific implementation process and implementation principle of S203 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S204: information is recorded.
The specific implementation process and implementation principle of S204 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
In the embodiment of the application, a mirror image of a service system is established, a patch is downloaded and stored from a preset patch library, the patch is used for repairing the vulnerability of the mirror image, and information is recorded, wherein the information is the information of a process running in the mirror image and/or the parameter of the mirror image and the change caused by the patch repairing the vulnerability. Therefore, the patch is downloaded and stored through the patch library, the patch used for repairing the bug is upgraded, and the quality of repairing the bug is ensured.
Optionally, as shown in fig. 3, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s301: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S301 are consistent with the specific implementation process and implementation principle of S101 shown in fig. 1, and are not described herein again.
S302: and downloading and storing the patch from a preset patch library.
The specific implementation process and implementation principle of S302 are consistent with the specific implementation process and implementation principle of S202 shown in fig. 2, and are not described herein again.
S303: and repairing the vulnerability of the image by using the patch.
The specific implementation process and implementation principle of S303 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S304: information is recorded.
The specific implementation process and implementation principle of S304 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
S305: and displaying the information of the patch matched with the retrieval information based on the retrieval information.
The information of the patch includes, but is not limited to, the name of the patch, the release time of the patch, and the number of the patch. In the embodiment of the present application, an fuzzy search method may be adopted, and search information (for example, the name of a patch) is input, so as to find the patch in the local patch library. Of course, other patch search methods may be used to search for a patch, and the embodiment of the present application is not limited.
In the embodiment of the application, a mirror image of a service system is established, a patch is downloaded and stored from a preset patch library, the patch is used for repairing a bug of the mirror image, and information is recorded, wherein the information is a process running in the mirror image and/or parameters of the mirror image. And moreover, based on the retrieval information, displaying the information of the patch matched with the retrieval information. Therefore, the information of the patch matched with the retrieval information can be obtained locally through the retrieval information, the time for manually searching the patch is reduced, and the patch with adverse effect on a business system is conveniently searched.
Optionally, as shown in fig. 4, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s401: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S401 are consistent with those of S101 shown in fig. 1, and are not described herein again
S402: and downloading and storing the patch from a preset patch library.
The specific implementation process and implementation principle of S402 are consistent with the specific implementation process and implementation principle of S202 shown in fig. 2, and are not described herein again.
S403: and searching for the vulnerability of the mirror image.
The process of finding a vulnerability of a mirror image is the same as the process of finding a vulnerability of a business system, and is common knowledge familiar to those skilled in the art, and is not described herein again.
S404: and searching the target patch from the patch.
Wherein the target patch is a patch for repairing the vulnerability.
S405: and repairing the vulnerability of the image by using the target patch.
The specific implementation process and implementation principle of S405 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S406: information is recorded.
The specific implementation process and implementation principle of S406 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
In the embodiment of the application, the patch is downloaded and stored from a preset patch library by establishing the mirror image of the service system. And searching the vulnerability of the mirror image, searching a target patch from the patch, and repairing the vulnerability of the mirror image by using the target patch. And recording information, wherein the information is the information of the process running in the mirror image and/or the parameters of the mirror image and the change caused by the patch repair vulnerability. And downloading and storing the patch through the patch library, and selecting a proper patch to repair the patch based on the searched bug of the mirror image, thereby simulating the influence caused by using the patch to repair the bug of the real service system.
Optionally, as shown in fig. 5, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s501: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S501 are consistent with the specific implementation process and implementation principle of S101 shown in fig. 1, and are not described herein again.
S502: the security of the patch is detected.
The security of the patch stored locally or downloaded from the patch library can be detected by adopting a virus killing or Trojan horse detection mode. If there is a patch whose security is extremely dangerous, the patch is deleted.
S503: and repairing the vulnerability of the image by using the patch passing the security detection.
The specific implementation process and implementation principle of S503 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S504: information is recorded.
The specific implementation process and implementation principle of S504 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
In the embodiment of the application, the security of the patch is detected by establishing the mirror image of the service system, and the loophole of the mirror image is repaired by using the patch passing the security detection. And recording information, wherein the information is the parameters of the process and/or the mirror image running in the mirror image and the changed information caused by the patch repair vulnerability. Therefore, the security of the patch is detected, the patch passing the security detection is used for repairing the vulnerability, and the influence on the business system caused by the patch virus or Trojan horse is eliminated.
In contrast to the method for acquiring information of repairing a vulnerability provided in the embodiment of the present application, an embodiment of the present application further provides a patch processing system, as shown in fig. 6, including:
and an image creating unit 100 for creating an image of the business system.
And a fixing unit 200 for fixing the bug of the image by using the patch.
The recording unit 300 is configured to record information, where the information is parameters of a process running in the image and/or the image, and information of a change caused by a patch repair vulnerability.
The specific implementation manner of the recording unit 300 for recording information includes: and recording the corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and the patch generated by the changed information.
The storage unit 400 is used for downloading and storing the patch from a preset patch library.
And the retrieval unit 500 is configured to display information of the patch matched with the retrieval information based on the retrieval information.
The fixing unit 200 is further configured to search for the bug of the image, search for a target patch from the patches, where the target patch is a patch for fixing the bug, and fix the bug of the image by using the target patch.
A detecting unit 600 is configured to detect security of the patch.
And the repairing unit 200 is further configured to repair the vulnerability of the image by using the patch that passes the security detection.
In the embodiment of the application, the mirror image of the service system is established, the patch is used for repairing the vulnerability of the mirror image, and information is recorded, wherein the information is the information of the process running in the mirror image and/or the parameter of the mirror image and the change caused by the patch repairing vulnerability. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
The functions described in the methods of the embodiments of the present application, if implemented in the form of software functional units and sold or used as independent products, may be stored in a storage medium readable by a computing device. Based on such understanding, part of the contribution to the prior art of the embodiments of the present application or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (9)
1. A method for acquiring information of repairing a vulnerability is characterized by comprising the following steps:
establishing a mirror image of a service system;
repairing the vulnerability of the image by using a patch;
recording information, wherein the information is information of a process running in the mirror image, parameters of the mirror image and changes caused by the patch repairing the vulnerability;
the information of the change caused by the patch repairing the bug in the process running in the mirror image is specifically: after the patch is used for repairing the vulnerability of the mirror image, information for indicating the change is generated because the running process in the mirror image is changed;
the parameters of the image, the changed information caused by the patch repairing the vulnerability, are specifically: after the patch is used for repairing the vulnerability of the mirror image, the information for indicating the change is generated because the parameters in the mirror image are changed;
the recording information includes:
and recording the corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and the patch generated by the changed information.
2. The method of claim 1, further comprising, prior to the fixing the vulnerability of the image using the patch:
and downloading and storing the patch from a preset patch library.
3. The method of claim 2, further comprising:
and displaying the information of the patch matched with the retrieval information based on the retrieval information.
4. The method of claim 2, wherein the fixing the vulnerability of the image using the patch comprises:
searching for the vulnerability of the mirror image;
searching a target patch from the patch, wherein the target patch is used for repairing the vulnerability;
and repairing the vulnerability of the image by using the target patch.
5. The method of claim 1, further comprising, prior to the fixing the mirrored vulnerability using a patch:
detecting the security of the patch;
the using the patch to repair the bug of the image comprises:
and repairing the vulnerability of the image by using the patch passing the security detection.
6. A patch processing system, comprising:
the mirror image creating unit is used for creating a mirror image of the service system;
a fixing unit, configured to fix the bug of the image using a patch;
a recording unit, configured to record information, where the information is information of a process running in the image and a parameter of the image, and is changed due to the patch repairing the vulnerability;
the process running in the image, the information of the change caused by the patch repairing the bug, specifically is: after the patch is used for repairing the vulnerability of the mirror image, because the running process in the mirror image is changed, information for indicating the change is generated;
the parameters of the image, the changed information caused by the patch repairing the vulnerability, are specifically: after the patch is used for repairing the vulnerability of the mirror image, the information for indicating the change is generated because the parameters in the mirror image are changed;
the recording information includes:
and recording a corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and a patch generated by the changed information.
7. The system of claim 6, further comprising: and the storage unit is used for downloading and storing the patch from a preset patch library.
8. The system of claim 6, further comprising: and the retrieval unit is used for displaying the information of the patch matched with the retrieval information based on the retrieval information.
9. The system of claim 6, further comprising: and the detection unit is used for detecting the safety of the patch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911065582.0A CN110807198B (en) | 2019-11-04 | 2019-11-04 | Method for acquiring information for repairing bugs and patch processing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911065582.0A CN110807198B (en) | 2019-11-04 | 2019-11-04 | Method for acquiring information for repairing bugs and patch processing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110807198A CN110807198A (en) | 2020-02-18 |
CN110807198B true CN110807198B (en) | 2022-09-23 |
Family
ID=69501152
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911065582.0A Active CN110807198B (en) | 2019-11-04 | 2019-11-04 | Method for acquiring information for repairing bugs and patch processing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110807198B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189349A (en) * | 2021-10-19 | 2022-03-15 | 广东南方通信建设有限公司 | Safety monitoring and early warning platform, safety monitoring and early warning method and storage medium |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103955380A (en) * | 2011-03-02 | 2014-07-30 | 北京奇虎科技有限公司 | Patch treatment method |
CN103457974A (en) * | 2012-06-01 | 2013-12-18 | 中兴通讯股份有限公司 | Safety control method and device for virtual machine mirror images |
US20140380292A1 (en) * | 2013-06-25 | 2014-12-25 | Xiaomi Inc. | Method, device, and storage medium for upgrading operating system |
CN103744709B (en) * | 2014-01-23 | 2017-02-15 | 华为技术有限公司 | patch loading method and device |
CN103927484B (en) * | 2014-04-21 | 2017-03-08 | 西安电子科技大学宁波信息技术研究院 | Rogue program behavior catching method based on Qemu simulator |
CN105589721A (en) * | 2015-12-22 | 2016-05-18 | 国云科技股份有限公司 | Method for batch updating system patches of Linux virtual machine |
CN105912931A (en) * | 2016-05-23 | 2016-08-31 | 北京北信源软件股份有限公司 | Method and system for repairing off-line virtual machine bug under virtualization environment |
US10402569B2 (en) * | 2016-10-20 | 2019-09-03 | International Business Machines Corporation | Code package processing |
CN107704309A (en) * | 2017-09-21 | 2018-02-16 | 中智关爱通(上海)科技股份有限公司 | The method and system of standardization running environment are built based on Docker |
CN109933408A (en) * | 2019-03-15 | 2019-06-25 | 山东浪潮云信息技术有限公司 | A kind of device and method of virtual machine image automated production under cloud computing environment |
-
2019
- 2019-11-04 CN CN201911065582.0A patent/CN110807198B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110807198A (en) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108092962B (en) | Malicious URL detection method and device | |
KR101161493B1 (en) | Method of Examining Malicious Codes and Dangerous Files in Android Terminal Platform | |
US9953162B2 (en) | Rapid malware inspection of mobile applications | |
EP2667314B1 (en) | System and method for detection and treatment of malware on data storage devices | |
US10943015B2 (en) | Continuous monitoring for detecting firmware threats | |
CN109918285B (en) | Security identification method and device for open source software | |
US9134996B2 (en) | Updating anti-virus software | |
EP1986120A1 (en) | Systems, apparatus, and methods for detecting malware | |
TW201629832A (en) | Method and device for identifying computer virus variants | |
CN109074448B (en) | Detection of a deviation of a safety state of a computing device from a nominal safety state | |
CN110806978A (en) | Defect management method and device for third-party component | |
CN110929259A (en) | Process security verification white list generation method and device | |
EP2754079B1 (en) | Malware risk scanner | |
CN110807198B (en) | Method for acquiring information for repairing bugs and patch processing system | |
JP2016099857A (en) | Fraudulent program handling system and fraudulent program handling method | |
US20230185921A1 (en) | Prioritizing vulnerabilities | |
CN111859399A (en) | Vulnerability detection method and device based on oval | |
CN105791250A (en) | Application detection method and device | |
US9686310B2 (en) | Method and apparatus for repairing a file | |
KR20120078017A (en) | Cloud computing-based system for supporting analysis of malicious code and analyst terminal using the same | |
JP6169497B2 (en) | Connection destination information determination device, connection destination information determination method, and program | |
CN110941825B (en) | Application monitoring method and device | |
CN112560030A (en) | File monitoring method and device, electronic equipment and computer readable storage medium | |
CN106407815A (en) | Vulnerability detection method and device | |
JP6885255B2 (en) | Flow generation program, flow generation device and flow generation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |