CN110807198B - Method for acquiring information for repairing bugs and patch processing system - Google Patents

Method for acquiring information for repairing bugs and patch processing system Download PDF

Info

Publication number
CN110807198B
CN110807198B CN201911065582.0A CN201911065582A CN110807198B CN 110807198 B CN110807198 B CN 110807198B CN 201911065582 A CN201911065582 A CN 201911065582A CN 110807198 B CN110807198 B CN 110807198B
Authority
CN
China
Prior art keywords
patch
information
vulnerability
repairing
mirror image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911065582.0A
Other languages
Chinese (zh)
Other versions
CN110807198A (en
Inventor
孙鹏飞
邹帮山
秦旭果
王照文
王光强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Yillion Bank Co ltd
Original Assignee
Jilin Yillion Bank Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Yillion Bank Co ltd filed Critical Jilin Yillion Bank Co ltd
Priority to CN201911065582.0A priority Critical patent/CN110807198B/en
Publication of CN110807198A publication Critical patent/CN110807198A/en
Application granted granted Critical
Publication of CN110807198B publication Critical patent/CN110807198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Abstract

The application provides a method for acquiring vulnerability repair information and a patch processing system, which are used for repairing the vulnerability of a mirror image by establishing the mirror image of a service system and using a patch, and recording information, wherein the information is the information of a process running in the mirror image and/or the parameters of the mirror image and the change caused by repairing the vulnerability by the patch. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.

Description

Method for acquiring information for repairing bugs and patch processing system
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method for acquiring information for repairing a vulnerability and a patch processing system.
Background
At present, in order to improve the security of a business system, many enterprises can carry out system vulnerability scanning on the business system and use patch upgrading on discovered system vulnerabilities.
Because the patch is used to repair the bug, the influence on the business system is unknown, and therefore, the operation risk of the business system is increased.
Disclosure of Invention
The application provides an acquisition method of bug fixing information and a patch processing system, and aims to solve the problem that the influence on a service system caused by using a patch to fix a bug cannot be predicted.
In order to achieve the above object, the present application provides the following technical solutions:
a method for acquiring information of repairing a vulnerability includes:
establishing a mirror image of a service system;
repairing the vulnerability of the image by using a patch;
and recording information, wherein the information is the information of the process running in the mirror image and/or the parameters of the mirror image and the change caused by the patch repairing the vulnerability.
Optionally, in the method for obtaining information of repairing a vulnerability, before the using a patch to repair the vulnerability of the image, the method further includes:
and downloading and storing the patch from a preset patch library.
Optionally, in the method for obtaining information of repairing a vulnerability, the method further includes:
and displaying the information of the patch matched with the retrieval information based on the retrieval information.
Optionally, the using the patch to repair the bug of the image includes:
searching for the vulnerability of the mirror image;
searching a target patch from the patches, wherein the target patch is a patch for repairing the vulnerability;
and repairing the vulnerability of the image by using the target patch.
Optionally, in the method for obtaining information of repairing a vulnerability, before the using a patch to repair the vulnerability of the image, the method further includes:
detecting the security of the patch;
the using the patch to fix the bug of the image includes:
and repairing the vulnerability of the image by using the patch passing the security detection.
Optionally, in the method for acquiring information of repairing the vulnerability, the recording information includes:
and recording the corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and the patch generated by the changed information.
A patch processing system, comprising:
the mirror image creating unit is used for creating a mirror image of the service system;
a repairing unit, configured to repair a bug of the image using a patch;
and the recording unit is used for recording information, wherein the information is information of a process running in the mirror image and/or parameters of the mirror image, and the change information is caused by the patch repairing the vulnerability.
Optionally, in the patch processing system, the patch processing system further includes: and the storage unit is used for downloading and storing the patch from a preset patch library.
Optionally, in the patch processing system, the patch processing system further includes: and the retrieval unit is used for displaying the information of the patch matched with the retrieval information based on the retrieval information.
Optionally, in the patch processing system, the patch processing system further includes: and the detection unit is used for detecting the safety of the patch.
According to the method for acquiring the information for repairing the bug and the patch processing system, the bug of the image is repaired by the patch by establishing the image of the service system, and the information is recorded, wherein the information is the information of the change caused by the bug repair by the patch, and is the information of the process running in the image and/or the parameter of the image. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an obtaining method for bug repair information according to an embodiment of the present application;
fig. 2 is a schematic diagram of another method for acquiring information for repairing a vulnerability, provided by an embodiment of the present application;
fig. 3 is a schematic diagram of another method for acquiring information for repairing a vulnerability, provided in an embodiment of the present application;
fig. 4 is a schematic diagram of another method for acquiring information of repairing a vulnerability, provided in the embodiment of the present application;
fig. 5 is a schematic diagram of another method for acquiring information for repairing a vulnerability, provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a patch processing system according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As can be seen from the background art, in the prior art, the effect on the service system cannot be predicted because a patch is used to fix a bug. Therefore, the embodiment of the application provides an obtaining method of information for repairing a vulnerability, which is used for obtaining the information for repairing the vulnerability after the vulnerability is repaired by using a patch, and the information can help a user to know the influence of the repaired patch on a service system, so that the operation risk of the service system is effectively avoided. In the following embodiments, the patch may be a hot patch or other patches, which are hereinafter referred to as patches.
As shown in fig. 1, a schematic diagram of an obtaining method for bug repair information provided in an embodiment of the present application includes the following steps:
s101: and establishing a mirror image of the service system.
The mirror image of the service system is used for simulating a real service system, so that the influence of using a patch to repair a bug on the service system is tested in a real service environment.
It should be noted that, in the process of creating the mirror image of the business system, the parameter of the business system is copied and used, so as to create the mirror image of the business system. Specific parameters include, but are not limited to: parameters such as a start parameter (indicating whether the service system is restarted), a configuration parameter (indicating the configuration requirements of software and hardware of the service system), and an installation environment parameter (indicating the installation environment required by the service system), and specific parameters can be set by technicians according to actual conditions.
S102: and repairing the vulnerability of the image by using the patch.
The patching of the bug of the image by using the patch is substantially a simulation of patching the bug of the service system by using the patch, and certainly, patching the bug of the service system by using the patch is common knowledge familiar to those skilled in the art, and is not described herein again.
S103: information is recorded.
The information is the parameters of the process running in the mirror image and/or the mirror image, and the changed information caused by the patch repair vulnerability. The processes running in the image include at least any one of a system process and an application process.
It should be noted that, for a process running in an image, the information of the change caused by a patch repair bug specifically refers to: after the patch is used to repair the vulnerability, the running process in the image is changed, so that information indicating the change is generated, for example, when the firewall process is originally running, and when the firewall process is suspended after the patch is used to repair the vulnerability, the information indicating that the firewall is suspended within the time of repairing the vulnerability is generated.
Parameters in the image, the changed information caused by patch repair vulnerabilities specifically refer to: after the patch is used to repair the bug, the parameter in the image is changed, so that information for indicating the change is generated, for example, the starting parameter originally indicates that the service system does not need to be restarted, and when the patch is used to repair the bug and the service system is restarted, the information for indicating that the service system is restarted after the bug is repaired is generated.
It should be emphasized that, in the embodiment of the present application, the recorded information may be stored in the preset information base, and the patch downloaded locally may be stored in the preset patch base, so that the recorded information and the patch corresponding to the information can be queried.
Optionally, in addition to recording the information, in the embodiment of the present application, a corresponding relationship is further recorded, where the corresponding relationship includes any piece of changed information and a corresponding relationship of a patch that is generated by the changed information.
Therefore, based on the corresponding relation, the parameters of the process and/or the image which cause the operation in the image can be searched, and the changed patch can be generated.
In the embodiment of the application, the mirror image of the service system is established, the patch is used for repairing the vulnerability of the mirror image, and information is recorded, wherein the information is the parameters of the process running in the mirror image and/or the mirror image, and the information is changed due to the patch repairing vulnerability. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
Optionally, as shown in fig. 2, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s201: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S201 are consistent with the specific implementation process and implementation principle of S101 shown in fig. 1, and are not described herein again.
S202: and downloading and storing the patch from a preset patch library.
The patch includes but is not limited to a hot patch and other patch types, and the hot patch specifically refers to: and generating the patch with the time length not exceeding the preset time length, wherein the preset time length is set by technical personnel according to the actual situation, in other words, the patch is updated recently by a patch release channel of the Internet.
It should be noted that, in the embodiment of the present application, a patch may be downloaded from a patch library of a patch distribution website through an internet channel, and the downloaded patch is stored in a local patch library.
S203: and repairing the vulnerability of the image by using the patch.
The specific implementation process and implementation principle of S203 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S204: information is recorded.
The specific implementation process and implementation principle of S204 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
In the embodiment of the application, a mirror image of a service system is established, a patch is downloaded and stored from a preset patch library, the patch is used for repairing the vulnerability of the mirror image, and information is recorded, wherein the information is the information of a process running in the mirror image and/or the parameter of the mirror image and the change caused by the patch repairing the vulnerability. Therefore, the patch is downloaded and stored through the patch library, the patch used for repairing the bug is upgraded, and the quality of repairing the bug is ensured.
Optionally, as shown in fig. 3, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s301: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S301 are consistent with the specific implementation process and implementation principle of S101 shown in fig. 1, and are not described herein again.
S302: and downloading and storing the patch from a preset patch library.
The specific implementation process and implementation principle of S302 are consistent with the specific implementation process and implementation principle of S202 shown in fig. 2, and are not described herein again.
S303: and repairing the vulnerability of the image by using the patch.
The specific implementation process and implementation principle of S303 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S304: information is recorded.
The specific implementation process and implementation principle of S304 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
S305: and displaying the information of the patch matched with the retrieval information based on the retrieval information.
The information of the patch includes, but is not limited to, the name of the patch, the release time of the patch, and the number of the patch. In the embodiment of the present application, an fuzzy search method may be adopted, and search information (for example, the name of a patch) is input, so as to find the patch in the local patch library. Of course, other patch search methods may be used to search for a patch, and the embodiment of the present application is not limited.
In the embodiment of the application, a mirror image of a service system is established, a patch is downloaded and stored from a preset patch library, the patch is used for repairing a bug of the mirror image, and information is recorded, wherein the information is a process running in the mirror image and/or parameters of the mirror image. And moreover, based on the retrieval information, displaying the information of the patch matched with the retrieval information. Therefore, the information of the patch matched with the retrieval information can be obtained locally through the retrieval information, the time for manually searching the patch is reduced, and the patch with adverse effect on a business system is conveniently searched.
Optionally, as shown in fig. 4, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s401: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S401 are consistent with those of S101 shown in fig. 1, and are not described herein again
S402: and downloading and storing the patch from a preset patch library.
The specific implementation process and implementation principle of S402 are consistent with the specific implementation process and implementation principle of S202 shown in fig. 2, and are not described herein again.
S403: and searching for the vulnerability of the mirror image.
The process of finding a vulnerability of a mirror image is the same as the process of finding a vulnerability of a business system, and is common knowledge familiar to those skilled in the art, and is not described herein again.
S404: and searching the target patch from the patch.
Wherein the target patch is a patch for repairing the vulnerability.
S405: and repairing the vulnerability of the image by using the target patch.
The specific implementation process and implementation principle of S405 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S406: information is recorded.
The specific implementation process and implementation principle of S406 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
In the embodiment of the application, the patch is downloaded and stored from a preset patch library by establishing the mirror image of the service system. And searching the vulnerability of the mirror image, searching a target patch from the patch, and repairing the vulnerability of the mirror image by using the target patch. And recording information, wherein the information is the information of the process running in the mirror image and/or the parameters of the mirror image and the change caused by the patch repair vulnerability. And downloading and storing the patch through the patch library, and selecting a proper patch to repair the patch based on the searched bug of the mirror image, thereby simulating the influence caused by using the patch to repair the bug of the real service system.
Optionally, as shown in fig. 5, a schematic diagram of another method for acquiring information of repairing a vulnerability provided in the embodiment of the present application includes the following steps:
s501: and establishing a mirror image of the service system.
The specific implementation process and implementation principle of S501 are consistent with the specific implementation process and implementation principle of S101 shown in fig. 1, and are not described herein again.
S502: the security of the patch is detected.
The security of the patch stored locally or downloaded from the patch library can be detected by adopting a virus killing or Trojan horse detection mode. If there is a patch whose security is extremely dangerous, the patch is deleted.
S503: and repairing the vulnerability of the image by using the patch passing the security detection.
The specific implementation process and implementation principle of S503 are consistent with the specific implementation process and implementation principle of S102 shown in fig. 1, and are not described herein again.
S504: information is recorded.
The specific implementation process and implementation principle of S504 are consistent with the specific implementation process and implementation principle of S103 shown in fig. 1, and are not described herein again.
In the embodiment of the application, the security of the patch is detected by establishing the mirror image of the service system, and the loophole of the mirror image is repaired by using the patch passing the security detection. And recording information, wherein the information is the parameters of the process and/or the mirror image running in the mirror image and the changed information caused by the patch repair vulnerability. Therefore, the security of the patch is detected, the patch passing the security detection is used for repairing the vulnerability, and the influence on the business system caused by the patch virus or Trojan horse is eliminated.
In contrast to the method for acquiring information of repairing a vulnerability provided in the embodiment of the present application, an embodiment of the present application further provides a patch processing system, as shown in fig. 6, including:
and an image creating unit 100 for creating an image of the business system.
And a fixing unit 200 for fixing the bug of the image by using the patch.
The recording unit 300 is configured to record information, where the information is parameters of a process running in the image and/or the image, and information of a change caused by a patch repair vulnerability.
The specific implementation manner of the recording unit 300 for recording information includes: and recording the corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and the patch generated by the changed information.
The storage unit 400 is used for downloading and storing the patch from a preset patch library.
And the retrieval unit 500 is configured to display information of the patch matched with the retrieval information based on the retrieval information.
The fixing unit 200 is further configured to search for the bug of the image, search for a target patch from the patches, where the target patch is a patch for fixing the bug, and fix the bug of the image by using the target patch.
A detecting unit 600 is configured to detect security of the patch.
And the repairing unit 200 is further configured to repair the vulnerability of the image by using the patch that passes the security detection.
In the embodiment of the application, the mirror image of the service system is established, the patch is used for repairing the vulnerability of the mirror image, and information is recorded, wherein the information is the information of the process running in the mirror image and/or the parameter of the mirror image and the change caused by the patch repairing vulnerability. Therefore, the patch is used in the mirror image of the service system to repair the vulnerability, the process of using the patch to repair the vulnerability in the service system is truly simulated, the change of the running process in the mirror image and the parameter of the mirror image is obtained from the recorded information, and the influence on the service system caused by using the patch to repair the vulnerability is further determined.
The functions described in the methods of the embodiments of the present application, if implemented in the form of software functional units and sold or used as independent products, may be stored in a storage medium readable by a computing device. Based on such understanding, part of the contribution to the prior art of the embodiments of the present application or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A method for acquiring information of repairing a vulnerability is characterized by comprising the following steps:
establishing a mirror image of a service system;
repairing the vulnerability of the image by using a patch;
recording information, wherein the information is information of a process running in the mirror image, parameters of the mirror image and changes caused by the patch repairing the vulnerability;
the information of the change caused by the patch repairing the bug in the process running in the mirror image is specifically: after the patch is used for repairing the vulnerability of the mirror image, information for indicating the change is generated because the running process in the mirror image is changed;
the parameters of the image, the changed information caused by the patch repairing the vulnerability, are specifically: after the patch is used for repairing the vulnerability of the mirror image, the information for indicating the change is generated because the parameters in the mirror image are changed;
the recording information includes:
and recording the corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and the patch generated by the changed information.
2. The method of claim 1, further comprising, prior to the fixing the vulnerability of the image using the patch:
and downloading and storing the patch from a preset patch library.
3. The method of claim 2, further comprising:
and displaying the information of the patch matched with the retrieval information based on the retrieval information.
4. The method of claim 2, wherein the fixing the vulnerability of the image using the patch comprises:
searching for the vulnerability of the mirror image;
searching a target patch from the patch, wherein the target patch is used for repairing the vulnerability;
and repairing the vulnerability of the image by using the target patch.
5. The method of claim 1, further comprising, prior to the fixing the mirrored vulnerability using a patch:
detecting the security of the patch;
the using the patch to repair the bug of the image comprises:
and repairing the vulnerability of the image by using the patch passing the security detection.
6. A patch processing system, comprising:
the mirror image creating unit is used for creating a mirror image of the service system;
a fixing unit, configured to fix the bug of the image using a patch;
a recording unit, configured to record information, where the information is information of a process running in the image and a parameter of the image, and is changed due to the patch repairing the vulnerability;
the process running in the image, the information of the change caused by the patch repairing the bug, specifically is: after the patch is used for repairing the vulnerability of the mirror image, because the running process in the mirror image is changed, information for indicating the change is generated;
the parameters of the image, the changed information caused by the patch repairing the vulnerability, are specifically: after the patch is used for repairing the vulnerability of the mirror image, the information for indicating the change is generated because the parameters in the mirror image are changed;
the recording information includes:
and recording a corresponding relation, wherein the corresponding relation comprises the corresponding relation of any piece of changed information and a patch generated by the changed information.
7. The system of claim 6, further comprising: and the storage unit is used for downloading and storing the patch from a preset patch library.
8. The system of claim 6, further comprising: and the retrieval unit is used for displaying the information of the patch matched with the retrieval information based on the retrieval information.
9. The system of claim 6, further comprising: and the detection unit is used for detecting the safety of the patch.
CN201911065582.0A 2019-11-04 2019-11-04 Method for acquiring information for repairing bugs and patch processing system Active CN110807198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911065582.0A CN110807198B (en) 2019-11-04 2019-11-04 Method for acquiring information for repairing bugs and patch processing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911065582.0A CN110807198B (en) 2019-11-04 2019-11-04 Method for acquiring information for repairing bugs and patch processing system

Publications (2)

Publication Number Publication Date
CN110807198A CN110807198A (en) 2020-02-18
CN110807198B true CN110807198B (en) 2022-09-23

Family

ID=69501152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911065582.0A Active CN110807198B (en) 2019-11-04 2019-11-04 Method for acquiring information for repairing bugs and patch processing system

Country Status (1)

Country Link
CN (1) CN110807198B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189349A (en) * 2021-10-19 2022-03-15 广东南方通信建设有限公司 Safety monitoring and early warning platform, safety monitoring and early warning method and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955380A (en) * 2011-03-02 2014-07-30 北京奇虎科技有限公司 Patch treatment method
CN103457974A (en) * 2012-06-01 2013-12-18 中兴通讯股份有限公司 Safety control method and device for virtual machine mirror images
US20140380292A1 (en) * 2013-06-25 2014-12-25 Xiaomi Inc. Method, device, and storage medium for upgrading operating system
CN103744709B (en) * 2014-01-23 2017-02-15 华为技术有限公司 patch loading method and device
CN103927484B (en) * 2014-04-21 2017-03-08 西安电子科技大学宁波信息技术研究院 Rogue program behavior catching method based on Qemu simulator
CN105589721A (en) * 2015-12-22 2016-05-18 国云科技股份有限公司 Method for batch updating system patches of Linux virtual machine
CN105912931A (en) * 2016-05-23 2016-08-31 北京北信源软件股份有限公司 Method and system for repairing off-line virtual machine bug under virtualization environment
US10402569B2 (en) * 2016-10-20 2019-09-03 International Business Machines Corporation Code package processing
CN107704309A (en) * 2017-09-21 2018-02-16 中智关爱通(上海)科技股份有限公司 The method and system of standardization running environment are built based on Docker
CN109933408A (en) * 2019-03-15 2019-06-25 山东浪潮云信息技术有限公司 A kind of device and method of virtual machine image automated production under cloud computing environment

Also Published As

Publication number Publication date
CN110807198A (en) 2020-02-18

Similar Documents

Publication Publication Date Title
CN108092962B (en) Malicious URL detection method and device
KR101161493B1 (en) Method of Examining Malicious Codes and Dangerous Files in Android Terminal Platform
US9953162B2 (en) Rapid malware inspection of mobile applications
EP2667314B1 (en) System and method for detection and treatment of malware on data storage devices
US10943015B2 (en) Continuous monitoring for detecting firmware threats
CN109918285B (en) Security identification method and device for open source software
US9134996B2 (en) Updating anti-virus software
EP1986120A1 (en) Systems, apparatus, and methods for detecting malware
TW201629832A (en) Method and device for identifying computer virus variants
CN109074448B (en) Detection of a deviation of a safety state of a computing device from a nominal safety state
CN110806978A (en) Defect management method and device for third-party component
CN110929259A (en) Process security verification white list generation method and device
EP2754079B1 (en) Malware risk scanner
CN110807198B (en) Method for acquiring information for repairing bugs and patch processing system
JP2016099857A (en) Fraudulent program handling system and fraudulent program handling method
US20230185921A1 (en) Prioritizing vulnerabilities
CN111859399A (en) Vulnerability detection method and device based on oval
CN105791250A (en) Application detection method and device
US9686310B2 (en) Method and apparatus for repairing a file
KR20120078017A (en) Cloud computing-based system for supporting analysis of malicious code and analyst terminal using the same
JP6169497B2 (en) Connection destination information determination device, connection destination information determination method, and program
CN110941825B (en) Application monitoring method and device
CN112560030A (en) File monitoring method and device, electronic equipment and computer readable storage medium
CN106407815A (en) Vulnerability detection method and device
JP6885255B2 (en) Flow generation program, flow generation device and flow generation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant