CN110968503A - Code scanning system and method and plug-in - Google Patents

Code scanning system and method and plug-in Download PDF

Info

Publication number
CN110968503A
CN110968503A CN201911075035.0A CN201911075035A CN110968503A CN 110968503 A CN110968503 A CN 110968503A CN 201911075035 A CN201911075035 A CN 201911075035A CN 110968503 A CN110968503 A CN 110968503A
Authority
CN
China
Prior art keywords
code scanning
terminal
plug
rule
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911075035.0A
Other languages
Chinese (zh)
Inventor
高诗林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN201911075035.0A priority Critical patent/CN110968503A/en
Publication of CN110968503A publication Critical patent/CN110968503A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/366Software debugging using diagnostics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The application discloses a code scanning system, a method and a plug-in thereof. The system comprises a terminal and a server, wherein the terminal comprises a plug-in; the server is used for maintaining code scanning rules and providing subscription for the terminal; and the plug-in is used for dynamically loading a code scanning rule obtained from the server subscription and scanning the codes in the terminal by using the code scanning rule.

Description

Code scanning system and method and plug-in
Technical Field
The present description relates to the field of computer technology.
Background
The use of code scanning technology has become more and more popular, and in the current code scanning scheme, a mode that a plug-in is provided with a code scanning rule packet is generally adopted, so that a user cannot select the code scanning rule packet, and therefore the user cannot obtain the latest code scanning rule in time and cannot specify the code scanning rule required by the user.
Disclosure of Invention
The present specification provides a code scanning system, a method thereof, and a plug-in, which enable a user to subscribe to a code scanning rule required by the user, and to get an update in time when scanning is initiated, and use of the latest code scanning rule helps the user to find out a code defect in time.
The application discloses a code scanning system, which comprises a terminal and a server, wherein the terminal comprises a plug-in;
the server is used for maintaining code scanning rules and providing subscription for the terminal;
and the plug-in is used for dynamically loading a code scanning rule obtained from the server subscription and scanning the codes in the terminal by using the code scanning rule.
In a preferred embodiment, the plug-in includes a loader engine, a plurality of scanners, and a result integration module, where each scanner corresponds to a different code scanning rule;
the loader engine is used for loading the code scanning rules, distinguishing the types of the code scanning rules, converting each different code scanning rule into a preset format and then respectively loading the preset format into the corresponding scanners;
each scanner is respectively used for scanning the code by using a code scanning rule loaded by the scanner;
the result integration module is used for merging and integrating the scanning results of the plurality of scanners and then outputting the scanning results.
In a preferred embodiment, the type of the code scanning rule includes one of the following or any combination thereof: pmd rule, groovy rule, jar rule.
In a preferred embodiment, the terminal further includes a memory for storing a key, the key including encrypted user identity information and information of the terminal;
the plug-in comprises an authentication module used for verifying the legality of the terminal according to the information of the terminal in the key, and sending the key to the server side, so that the server side can verify the legality of the user according to the user identity information in the key.
In a preferred embodiment, the plug-in further includes a key generation module, configured to generate a key according to the user identity information of the login user and the terminal information of the current terminal after logging in the server, and store the key in the memory.
In a preferred embodiment, the terminal information includes one of the following or any combination thereof:
MAC address, hard disk serial number, processor serial number, mainboard serial number.
In a preferred embodiment, the terminal further includes a browser, configured to log in to the server and subscribe to the code scanning rule.
In a preferred embodiment, the plug-in is installed in an integrated development environment in the terminal, and is used for scanning codes in the integrated development environment.
The application also discloses a code scanning method, which comprises the following steps:
a plug-in on the terminal acquires a code scanning rule from a server through subscription;
the plug-in dynamically loads a code scanning rule from the server;
and the plug-in uses the code scanning rule to scan the codes in the terminal.
In a preferred example, the plug-in includes a plurality of scanners, each scanner corresponds to a different code scanning rule;
the plug-in dynamically loads the code scanning rule from the server, and further comprises: the plug-in distinguishes the types of the code scanning rules, converts each different code scanning rule into a preset format and then loads the preset format into the corresponding scanner; each scanner scans the code by using a code scanning rule loaded by the scanner; and the plug-in integrates the scanning results of the plurality of scanners and outputs the integrated scanning results.
In a preferred embodiment, the type of the code scanning rule includes one of the following or any combination thereof: pmd rule, groovy rule, jar rule.
In a preferred embodiment, before the plug-in on the terminal acquires the code scanning rule from the server through the subscription, the method further includes:
when the plug-in logs in the server for the first time or changes the login user, after the login is successful, a key is generated according to the user identity information of the login user and the terminal information of the current terminal and is stored in the terminal, wherein the key comprises the encrypted user identity information and the encrypted terminal information.
In a preferred embodiment, before the plug-in on the terminal acquires the code scanning rule from the server through the subscription, the method further includes:
and the plug-in verifies the legality of the terminal according to the information of the terminal in the key, and sends the key to the server, so that the server side can verify the legality of the user according to the user identity information in the key.
In a preferred embodiment, the terminal information includes one of the following or any combination thereof:
MAC address, hard disk serial number, processor serial number, mainboard serial number.
In a preferred embodiment, before the plug-in on the terminal acquires the code scanning rule from the server through the subscription, the method further includes:
and the browser on the terminal logs in the server and subscribes the code scanning rule.
In a preferred embodiment, the plug-in is installed in an integrated development environment in the terminal, and is used for scanning codes in the integrated development environment.
The present application also discloses a code scanning system, comprising:
a memory for storing computer executable instructions; and the number of the first and second groups,
a processor, coupled with the memory, for implementing the steps in the method as described above when executing the computer-executable instructions.
The present application also discloses a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, implement the steps in the method as described above.
In the embodiment of the specification, a code scanning rule of common subscription is maintained at a server, a plug-in is arranged in a terminal, a latest code scanning rule is obtained through subscription to the server, and codes in the terminal are scanned after dynamic loading, so that a user can subscribe a rule required by the user and timely obtain update when scanning is initiated, and the latest rule is helpful for the user to timely find out a code defect.
Furthermore, the code scanning rules obtained by subscription can contain various types of rules, the rules obtained by subscription can be classified during dynamic loading, the rules of different types can be loaded to different scanners in the plug-in, each scanner respectively scans the same code, the code scanning results are collected and combined, and the codes are output after the repetition is removed. In this way, different types of code scanning rules can be supported in one plug-in, and the code can be checked more thoroughly.
A large number of technical features are described in the specification, and are distributed in various technical solutions, so that the specification is too long if all possible combinations of the technical features (namely, the technical solutions) in the application are listed. In order to avoid this problem, the respective technical features disclosed in the above summary of the invention of the present specification, the respective technical features disclosed in the following embodiments and examples, and the respective technical features disclosed in the drawings may be freely combined with each other to constitute various new technical solutions (which should be regarded as having been described in the present specification) unless such a combination of the technical features is technically impossible. For example, in one example, the feature a + B + C is disclosed, in another example, the feature a + B + D + E is disclosed, and the features C and D are equivalent technical means for the same purpose, and technically only one feature is used, but not simultaneously employed, and the feature E can be technically combined with the feature C, then the solution of a + B + C + D should not be considered as being described because the technology is not feasible, and the solution of a + B + C + E should be considered as being described.
Drawings
FIG. 1 is a schematic block diagram of a code scanning system according to a first embodiment of the present description;
fig. 2 is a flowchart illustrating a code scanning method according to a second embodiment of the present specification.
Detailed Description
In the following description, numerous technical details are set forth in order to provide a better understanding of the present application. However, it will be understood by those skilled in the art that the technical solutions claimed in the present application may be implemented without these technical details and with various changes and modifications based on the following embodiments.
Description of partial concepts:
the server side: the term "server" or "cloud" refers to a computer system that can provide services to other devices in a network. The objects served by the server are generally called terminals or clients, and the server and the terminals can be connected in a wired or wireless communication mode. The implementation manner of the server is various, and may be a single computer device, or may be a combination of multiple computer devices (e.g., a cluster server, a cloud server, etc.).
A terminal: a terminal device is a device located at the outermost periphery of a computer network or a communication network, and is mainly used for inputting user information and outputting a processing result. Besides the input and output functions, the terminal can also perform certain operations and processing to realize partial system functions. The terminal may be, for example, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart watch, a smart bracelet, a television, a projector with input function, a Personal Digital Assistant (PDA), and the like.
IDE: an Integrated Development Environment.
Embodiments of the present description will be described in further detail below with reference to the accompanying drawings.
A first embodiment of the present specification relates to a code scanning system, whose structure is shown in fig. 1, and includes a terminal and a server, where the terminal includes a plug-in, specifically:
and the server is used for maintaining the code scanning rule and providing the terminal with subscription.
And the plug-in is used for dynamically loading a code scanning rule obtained from the server subscription and scanning the codes in the terminal by using the code scanning rule.
The following explains the server in detail:
optionally, in an embodiment of the present specification, the type of the code scanning rule maintained by the server may be one of the following or any combination thereof: pmd rule, groovy rule, jar rule. These three rules are all the existing code scanning rules in the industry, and are not themselves the innovation of the present invention, and will not be described in detail here. Those skilled in the art will appreciate that other types of code scanning rules may be included, even code scanning rules that are customized within a team.
The following explains the plug-in detail:
optionally, in an embodiment, the plug-in is installed in an integrated development environment in the terminal, and is used for scanning codes in the integrated development environment.
Optionally, in an embodiment, the plug-in further includes a loader engine, a plurality of scanners, and a result integration module. Wherein, each scanner respectively corresponds to a different code scanning rule. Specifically, the loader engine is configured to load the code scanning rules, distinguish types of the code scanning rules, convert each different code scanning rule into a predetermined format, and load the converted code scanning rules into corresponding scanners respectively; each scanner is respectively used for scanning the code by using a code scanning rule loaded by the scanner; the result integration module is used for merging and integrating the scanning results of the plurality of scanners and then outputting the scanning results.
Optionally, in an embodiment, the plug-in may have only one scanner, in which case there is no need to distinguish the type of code scan rule.
Optionally, in an embodiment of the present specification, the terminal further includes a memory for storing a key, where the key includes the encrypted user identity information and the information of the terminal. Correspondingly, the plug-in further comprises an authentication module for verifying the validity of the terminal according to the terminal information in the key, and sending the key to the server, so that the server can verify the validity of the user according to the user identity information in the key.
Optionally, in an embodiment, the terminal further includes a browser, configured to log in the server and subscribe to the code scanning rule.
Further optionally, the plug-in further includes a key generation module, configured to generate a key according to the user identity information of the login user and the terminal information of the current terminal after logging in the server, and store the key in the memory. Wherein, the terminal information includes one of the following or any combination thereof: MAC address, hard disk serial number, processor serial number, mainboard serial number.
In the embodiment, the user can subscribe the required rules and timely get the updates when the scanning is initiated, and the latest rules help the user to timely find the code defects. Furthermore, different types of code scanning rules can be supported in one plug-in, and the code can be checked more thoroughly.
A second embodiment of the present specification relates to a code scanning method, a flow of which is shown in fig. 2, including:
step 110: a plug-in on the terminal acquires a code scanning rule from a server through subscription;
step 120: the plug-in dynamically loads a code scanning rule from the server;
step 130: and the plug-in uses the code scanning rule to scan the codes in the terminal.
Each step is explained in detail below.
For step 110:
optionally, in an embodiment, the plug-in is installed in an integrated development environment in the terminal, and is used for scanning codes in the integrated development environment.
Optionally, in an embodiment of the present specification, the plug-in includes one or more scanners, and each scanner corresponds to a different code scanning rule.
Optionally, in an embodiment of the present specification, the type of the code scanning rule may be one of the following or any combination thereof: pmd rule, groovy rule, jar rule. Alternatively, other types of code scanning rules, even code scanning rules that are customized within a team, are also possible.
Optionally, in an embodiment, step 110 further includes the following steps: and the browser on the terminal logs in the server and subscribes the code scanning rule.
For step 120:
optionally, in an embodiment, the plug-in distinguishes types of the code scanning rules, converts each different code scanning rule into a predetermined format, and then loads the predetermined format into the corresponding scanner; each scanner scans the code by using a code scanning rule loaded by the scanner; and the plug-in integrates the scanning results of the plurality of scanners and outputs the integrated scanning results.
It is noted that in one embodiment, the plug-in may have only one scanner, in which case there is no need to distinguish between the types of code scan rules.
For step 130:
alternatively, in the embodiments of the present specification, the scanned code may be various, such as Java, C #, Python, C + +, and the like.
In addition, optionally, in an embodiment, before step 110, the following steps are further included: when the plug-in logs in the server for the first time or changes the login user, after the login is successful, a key is generated according to the user identity information of the login user and the terminal information of the current terminal and is stored in the terminal, wherein the key comprises the encrypted user identity information and the encrypted terminal information. Correspondingly, the plug-in verifies the legality of the terminal according to the information of the terminal in the key, and sends the key to the server, so that the server side can verify the legality of the user according to the user identity information in the key. Wherein, the terminal information includes one of the following or any combination thereof: MAC address, hard disk serial number, processor serial number, mainboard serial number.
It should be noted that, in one embodiment, the method may be used for software development, and potential problems in the code, such as security holes, performance problems, and ways of using statement errors, may be discovered through code scanning, and the code with these problems often completely conforms to the syntax rules of the programming language used.
This embodiment is a method embodiment corresponding to the first embodiment, and the technical details in the first embodiment may be applied to this embodiment, and the technical details in this embodiment may also be applied to the first embodiment.
It should be noted that those skilled in the art should understand it. The functions of the parts shown in the above-described embodiments of the code scanning system may be implemented by a program (executable instructions) running on a processor, or may be implemented by specific logic circuits. The code scanning system described above in the embodiments of the present disclosure may also be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a stand-alone product. Based on such understanding, the technical solutions of the embodiments of the present specification may be essentially or partially implemented in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present specification. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, or an optical disk. Thus, embodiments of the present description are not limited to any specific combination of hardware and software.
Accordingly, the present specification embodiments also provide a computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, implement the method embodiments of the present specification. Computer-readable storage media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable storage medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
In addition, the present specification embodiments also provide a code scanning system, comprising a memory for storing computer executable instructions, and a processor; the processor is configured to implement the steps of the method embodiments described above when executing the computer-executable instructions in the memory.
In one embodiment, the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), or the like. The aforementioned memory may be a read-only memory (ROM), a Random Access Memory (RAM), a Flash memory (Flash), a hard disk, or a solid state disk. The steps of the method disclosed in the embodiments of the present invention may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor. In one embodiment, the code scanning system further comprises a bus and a communication interface. The processor, memory and communication interface are all interconnected by a bus. The communication interface may be a wireless communication interface or a wired communication interface for enabling the processor to communicate with other devices.
It is noted that, in the present patent application, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the use of the verb "comprise a" to define an element does not exclude the presence of another, same element in a process, method, article, or apparatus that comprises the element. In the present patent application, if it is mentioned that a certain action is executed according to a certain element, it means that the action is executed according to at least the element, and two cases are included: performing the action based only on the element, and performing the action based on the element and other elements. The expression of a plurality of, a plurality of and the like includes 2, 2 and more than 2, more than 2 and more than 2.
All documents mentioned in this specification are to be considered as being incorporated in their entirety into the disclosure of this specification so as to be subject to modification as necessary. It should be understood that the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of one or more embodiments of the present disclosure should be included in the scope of protection of one or more embodiments of the present disclosure.
In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.

Claims (18)

1. A code scanning system comprises a terminal and a server, wherein the terminal comprises a plug-in;
the server is used for maintaining code scanning rules and providing subscription for the terminal;
and the plug-in is used for dynamically loading a code scanning rule obtained from the server subscription and scanning the codes in the terminal by using the code scanning rule.
2. The code scanning system of claim 1, wherein the plug-in includes a loader engine, a plurality of scanners, and a result integration module, each scanner corresponding to a different code scanning rule;
the loader engine is used for loading the code scanning rules, distinguishing the types of the code scanning rules, converting each different code scanning rule into a preset format and then respectively loading the preset format into the corresponding scanners;
each scanner is respectively used for scanning the code by using a code scanning rule loaded by the scanner;
the result integration module is used for merging and integrating the scanning results of the plurality of scanners and then outputting the scanning results.
3. The code scanning system of claim 2, wherein the type of code scanning rule comprises one or any combination of: pmd rule, groovy rule, jar rule.
4. The code scanning system of claim 2, wherein the terminal further comprises a memory for storing a key comprising encrypted user identity information and information of the terminal;
the plug-in comprises an authentication module used for verifying the legality of the terminal according to the information of the terminal in the key, and sending the key to the server side, so that the server side can verify the legality of the user according to the user identity information in the key.
5. The code scanning system of claim 4, wherein the plug-in further comprises a key generation module, configured to generate a key according to the user identity information of the logged-in user and the terminal information of the current terminal after logging in the server, and store the key in the memory.
6. The code scanning system of any of claims 1-5, wherein the terminal information comprises one or any combination of:
MAC address, hard disk serial number, processor serial number, mainboard serial number.
7. The code scanning system of any one of claims 1-5, wherein the terminal further comprises a browser for logging in to the server and subscribing to the code scanning rules.
8. The code scanning system of any one of claims 1-5, wherein the plug-in is installed in an integrated development environment in the terminal for scanning code in the integrated development environment.
9. A code scanning method, comprising:
a plug-in on the terminal acquires a code scanning rule from a server through subscription;
the plug-in dynamically loads a code scanning rule from the server;
and the plug-in uses the code scanning rule to scan the codes in the terminal.
10. The code scanning method of claim 9, wherein the plug-in includes a plurality of scanners, each scanner corresponding to a different code scanning rule;
the plug-in dynamically loads the code scanning rule from the server, and further comprises: the plug-in distinguishes the types of the code scanning rules, converts each different code scanning rule into a preset format and then loads the preset format into the corresponding scanner; each scanner scans the code by using a code scanning rule loaded by the scanner; and the plug-in integrates the scanning results of the plurality of scanners and outputs the integrated scanning results.
11. The code scanning method of claim 10, wherein the type of the code scanning rule comprises one of the following or any combination thereof: pmd rule, groovy rule, jar rule.
12. The code scanning method according to claim 10, wherein before the plug-in on the terminal acquires the code scanning rule from the server through subscription, the method further comprises:
when the plug-in logs in the server for the first time or changes the login user, after the login is successful, a key is generated according to the user identity information of the login user and the terminal information of the current terminal and is stored in the terminal, wherein the key comprises the encrypted user identity information and the encrypted terminal information.
13. The code scanning method according to claim 12, wherein before the plug-in on the terminal acquires the code scanning rule from the server through subscription, the method further comprises:
and the plug-in verifies the legality of the terminal according to the information of the terminal in the key, and sends the key to the server, so that the server side can verify the legality of the user according to the user identity information in the key.
14. The code scanning method according to any one of claims 9 to 13, wherein the terminal information includes one of the following or any combination thereof:
MAC address, hard disk serial number, processor serial number, mainboard serial number.
15. The code scanning method according to any one of claims 9 to 13, wherein before the plug-in on the terminal acquires the code scanning rule from the server through subscription, the method further comprises:
and the browser on the terminal logs in the server and subscribes the code scanning rule.
16. The code scanning method according to any one of claims 9 to 13, wherein the plug-in is installed in an integrated development environment in the terminal for scanning a code in the integrated development environment.
17. A code scanning system comprising:
a memory for storing computer executable instructions; and the number of the first and second groups,
a processor, coupled with the memory, for implementing the steps in the method of any of claims 9 to 16 when executing the computer-executable instructions.
18. A computer-readable storage medium having stored thereon computer-executable instructions which, when executed by a processor, implement the steps in the method of any one of claims 9 to 16.
CN201911075035.0A 2019-11-06 2019-11-06 Code scanning system and method and plug-in Pending CN110968503A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911075035.0A CN110968503A (en) 2019-11-06 2019-11-06 Code scanning system and method and plug-in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911075035.0A CN110968503A (en) 2019-11-06 2019-11-06 Code scanning system and method and plug-in

Publications (1)

Publication Number Publication Date
CN110968503A true CN110968503A (en) 2020-04-07

Family

ID=70030225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911075035.0A Pending CN110968503A (en) 2019-11-06 2019-11-06 Code scanning system and method and plug-in

Country Status (1)

Country Link
CN (1) CN110968503A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113126975A (en) * 2021-06-21 2021-07-16 云账户技术(天津)有限公司 Method and device for realizing code segment plug-in

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863211A (en) * 2006-03-23 2006-11-15 华为技术有限公司 Content filtering system and method thereof
CN105743638A (en) * 2016-05-13 2016-07-06 江苏中天科技软件技术有限公司 System client authorization authentication method based on B/S framework
CN108153664A (en) * 2016-12-06 2018-06-12 北京奇虎科技有限公司 A kind of static code scan method and device
CN108595963A (en) * 2018-04-26 2018-09-28 杭州迪普科技股份有限公司 A kind of vulnerability scanning method and apparatus
CN109861994A (en) * 2019-01-17 2019-06-07 安徽云探索网络科技有限公司 The vulnerability scanning method and its scanning means that cloud is invaded

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863211A (en) * 2006-03-23 2006-11-15 华为技术有限公司 Content filtering system and method thereof
CN105743638A (en) * 2016-05-13 2016-07-06 江苏中天科技软件技术有限公司 System client authorization authentication method based on B/S framework
CN108153664A (en) * 2016-12-06 2018-06-12 北京奇虎科技有限公司 A kind of static code scan method and device
CN108595963A (en) * 2018-04-26 2018-09-28 杭州迪普科技股份有限公司 A kind of vulnerability scanning method and apparatus
CN109861994A (en) * 2019-01-17 2019-06-07 安徽云探索网络科技有限公司 The vulnerability scanning method and its scanning means that cloud is invaded

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113126975A (en) * 2021-06-21 2021-07-16 云账户技术(天津)有限公司 Method and device for realizing code segment plug-in
CN113126975B (en) * 2021-06-21 2021-09-17 云账户技术(天津)有限公司 Method and device for realizing code segment plug-in

Similar Documents

Publication Publication Date Title
US10558447B2 (en) Application push method, and a service device
US11281438B2 (en) Platform for web services development and method therefor
CN109891415B (en) Securing a Web server for an unauthorized client application
CN113076153B (en) Interface calling method and device
US20190325134A1 (en) Neural network detection of malicious activity
CN105515935A (en) Interaction information DOI processing method and device
CN110362547A (en) Coding, parsing, storage method and the device of journal file
CN111654555B (en) Method, electronic device and storage medium for message distribution
CN113783708A (en) Re-voting binary consensus method and device based on reliable broadcast
CN110968503A (en) Code scanning system and method and plug-in
EP4062327A1 (en) Method and system for identifying information objects using deep ai-based knowledge objects
WO2020257123A1 (en) Systems and methods for blockchain-based authentication
CN113703996B (en) Access control method, equipment and medium based on user and YANG model grouping
CN108734149B (en) Text data scanning method and device
CN105573823A (en) Resource locking method and device
CN113395326B (en) Network service-based login method, device and computer-readable storage medium
CN112507014B (en) Data storage method, device and system based on credible account book database
CN111324645A (en) Data processing method and device for block chain
CN115987683B (en) Node access control method, device, equipment and medium in block chain network
CN110008081B (en) Interactive data processing method and device
US20230177164A1 (en) Determining a source of a vulnerability in software
CN110020840B (en) Data transmission method and system thereof
US20240106838A1 (en) Systems and methods for detecting malicious events
CN112214250B (en) Application program component loading method and device
CN113687973A (en) Method, device and medium for controlling dynamic output of logs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200407

RJ01 Rejection of invention patent application after publication