CN114880718A - Open source software vulnerability management method and device based on block chain - Google Patents

Open source software vulnerability management method and device based on block chain Download PDF

Info

Publication number
CN114880718A
CN114880718A CN202210547152.8A CN202210547152A CN114880718A CN 114880718 A CN114880718 A CN 114880718A CN 202210547152 A CN202210547152 A CN 202210547152A CN 114880718 A CN114880718 A CN 114880718A
Authority
CN
China
Prior art keywords
open source
source software
vulnerability
blockchain
version data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210547152.8A
Other languages
Chinese (zh)
Inventor
薛贝娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210547152.8A priority Critical patent/CN114880718A/en
Publication of CN114880718A publication Critical patent/CN114880718A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)

Abstract

The specification relates to the technical field of block chains, and particularly discloses a block chain-based open source software vulnerability management method and device, wherein the method comprises the following steps: obtaining version data and vulnerability data corresponding to each open source software in a plurality of open source software used in a target application program; generating an open source software vulnerability list based on version data and vulnerability data corresponding to each open source software; sending the vulnerability list of the open source software to a block chain network for distributed storage; the block chain network comprises a plurality of block chain nodes, the target application program comprises a plurality of modules, a plurality of block chain nodes correspond to the modules one by one, and the block chain nodes store open-source software version data used in the corresponding modules; polling open source software version data stored in each block chain node in a plurality of block chain nodes; and managing vulnerability data in the open source software vulnerability list stored in the blockchain network according to the polling result. The scheme can realize automatic unified maintenance of the open source software bugs.

Description

基于区块链的开源软件漏洞管理方法及装置Blockchain-based open source software vulnerability management method and device

技术领域technical field

本说明书涉及区块链技术领域,特别涉及一种基于区块链的开源软件漏洞管理方法及装置。This specification relates to the field of blockchain technology, in particular to a method and device for open source software vulnerability management based on blockchain.

背景技术Background technique

手机银行产品代码中使用的开源软件数目众多,同一开源软件又存在着不同的版本,不同版本的开源软件存在着不同的安全漏洞,这些漏洞都会影响产品安全。由于开源软件种类、版本、漏洞信息众多,导致产品开源软件漏洞管理困难,难以统一维护。There are a large number of open source software used in mobile banking product codes. The same open source software has different versions, and different versions of open source software have different security loopholes, and these loopholes will affect product security. Due to the large number of types, versions, and vulnerability information of open source software, it is difficult to manage open source software vulnerabilities in products, and it is difficult to maintain uniformly.

针对上述问题,目前尚未提出有效的解决方案。For the above problems, no effective solution has been proposed yet.

发明内容SUMMARY OF THE INVENTION

本说明书实施例提供了一种基于区块链的开源软件漏洞管理方法及装置,以解决现有技术中产品开源软件漏洞管理困难、难以统一维护问题。The embodiments of this specification provide a method and device for open source software vulnerability management based on blockchain, so as to solve the problems of difficulty in managing open source software vulnerabilities in products and difficult unified maintenance in the prior art.

本说明书实施例提供了一种基于区块链的开源软件漏洞管理方法,应用于漏洞管理系统,包括:The embodiments of this specification provide a blockchain-based open source software vulnerability management method, which is applied to a vulnerability management system, including:

获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据;Obtain the version data and vulnerability data corresponding to each open source software among multiple open source software used in the target application;

基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单;generating an open source software vulnerability list based on the version data and vulnerability data corresponding to each open source software;

将所述开源软件漏洞清单发送至区块链网络进行分布式存储;所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据;Send the open source software vulnerability list to a blockchain network for distributed storage; the blockchain network includes multiple blockchain nodes, the target application includes multiple modules, and the multiple blockchains The nodes are in one-to-one correspondence with the multiple modules, and the blockchain nodes are used to store open source software version data used in the corresponding modules;

轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;polling the open source software version data stored in each of the plurality of blockchain nodes;

根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。According to the polling result, the vulnerability data in the open source software vulnerability list stored in the blockchain network is managed.

在一个实施例中,所述开源软件漏洞清单中记录有所述多个开源软件中各开源软件对应的版本数据以及所述版本数据对应的漏洞数据。In one embodiment, the open source software vulnerability list records version data corresponding to each open source software in the plurality of open source software and vulnerability data corresponding to the version data.

在一个实施例中,轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据,包括:In one embodiment, polling the open source software version data stored in each of the plurality of blockchain nodes includes:

定时轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;regularly polling the open source software version data stored in each of the plurality of blockchain nodes;

根据轮询得到的开源软件版本数据,统计所述多个开源软件中各开源软件当前使用的版本数据。According to the open source software version data obtained by polling, statistics on the version data currently used by each open source software in the plurality of open source software.

在一个实施例中,根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理,包括:In one embodiment, according to the polling result, the vulnerability data in the open source software vulnerability list stored in the blockchain network is managed, including:

将所述多个开源软件中各开源软件当前使用的版本数据与所述开源软件漏洞清单中的版本数据进行对比;comparing the version data currently used by each open source software in the plurality of open source software with the version data in the open source software vulnerability list;

在根据对比结果确定出当前使用的版本数据不包含所述开源软件漏洞清单中目标版本数据的情况下,将所述开源软件漏洞清单中的与所述目标版本数据对应的漏洞数据更新为无漏洞。If it is determined according to the comparison result that the currently used version data does not contain the target version data in the open source software vulnerability list, update the vulnerability data corresponding to the target version data in the open source software vulnerability list to no vulnerability .

本说明书实施例提供了一种基于区块链的开源软件漏洞管理方法,应用于区块链网络,包括:The embodiments of this specification provide a blockchain-based open source software vulnerability management method, which is applied to a blockchain network, including:

接收漏洞管理系统发送的开源软件漏洞清单,并对所述开源软件漏洞清单进行分布式存储;所述开源软件漏洞清单是基于目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据生成的;Receive the open source software vulnerability list sent by the vulnerability management system, and store the open source software vulnerability list in a distributed manner; the open source software vulnerability list is based on version data corresponding to each open source software in a plurality of open source software used in the target application and vulnerability data generated;

响应于所述漏洞管理系统发送的轮询请求,向所述漏洞管理系统发送所述区块链网络中的多个区块链节点中各区块链节点中存储的开源版本数据;所述目标应用程序包括多个模块,所述多个模块与所述多个区块链节点一一对应,所述各区块链节点用于存储对应模块中使用的开源软件版本数据;In response to the polling request sent by the vulnerability management system, the open source version data stored in each blockchain node of the plurality of blockchain nodes in the blockchain network is sent to the vulnerability management system; the target application The program includes a plurality of modules, and the plurality of modules are in one-to-one correspondence with the plurality of blockchain nodes, and the blockchain nodes are used to store open source software version data used in the corresponding modules;

接收所述漏洞管理系统返回的轮询结果,并根据所述轮询结果对所述区块链网络中存储的开源软件漏洞清单进行管理。Receive the polling result returned by the vulnerability management system, and manage the open source software vulnerability list stored in the blockchain network according to the polling result.

在一个实施例中,所述方法还包括:In one embodiment, the method further includes:

在所述区块链节点对应的模块中使用的开源软件进行升级的情况下,对所述区块链节点中存储的开源软件版本数据进行更新。When the open source software used in the module corresponding to the blockchain node is upgraded, the open source software version data stored in the blockchain node is updated.

本说明书实施例还提供了一种基于区块链的开源软件漏洞管理装置,应用于漏洞管理系统,包括:The embodiments of this specification also provide a blockchain-based open source software vulnerability management device, which is applied to a vulnerability management system, including:

获取模块,用于获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据;The acquisition module is used to acquire the version data and vulnerability data corresponding to each open source software in the multiple open source software used in the target application;

生成模块,用于基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单;a generating module, configured to generate an open source software vulnerability list based on the version data and vulnerability data corresponding to the open source software;

发送模块,用于将所述开源软件漏洞清单发送至区块链网络进行分布式存储;所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据;a sending module for sending the open source software vulnerability list to a blockchain network for distributed storage; the blockchain network includes multiple blockchain nodes, the target application includes multiple modules, the The plurality of blockchain nodes are in one-to-one correspondence with the plurality of modules, and the blockchain nodes are used to store open source software version data used in the corresponding modules;

轮询模块,用于轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;A polling module for polling open source software version data stored in each of the plurality of blockchain nodes;

管理模块,用于根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。The management module is used to manage the vulnerability data in the open source software vulnerability list stored in the blockchain network according to the polling result.

本说明书实施例还提供了一种基于区块链的开源软件漏洞管理装置,应用于区块链网络,包括:The embodiments of this specification also provide a blockchain-based open source software vulnerability management device, which is applied to a blockchain network, including:

接收模块,用于接收漏洞管理系统发送的开源软件漏洞清单,并对所述开源软件漏洞清单进行分布式存储;所述开源软件漏洞清单是基于目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据生成的;The receiving module is used to receive the open source software vulnerability list sent by the vulnerability management system, and perform distributed storage on the open source software vulnerability list; the open source software vulnerability list is based on each open source software used in the target application. The version data and vulnerability data corresponding to the software are generated;

发送模块,用于响应于所述漏洞管理系统发送的轮询请求,向所述漏洞管理系统发送所述区块链网络中的多个区块链节点中各区块链节点中存储的开源版本数据;所述目标应用程序包括多个模块,所述多个模块与所述多个区块链节点一一对应,所述各区块链节点用于存储对应模块中使用的开源软件版本数据;A sending module, configured to send, to the vulnerability management system, the open source version data stored in each blockchain node of the plurality of blockchain nodes in the blockchain network in response to a polling request sent by the vulnerability management system ; The target application program includes a plurality of modules, and the plurality of modules are in one-to-one correspondence with the plurality of blockchain nodes, and each blockchain node is used to store the open source software version data used in the corresponding modules;

管理模块,用于接收所述漏洞管理系统返回的轮询结果,并根据所述轮询结果对所述区块链网络中存储的开源软件漏洞清单进行管理。The management module is configured to receive the polling result returned by the vulnerability management system, and manage the open source software vulnerability list stored in the blockchain network according to the polling result.

本说明书实施例还提供一种计算机设备,包括处理器以及用于存储处理器可执行指令的存储器,所述处理器执行所述指令时实现上述任意实施例中所述的基于区块链的开源软件漏洞管理方法的步骤。Embodiments of this specification further provide a computer device, including a processor and a memory for storing instructions executable by the processor, when the processor executes the instructions, the open source blockchain-based blockchain described in any of the foregoing embodiments is implemented. Steps of a software vulnerability management methodology.

本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机指令,所述指令被执行时实现上述任意实施例中所述的基于区块链的开源软件漏洞管理方法的步骤。Embodiments of the present specification further provide a computer-readable storage medium on which computer instructions are stored, and when the instructions are executed, implement the steps of the blockchain-based open source software vulnerability management method described in any of the foregoing embodiments.

本说明书实施例还提供一种计算机程序产品,包括计算机程序/指令,所述计算机程序/指令被处理器执行时实现上述任意实施例中所述的基于区块链的开源软件漏洞管理方法的步骤。Embodiments of this specification also provide a computer program product, including computer programs/instructions, when the computer program/instructions are executed by a processor, the steps of the block chain-based open source software vulnerability management method described in any of the foregoing embodiments are implemented. .

在本说明书实施例中,提供了一种基于区块链的开源软件漏洞管理方法,漏洞管理系统可以获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据,基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单,将所述开源软件漏洞清单发送至区块链网络进行分布式存储,所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据,轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据,根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。上述方案中,将开源软件漏洞清单发送至区块链网络进行分布式存储,可以利用区块链对开源软件漏洞清单进行共享,而且还可以防止漏洞清单被恶意篡改,通过将目标应用程序中的多个模块中各模块中使用的开源软件版本数据存储在对应区块链节点中,使得可以通过轮询区块链节点来获取各模块使用的开源软件版本数据,进而根据轮询结果对开源漏洞清单进行管理。通过上述方案解决了现有的产品开源软件漏洞管理困难、难以统一维护的技术问题,达到了实现自动化统一维护开源软件漏洞、节约管理成本,提升产品安全质量的技术效果。In the embodiment of this specification, a blockchain-based open source software vulnerability management method is provided, and the vulnerability management system can obtain version data and vulnerability data corresponding to each open source software in a plurality of open source software used in a target application, based on The version data and vulnerability data corresponding to each open source software, generate an open source software vulnerability list, and send the open source software vulnerability list to a blockchain network for distributed storage, where the blockchain network includes multiple blockchains node, the target application program includes multiple modules, the multiple blockchain nodes are in one-to-one correspondence with the multiple modules, and the blockchain nodes are used to store the open source software version data used in the corresponding modules. query the open source software version data stored in each of the plurality of blockchain nodes, and manage the vulnerability data in the open source software vulnerability list stored in the blockchain network according to the polling result. In the above scheme, the open source software vulnerability list is sent to the blockchain network for distributed storage, and the open source software vulnerability list can be shared by using the blockchain, and the vulnerability list can also be prevented from being maliciously tampered with. The open source software version data used in each module in multiple modules is stored in the corresponding blockchain node, so that the open source software version data used by each module can be obtained by polling the blockchain nodes, and then open source vulnerabilities can be identified according to the polling results. list to manage. The above solution solves the technical problems of difficulty in managing open source software vulnerabilities in existing products and is difficult to maintain uniformly, and achieves the technical effect of realizing automatic and unified maintenance of open source software vulnerabilities, saving management costs, and improving product security quality.

附图说明Description of drawings

此处所说明的附图用来提供对本说明书的进一步理解,构成本说明书的一部分,并不构成对本说明书的限定。在附图中:The accompanying drawings described herein are used to provide a further understanding of the present specification, and constitute a part of the present specification, and do not constitute a limitation to the present specification. In the attached image:

图1示出了本说明书一实施例中的基于区块链的开源软件漏洞管理方法的流程图;FIG. 1 shows a flowchart of a method for managing open source software vulnerabilities based on blockchain in an embodiment of the present specification;

图2示出了本说明书一实施例中的基于区块链的开源软件漏洞管理方法的流程图;FIG. 2 shows a flowchart of a method for managing open source software vulnerabilities based on blockchain in an embodiment of the present specification;

图3示出了本说明书一实施例中的基于区块链的开源软件漏洞管理装置的示意图;FIG. 3 shows a schematic diagram of a block chain-based open source software vulnerability management apparatus in an embodiment of the present specification;

图4示出了本说明书一实施例中的基于区块链的开源软件漏洞管理装置的示意图;FIG. 4 shows a schematic diagram of a block chain-based open source software vulnerability management device in an embodiment of the present specification;

图5示出了本说明书一实施例中的计算机设备的示意图。FIG. 5 shows a schematic diagram of a computer device in an embodiment of the present specification.

具体实施方式Detailed ways

下面将参考若干示例性实施方式来描述本说明书的原理和精神。应当理解,给出这些实施方式仅仅是为了使本领域技术人员能够更好地理解进而实现本说明书,而并非以任何方式限制本说明书的范围。相反,提供这些实施方式是为了使本说明书公开更加透彻和完整,并且能够将本公开的范围完整地传达给本领域的技术人员。The principles and spirit of this specification will now be described with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present specification, but not to limit the scope of the present specification in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

本领域的技术人员知道,本说明书的实施方式可以实现为一种系统、装置设备、方法或计算机程序产品。因此,本说明书公开可以具体实现为以下形式,即:完全的硬件、完全的软件(包括固件、驻留软件、微代码等),或者硬件和软件结合的形式。Those skilled in the art will appreciate that the embodiments of the present specification can be implemented as a system, apparatus, method or computer program product. Accordingly, the present disclosure may be embodied in the form of entirely hardware, entirely software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

传统的开源软件漏洞管理方法仍然是通过普通的表格来维护,且每次修复低版本漏洞后,还需要再新增高版本漏洞,工作量大。此外,传统的开源软件漏洞为人工记录手工维护的方式,维护效率低,且容易出错。为了解决上述问题,本说明书实施例提供了一种基于区块链技术的自动化开源软件漏洞管理方法,更加高效便捷,为开发人员节省时间。The traditional open source software vulnerability management method is still maintained through ordinary forms, and each time a low-version vulnerability is repaired, a new high-version vulnerability needs to be added, and the workload is heavy. In addition, the traditional open source software vulnerabilities are manually recorded and maintained manually, which is inefficient and prone to errors. In order to solve the above problems, the embodiments of this specification provide an automatic open source software vulnerability management method based on blockchain technology, which is more efficient and convenient, and saves time for developers.

基于此,本说明书实施例提供了一种基于区块链的开源软件漏洞管理方法,应用于漏洞管理系统。图1示出了本说明书一实施例中基于区块链的开源软件漏洞管理方法的流程图。虽然本说明书提供了如下述实施例或附图所示的方法操作步骤或装置结构,但基于常规或者无需创造性的劳动在所述方法或装置中可以包括更多或者更少的操作步骤或模块单元。在逻辑性上不存在必要因果关系的步骤或结构中,这些步骤的执行顺序或装置的模块结构不限于本说明书实施例描述及附图所示的执行顺序或模块结构。所述的方法或模块结构的在实际中的装置或终端产品应用时,可以按照实施例或者附图所示的方法或模块结构连接进行顺序执行或者并行执行(例如并行处理器或者多线程处理的环境,甚至分布式处理环境)。Based on this, the embodiments of this specification provide a blockchain-based open source software vulnerability management method, which is applied to a vulnerability management system. FIG. 1 shows a flow chart of a method for vulnerability management of open source software based on blockchain in an embodiment of the present specification. Although the present specification provides method operation steps or device structures as shown in the following embodiments or drawings, more or less operation steps or module units may be included in the method or device based on routine or no creative effort. . In the steps or structures that logically do not have a necessary causal relationship, the execution sequence of these steps or the module structure of the device is not limited to the execution sequence or module structure described in the embodiments of this specification and shown in the accompanying drawings. When the described method or module structure is applied in an actual device or terminal product, it can be executed sequentially or in parallel (for example, a parallel processor or multi-threaded processing method) according to the connection of the method or module structure shown in the embodiments or the accompanying drawings. environments, even distributed processing environments).

具体地,如图1所示,本说明书一种实施例提供的基于区块链的开源软件漏洞管理方法可以包括以下步骤:Specifically, as shown in FIG. 1 , the blockchain-based open source software vulnerability management method provided by an embodiment of this specification may include the following steps:

步骤S101,获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据。Step S101 , acquiring version data and vulnerability data corresponding to each open source software in a plurality of open source software used in the target application.

漏洞管理系统可以为一个具有运算和网络交互功能的电子设备;也可以为运行于该电子设备中,为数据处理和网络交互提供支持的软件。The vulnerability management system can be an electronic device with computing and network interaction functions; it can also be software that runs in the electronic device and provides support for data processing and network interaction.

漏洞管理系统可以获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据。其中版本数据可以包括开源软件的多个版本号。漏洞数据可以包括各版本的开源软件存在的漏洞。The vulnerability management system can obtain version data and vulnerability data corresponding to each open source software in a plurality of open source software used in the target application. The version data may include multiple version numbers of the open source software. Vulnerability data may include vulnerabilities in various versions of open source software.

漏洞管理系统可以从目标应用程序日志中获取该应用程序中使用的多个开源软件的版本数据和漏洞数据。漏洞管理系统也可以接收开发人员输入的目标应用程序中使用的多个开源软件的版本数据和漏洞数据。The vulnerability management system can obtain version data and vulnerability data of multiple open source software used in the application from the target application log. The vulnerability management system may also receive developer input version data and vulnerability data for multiple open source software used in the target application.

步骤S102,基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单。Step S102, generating an open source software vulnerability list based on the version data and vulnerability data corresponding to each open source software.

在获得各开源软件对应的版本数据和漏洞数据之后,可以基于版本数据和漏洞数据,生成开源软件漏洞清单。After obtaining the version data and vulnerability data corresponding to each open source software, an open source software vulnerability list can be generated based on the version data and the vulnerability data.

在本说明书一些实施例中,所述开源软件漏洞清单中记录有所述多个开源软件中各开源软件对应的版本数据以及所述版本数据对应的漏洞数据。In some embodiments of this specification, the open source software vulnerability list records version data corresponding to each open source software in the plurality of open source software and vulnerability data corresponding to the version data.

在本说明书一些实施例中,所述开源软件漏洞清单中记录有所述毒狗额开源软件中开源软件对应的版本数据、所述本本数据对应的漏洞数据以及采用该版本的应用程序的模块的个数。In some embodiments of this specification, the open source software vulnerability list records the version data corresponding to the open source software in the Dugou open source software, the vulnerability data corresponding to the notebook data, and the modules of the application using this version. number.

步骤S103,将所述开源软件漏洞清单发送至区块链网络进行分布式存储;所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据。Step S103, sending the open source software vulnerability list to a blockchain network for distributed storage; the blockchain network includes multiple blockchain nodes, the target application includes multiple modules, and the multiple The blockchain nodes are in one-to-one correspondence with the multiple modules, and the blockchain nodes are used to store open source software version data used in the corresponding modules.

在生成开源软件漏洞清单之后,漏洞管理系统可以将开源软件漏洞清单发送至区块链网络中进行分布式存储,以在所述区块链网络中对所述开源软件漏洞清单进行共享。通过在区块链网络中存储开源软件漏洞清单,可以防止开源软件漏洞清单被恶意篡改。After generating the open source software vulnerability list, the vulnerability management system may send the open source software vulnerability list to a blockchain network for distributed storage, so as to share the open source software vulnerability list in the blockchain network. By storing the open source software vulnerability list in the blockchain network, the open source software vulnerability list can be prevented from being maliciously tampered with.

区块链网络中可以包括多个区块链节点。目标应用程序中可以包括多个模块。例如手机银行应用程序中可以包括:信用卡模块、转账模块、理财模块、外汇模块等。区块链节点可以与模块一一对应。区块链节点可以用于存储对应模块中使用的开源软件版本数据。开源软件版本数据可以包括开源软件的名称以及对应的版本号。A blockchain network can include multiple blockchain nodes. A target application can include multiple modules. For example, the mobile banking application may include: a credit card module, a transfer module, a wealth management module, a foreign exchange module, and the like. Blockchain nodes can correspond one-to-one with modules. Blockchain nodes can be used to store open source software version data used in corresponding modules. The open source software version data may include the name of the open source software and a corresponding version number.

步骤S104,轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据。Step S104, polling open source software version data stored in each blockchain node of the plurality of blockchain nodes.

步骤S105,根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。Step S105, according to the polling result, manage the vulnerability data in the open source software vulnerability list stored in the blockchain network.

漏洞管理系统可以轮询多个区块链节点中各区块链节点中存储的开源软件版本数据,从而对目标应用程序中的模块所使用的版本数据进行统计,得到轮询结果。之后,漏洞管理系统可以根据轮询结果,对区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。例如,可以对漏洞清单中的漏洞数据进行更新和维护。The vulnerability management system can poll the open source software version data stored in each blockchain node in multiple blockchain nodes, so as to collect statistics on the version data used by the modules in the target application, and obtain the polling result. After that, the vulnerability management system can manage the vulnerability data in the open source software vulnerability list stored in the blockchain network according to the polling result. For example, vulnerability data in the vulnerability inventory can be updated and maintained.

上述实施例中,将开源软件漏洞清单发送至区块链网络进行分布式存储,可以利用区块链对开源软件漏洞清单进行共享,而且还可以防止漏洞清单被恶意篡改,通过将目标应用程序中的多个模块中各模块中使用的开源软件版本数据存储在对应区块链节点中,使得可以通过轮询区块链节点来获取各模块使用的开源软件版本数据,进而根据轮询结果对开源漏洞清单进行管理,实现了自动化统一维护开源软件漏洞。In the above embodiment, the open source software vulnerability list is sent to the blockchain network for distributed storage, and the open source software vulnerability list can be shared by using the blockchain, and the vulnerability list can also be prevented from being maliciously tampered with. The open source software version data used in each module of the multiple modules is stored in the corresponding blockchain node, so that the open source software version data used by each module can be obtained by polling the blockchain node, and then the open source software version data used by each module can be obtained according to the polling result. The vulnerability list is managed, and the automatic and unified maintenance of open source software vulnerabilities is realized.

在本说明书一些实施例中,轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据,可以包括:定时轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;根据轮询得到的开源软件版本数据,统计所述多个开源软件中各开源软件当前使用的版本数据。In some embodiments of this specification, polling the open source software version data stored in each of the plurality of blockchain nodes may include: periodically polling each of the plurality of blockchain nodes The open source software version data stored in the open source software; according to the open source software version data obtained by polling, statistics of the version data currently used by each open source software in the plurality of open source software.

考虑到目标应用程序中各模块使用的开源软件版本会实时更新,漏洞管理系统定时轮询多个区块链节点中各区块链节点中存储的开源软件版本数据。可以根据轮询得到的开源软件版本数据,统计所述多个开源软件中各开源软件当前使用的版本数据。之后,可以根据多个开源软件中各开源软件当前使用的版本数据对区块链网络中存储的开源软件漏洞清单进行更新管理。通过上述方式,可以实时对开源软件漏洞清单进行管理。Considering that the open source software version used by each module in the target application will be updated in real time, the vulnerability management system periodically polls the open source software version data stored in each blockchain node in multiple blockchain nodes. The version data currently used by each open source software in the plurality of open source software may be counted according to the open source software version data obtained by polling. After that, the list of open source software vulnerabilities stored in the blockchain network can be updated and managed according to the version data currently used by each open source software in the multiple open source software. In the above manner, the open source software vulnerability list can be managed in real time.

在本说明书一些实施例中,根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理,可以包括:将所述多个开源软件中各开源软件当前使用的版本数据与所述开源软件漏洞清单中的版本数据进行对比;在根据对比结果确定出当前使用的版本数据不包含所述开源软件漏洞清单中目标版本数据的情况下,将所述开源软件漏洞清单中的与所述目标版本数据对应的漏洞数据更新为无漏洞。In some embodiments of this specification, according to the polling result, managing the vulnerability data in the open source software vulnerability list stored in the blockchain network may include: using each open source software currently used in the multiple open source software The version data of the open source software vulnerability list is compared with the version data in the open source software vulnerability list; if it is determined according to the comparison result that the currently used version data does not contain the target version data in the open source software vulnerability list, the open source software vulnerability list The vulnerability data in the manifest corresponding to the target version data is updated to be no vulnerability.

在得到多个开源软件中各开源软件当前使用的版本数据之后,可以将多个开源软件中开源软件当前使用的版本数据与开源软件漏洞清单中的版本数据进行对比。在确定出当前使用的版本数据不包含开源软件漏洞清单中的目标版本数据的情况下,可以将开源漏洞清单中与该目标版本数据对应的漏洞数据更新为无漏洞。即,在目标应用程序中各模块均不使用某一版本的软件之后,该版本对应的漏洞即不存在于目标应用程序中。通过上述方式,可以及时更新开源漏洞清单,便于开发人员直观快捷地了解到当前的漏洞情况。After obtaining the version data currently used by each open source software in the multiple open source software, the version data currently used by the open source software in the multiple open source software can be compared with the version data in the open source software vulnerability list. When it is determined that the currently used version data does not contain the target version data in the open source software vulnerability list, the vulnerability data corresponding to the target version data in the open source vulnerability list can be updated to be no vulnerability. That is, after each module in the target application program does not use a certain version of the software, the vulnerability corresponding to this version does not exist in the target application program. Through the above method, the open source vulnerability list can be updated in time, so that developers can intuitively and quickly understand the current vulnerability situation.

本说明书实施例提供了一种基于区块链的开源软件漏洞管理方法,应用于区块链网络。图2示出了本说明书一实施例中基于区块链的开源软件漏洞管理方法的流程图。The embodiments of this specification provide a blockchain-based open source software vulnerability management method, which is applied to a blockchain network. FIG. 2 shows a flow chart of a method for vulnerability management of open source software based on blockchain in an embodiment of the present specification.

具体地,如图2所示,本说明书一种实施例提供的基于区块链的开源软件漏洞管理方法可以包括以下步骤:Specifically, as shown in FIG. 2 , the blockchain-based open source software vulnerability management method provided by an embodiment of this specification may include the following steps:

步骤S201,接收漏洞管理系统发送的开源软件漏洞清单,并对所述开源软件漏洞清单进行分布式存储;所述开源软件漏洞清单是基于目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据生成的。Step S201: Receive an open source software vulnerability list sent by the vulnerability management system, and perform distributed storage on the open source software vulnerability list; the open source software vulnerability list is based on the corresponding open source software among a plurality of open source software used in the target application. generated version data and vulnerability data.

步骤S202,响应于所述漏洞管理系统发送的轮询请求,向所述漏洞管理系统发送所述区块链网络中的多个区块链节点中各区块链节点中存储的开源版本数据;所述目标应用程序包括多个模块,所述多个模块与所述多个区块链节点一一对应,所述各区块链节点用于存储对应模块中使用的开源软件版本数据。Step S202, in response to the polling request sent by the vulnerability management system, send the open source version data stored in each blockchain node of the plurality of blockchain nodes in the blockchain network to the vulnerability management system; The target application program includes multiple modules, and the multiple modules are in one-to-one correspondence with the multiple blockchain nodes, and the respective blockchain nodes are used to store open source software version data used in the corresponding modules.

步骤S203,接收所述漏洞管理系统返回的轮询结果,并根据所述轮询结果对所述区块链网络中存储的开源软件漏洞清单进行管理。Step S203: Receive the polling result returned by the vulnerability management system, and manage the open source software vulnerability list stored in the blockchain network according to the polling result.

上述实施例中,将开源软件漏洞清单发送至区块链网络进行分布式存储,可以利用区块链对开源软件漏洞清单进行共享,而且还可以防止漏洞清单被恶意篡改,通过将目标应用程序中的多个模块中各模块中使用的开源软件版本数据存储在对应区块链节点中,使得可以通过轮询区块链节点来获取各模块使用的开源软件版本数据,进而根据轮询结果对开源漏洞清单进行管理,实现了自动化统一维护开源软件漏洞。In the above embodiment, the open source software vulnerability list is sent to the blockchain network for distributed storage, and the open source software vulnerability list can be shared by using the blockchain, and the vulnerability list can also be prevented from being maliciously tampered with. The open source software version data used in each module of the multiple modules is stored in the corresponding blockchain node, so that the open source software version data used by each module can be obtained by polling the blockchain node, and then the open source software version data used by each module can be obtained according to the polling result. The vulnerability list is managed, and the automatic and unified maintenance of open source software vulnerabilities is realized.

在本说明书一些实施例中,开源软件漏洞管理方法还可以包括:在所述区块链节点对应的模块中使用的开源软件进行升级的情况下,对所述区块链节点中存储的开源软件版本数据进行更新。考虑到目标应用程序中各模块使用的软件版本会实时更新,因此,在某一模块使用的开源软件进行升级的情况下,可以对该模块对应的区块链节点中存储的开源软件版本数据进行更新。通过上述方式,可以实时更新区块链节点中存储的各模块的开源软件版本数据。In some embodiments of this specification, the open source software vulnerability management method may further include: in the case of upgrading the open source software used in the module corresponding to the blockchain node, updating the open source software stored in the blockchain node The version data is updated. Considering that the software version used by each module in the target application will be updated in real time, therefore, when the open source software used by a module is upgraded, the open source software version data stored in the blockchain node corresponding to the module can be updated. renew. In the above manner, the open source software version data of each module stored in the blockchain node can be updated in real time.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。具体的可以参照前述相关处理相关实施例的描述,在此不做一一赘述。Each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. For details, reference may be made to the descriptions of the foregoing related processing-related embodiments, which will not be repeated here.

上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The foregoing describes specific embodiments of the present specification. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps recited in the claims can be performed in an order different from that in the embodiments and still achieve desirable results. Additionally, the processes depicted in the figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.

下面结合一个具体实施例对上述方法进行说明,然而,值得注意的是,该具体实施例仅是为了更好地说明本说明书,并不构成对本说明书的不当限定。The above method will be described below with reference to a specific embodiment. However, it should be noted that the specific embodiment is only for better illustrating the specification, and does not constitute an improper limitation of the specification.

本说明书实施例提供一种基于区块链技术的手机银行开源软件漏洞管理办法,可以实现自动化统一维护开源软件漏洞并完成修复,节约管理成本,提升产品安全质量。开源软件漏洞清单入区块链,产品下各模块分别作为节点,共同维护开源软件漏洞清单,从同一开源软件各模块使用的最低版本漏洞开始修复,当某个模块升级最低版本后,将该模块节点当前开源软件版本更新,开源软件漏洞系统将定期对漏洞修复清单中的问题进行轮询,当所有节点都不存在该版本漏洞时,更新区块链开源软件漏洞清单,关闭该漏洞,开始下一次轮询,对下一版本的漏洞修复进行跟踪。The embodiments of this specification provide a method for managing open source software vulnerabilities in mobile banking based on blockchain technology, which can realize automatic and unified maintenance of open source software vulnerabilities and complete repairs, save management costs, and improve product security quality. The open source software vulnerability list is entered into the blockchain, and each module under the product is used as a node to jointly maintain the open source software vulnerability list, starting from the minimum version vulnerability used by each module of the same open source software. When a module is upgraded to the minimum version, the module The current open source software version of the node is updated. The open source software vulnerability system will periodically poll the problems in the vulnerability repair list. When all nodes do not have the version vulnerability, update the blockchain open source software vulnerability list, close the vulnerability, and start downloading. One poll to keep track of bug fixes for the next release.

区块链开源软件漏洞清单用于统计当前产品下使用的所有版本开源软件存在漏洞。开源软件漏洞管理轮询系统每隔1小时,对区块链开源软件漏洞清单上的漏洞实行轮询,并自动关闭已修复漏洞。产品子模块区块链节点中,每个节点用于记录该子模块用使用的当前开源软件版本。The blockchain open source software vulnerability list is used to count the vulnerabilities of all versions of open source software used under the current product. The open source software vulnerability management polling system polls the vulnerabilities on the blockchain open source software vulnerability list every hour, and automatically closes the fixed vulnerabilities. In the product sub-module blockchain node, each node is used to record the current open source software version used by the sub-module.

例如,手机银行产品中有20个子模块(比如信用卡模块、转账模块、外汇模块等),这20个子模块,共引入了3个开源软件:开源软件A,开源软件B、开源软件C(仅举例,实际中的数目可能上千个)。For example, there are 20 sub-modules in mobile banking products (such as credit card module, transfer module, foreign exchange module, etc.), these 20 sub-modules have introduced 3 open source software: open source software A, open source software B, open source software C (for example only , the actual number may be thousands).

开源软件A已经发布的版本有1.1,1.2,1.3,开源软件B已经发布的版本有2.2.1,2.2.2,2.2.3,开源软件C已经发布的版本有3.3.1,3.3.2,3.3.3。开源软件A的1.1版本存在漏洞A1,1.2版本存在漏洞A2,1.3版本存在漏洞A3。开源软件B的2.2.1版本存在漏洞B1,2.2.2版本存在漏洞B2,2.2.3版本不存在漏洞。开源软件C的3.3.1版本存在漏洞C1,3.3.2版本不存在漏洞,3.3.3版本不存在漏洞。Open source software A has released versions 1.1, 1.2, 1.3, open source software B has released versions 2.2.1, 2.2.2, 2.2.3, open source software C has released versions 3.3.1, 3.3.2, 3.3.3. Version 1.1 of open source software A has vulnerability A1, version 1.2 has vulnerability A2, and version 1.3 has vulnerability A3. Version 2.2.1 of open source software B has vulnerability B1, version 2.2.2 has vulnerability B2, and version 2.2.3 has no vulnerability. The 3.3.1 version of the open source software C has a vulnerability C1, the 3.3.2 version does not have a vulnerability, and the 3.3.3 version does not have a vulnerability.

基于此,生成的开源软件漏洞管理清单如下面的表1所示。可以将开源软件漏洞管理清单发送至区块链网络进行存储。Based on this, the generated open source software vulnerability management checklist is shown in Table 1 below. Open source software vulnerability management checklists can be sent to the blockchain network for storage.

表1Table 1

Figure BDA0003653041870000101
Figure BDA0003653041870000101

手机银行产品下各子模块为区块链节点,每个节点记录当前模块使用的开源软件当前版本情况。如模块1的节点记录着开源软件A版本为1.1,模块2节点记录着开源软件A版本为1.2,模块3节点记录着开源软件A版本为1.1,如表2所示。Each sub-module under the mobile banking product is a blockchain node, and each node records the current version of the open source software used by the current module. For example, the node of module 1 records the open source software A version as 1.1, the module 2 node records the open source software A version as 1.2, and the module 3 node records the open source software A version as 1.1, as shown in Table 2.

表2Table 2

Figure BDA0003653041870000102
Figure BDA0003653041870000102

Figure BDA0003653041870000111
Figure BDA0003653041870000111

开源软件漏洞管理轮询系统根据开源软件漏洞管理清单中定期对每个开源软件根据最低存在漏洞版本每隔1小时轮询各节点,当节点中存在当前版本,则表示该漏洞未修复。The open source software vulnerability management polling system periodically polls each node for each open source software according to the minimum vulnerable version in the open source software vulnerability management list every 1 hour. When the current version exists in the node, it means that the vulnerability has not been fixed.

如开源软件A,开源软件漏洞管理清单中最低版本为1.1,3个子模块中,模块1和模块3均使用了1.1版本,则该漏洞未修复。For example, for open source software A, the minimum version in the open source software vulnerability management list is 1.1. Among the three sub-modules, both module 1 and module 3 use version 1.1, and the vulnerability has not been fixed.

当模块1的开源软件A的版本,从1.1升级到1.2,模块3将开源软件版本,从1.1升级到1.3,各节点更新自己的最新版本情况如表3所示。When the version of open source software A of module 1 is upgraded from 1.1 to 1.2, and the version of open source software of module 3 is upgraded from 1.1 to 1.3, each node updates its latest version as shown in Table 3.

表3table 3

模块module 开源软件A版本Open source software version A 模块1Module 1 1.21.2 模块2Module 2 1.21.2 模块3Module 3 1.31.3

开源软件轮询到,当所有节点都不存在开源软件A的1.1版本时,开源软件A的1.1版本漏洞修复,更新开源软件漏洞管理清单,关闭开源软件A的1.1版本漏洞,更新后的开源软件漏洞管理清单如表4所述。When the open source software polls, when the 1.1 version of open source software A does not exist on all nodes, the open source software version 1.1 vulnerability is repaired, the open source software vulnerability management list is updated, the 1.1 version vulnerability of open source software A is closed, and the updated open source software The vulnerability management checklist is described in Table 4.

表4Table 4

Figure BDA0003653041870000112
Figure BDA0003653041870000112

其它开源软件版本漏洞使用同样的方法进行轮询。持续定时对区块链节点进行轮询,以实时掌握目标应用程序的开源软件漏洞情况。Other open source software version vulnerabilities are polled using the same method. Continue to regularly poll the blockchain nodes to grasp the open source software vulnerabilities of the target application in real time.

上述具体实施例中,通过将开源软件漏洞清单用区块链进行共享,定期轮询各节点的开源软件漏洞,实现了开源软件漏洞清单自动化维护,此外,利用区块链进行漏洞清单共享,可以防止各模块随意修改漏洞清单。In the above specific embodiment, the open source software vulnerability list is shared with the blockchain, and the open source software vulnerabilities of each node are periodically polled, so as to realize the automatic maintenance of the open source software vulnerability list. Prevent each module from modifying the vulnerability list at will.

基于同一发明构思,本说明书实施例中还提供了一种基于区块链的开源软件漏洞管理装置,应用于漏洞管理系统,如下面的实施例所述。由于基于区块链的开源软件漏洞管理装置解决问题的原理与基于区块链的开源软件漏洞管理方法相似,因此基于区块链的开源软件漏洞管理装置的实施可以参见基于区块链的开源软件漏洞管理方法的实施,重复之处不再赘述。以下所使用的,术语“单元”或者“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。图3是本说明书实施例的基于区块链的开源软件漏洞管理装置的一种结构框图,如图3所示,包括:获取模块301、生成模块302、发送模块303、轮询模块304和管理模块305,下面对该结构进行说明。Based on the same inventive concept, the embodiments of this specification also provide a block chain-based open source software vulnerability management device, which is applied to a vulnerability management system, as described in the following embodiments. Since the principle of solving the problem of the open source software vulnerability management device based on the blockchain is similar to the open source software vulnerability management method based on the blockchain, the implementation of the open source software vulnerability management device based on the blockchain can refer to the open source software based on the blockchain. The implementation of vulnerability management methods will not be repeated here. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated. FIG. 3 is a structural block diagram of the blockchain-based open source software vulnerability management device according to the embodiment of the present specification. As shown in FIG. 3 , it includes: an acquisition module 301 , a generation module 302 , a transmission module 303 , a polling module 304 and a management Module 305, the structure of which is described below.

获取模块301用于获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据;The obtaining module 301 is configured to obtain version data and vulnerability data corresponding to each open source software in a plurality of open source software used in the target application;

生成模块302用于基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单;The generating module 302 is configured to generate an open source software vulnerability list based on the version data and vulnerability data corresponding to each open source software;

发送模块303用于将所述开源软件漏洞清单发送至区块链网络进行分布式存储;所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据;The sending module 303 is configured to send the open source software vulnerability list to a blockchain network for distributed storage; the blockchain network includes multiple blockchain nodes, the target application includes multiple modules, and the The plurality of blockchain nodes are in one-to-one correspondence with the plurality of modules, and the blockchain nodes are used to store open source software version data used in the corresponding modules;

轮询模块304用于轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;The polling module 304 is configured to poll the open source software version data stored in each block chain node of the plurality of block chain nodes;

管理模块305用于根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。The management module 305 is configured to manage the vulnerability data in the open source software vulnerability list stored in the blockchain network according to the polling result.

在本说明书一些实施例中,所述开源软件漏洞清单中记录有所述多个开源软件中各开源软件对应的版本数据以及所述版本数据对应的漏洞数据。In some embodiments of this specification, the open source software vulnerability list records version data corresponding to each open source software in the plurality of open source software and vulnerability data corresponding to the version data.

在本说明书一些实施例中,轮询模块可以具体用于:定时轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;根据轮询得到的开源软件版本数据,统计所述多个开源软件中各开源软件当前使用的版本数据。In some embodiments of this specification, the polling module may be specifically configured to: regularly poll the open source software version data stored in each blockchain node among the plurality of blockchain nodes; according to the open source software version data obtained by polling, Statistics of the version data currently used by each open source software in the plurality of open source software.

在本说明书一些实施例中,管理模块可以具体用于:将所述多个开源软件中各开源软件当前使用的版本数据与所述开源软件漏洞清单中的版本数据进行对比;在根据对比结果确定出当前使用的版本数据不包含所述开源软件漏洞清单中目标版本数据的情况下,将所述开源软件漏洞清单中的与所述目标版本数据对应的漏洞数据更新为无漏洞。In some embodiments of this specification, the management module may be specifically configured to: compare the version data currently used by each open source software in the plurality of open source software with the version data in the open source software vulnerability list; If it is found that the currently used version data does not include the target version data in the open source software vulnerability list, update the vulnerability data corresponding to the target version data in the open source software vulnerability list to no vulnerability.

基于同一发明构思,本说明书实施例中还提供了一种基于区块链的开源软件漏洞管理装置,应用于区块链网络,如下面的实施例所述。由于基于区块链的开源软件漏洞管理装置解决问题的原理与基于区块链的开源软件漏洞管理方法相似,因此基于区块链的开源软件漏洞管理装置的实施可以参见基于区块链的开源软件漏洞管理方法的实施,重复之处不再赘述。以下所使用的,术语“单元”或者“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。图4是本说明书实施例的基于区块链的开源软件漏洞管理装置的一种结构框图,如图4所示,包括:接收模块401、发送模块402和管理模块403,下面对该结构进行说明。Based on the same inventive concept, the embodiments of this specification also provide a blockchain-based open source software vulnerability management device, which is applied to a blockchain network, as described in the following embodiments. Since the principle of solving the problem of the open source software vulnerability management device based on the blockchain is similar to the open source software vulnerability management method based on the blockchain, the implementation of the open source software vulnerability management device based on the blockchain can refer to the open source software based on the blockchain. The implementation of vulnerability management methods will not be repeated here. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated. FIG. 4 is a structural block diagram of the blockchain-based open source software vulnerability management device according to the embodiment of the present specification. As shown in FIG. 4 , it includes: a receiving module 401, a sending module 402 and a management module 403. The following describes the structure. illustrate.

接收模块401用于接收漏洞管理系统发送的开源软件漏洞清单,并对所述开源软件漏洞清单进行分布式存储;所述开源软件漏洞清单是基于目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据生成的。The receiving module 401 is configured to receive the open source software vulnerability list sent by the vulnerability management system, and perform distributed storage on the open source software vulnerability list; the open source software vulnerability list is based on each open source software used in the target application. The version data and vulnerability data corresponding to the software are generated.

发送模块402用于响应于所述漏洞管理系统发送的轮询请求,向所述漏洞管理系统发送所述区块链网络中的多个区块链节点中各区块链节点中存储的开源版本数据;所述目标应用程序包括多个模块,所述多个模块与所述多个区块链节点一一对应,所述各区块链节点用于存储对应模块中使用的开源软件版本数据。The sending module 402 is configured to, in response to the polling request sent by the vulnerability management system, send to the vulnerability management system the open source version data stored in each blockchain node of the plurality of blockchain nodes in the blockchain network ; The target application program includes a plurality of modules, the plurality of modules are in one-to-one correspondence with the plurality of blockchain nodes, and each blockchain node is used to store the open source software version data used in the corresponding modules.

管理模块403用于接收所述漏洞管理系统返回的轮询结果,并根据所述轮询结果对所述区块链网络中存储的开源软件漏洞清单进行管理。The management module 403 is configured to receive the polling result returned by the vulnerability management system, and manage the open source software vulnerability list stored in the blockchain network according to the polling result.

在本说明书一些实施例中,所述装置还可以包括更新模块,所述更新模块可以具体用于在所述区块链节点对应的模块中使用的开源软件进行升级的情况下,对所述区块链节点中存储的开源软件版本数据进行更新。In some embodiments of the present specification, the apparatus may further include an update module, and the update module may be specifically configured to update the region in the case of upgrading the open source software used in the module corresponding to the blockchain node. The open source software version data stored in the blockchain node is updated.

从以上的描述中,可以看出,本说明书实施例实现了如下技术效果:提供了一种基于区块链的开源软件漏洞管理方法,漏洞管理系统可以获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据,基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单,将所述开源软件漏洞清单发送至区块链网络进行分布式存储,所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据,轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据,根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。上述方案中,将开源软件漏洞清单发送至区块链网络进行分布式存储,可以利用区块链对开源软件漏洞清单进行共享,而且还可以防止漏洞清单被恶意篡改,通过将目标应用程序中的多个模块中各模块中使用的开源软件版本数据存储在对应区块链节点中,使得可以通过轮询区块链节点来获取各模块使用的开源软件版本数据,进而根据轮询结果对开源漏洞清单进行管理。通过上述方案解决了现有的产品开源软件漏洞管理困难、难以统一维护的技术问题,达到了实现自动化统一维护开源软件漏洞、节约管理成本,提升产品安全质量的技术效果。From the above description, it can be seen that the embodiments of this specification achieve the following technical effects: a blockchain-based open source software vulnerability management method is provided, and the vulnerability management system can obtain multiple open source software used in target applications The version data and vulnerability data corresponding to each open source software in the above, based on the version data and vulnerability data corresponding to each open source software, generate an open source software vulnerability list, and send the open source software vulnerability list to the blockchain network for distributed storage, The blockchain network includes multiple blockchain nodes, the target application includes multiple modules, and the multiple blockchain nodes correspond to the multiple modules one-to-one. In order to store the open-source software version data used in the corresponding module, poll the open-source software version data stored in each blockchain node of the plurality of blockchain nodes, and according to the polling result, analyze the data stored in the blockchain network. Vulnerability data in open source software vulnerability inventories is managed. In the above scheme, the open source software vulnerability list is sent to the blockchain network for distributed storage, and the open source software vulnerability list can be shared by using the blockchain, and the vulnerability list can also be prevented from being maliciously tampered with. The open source software version data used in each module in multiple modules is stored in the corresponding blockchain node, so that the open source software version data used by each module can be obtained by polling the blockchain nodes, and then open source vulnerabilities can be identified according to the polling results. list to manage. The above solution solves the existing technical problems of difficulty in managing open source software vulnerabilities of products and difficult to maintain uniformly, and achieves the technical effect of realizing automatic and unified maintenance of open source software vulnerabilities, saving management costs, and improving product security quality.

本说明书实施方式还提供了一种计算机设备,具体可以参阅图5所示的基于本说明书实施例提供的基于区块链的开源软件漏洞管理方法的计算机设备组成结构示意图,所述计算机设备具体可以包括输入设备51、处理器52、存储器53。其中,所述存储器53用于存储处理器可执行指令。所述处理器52执行所述指令时实现上述任意实施例中所述的基于区块链的开源软件漏洞管理方法的步骤。The embodiment of this specification also provides a computer device. For details, please refer to the schematic diagram of the composition and structure of the computer device based on the blockchain-based open source software vulnerability management method provided by the embodiment of this specification. The computer device may specifically It includes an input device 51 , a processor 52 , and a memory 53 . The memory 53 is used for storing processor executable instructions. When the processor 52 executes the instructions, the steps of the block chain-based open source software vulnerability management method described in any of the foregoing embodiments are implemented.

在本实施方式中,所述输入设备具体可以是用户和计算机系统之间进行信息交换的主要装置之一。所述输入设备可以包括键盘、鼠标、摄像头、扫描仪、光笔、手写输入板、语音输入装置等;输入设备用于把原始数据和处理这些数的程序输入到计算机中。所述输入设备还可以获取接收其他模块、单元、设备传输过来的数据。所述处理器可以按任何适当的方式实现。例如,处理器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式等等。所述存储器具体可以是现代信息技术中用于保存信息的记忆设备。所述存储器可以包括多个层次,在数字系统中,只要能保存二进制数据的都可以是存储器;在集成电路中,一个没有实物形式的具有存储功能的电路也叫存储器,如RAM、FIFO等;在系统中,具有实物形式的存储设备也叫存储器,如内存条、TF卡等。In this implementation manner, the input device may specifically be one of the main apparatuses for information exchange between the user and the computer system. The input device may include a keyboard, a mouse, a camera, a scanner, a light pen, a handwriting input pad, a voice input device, etc.; the input device is used to input raw data and a program for processing these numbers into the computer. The input device can also acquire and receive data transmitted from other modules, units, and devices. The processor may be implemented in any suitable manner. For example, a processor may take the form of, for example, a microprocessor or a processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor, logic gates, switches, application specific integrated circuits ( Application Specific Integrated Circuit, ASIC), programmable logic controller and embedded microcontroller form, etc. The memory may specifically be a memory device used for storing information in modern information technology. The memory can include multiple levels. In a digital system, as long as it can store binary data, it can be a memory; in an integrated circuit, a circuit with a storage function that does not have a physical form is also called a memory, such as RAM, FIFO, etc.; In the system, the storage device with physical form is also called memory, such as memory stick, TF card, etc.

在本实施方式中,该计算机设备具体实现的功能和效果,可以与其它实施方式对照解释,在此不再赘述。In this embodiment, the functions and effects specifically implemented by the computer device can be explained in comparison with other embodiments, and will not be repeated here.

本说明书实施方式中还提供了一种基于区块链的开源软件漏洞管理方法的计算机存储介质,所述计算机存储介质存储有计算机程序指令,在所述计算机程序指令被执行时实现上述任意实施例中所述基于区块链的开源软件漏洞管理方法的步骤。Embodiments of this specification also provide a computer storage medium for a blockchain-based open source software vulnerability management method, where the computer storage medium stores computer program instructions, and implements any of the above embodiments when the computer program instructions are executed The steps of a blockchain-based open source software vulnerability management method described in .

在本实施方式中,上述存储介质包括但不限于随机存取存储器(Random AccessMemory,RAM)、只读存储器(Read-Only Memory,ROM)、缓存(Cache)、硬盘(Hard DiskDrive,HDD)或者存储卡(Memory Card)。所述存储器可以用于存储计算机程序指令。网络通信单元可以是依照通信协议规定的标准设置的,用于进行网络连接通信的接口。In this embodiment, the above-mentioned storage medium includes but is not limited to random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), cache (Cache), hard disk (Hard DiskDrive, HDD) or storage Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set according to a standard specified by a communication protocol.

在本实施方式中,该计算机存储介质存储的程序指令具体实现的功能和效果,可以与其它实施方式对照解释,在此不再赘述。In this embodiment, the functions and effects specifically implemented by the program instructions stored in the computer storage medium can be explained in comparison with other embodiments, and will not be repeated here.

本说明书实施例还提供一种计算机程序产品,包括计算机程序/指令,所述计算机程序/指令被处理器执行时实现上述任意实施例中所述的基于区块链的开源软件漏洞管理方法的步骤。Embodiments of this specification also provide a computer program product, including computer programs/instructions, when the computer program/instructions are executed by a processor, the steps of the block chain-based open source software vulnerability management method described in any of the foregoing embodiments are implemented. .

显然,本领域的技术人员应该明白,上述的本说明书实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本说明书实施例不限制于任何特定的硬件和软件结合。Obviously, those skilled in the art should understand that each module or each step of the above-mentioned embodiments of the present specification can be implemented by a general-purpose computing device, and they can be centralized on a single computing device, or distributed in multiple computing devices. network, they can optionally be implemented with program code executable by a computing device, so that they can be stored in a storage device and executed by the computing device, and in some cases, can be different from the The illustrated or described steps are performed in order, either by fabricating them separately into individual integrated circuit modules, or by fabricating multiple modules or steps of them into a single integrated circuit module. As such, embodiments of this specification are not limited to any particular combination of hardware and software.

应该理解,以上描述是为了进行图示说明而不是为了进行限制。通过阅读上述描述,在所提供的示例之外的许多实施方式和许多应用对本领域技术人员来说都将是显而易见的。因此,本说明书的范围不应该参照上述描述来确定,而是应该参照前述权利要求以及这些权利要求所拥有的等价物的全部范围来确定。It should be understood that the above description is for purposes of illustration and not limitation. From reading the above description, many embodiments and many applications beyond the examples provided will be apparent to those skilled in the art. The scope of the specification should, therefore, be determined not with reference to the above description, but should instead be determined with reference to the preceding claims, along with the full scope of equivalents to which such claims are entitled.

以上所述仅为本说明书的优选实施例而已,并不用于限制本说明书,对于本领域的技术人员来说,本说明书实施例可以有各种更改和变化。凡在本说明书的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本说明书的保护范围之内。The above descriptions are only preferred embodiments of the present specification, and are not intended to limit the present specification. For those skilled in the art, various modifications and changes may be made to the embodiments of the present specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this specification shall be included within the protection scope of this specification.

Claims (11)

1.一种基于区块链的开源软件漏洞管理方法,其特征在于,应用于漏洞管理系统,包括:1. A block chain-based open source software vulnerability management method, characterized in that, applied to a vulnerability management system, comprising: 获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据;Obtain the version data and vulnerability data corresponding to each open source software among multiple open source software used in the target application; 基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单;generating an open source software vulnerability list based on the version data and vulnerability data corresponding to each open source software; 将所述开源软件漏洞清单发送至区块链网络进行分布式存储;所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据;Send the open source software vulnerability list to a blockchain network for distributed storage; the blockchain network includes multiple blockchain nodes, the target application includes multiple modules, and the multiple blockchains The nodes are in one-to-one correspondence with the multiple modules, and the blockchain nodes are used to store open source software version data used in the corresponding modules; 轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;polling the open source software version data stored in each of the plurality of blockchain nodes; 根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。According to the polling result, the vulnerability data in the open source software vulnerability list stored in the blockchain network is managed. 2.根据权利要求1所述的开源软件漏洞管理方法,其特征在于,所述开源软件漏洞清单中记录有所述多个开源软件中各开源软件对应的版本数据以及所述版本数据对应的漏洞数据。2. The open-source software vulnerability management method according to claim 1, wherein the open-source software vulnerability list records version data corresponding to each open-source software in the plurality of open-source software and vulnerabilities corresponding to the version data. data. 3.根据权利要求1所述的开源软件漏洞管理方法,其特征在于,轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据,包括:3. The open source software vulnerability management method according to claim 1, wherein polling the open source software version data stored in each blockchain node in the plurality of blockchain nodes comprises: 定时轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;regularly polling the open source software version data stored in each of the plurality of blockchain nodes; 根据轮询得到的开源软件版本数据,统计所述多个开源软件中各开源软件当前使用的版本数据。According to the open source software version data obtained by polling, statistics on the version data currently used by each open source software in the plurality of open source software. 4.根据权利要求3所述的开源软件漏洞管理方法,其特征在于,根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理,包括:4. The open-source software vulnerability management method according to claim 3, wherein, according to the polling result, the vulnerability data in the open-source software vulnerability list stored in the blockchain network is managed, comprising: 将所述多个开源软件中各开源软件当前使用的版本数据与所述开源软件漏洞清单中的版本数据进行对比;comparing the version data currently used by each open source software in the plurality of open source software with the version data in the open source software vulnerability list; 在根据对比结果确定出当前使用的版本数据不包含所述开源软件漏洞清单中目标版本数据的情况下,将所述开源软件漏洞清单中的与所述目标版本数据对应的漏洞数据更新为无漏洞。If it is determined according to the comparison result that the currently used version data does not contain the target version data in the open source software vulnerability list, update the vulnerability data corresponding to the target version data in the open source software vulnerability list to no vulnerability . 5.一种基于区块链的开源软件漏洞管理方法,其特征在于,应用于区块链网络,包括:5. A blockchain-based open source software vulnerability management method, characterized in that, applied to a blockchain network, comprising: 接收漏洞管理系统发送的开源软件漏洞清单,并对所述开源软件漏洞清单进行分布式存储;所述开源软件漏洞清单是基于目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据生成的;Receive the open source software vulnerability list sent by the vulnerability management system, and store the open source software vulnerability list in a distributed manner; the open source software vulnerability list is based on version data corresponding to each open source software in a plurality of open source software used in the target application and vulnerability data generated; 响应于所述漏洞管理系统发送的轮询请求,向所述漏洞管理系统发送所述区块链网络中的多个区块链节点中各区块链节点中存储的开源版本数据;所述目标应用程序包括多个模块,所述多个模块与所述多个区块链节点一一对应,所述各区块链节点用于存储对应模块中使用的开源软件版本数据;In response to the polling request sent by the vulnerability management system, the open source version data stored in each blockchain node of the plurality of blockchain nodes in the blockchain network is sent to the vulnerability management system; the target application The program includes a plurality of modules, and the plurality of modules are in one-to-one correspondence with the plurality of blockchain nodes, and the blockchain nodes are used to store open source software version data used in the corresponding modules; 接收所述漏洞管理系统返回的轮询结果,并根据所述轮询结果对所述区块链网络中存储的开源软件漏洞清单进行管理。Receive the polling result returned by the vulnerability management system, and manage the open source software vulnerability list stored in the blockchain network according to the polling result. 6.根据权利要求5所述的开源软件漏洞管理方法,其特征在于,还包括:6. The open source software vulnerability management method according to claim 5, further comprising: 在所述区块链节点对应的模块中使用的开源软件进行升级的情况下,对所述区块链节点中存储的开源软件版本数据进行更新。When the open source software used in the module corresponding to the blockchain node is upgraded, the open source software version data stored in the blockchain node is updated. 7.一种基于区块链的开源软件漏洞管理装置,其特征在于,应用于漏洞管理系统,包括:7. A block chain-based open source software vulnerability management device, characterized in that, applied to a vulnerability management system, comprising: 获取模块,用于获取目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据;The acquisition module is used to acquire the version data and vulnerability data corresponding to each open source software in the multiple open source software used in the target application; 生成模块,用于基于所述各开源软件对应的版本数据和漏洞数据,生成开源软件漏洞清单;a generating module, configured to generate an open source software vulnerability list based on the version data and vulnerability data corresponding to the open source software; 发送模块,用于将所述开源软件漏洞清单发送至区块链网络进行分布式存储;所述区块链网络中包括多个区块链节点,所述目标应用程序包括多个模块,所述多个区块链节点与所述多个模块一一对应,所述区块链节点用于存储对应模块中使用的开源软件版本数据;a sending module for sending the open source software vulnerability list to a blockchain network for distributed storage; the blockchain network includes multiple blockchain nodes, the target application includes multiple modules, the The plurality of blockchain nodes are in one-to-one correspondence with the plurality of modules, and the blockchain nodes are used to store open source software version data used in the corresponding modules; 轮询模块,用于轮询所述多个区块链节点中各区块链节点中存储的开源软件版本数据;a polling module for polling open source software version data stored in each of the plurality of blockchain nodes; 管理模块,用于根据轮询结果,对所述区块链网络中存储的开源软件漏洞清单中的漏洞数据进行管理。The management module is used to manage the vulnerability data in the open source software vulnerability list stored in the blockchain network according to the polling result. 8.一种基于区块链的开源软件漏洞管理装置,其特征在于,应用于区块链网络,包括:8. A block chain-based open source software vulnerability management device, characterized in that, applied to a block chain network, comprising: 接收模块,用于接收漏洞管理系统发送的开源软件漏洞清单,并对所述开源软件漏洞清单进行分布式存储;所述开源软件漏洞清单是基于目标应用程序中使用的多个开源软件中各开源软件对应的版本数据和漏洞数据生成的;The receiving module is used to receive the open source software vulnerability list sent by the vulnerability management system, and perform distributed storage on the open source software vulnerability list; the open source software vulnerability list is based on each open source software used in the target application. The version data and vulnerability data corresponding to the software are generated; 发送模块,用于响应于所述漏洞管理系统发送的轮询请求,向所述漏洞管理系统发送所述区块链网络中的多个区块链节点中各区块链节点中存储的开源版本数据;所述目标应用程序包括多个模块,所述多个模块与所述多个区块链节点一一对应,所述各区块链节点用于存储对应模块中使用的开源软件版本数据;A sending module, configured to send, to the vulnerability management system, the open source version data stored in each blockchain node of the plurality of blockchain nodes in the blockchain network in response to a polling request sent by the vulnerability management system ; The target application program includes a plurality of modules, and the plurality of modules are in one-to-one correspondence with the plurality of blockchain nodes, and each blockchain node is used to store the open source software version data used in the corresponding modules; 管理模块,用于接收所述漏洞管理系统返回的轮询结果,并根据所述轮询结果对所述区块链网络中存储的开源软件漏洞清单进行管理。The management module is configured to receive the polling result returned by the vulnerability management system, and manage the open source software vulnerability list stored in the blockchain network according to the polling result. 9.一种计算机设备,其特征在于,包括处理器以及用于存储处理器可执行指令的存储器,所述处理器执行所述指令时实现权利要求1至6中任一项所述方法的步骤。9. A computer device, comprising a processor and a memory for storing instructions executable by the processor, when the processor executes the instructions, the steps of the method according to any one of claims 1 to 6 are implemented . 10.一种计算机可读存储介质,其上存储有计算机指令,其特征在于,所述指令被处理器执行时实现权利要求1至6中任一项所述方法的步骤。10. A computer-readable storage medium on which computer instructions are stored, wherein the instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 6. 11.一种计算机程序产品,包括计算机程序/指令,其特征在于,所述计算机程序/指令被处理器执行时实现权利要求1至6中任一项所述方法的步骤。11. A computer program product comprising computer programs/instructions, wherein the computer program/instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 6.
CN202210547152.8A 2022-05-19 2022-05-19 Open source software vulnerability management method and device based on block chain Pending CN114880718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210547152.8A CN114880718A (en) 2022-05-19 2022-05-19 Open source software vulnerability management method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210547152.8A CN114880718A (en) 2022-05-19 2022-05-19 Open source software vulnerability management method and device based on block chain

Publications (1)

Publication Number Publication Date
CN114880718A true CN114880718A (en) 2022-08-09

Family

ID=82676790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210547152.8A Pending CN114880718A (en) 2022-05-19 2022-05-19 Open source software vulnerability management method and device based on block chain

Country Status (1)

Country Link
CN (1) CN114880718A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116032527A (en) * 2022-11-08 2023-04-28 广东广信通信服务有限公司 Cloud computing-based data security vulnerability sensing system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918285A (en) * 2018-12-28 2019-06-21 北京奇安信科技有限公司 A kind of safety recognizing method and device of open source software
CN111164948A (en) * 2019-06-27 2020-05-15 阿里巴巴集团控股有限公司 Managing network security vulnerabilities using blockchain networks
CN111797402A (en) * 2020-06-17 2020-10-20 北京世纪互联宽带数据中心有限公司 Method, device and storage medium for detecting software vulnerability
CN111931183A (en) * 2020-07-31 2020-11-13 中国工商银行股份有限公司 Open source software security vulnerability processing method and device
CN112380541A (en) * 2020-11-16 2021-02-19 深圳壹账通智能科技有限公司 Method and device for detecting vulnerability of intelligent contract and computer equipment
WO2021036521A1 (en) * 2019-08-30 2021-03-04 中国移动通信有限公司研究院 Information sharing method, apparatus, system, electronic device, and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918285A (en) * 2018-12-28 2019-06-21 北京奇安信科技有限公司 A kind of safety recognizing method and device of open source software
CN111164948A (en) * 2019-06-27 2020-05-15 阿里巴巴集团控股有限公司 Managing network security vulnerabilities using blockchain networks
WO2021036521A1 (en) * 2019-08-30 2021-03-04 中国移动通信有限公司研究院 Information sharing method, apparatus, system, electronic device, and storage medium
CN111797402A (en) * 2020-06-17 2020-10-20 北京世纪互联宽带数据中心有限公司 Method, device and storage medium for detecting software vulnerability
CN111931183A (en) * 2020-07-31 2020-11-13 中国工商银行股份有限公司 Open source software security vulnerability processing method and device
CN112380541A (en) * 2020-11-16 2021-02-19 深圳壹账通智能科技有限公司 Method and device for detecting vulnerability of intelligent contract and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116032527A (en) * 2022-11-08 2023-04-28 广东广信通信服务有限公司 Cloud computing-based data security vulnerability sensing system and method

Similar Documents

Publication Publication Date Title
US10275343B2 (en) Application programming interface for providing access to computing platform definitions
US10541886B2 (en) Decentralized change management based on peer devices using a blockchain
US10740081B2 (en) Methods and apparatus for software lifecycle management of a virtual computing environment
US9253265B2 (en) Hot pluggable extensions for access management system
CN110324399B (en) Incorporating cluster awareness into the facility management portal
US8738966B2 (en) Change management system and method
CN107483241B (en) Method and device for downloading upgrade mirror image version in network element upgrading process
US20130097595A1 (en) Update scanning
US20150200959A1 (en) Managing risk in multi-node automation of endpoint management
US11516070B1 (en) Method and system for diagnosing and remediating service failures
CN111221550B (en) Rule updating method and device for streaming computing and streaming computing system
US20140281664A1 (en) Method and system for determining device configuration settings
CN115469833A (en) Method and device for implementing dynamic rule engine, electronic equipment and storage medium
CN112702195A (en) Gateway configuration method, electronic device and computer readable storage medium
CN112837155B (en) Method and device for registering and executing intelligent contracts in blockchain
US9716625B2 (en) Identifying compatible system configurations
CN114880718A (en) Open source software vulnerability management method and device based on block chain
US10817512B2 (en) Standing queries in memory
CN114430894A (en) Minimize production disruptions with scanning rules engine
US20230334344A1 (en) Distributed ledger based machine-learning model management
WO2019233454A1 (en) Chain code upgrading method and device
US9288178B2 (en) Inventory updating of an internet protocol (IP) alias within a highly available computing cluster
US12028236B2 (en) Consensus driven service promotion
US20130081007A1 (en) Providing continuous application availability during application update
US20230385113A1 (en) Progress Monitoring Service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination