CN115238264A - Open source packet dynamic monitoring alarm method, system and readable storage medium - Google Patents

Open source packet dynamic monitoring alarm method, system and readable storage medium Download PDF

Info

Publication number
CN115238264A
CN115238264A CN202211155552.0A CN202211155552A CN115238264A CN 115238264 A CN115238264 A CN 115238264A CN 202211155552 A CN202211155552 A CN 202211155552A CN 115238264 A CN115238264 A CN 115238264A
Authority
CN
China
Prior art keywords
open source
software
package
information
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211155552.0A
Other languages
Chinese (zh)
Inventor
何文浪
何少坚
黄炫明
曾柏力
陈俞任
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Post Consumer Finance Co ltd
Original Assignee
China Post Consumer Finance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Post Consumer Finance Co ltd filed Critical China Post Consumer Finance Co ltd
Priority to CN202211155552.0A priority Critical patent/CN115238264A/en
Publication of CN115238264A publication Critical patent/CN115238264A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Abstract

The invention relates to a dynamic monitoring and alarming method, a system and a readable storage medium for an open source packet, which comprises the following steps: s1, scanning software to acquire third-party open source package information used by the software when the software is started; s2, collecting the third-party open source package information to a database and storing the third-party open source package information; s3, comparing the third-party open source package list scanned by the scanning component with the third-party open source package list with the security vulnerabilities one by one; s4, judging whether a third-party open source package with a security vulnerability exists or not through comparison, and if not, continuing to run a software starting process; and if the alarm exists, the component is blocked from starting the process, and warning information is printed to give an alarm.

Description

Open source packet dynamic monitoring alarm method, system and readable storage medium
Technical Field
The invention relates to the technical field of software security, in particular to a dynamic monitoring and alarming method and system for an open source packet and a readable storage medium.
Background
The third party development kit is a self-contained jar kit in the non-JDK, and is a jar kit or a java file which is developed by other organizations or individuals and realizes certain functions; the development kit utilizing the open sources can be used for designing and developing corresponding software programs, the mode of developing the independent products by using the open source codes can greatly save research and development cost and accelerate the research and development speed of information products, and the advantage of accelerated progress of open source ecology on informatization is remarkable.
The advantage of applying the third-party open source package in software development is obvious, but certain potential hazards such as security vulnerabilities exist, and backdoors or vulnerabilities of open source communities are very difficult to find.
In the daily Java software development and software security vulnerability scanning process, some software depends on part of third-party open source packages, for the third-party open source packages on which the software depends, because the number of the third-party open source packages is actually too large, all information cannot be mastered in real time, developers or security personnel are not clear about which third-party open source packages the software depends on, nor are they clear about which third-party open source packages have security vulnerabilities, and under the condition that it is determined that a certain third-party open source package has security vulnerabilities, the third-party open source package cannot be accurately and quickly analyzed to which software the third-party open source package is currently used.
At present, a mode for solving the above problems is to manually maintain a list of all third-party open source packages of the software, and when checking whether an open source package with a security vulnerability exists, by comparing the information of the third-party open source package with the information of the open source packages in the list of all third-party open source packages one by one, a software list with the security vulnerability is obtained, and then relevant developers are notified to analyze whether the responsible application relates to the relevant open source package, so as to perform security rectification and eliminate the potential safety hazard.
However, the above method requires manual registration and comparison by human labor, which is time-consuming and easy to miss, and has low efficiency, and in addition, because of non-dynamic comparison, the timeliness is poor, and the software with security holes cannot be intervened in time, so that the risk of security attack exists.
Disclosure of Invention
Based on the above, there is a need to provide an open source package dynamic monitoring alarm method, system and readable storage medium capable of solving the risk of applying a third party open source package in software development.
An aspect of the embodiments of the present invention provides a method for dynamically monitoring and alarming an open source packet, including the following steps:
s1, when software starts and initializes, an open source package scanning component scans the software so as to obtain third-party open source package information used by the software and obtain a third-party open source package list used by the software;
s2, associating the third-party open source package information with a software ID, and then collecting the third-party open source package list to a database through a message middleware and storing the third-party open source package list;
s3, acquiring third-party open source package list information with security vulnerabilities, and comparing the third-party open source package list scanned by the scanning component with the third-party open source package list information with the security vulnerabilities one by the open source package blocking component;
s4, judging whether a third-party open source packet with a security vulnerability exists or not through comparison, and if not, continuing to run a software starting process; and if the alarm exists, the component is blocked from starting the process, and warning information is printed to give an alarm.
Preferably, the third party open source package information includes a group name, a package name and a version number of the open source package.
Preferably, the database is a relational database.
Preferably, the step of scanning by the software to obtain information of all third-party open source packages on which the software depends includes:
acquiring an environment variable value from the environment variable of the software system to obtain a path list corresponding to the environment variable value;
then, scanning a directory in a path list to acquire all Jar package information under the directory;
and finally, scanning the Jar package information in the Jar package operated by the software, and acquiring all third-party open source package information depended by the software.
Preferably, the environment variable value includes a JAVA _ HOME environment variable value and a JAVA.
The invention also provides a dynamic monitoring and warning system for the open source packet, which comprises:
a third-party open source package acquisition module: the open source package scanning component is used for scanning the software when the software is started and initialized, so that the information of a third-party open source package used by the software is obtained, and a third-party open source package list used by the software is obtained;
a storage module: the system comprises a database, a message middleware and a third party open source package information database, wherein the database is used for storing the third party open source package information;
an information matching module: the system comprises a configuration page, a scanning component, an open source packet blocking component and a database, wherein the configuration page is used for storing third-party open source packet list information with security holes through a configuration storage interface, acquiring a software list which corresponds to a third-party open source packet in use according to the third-party open source packet information stored in the database, or acquiring all third-party open source packet lists on which software depends from a software system ID (identity), and comparing the third-party open source packet list scanned by the scanning component with the third-party open source packet list information with the security holes one by the open source packet blocking component;
a safety judgment module: the third-party open source package is used for judging whether a security vulnerability exists or not through comparison, and if not, the software starting process continues to run; and if the alarm exists, the component is blocked from starting the process, and warning information is printed to give an alarm.
Preferably, the storage module comprises a database, and the database is a relational database.
Preferably, the third-party open source package obtaining module includes:
an environment variable value acquisition module: the system comprises a software system, a path list and a control module, wherein the software system is used for acquiring an environment variable value from an environment variable of the software system to obtain the path list corresponding to the environment variable value;
a file package acquisition module: the method comprises the steps that a directory in a path list is scanned, and all Jar package information under the directory is obtained;
an information acquisition module: the method is used for scanning the Jar package information in the Jar package operated by the software and acquiring all third-party open source package information depended by the software.
Preferably, the system further comprises: the third-party open source package information comprises a group name, a package name and a version number of the open source package.
The invention provides a readable storage medium, wherein a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, the steps of the open source packet dynamic monitoring alarm method are realized.
The invention provides an open source package management method and an open source package management component based on configuration and dynamic running inspection, which can analyze all third-party open source packages depending on Java software, can inquire and analyze all Java software lists with security vulnerabilities according to the third-party open source packages with the security vulnerabilities, and can realize running blocking of the Java software with the security vulnerabilities.
The method can efficiently and accurately scan the third-party open source package information used by the software, greatly facilitates software developers and software security personnel to analyze and know the condition that the software uses the third-party open source package, and can effectively manage and control the software with the security vulnerability according to the configured third-party open source information with the security vulnerability, the open source package scanning component and the open source package blocking component, thereby avoiding the software security problem.
Drawings
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings. Like reference numerals refer to like parts throughout the drawings, and the drawings are not intended to be drawn to scale in actual dimensions, emphasis instead being placed upon illustrating the principles of the invention.
FIG. 1 is a flow chart of a method of an embodiment of the present invention;
fig. 2 is a schematic diagram of open source packet information acquisition according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a comparison between a list of third-party open source packages with security vulnerabilities and a third-party open source package used by software according to an embodiment of the present invention;
FIG. 4 is a flow chart of information scanning of the scanning component according to the embodiment of the present invention.
Detailed Description
The present invention will be better understood and implemented by those skilled in the art by the following detailed description of the embodiments taken in conjunction with the accompanying drawings, which are not intended to limit the scope of the present invention.
As shown in fig. 1 to 4, an embodiment of the present invention provides a dynamic monitoring and alarming method for an open source packet, including the following steps:
s1, when software is started and initialized, an open source package scanning assembly scans the software so as to obtain third-party open source package information used by the software and obtain a third-party open source package list used by the software;
s2, associating the third-party open source package information with a software ID, and then collecting and storing the third-party open source package information to a database through a message middleware; asynchronously sending the list information of the third-party open source package to a database for storage through message middleware;
s3, acquiring third-party open source package list information with security vulnerabilities, and comparing the third-party open source package list scanned by the scanning component with the third-party open source package list information with the security vulnerabilities one by the open source package blocking component;
the configuration page stores third-party open source package list information with security vulnerabilities through a configuration storage interface, a software list corresponding to a third-party open source package is obtained by the third-party open source package information according to the third-party open source package information stored in a database, or all third-party open source package lists on which software depends are obtained by a software system ID, and the open source package blocking component compares the third-party open source package list scanned by the scanning component with the third-party open source package list information with the security vulnerabilities one by one;
s4, judging whether a third-party open source packet with a security vulnerability exists or not through comparison, and if not, continuing to run a software starting process; and if the alarm exists, the component is blocked from starting the process, and warning information is printed to give an alarm. The third-party open source package for judging whether the security vulnerability exists specifically comprises the following steps: the third-party open source package list scanned by the scanning component is compared with the configured third-party open source package list information with the security vulnerability, so that whether the third-party open source package list scanned by the scanning component by the open source package blocking component is matched with the configured third-party open source package list information with the security vulnerability or not is judged, if so, the third-party open source package with the security vulnerability exists in the software, otherwise, the third-party open source package without the security vulnerability does not exist in the software.
And integrating an open source package scanning component on the software system, and scanning all third-party open source package information depended by the software through the open source package scanning component when the software is started and initialized.
The information of the third-party open source package scanned by the open source package scanning component is sent to a server side through message middleware (such as Kafka) and collected into a relational database (such as a Mysql database) for storage, so that the software system ID and the information of the third-party open source package can be associated and synchronized into the relational database for storage under the condition that software starting is not influenced.
And setting a query interface and a query page, wherein the query page queries all third-party open source package lists depended by the software or all software lists corresponding to the third-party open source packages in use through the query interface when inputting the ID of the software system or the third-party open source package information such as group name, package name and version number through the query interface.
Setting a configuration interface and a configuration page, inputting the information of the third-party open source packages with the security vulnerabilities such as group names, package names and version numbers into the configuration page, and storing all the third-party open source package lists with the security vulnerabilities through the configuration storage interface.
The software is integrated with the open source package blocking component, when the software is started and initialized, the open source package blocking component inquires all third-party open source package lists with security vulnerabilities through the configuration inquiry interface, the third-party open source package lists which are scanned out by the open source package scanning component and are in use are compared with the third-party open source package list information with the security vulnerabilities one by one, and if the configured third-party open source packages with the security vulnerabilities exist, the software is blocked from starting a process and warning information is printed.
In a preferred embodiment, the third-party open source package information includes a group name, a package name, and a version number of the open source package. The identity of the open source package is thus confirmed by the group name, package name and version number of the open source package.
In a preferred embodiment, the database is a relational database. And the relational database is used, so that the software system ID and the third-party open source package information are associated and synchronized to the relational database for storage under the condition of not influencing software starting, and preferably, the Mysql database can be used for scanning the third-party open source package information.
In a preferred embodiment, the step of scanning by the software to obtain information of all third-party open source packages on which the software depends specifically includes:
acquiring an environment variable value from the environment variable of the software system to obtain a path list corresponding to the environment variable value;
then, scanning a directory in a path list to acquire all Jar package information under the directory;
and finally, scanning the information of the Jar package in which the software runs to acquire all the open source package information of the third party on which the software depends.
In a preferred embodiment, the environment variable value includes a JAVA _ HOME environment variable value and a JAVA.
As shown in fig. 4, the scanning process of the open source packet scanning component specifically includes the following steps:
obtaining a JAVA _ HOME environment variable value from a software system environment variable to obtain a path corresponding to JAVA _ HOME;
scanning the directory jre/lib in the path to acquire all Jar package information under the directory;
scanning the directory lib in the path to acquire all Jar package information under the directory;
obtaining a java.class.path environment value from a software system environment variable to obtain a class path;
scanning classpath type paths, and acquiring all Jar package information under a type path directory;
scanning a software running directory to acquire software running Jar package information;
scanning all Jar package information in the Jar package run by software;
and after the scanning is finished, obtaining the list information of all third-party open source packages on which the software depends.
The invention also provides a dynamic monitoring and warning system for the open source packet, which comprises:
a third-party open source package acquisition module: the open source package scanning component is used for scanning the software when the software is started and initialized, so that the information of a third-party open source package used by the software is obtained, and a third-party open source package list used by the software is obtained;
a storage module: the system comprises a database, a message middleware and a third party open source package information database, wherein the database is used for storing the third party open source package information; asynchronously sending the third-party open source package information to a database through message middleware for storage;
an information matching module: the system comprises a configuration page, a source-opening package blocking component, a scanning component and a database, wherein the configuration page is used for storing third-party source-opening package list information with security holes through a configuration storage interface, acquiring a software list of a corresponding third-party source-opening package in use according to the third-party source-opening package information stored in the database, or acquiring all third-party source-opening package lists on which software depends from a software system ID (identity), and comparing the third-party source-opening package lists scanned by the scanning component with the third-party source-opening package lists with security holes one by the source-opening package blocking component;
a safety judgment module: the third-party open source package is used for judging whether a security vulnerability exists or not through comparison, and if not, the software starting process continues to run; and if the alarm exists, the component is blocked from starting the process, and warning information is printed to give an alarm.
In a preferred embodiment, the storage module comprises a database, which is a relational database. The software system ID and the third party open source package information are related and synchronized to the relational database for storage under the condition that the software starting is not influenced. Preferably, the Mysql database is used for storage.
In a preferred embodiment, the third-party open source package obtaining module includes:
an environment variable value acquisition module: the path list is used for acquiring the environment variable value from the environment variable of the software system to obtain a path list corresponding to the environment variable value;
a file package acquisition module: the method comprises the steps that a directory in a path list is scanned, and all Jar package information under the directory is obtained;
an information acquisition module: the method is used for scanning the Jar package information in the Jar package operated by the software and acquiring all third-party open source package information depended by the software.
In a preferred embodiment, the system further comprises: the third-party open source package information comprises a group name, a package name and a version number of the open source package.
The invention provides a readable storage medium, wherein a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, the steps of the open source packet dynamic monitoring alarm method are realized.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A dynamic monitoring and alarming method for an open source packet is characterized by comprising the following steps:
s1, when software is started and initialized, an open source package scanning assembly scans the software so as to obtain third-party open source package information used by the software and obtain a third-party open source package list used by the software;
s2, associating the third-party open source package information with a software ID, and then collecting the third-party open source package list to a database through a message middleware and storing the third-party open source package list;
s3, acquiring third-party open source package list information with security vulnerabilities, and comparing the third-party open source package list scanned by the scanning component with the third-party open source package list information with the security vulnerabilities one by the open source package blocking component;
s4, judging whether a third-party open source package with a security vulnerability exists or not through comparison, and if not, continuing to run a software starting process; and if the alarm exists, the component is blocked from starting the process, and warning information is printed to give an alarm.
2. The method of claim 1, wherein the third party open source package information includes a group name, a package name, and a version number of the open source package.
3. The method of claim 1, wherein the database is a relational database.
4. The method according to claim 3, wherein the step of the software scanning and acquiring the information of all third-party open source packages on which the software depends specifically includes:
acquiring an environment variable value from the environment variable of the software system to obtain a path list corresponding to the environment variable value;
then, scanning a directory in a path list to acquire all Jar package information under the directory;
and finally, scanning the Jar package information in the Jar package operated by the software, and acquiring all third-party open source package information depended by the software.
5. The method of claim 4, wherein the environment variable value comprises a JAVA _ HOME environment variable value and a JAVA.class.path environment variable value, wherein a path corresponding to JAVA _ HOME is obtained according to the JAVA _ HOME environment variable value, and a class path is obtained according to the JAVA.class.path environment variable value.
6. An open source packet dynamic monitoring alarm system, the system comprising:
a third-party open source package acquisition module: the open source package scanning component is used for scanning the software when the software is started and initialized, so that the information of a third-party open source package used by the software is obtained, and a third-party open source package list used by the software is obtained;
a storage module: the system comprises a database, a message middleware and a third party open source package information database, wherein the database is used for storing the third party open source package information;
an information matching module: the system comprises a configuration page, a scanning component, an open source packet blocking component and a database, wherein the configuration page is used for storing third-party open source packet list information with security holes through a configuration storage interface, acquiring a software list which corresponds to a third-party open source packet in use according to the third-party open source packet information stored in the database, or acquiring all third-party open source packet lists on which software depends from a software system ID (identity), and comparing the third-party open source packet list scanned by the scanning component with the third-party open source packet list information with the security holes one by the open source packet blocking component;
a safety judgment module: the third-party open source package is used for judging whether a security vulnerability exists or not through comparison, and if not, the software starting process continues to run; if yes, the component is blocked from starting the process, and warning information is printed to give an alarm.
7. The system of claim 6, wherein the storage module comprises a database, the database being a relational database.
8. The system of claim 7, wherein the third party open source package acquisition module comprises:
an environment variable value acquisition module: the path list is used for acquiring the environment variable value from the environment variable of the software system to obtain a path list corresponding to the environment variable value;
a file package acquisition module: the method comprises the steps that a directory in a path list is scanned, and all Jar package information under the directory is obtained;
an information acquisition module: the method is used for scanning the Jar package information in the Jar package operated by the software and acquiring all third-party open source package information depended by the software.
9. The system of claim 8, wherein the system further comprises: the third-party open source package information comprises a group name, a package name and a version number of the open source package.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the open source packet dynamic monitoring alarm method according to any one of claims 1 to 5.
CN202211155552.0A 2022-09-22 2022-09-22 Open source packet dynamic monitoring alarm method, system and readable storage medium Pending CN115238264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211155552.0A CN115238264A (en) 2022-09-22 2022-09-22 Open source packet dynamic monitoring alarm method, system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211155552.0A CN115238264A (en) 2022-09-22 2022-09-22 Open source packet dynamic monitoring alarm method, system and readable storage medium

Publications (1)

Publication Number Publication Date
CN115238264A true CN115238264A (en) 2022-10-25

Family

ID=83667042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211155552.0A Pending CN115238264A (en) 2022-09-22 2022-09-22 Open source packet dynamic monitoring alarm method, system and readable storage medium

Country Status (1)

Country Link
CN (1) CN115238264A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061794A1 (en) * 2005-09-13 2007-03-15 Mausolf Jeffry R Method and apparatus for classpath optimization in a Java runtime environment
CN110909363A (en) * 2019-11-25 2020-03-24 中国人寿保险股份有限公司 Software third-party component vulnerability emergency response system and method based on big data
CN111625839A (en) * 2020-05-29 2020-09-04 深圳前海微众银行股份有限公司 Third-party component vulnerability detection method, device, equipment and computer storage medium
US20220083667A1 (en) * 2020-09-16 2022-03-17 At&T Intellectual Property I, L.P. Open Source Software Security Vulnerability Prioritization Scheme
CN115033887A (en) * 2022-06-17 2022-09-09 中国平安人寿保险股份有限公司 Open source component safety management method and system, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061794A1 (en) * 2005-09-13 2007-03-15 Mausolf Jeffry R Method and apparatus for classpath optimization in a Java runtime environment
CN110909363A (en) * 2019-11-25 2020-03-24 中国人寿保险股份有限公司 Software third-party component vulnerability emergency response system and method based on big data
CN111625839A (en) * 2020-05-29 2020-09-04 深圳前海微众银行股份有限公司 Third-party component vulnerability detection method, device, equipment and computer storage medium
US20220083667A1 (en) * 2020-09-16 2022-03-17 At&T Intellectual Property I, L.P. Open Source Software Security Vulnerability Prioritization Scheme
CN115033887A (en) * 2022-06-17 2022-09-09 中国平安人寿保险股份有限公司 Open source component safety management method and system, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107545181B (en) Program operating method, terminal, and computer-readable storage medium
US11805136B2 (en) Scanning container images and objects associated with building the container images
US20180173808A1 (en) Intent and bot based query guidance
US20130262641A1 (en) Generating Roles for a Platform Based on Roles for an Existing Platform
CN104598815B (en) Recognition methods, device and the client of malice advertising program
US20200142674A1 (en) Extracting web api endpoint data from source code
CN109710220B (en) Relational database query method, relational database query device, relational database query equipment and storage medium
US20150317479A1 (en) Scanning device, cloud management device, method and system for checking and killing malicious programs
CN112667697A (en) Method and device for acquiring real estate information by combining RPA and AI
CN110210241B (en) Data desensitization method and device
CN111338693B (en) Model construction-based target file generation method, server and storage medium
US20080162444A1 (en) System and method for monitoring and providing patent information automatically
CN115033894A (en) Software component supply chain safety detection method and device based on knowledge graph
CN112256318A (en) Construction method and equipment for dependent product
CN111966630B (en) File type detection method, device, equipment and medium
CN115238264A (en) Open source packet dynamic monitoring alarm method, system and readable storage medium
CN117349187A (en) Model persistence-based interactive vulnerability analysis method and system
CN112182065A (en) Asset management system and method based on automatic acquisition and multi-source import
CN115062084B (en) Method and device for constructing API (application programming interface) based on database metadata
CN114428706B (en) Interface monitoring method and device, storage medium and electronic equipment
US20140222779A1 (en) Simplified query generation from prior query results
US20140136831A1 (en) Portable Lightweight LDAP Directory Server and Database
CN114201757A (en) Confidence coefficient identification method based on software vulnerability recognition and information storage medium
CN113593664A (en) Data entry method based on electronic log in EDC system and EDC system thereof
CN113326506A (en) Applet monitoring method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221025