US 12,475,233 B2
Data processing method and apparatus
Hao Zhou, Hangzhou (CN); Ruichao Liu, Hangzhou (CN); Fei Shi, Hangzhou (CN); and Kan Dong, Hangzhou (CN)
Assigned to Hangzhou AliCloud Feitian Information Technology Co., Ltd., Hangzhou (CN)
Appl. No. 18/691,837
Filed by Hangzhou AliCloud Feitian Information Technology Co., Ltd., Hangzhou (CN)
PCT Filed Feb. 3, 2023, PCT No. PCT/CN2023/074419
§ 371(c)(1), (2) Date Mar. 13, 2024,
PCT Pub. No. WO2023/155697, PCT Pub. Date Aug. 24, 2023.
Claims priority of application No. 202210138769.4 (CN), filed on Feb. 15, 2022.
Prior Publication US 2024/0394380 A1, Nov. 28, 2024
Int. Cl. G06F 11/36 (2025.01); G06F 11/07 (2006.01); G06F 21/56 (2013.01); G06F 21/57 (2013.01); G06F 21/74 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 11/0793 (2013.01); G06F 21/74 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A data processing method, applied to a target device in which a Linux operating system is running, wherein a first program is deployed in the Linux operating system, and the method comprises:
loading a target loading and invasion machine into a first memory space of the first program, and acquiring a vulnerability repair library for the first program through the target loading and invasion machine;
creating, in the first memory space, a second memory space for the target loading and invasion machine, and configuring a second runtime environment isolated from a first runtime environment of the first program, wherein the second memory space is simply available to the target loading and invasion machine and to a program loadable by the target loading and invasion machine;
loading the vulnerability repair library in the second memory space based on the second runtime environment, and performing a vulnerability repair on the first program by using the vulnerability repair library.