An Internet-based vulnerability information cloud service method
A cloud service, Internet technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Such as figure 1 As shown, the Internet-based vulnerability information cloud service method described in the embodiment of the present invention mainly includes the following structural components: ① first establish the base layer and the business layer: use the base layer as a data resource platform and provide basic data for the center to carry out various services Resources; the business layer mainly includes information security product evaluation, system certification, service qualification certification, and personnel qualification certification. Special applications (subsystems) for system certification and special applications (subsystems) for personnel qualification certification; ② The internal display area is composed of the basic layer and the business layer. This display layer is the external display area and mainly includes CNNVD (China National Vulnerability Database of Information Security) and external websites. The service layer is the service area an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 