Unlock instant, AI-driven research and patent intelligence for your innovation.

An Internet-based vulnerability information cloud service method

A cloud service, Internet technology, applied in the field of information security

Inactive Publication Date: 2016-06-15
CHINA INFORMATION TECH SECURITY EVALUATION CENT +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an Internet-based vulnerability information cloud service method that provides rich information security data for relevant government departments, "8+2" important industries, information security manufacturers and all walks of life, so as to solve the shortage of existing vulnerability information services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Internet-based vulnerability information cloud service method
  • An Internet-based vulnerability information cloud service method
  • An Internet-based vulnerability information cloud service method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Such as figure 1 As shown, the Internet-based vulnerability information cloud service method described in the embodiment of the present invention mainly includes the following structural components: ① first establish the base layer and the business layer: use the base layer as a data resource platform and provide basic data for the center to carry out various services Resources; the business layer mainly includes information security product evaluation, system certification, service qualification certification, and personnel qualification certification. Special applications (subsystems) for system certification and special applications (subsystems) for personnel qualification certification; ② The internal display area is composed of the basic layer and the business layer. This display layer is the external display area and mainly includes CNNVD (China National Vulnerability Database of Information Security) and external websites. The service layer is the service area an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an Internet-based vulnerability information cloud service method. Firstly, a data source is selected, a characteristic vulnerability is extracted from a resource platform, and then a core data source is determined, a data set is established, and a statistical trend analysis is performed on it; through Different time points divide the life cycle of a vulnerability into several stages, and each stage reflects its own status and accompanying risks; data preprocessing, mapping, drawing, and display are performed. The beneficial effects of the present invention are as follows: through data analysis, data mining, and data display on loopholes and other data, combined with the cloud computing model, Internet-based loophole information cloud services are implemented, which is conducive to realizing internal applications, supporting leadership decision-making, and popularizing information security to the public Information, auxiliary information security situation assessment and other functions; this method mode has great flexibility, enough to adapt to various types and sizes of applications in various software development and deployment stages.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an Internet-based vulnerability information cloud service method. Background technique [0002] Cloud computing is an important part of emerging industries. Cloud computing is a mode of delivery and use of IT resources, which refers to obtaining the required hardware, Resources such as platforms, software, and services; the network that provides resources is called "cloud", and its computing power is usually built by distributed large-scale clusters and server virtualization software. The advantage of cloud computing is that the resources in the "cloud" can be infinitely expanded from the user's point of view, and can be obtained at any time, used on demand, expanded at any time, and paid for use. [0003] As important information security data, vulnerability information is of great significance to the development of national information security. NVD (National Vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/62H04L29/08H04L12/58G06F21/57
Inventor 吴世忠易锦张磊刘晖赵向辉刘彦钊张建军王峰闵京华曾昭沛林涛谢庆庆徐斌叶林白露李欣
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT