Handheld terminal of realizing computer information security protection, vulnerability scanning and protection reinforcement and protection method

A hand-held terminal and vulnerability scanning technology, applied in computer security devices, computing, platform integrity maintenance, etc., can solve problems such as high professional skills requirements for operation and maintenance personnel, untimely protection schemes, and inability to fully grasp and understand , to achieve the effect of saving manpower, improving the level of safety protection and improving work efficiency

Active Publication Date: 2018-11-16
JIANGSU ELECTRIC POWER CO
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are three main problems: first, the corresponding system applications and protection solutions of equipment manufacturers are generally untimely, and cannot issue countermeasures as soon as security vulnerabilities are discovered; second, operation and maintenance personnel are required to have certain computer business knowledge , it is necessary to manually reinforce the upgrade patch. Due to the large differences in various systems and equipment models and application conditions, it is impossible to fully grasp the understanding, and the professional skills of operation and maintenance personnel are required to be high; the third is that after the system and equipment are hardened , it is impossible to conduct effective tests to verify whether the reinforcement scheme is effective for similar security vulnerability attacks in the future, and there is still some uncertainty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handheld terminal of realizing computer information security protection, vulnerability scanning and protection reinforcement and protection method
  • Handheld terminal of realizing computer information security protection, vulnerability scanning and protection reinforcement and protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0025] Such as figure 1 As shown, a handheld terminal that realizes computer information security protection loophole scanning and protection reinforcement provided by the present invention includes a USB interface, a display screen, a security loophole scanning analysis module, an automatic upgrade patch reinforcement module, a security loophole attack testing module, and a system Security protection version database automatic update module;

[0026] The handheld terminal is inserted into the device host to be detected through the USB interface to realize security vulnerability scanning and protection reinforcement of the device host;

[0027] 1) Security vulnerability scanning and analysis module;

[0028] The security vulnerability scanning and analysis module scans and analyzes the security vulnerabilities of the target host or network to find potential s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a handheld terminal of realizing computer information security protection, vulnerability scanning and protection reinforcement. The terminal includes a USB interface, a securityvulnerability scanning and analysis module, an automatic upgrading patch reinforcement module, a security vulnerability attack test module and a system security protection version database automatic-updating module. The handheld terminal is plugged onto a host, which needs to be detected, through the USB interface, and realizes security protection, vulnerability scanning and protection reinforcement on the host through the security vulnerability scanning and analysis module, the automatic upgrading patch reinforcement module, the security vulnerability attack test module and the system security protection version database automatic-updating module. The terminal improves working efficiency of computer security protection reinforcement, and saves manpower and material resource costs.

Description

technical field [0001] The invention relates to the technical field of power system automation, in particular to a hand-held terminal capable of scanning computer information security protection vulnerabilities. Background technique [0002] In recent years, with the promulgation of the national "Network Security Law", higher requirements have been put forward for the security of network products and information data. At present, people's daily work has become increasingly inseparable from network information services. Among them, system applications The security and stability of a series of computer equipment such as servers, data storage devices, and personal office computers have played an increasingly important role in whether we can use information and data reliably and safely. [0003] The existing general practice for security protection and reinforcement of computer equipment is: According to the manufacturers of operating systems, system applications, equipment hard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56H04L29/06
CPCG06F21/563G06F21/566G06F21/577H04L63/1416H04L63/1433H04L63/1441
Inventor 俞力珉缪秋高红娟蒋业婷白晨阳董金华赵紫恒张威
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products