Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A platform system for merging vulnerabilities in cyberspace

A network space and vulnerability technology, applied in the transmission system, electrical components, etc., can solve the problems of influence, control and destruction, and achieve the effect of improving the industry level, accurate collection and vulnerability analysis, and improving scanning efficiency and accuracy

Active Publication Date: 2021-06-04
深圳极限智能信息技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a network space vulnerability merging platform system, through the network communication layer, distributed control technology and scanning, use the distributed advantages and efficiency to improve the work efficiency of the system platform, and can target large-scale regional network targets Scanning can improve my country's detection capabilities in the field of information security, completely reverse the situation of Trojan horse viruses using large data carriers for advanced persistent attacks and low discovery rates, and solve the current situation based on Internet security risks. Many threats are through viruses and infiltration Problems with the purpose of influencing, controlling and disrupting networks and stealing information on networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A platform system for merging vulnerabilities in cyberspace
  • A platform system for merging vulnerabilities in cyberspace
  • A platform system for merging vulnerabilities in cyberspace

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0033] Refer to the attached Figure 4 and Figure 5 : First, the administrator / executor logs in to the web to submit the task; then the distribution node controls the background, and the task will be automatically assigned to the idle node; again, the node will analyze the task process (information collection->IP range / domain name arrangement- >Vulnerability scanning), and store the collected information, vulnerabilities, and services in the database; finally, the node still sends a notification to the administrator’s mailbox, reporting the completion of the task scanning and whether there is a vulnerability report and vulnerability level, and completes the entire detection report process , the program will automatically assign tasks to each distribution node, and use the distribution nodes to perform some tedious tasks such as information collection, vulnerability analysis, and report output for target tasks, which can greatly save personnel usage and time, and the automatio...

Embodiment 3

[0035] Refer to the attached Figure 6 : Administrators or executives can view the vulnerability distribution map of the areas or tasks under their management through the web operation terminal 2, and can clearly view the key areas of vulnerabilities and safe areas (visual display of the distribution of vulnerability areas), which can facilitate emergency response and ensure Network security.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network space loophole merging platform system, which includes a network communication layer. The network communication layer connection end is provided with a plurality of Web operation terminals, and the network communication layer output end is respectively provided with a database server and a Web server. The connection end of the network communication layer is provided with a background program server, and the connection end of the background program server is provided with a plurality of distributed servers. The present invention is equipped with a network communication layer, distributed control technology and scanning, utilizes distributed advantages and efficiency to improve the working efficiency of the system platform, can scan large-scale area network targets, and is useful for research on how to allocate tasks and automatically identify idle nodes and As a result, the function of data return is optimized for special effects, and the search engine is used to collect information on the Internet and scan the target to improve the scanning efficiency and accuracy of a wide range of network conditions.

Description

technical field [0001] The invention relates to a network platform system, in particular to a network space loophole merging platform system. Background technique [0002] With the rapid development of information technology, computer networks have been widely used, and it has become the trend of the times to use a wide and open network environment for global communication. People's daily economic and social life is increasingly dependent on the Internet. [0003] Human society has gradually entered the information age characterized by digitization, networking, and intelligence. The explosive growth of information has further led to the advent of the era of big data. Various information systems such as search engines, social networks, e-government, e-finance, e-commerce, intelligent transportation, and intelligent factories have sprung up, quietly acquiring massive amounts of data to perceive, manage, and regulate all aspects of the real physical environment and social life ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1433H04L63/145H04L67/02
Inventor 赖洪昌
Owner 深圳极限智能信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products