Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security configuration checking system

A technology of security configuration and system service, applied in the field of security configuration verification system, can solve problems such as lack of verification system

Pending Publication Date: 2018-11-27
信联科技(南京)有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are also many SCAP-related projects in the open source field, among which OpenSCAP, OVALDi and eSCAPe are more important. These projects form a complete development and utilization system for SCAP. eSCAPe is used to generate SCAPContent, while OpenSCAP, OVALDi is used to perform SCAP-based scans, but lacks a verification system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security configuration checking system
  • Security configuration checking system
  • Security configuration checking system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with accompanying drawing:

[0033] like figure 1 and figure 2 Shown: A security configuration verification system including

[0034] Basic platform, including basic software platform and hardware basic platform;

[0035] System processing layer, including data processing and system services;

[0036] Core service layer, including security configuration verification engine, report statistical analysis engine, asset scanning engine and network topology analysis engine;

[0037] The external access layer is used to display the system functions and third-party call interfaces. The function display includes security configuration inspection, asset scanning, configuration template library, report management and user management function display, and provides third-party interface calls based on webservice.

[0038] like figure 1 As shown, the system processing layer includes data processing and system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security configuration checking system. In a remote checking process, an access mode of target equipment, a login user name and a login password need to be output; remote check can be achieved only when a check target and a tool can be reached by an IP and the check target opens related service and ports; for the remote check, a plurality of sets of equipment can be simultaneously checked through the appointed concurrent access quantity; for the remote check which the IP cannot reach directly, property information and login information of skip intermediate equipment can be set through some intermediate equipment such as bastion host skip and through a skip table function; target equipment is accessed after skip; when a dynamic password is needed, corresponding intermediate equipment or the bastion host can be mutually logged in to form activity conversation through a share conversation function, a system can be connected to the intermediate equipment or the bastion host through the conversation to access the target equipment to collect security configuration to perform security configuration base line check, and finally a configuration check result is output.

Description

technical field [0001] The invention relates to the technical field of verification systems, in particular to a safety configuration verification system. Background technique [0002] Based on the benchmark security standard system that combines research and business security, a baseline security model for business systems is formed with reference to domestic and foreign standards, norms, and mature experience. Among these reference contents, the most worthwhile reference is the FDCC project (Federal Desktop Core Configuration, Federal Desktop Core Configuration Program) based on SCAP (Security Content Automation Protocol). [0003] FDCC's goal is to deploy a standard desktop operating system with integrated security configurations on more than 450,000 federal government computers to reduce security holes and illegal configurations in millions of federal computers while reducing acquisition and operating costs. This project was first carried out within the US Air Force. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26H04L12/751H04L29/08H04L45/02
CPCH04L41/12H04L43/10H04L45/02H04L63/20H04L67/08H04L67/02H04L63/168H04L41/0213
Inventor 孙帅李明柱
Owner 信联科技(南京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products