Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detection of device loophole information and computer device

A technology for testing equipment and equipment, which is applied in the field of network security, and can solve problems such as property loss, safety issues that cannot be ignored, and equipment manipulation

Pending Publication Date: 2019-01-11
BEIJING QIHOO TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of science and technology, electronic technology has also developed rapidly, and Internet of Things (IOT, Internet of Things) devices are becoming more and more popular, but security issues cannot be ignored. Once a loophole occurs, it may cause information theft, property loss, Equipment is manipulated, and even life is monitored, so it is urgent to provide users with security warnings to achieve security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detection of device loophole information and computer device
  • Method and device for detection of device loophole information and computer device
  • Method and device for detection of device loophole information and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] This embodiment provides a method for detecting device vulnerability information, such as figure 1 As shown, the methods include:

[0081] S110, obtaining basic information of all devices in the current local area network;

[0082] The current local area network in this embodiment mainly includes the home local area network. Since there are more and more smart devices in the home network, some devices have security risks. In order to achieve security protection, it is necessary to obtain all devices in the network for vulnerability detection. Then First, you need to obtain the basic information of each device. Among them, the equipment may include: mobile phones, computers, IPADs, routers, cameras, sweeping robots, and children's watches.

[0083] As an optional embodiment, since the network protocol used by each device may be different, obtaining the basic information of all devices in the current local area network includes: using a standard network protocol to iden...

Embodiment 2

[0126] Embodiment two

[0127] This embodiment provides a device for detecting device vulnerability information, such as figure 2 As shown, the device includes: an acquisition unit 21, a detection unit 22 and a display unit 23;

[0128] The obtaining unit 21 obtains basic information of all devices in the current local area network. The current local area network in this embodiment mainly includes the home local area network. Since there are more and more smart devices in the home network, some devices have security risks. In order to achieve security protection, it is necessary to obtain all devices in the network for vulnerability detection. Then The acquisition unit 21 first needs to acquire the basic information of each device. Among them, the equipment may include: mobile phones, computers, IPADs, routers, cameras, sweeping robots, and children's watches.

[0129] As an optional embodiment, since the network protocols used by each device may be different, the obtainin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a device for detection of device loophole information and a computer device. The method comprises the steps of: obtaining basic information of allthe devices in a current local area network; performing loophole detection for the basic information of all the devices based on a preset loophole detection rule, and obtaining and displaying loophole detection result information; and finally, performing detection of the loophole information of all the devices in the current local area network, and displaying the loophole detection result information of each device to users so as to perform safety early warning of the users and achieve the purpose of the safety protection.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and computer equipment for detecting equipment vulnerability information. Background technique [0002] With the continuous development of science and technology, electronic technology has also developed rapidly, and Internet of Things (IOT, Internet of Things) devices are becoming more and more popular, but security issues cannot be ignored. Once a loophole occurs, it may cause information theft, property loss, Equipment is manipulated, and even life is monitored. Therefore, it is urgent to provide users with security warnings to achieve security protection. Contents of the invention [0003] In view of the above problems, the present invention is proposed to provide a method, device and computer equipment for detecting device vulnerability information that overcome the above problems or at least partially solve the above problems. [0004] The first...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 孙诚林慧敏
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products