Loophole finding and emergency verification implementation method
An implementation method and vulnerability technology, applied in the field of network security, can solve problems such as cumbersome work and incompetence, and achieve the effects of flexible structural adjustment, improved efficiency and security, and strong data compatibility.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to make the technical means, creative features, objectives and effects of the present invention easy to understand, the present invention will be further explained below in conjunction with specific embodiments.
[0029] Such as figure 1 As shown in 6, a method for implementing vulnerability discovery and emergency verification includes the following steps:
[0030] S1, system configuration setting, first, according to the network structure and network scale information to be detected, specify the vulnerability detection system configuration plan that meets the needs of the current vulnerability detection target;
[0031] S2: Vulnerability detection system configuration. After step S1 is completed, the vulnerability detection system configuration scheme designed according to step S1 is first constructed according to the network structure to be detected, and the vulnerability detection radar is connected to the network structure to be detected. Enter the vulnerability ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com