A Vulnerability Discovery and Emergency Verification Implementation Method
An implementation method and vulnerability technology, applied in the field of network security, can solve problems such as cumbersome work and incompetence, and achieve the effects of flexible structure adjustment, improved efficiency and security, and simple system composition
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.
[0029] like figure 1 -As shown in -6, a method for implementing vulnerability discovery and emergency verification includes the following steps:
[0030] S1. System configuration setting. First, according to the network structure and network scale information to be detected, specify the configuration scheme of the vulnerability detection system that meets the needs of the current vulnerability detection target;
[0031] S2, configuration of the vulnerability detection system. After completing step S1, according to the configuration scheme of the vulnerability detection system designed in step S1, first construct a vulnerability detection device according to the network structure to be detected and connect the vulnerability detection device with th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com