Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety assessment method and safety assessment equipment

A technology for evaluating equipment and safety, applied in the field of safety, it can solve the problems of relying on human evaluation, high requirements for human resources, and the inability of evaluation resources to meet evaluation needs.

Pending Publication Date: 2019-07-09
NATIONZ TECH INC
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to solve the problem that the existing evaluation resources cannot meet the evaluation requirements because the traditional safety evaluation scheme relies on human evaluation and has high requirements for human resources. Aiming at this technical problem, a safety evaluation method is provided and safety assessment equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety assessment method and safety assessment equipment
  • Safety assessment method and safety assessment equipment
  • Safety assessment method and safety assessment equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] In order to solve the problem that the security assessment scheme in the prior art relies on a large amount of manpower input, resulting in the assessment resources being unable to meet the existing assessment requirements and restricting the improvement of industrial efficiency, this embodiment provides a security assessment method, see figure 1 Flowchart showing the safety assessment method:

[0049] S102: The security evaluation device acquires characteristic data of bypass leakage of an evaluation object.

[0050] The evaluation object refers to the object whose security needs to be evaluated, especially the object used for encryption. It can be hardware, such as a mobile phone, a security chip, etc., or program code. Taking encrypted electronic equipment in hardware devices as an example, it will generate bypass leakage information during operation, such as time consumption, power consumption or electromagnetic radiation, and these bypass leakage information may ...

Embodiment 2

[0069] This embodiment will continue to introduce the security evaluation method provided by the present invention on the basis of the first embodiment. It is assumed that the evaluation object in this embodiment is a chip, and the evaluation personnel define various vulnerabilities that may appear in the chip based on experience. Corresponding vulnerability model. The vulnerability model can be stored in the memory of the security assessment device, or in other storage devices other than the security assessment device. The main security assessment device can obtain the corresponding vulnerability model data when evaluating the chip. , see below image 3 Flowchart of the safety assessment method shown:

[0070] S302: The safety evaluation device collects the bypass leakage waveform data of the chip.

[0071] First, the safety assessment equipment uses radio frequency acquisition equipment to collect the electromagnetic radiation of the target chip, and after frequency mixing...

Embodiment 3

[0101] This embodiment provides a security evaluation device, please refer to Figure 5 :

[0102] The security assessment device 50 includes a data acquisition module 502 , a feature extraction module 504 , a feature matching module 506 and a vulnerability judgment module 508 . Wherein the data acquisition module 502 is used to obtain the feature data of the evaluation object bypass leakage; the feature extraction module 504 is used to extract the potential vulnerability features corresponding to the vulnerability model from the feature data of the evaluation object according to the pre-stored vulnerability model; the feature matching module 506 It is used to match the extracted potential vulnerability features with the standard features of the vulnerability model; and the vulnerability judgment module 508 is used to determine whether the evaluation object has a vulnerability corresponding to the vulnerability model according to the matching result.

[0103] For the specific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety assessment method and safety assessment equipment, and the safety assessment equipment obtains a vulnerability model in advance through abstraction according to vulnerabilities possibly appearing in an assessment object, and stores the vulnerability model and standard features of the vulnerability model. During an evaluation phase, the safety assessment equipment acquires characteristic data of the assessment object, extracts potential vulnerability features corresponding to the vulnerability model from the feature data of the assessment object according to a preset vulnerability model of the assessment object, and matches the extracted potential vulnerability features with standard features of the vulnerability model to determine whether the assessment object has a leakage hidden danger corresponding to the vulnerability model or not according to a matching result. When the safety assessment is carried out on the assessment object, the safety assessment equipment can automatically carry out assessment work according to the preset vulnerability model and the standard characteristics corresponding to the vulnerability model without depending on manpower, so that the requirement of safety assessment on manpower resources is reduced, and the optimal configuration of the resources is favorably realized.

Description

technical field [0001] The present invention relates to the field of security technology, and more specifically, to a security assessment method and security assessment equipment. Background technique [0002] In traditional security assessment schemes, manpower plays a dominant role in the assessment work. With the continuous improvement of hardware technology and protection strategies of security products, traditional security assessment solutions have faced more and more challenges: hidden dangers of product information leakage still exist, and compared with the past, the difficulty of collecting information leakage and the risk of information leakage Analysis complexity has been increased. But at the same time, the evaluation resources available for security evaluation have not increased. Therefore, if the traditional security evaluation method continues to be used, the evaluation resources cannot meet the evaluation requirements. Contents of the invention [0003] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/556G06F21/577
Inventor 唐有
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products