Asset vulnerability identification method, device and system

An asset and vulnerability technology, applied in the field of network security, can solve the problem of single asset vulnerability detection

Inactive Publication Date: 2020-01-17
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method, device and system for identifying asset vulnerabilities, so as to solve the technical problem that the existing asset vulnerability identification methods are relatively single in detecting asset vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset vulnerability identification method, device and system
  • Asset vulnerability identification method, device and system
  • Asset vulnerability identification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] According to an embodiment of the present invention, an embodiment of a method for identifying asset vulnerabilities is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0036] figure 1 is a method for identifying asset vulnerabilities according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0037] Step S102, acquiring asset information of the asset to be detected;

[0038] Step S104, sending the asset information to the cloud data center, so that the cloud data center performs vulnerability identification detection on the asset to be detected based on the asset information, and generates a vuln...

Embodiment 2

[0059] The present invention also provides an asset vulnerability identification device, which is used to implement the asset vulnerability identification method provided by the above-mentioned content of the embodiment of the present invention. The following is a specific introduction of the asset vulnerability identification device provided by the embodiment of the present invention.

[0060] Such as figure 2 As shown, the above asset identification device includes: an acquisition unit 10 , a sending unit 20 and an early warning unit 30 .

[0061] The acquisition unit 10 is used to acquire asset information of the asset to be detected;

[0062] The sending unit 20 is configured to send the asset information to the cloud data center, so that the cloud data center performs vulnerability identification detection on the asset to be detected based on the asset information, and generates a vulnerability identification result, wherein the The cloud data center stores target threa...

Embodiment 3

[0069] The present invention also provides an asset vulnerability identification system, which is used to implement the asset vulnerability identification system provided by the above-mentioned content of the embodiments of the present invention. The following is a specific introduction of the asset vulnerability identification system provided by the embodiments of the present invention.

[0070] Such as image 3 As shown, the above-mentioned asset identification system includes: a local asset information base 100 , a cloud data center 200 and a vulnerability warning platform 300 .

[0071] The local asset information library 100 is used to collect and store asset information of assets to be detected;

[0072] The cloud data center 200 is configured to perform vulnerability identification and detection on the asset to be detected based on the asset information, and generate a vulnerability identification result;

[0073] The vulnerability early warning platform 300 is used to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asset vulnerability identification method, device and system, and relates to the technical field of network security, and the method comprises the steps: obtaining the assetinformation of to-be-detected assets; sending the asset information to a cloud data center; the cloud data center performing vulnerability identification detection on the to-be-detected assets based on the asset information and generating a vulnerability identification result; wherein the cloud data center stores target threat intelligence data, and the target threat intelligence data comprises atleast one of threat intelligence data uploaded by a security service provider, threat intelligence data uploaded by a security intelligence organization and threat intelligence data uploaded by an enterprise to which assets to be detected belong; and obtaining the vulnerability identification result, and generating early warning information based on the vulnerability identification result, thereby solving the technical problem that an existing asset vulnerability identification method is relatively single in asset vulnerability detection.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and system for identifying asset vulnerabilities. Background technique [0002] Under the current network security technology conditions, the occurrence of network attacks is basically a malicious act carried out by network threats using the vulnerabilities exposed by information assets. In cyberspace, cyber threats exist objectively. To reduce the risk of cyber attacks, it is a very effective security technical measure to strengthen the vulnerabilities of information assets. However, before hardening asset vulnerabilities, it is necessary to know the vulnerabilities faced by information assets. Therefore, information asset vulnerability detection is extremely important for network security protection. [0003] However, the existing vulnerability detection methods have a relatively single technical problem in asset vulnerability detection. [0004] For...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 王英新范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products