Unlock instant, AI-driven research and patent intelligence for your innovation.

A vulnerability data processing method and device

A technology of data processing and loopholes, applied in the direction of electrical digital data processing, computer security devices, instruments, etc., can solve the problems of resource consumption, large manpower consumption, and low management efficiency, so as to reduce labor costs, improve management efficiency, and save manpower resource effect

Active Publication Date: 2022-03-29
TAIKANG LIFE INSURANCE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, vulnerability scanning relies on corresponding scanning equipment and tools to conduct vulnerability scanning, and the results are not accurate enough. If it is directly included in the scope of vulnerability data processing, the vulnerability data will have great deviations, which cannot meet the requirements of large-scale routines. Vulnerability data processing for project security testing
[0004] However, the existing vulnerability data processing mode is still in the stage of manual analysis, processing and manual management. It takes a lot of manpower to store and analyze each vulnerability corresponding to each project in the later stage, and tests such as conventional security testing or penetration testing generally require Manual report writing required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability data processing method and device
  • A vulnerability data processing method and device
  • A vulnerability data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0078] One of the core ideas of the embodiment of the present invention is to set up an interactive page and a visualization page on the vulnerability data processing platform, receive the item to be tested input by the user on the interaction page, extract the original state information of the item to be tested and display it on the visualization page; When the project to be tested starts the test, the current state information of the project to be tested is generated according to the obtained test progress identifier; wherein, the current state information includes the completed test state; for the project to be tested in the completed test state, the corresponding vulnerability information is determined, according to Vulnerabili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a vulnerability data processing method and device, the method comprising: receiving the item to be tested input by the user on the interactive page of the vulnerability data processing platform; extracting the original state information of the item to be tested; The visual page of the vulnerability data processing platform shows the original status information of the item to be tested; when the item to be tested starts testing, the current status information of the item to be tested is generated; The project determines the corresponding vulnerability information; generates a test report according to the vulnerability information, and displays the test report on the interactive page. It solves the technical problem that a large number of items to be tested and their vulnerabilities cannot be managed uniformly in the prior art, realizes the transparency of the test task process, improves management efficiency, and reduces the consumption of processing resources.

Description

technical field [0001] The invention relates to the field of computer network information security, in particular to a vulnerability data processing method and device. Background technique [0002] At present, information technology is in a stage of rapid development, and the level of financial information application is gradually improving. While the business activities of financial institutions are constantly integrating with the Internet, financial institutions themselves are also facing increasingly severe security challenges. Among them, the security issues of various web applications are very easy to appear in the scene of complicated business, scattered information, and complicated personnel. Huge financial institutions are not only difficult to carry out unified risk management, but once a security incident occurs, the harm and impact will be huge, resulting in unpredictable losses. [0003] Most of the existing vulnerability data processing methods and vulnerabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 崔健
Owner TAIKANG LIFE INSURANCE CO LTD