Asset safety assessment method and system based on intelligence analysis

A security assessment and asset technology, applied in the field of network security, can solve the problems of high registration cost, inability to effectively evaluate the security status of digital assets, slow update speed, etc., and achieve the effect of convenient deployment and defense strategy

Active Publication Date: 2020-10-30
武汉思普崚技术有限公司
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing asset digital management has problems such as high registration cost, slow update speed, and inability to effectively evaluate the security status of digital assets
At the same time, traditional security detection can only resist security threats from a certain aspect, and will form an isolated island of security defense. It lacks the correlation analysis of security data of massive information, and cannot produce synergistic effects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset safety assessment method and system based on intelligence analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0035] figure 1 A general flow chart of the asset security assessment method based on intelligence analysis provided by this application, the method includes:

[0036] The edge layer collects equipment asset data, including the files stored in each network node, the key stored in the database, the mapping relationship table stored in the database, the email address of the local area network, and the IP address of each network node. Tables, email addresses, and IP addresses are respectively virtualized into single second-class digital assets one by one, and file names, key abstracts, table names, email addresses, and IP addresses are respectively ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asset safety assessment method and system based on intelligence analysis. Digital assets are obtained through an edge layer, summarizing equipment information and monitoringchannel data virtualization, fingerprint information of the digital assets is calculated, data information of multiple ways is collected, information data streams are obtained, feature vectors and morphological analysis of the information data streams are detected, tracing is conducted according to the fingerprint information of the digital assets, and therefore the digital assets in the network are evaluated, and an administrator can deploy defense strategies conveniently.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and system for asset security assessment based on intelligence analysis. Background technique [0002] In the past, digital assets refer to non-physical assets owned by enterprises that exist in the form of electronic data. However, with the development of network technology, physical assets can also be virtualized into electronic forms. From the perspective of users, each virtualized device on the operation interface, It is as simple and convenient as operating a physical device. [0003] The existing asset digital management has problems such as high registration cost, slow update speed, and inability to effectively evaluate the security status of digital assets. At the same time, traditional security detection can only resist security threats from a certain aspect, and will form an isolated island of security defense. It lacks the correlation analy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/2458G06N20/00
CPCG06F2216/03G06F16/2465G06N20/00H04L63/1416H04L63/1433H04L63/1441
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products