Unlock instant, AI-driven research and patent intelligence for your innovation.

Security baseline detection method and security baseline detection system for embedded system

An embedded system and security baseline technology, applied in the computer field, can solve the problem that security baseline detection cannot be applied to embedded systems.

Pending Publication Date: 2020-12-29
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In some cases, detection operations can be performed on the security baseline of server systems or desktop systems. These systems are very standardized and unified systems, but because embedded systems can be tailored according to various applications, they are very are diverse, so security baseline testing for these systems does not apply to embedded systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security baseline detection method and security baseline detection system for embedded system
  • Security baseline detection method and security baseline detection system for embedded system
  • Security baseline detection method and security baseline detection system for embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the objects, technical solutions, and advantages of the present disclosure more apparent, exemplary embodiments according to the present disclosure will be described in detail below with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present disclosure, rather than all the embodiments of the present disclosure, and it should be understood that the present disclosure is not limited by the exemplary embodiments described here.

[0030] In this specification and the drawings, substantially the same or similar steps and elements are denoted by the same or similar reference numerals, and repeated descriptions of these steps and elements will be omitted. Meanwhile, in the description of the present disclosure, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance or ranking.

[0031] Cloud ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security baseline detection method and system, relates to cloud security services, and is used for providing security services for users based on a cloud computing platform.The method is used for remotely carrying out security baseline detection on the embedded system carried on the embedded equipment so as to reduce the possibility that the embedded system is attacked.The method comprises the following steps: establishing remote connection with a to-be-detected embedded system, and acquiring system information data of the embedded system; generating a security baseline detection rule for the embedded system to be detected; analyzing and processing the acquired system information data; performing structured processing on the analyzed system information data to obtain structured system information data with unified format and attribute; performing security baseline detection on the structured system information data by using a security baseline detection ruleto obtain a security baseline detection result of the embedded system; and outputting and displaying a security baseline detection result of the embedded system.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and more specifically, to a method for detecting a security baseline of an embedded system and a system for detecting a security baseline. Background technique [0002] Embedded systems are application-centric, based on computer technology, and the software and hardware can be tailored. They are suitable for special-purpose computer systems that have strict requirements on function, reliability, cost, volume, and power consumption. The most typical feature of an embedded system is that it is closely related to people's daily life. Any ordinary person may have all kinds of electronic products that use embedded technology, ranging from micro-digital devices such as cameras and smart door locks to large information systems. Home appliances, smart appliances, smart robots, cars, etc., all kinds of new embedded devices have far exceeded the number of general-purpose computers. With the inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22
CPCG06F11/2205G06F11/2273G06F11/2294
Inventor 汪洋一舟张文凯
Owner TENCENT TECH (SHENZHEN) CO LTD