Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Linkage scanning method for loopholes

A scanning method and linkage technology, applied in the field of network security

Pending Publication Date: 2021-04-30
西安交大捷普网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under the existing technology, these devices are connected in parallel to the network. Although the threat factors in the network can be detected in time, effective blocking or isolation measures cannot be taken, and serial devices such as firewalls or gateways are still needed to carry out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linkage scanning method for loopholes
  • Linkage scanning method for loopholes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The specific technical solutions for realizing the technical purpose of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0021] Such as figure 1 As shown, the linkage scanning method for vulnerabilities includes: monitoring the scanning request from the non-missing device; if the device is authenticated, receiving the linkage message in the scanning request, creating and starting the corresponding scanning task according to the content of the message, and checking the The target specified by the scanning request executes vulnerability scanning; the scanning result of the scanning task is returned to the requesting device, and corresponding processing actions are performed according to the scanning result.

[0022] The non-missed-scan device that has passed the authentication will no longer perform authentication on the scan request initiated by it within a preset time period.

[0023] The above-men...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability linkage scanning method, provides an information intercommunication mechanism, guarantees the trustworthiness of linkage equipment through a preset reliable authentication measure, and can initiate a request to missing scanning equipment when non-missing scanning equipment finds that a security event needs to be further subjected to missing scanning to find a potential threat. And the missing scanning equipment returns the corresponding scanning result to the request equipment so as to take proper action. And meanwhile, corresponding blocking or discarding processing measures are taken for serial equipment such as a scanning result reporting firewall, so that deeper and wider system protection of the network is facilitated.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method for realizing linkage scanning of security loopholes. Background technique [0002] Informatization and the openness and interconnection of the Internet make the internal networks and hosts of enterprises and organizations extremely easy to become targets or carriers of attacks. Therefore, the importance of internal computer network security needs to be paid more attention to. With the development of communication and network technology, some specialized equipment different from traditional firewalls and other security equipment have emerged, such as intrusion detection system, intrusion prevention system, information audit system, vulnerability scanning system, etc. Undertake different security protection tasks. However, under the existing technology, these devices are connected in parallel to the network. Although threats in the network can be det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 刘亚轩何建锋陈宏伟
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products