Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information generation method based on threat perception big data, and artificial intelligence perception system

A technology for information generation and perception systems, applied in the field of artificial intelligence perception systems, can solve problems affecting the evaluation process of threat perception effects, and does not take into account the safety performance optimization reliability evaluation and other problems

Inactive Publication Date: 2021-09-24
广州天悦科技信息有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in related technologies, the security optimization of firmware information for open targets still only uses the previous method of threat-aware data mining for subsequent business updates, without considering the reliability evaluation of the security performance optimization process, but the current solution lacks security performance. Optimize the evaluation process of whether it meets the security performance optimization conditions, leading to the evaluation process that affects the threat perception effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information generation method based on threat perception big data, and artificial intelligence perception system
  • Information generation method based on threat perception big data, and artificial intelligence perception system
  • Information generation method based on threat perception big data, and artificial intelligence perception system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 It is a schematic diagram of an application scenario of an information generation system 10 based on threat-aware big data provided by an embodiment of the present application. The information generation system 10 based on threat-aware big data may include an artificial intelligence perception system 100 and a threat-aware cloud protection system 200 communicatively connected to the artificial intelligence perception system 100 . figure 1 The shown information generation system 10 based on threat-aware big data is only a feasible example, and in other feasible embodiments, the information generation system 10 based on threat-aware big data may also only include figure 1 At least some of the components shown may also include other components.

[0021] In this embodiment, the artificial intelligence sensing system 100 and the threat-aware cloud protection system 200 in the information generation system 10 based on threat-aware big data can cooperate to execute t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention provides an information generation method based on threat perception big data, and an artificial intelligence perception system. According to the information generation method based on the threat perception big data, and the artificial intelligence perception system provided by the embodiment of the invention, after the security optimization application data is obtained, the security optimization performance evaluation is performed on the security optimization firmware information and the security optimization application data, whether the safety optimization application data are matched with the optimization performance of the safety optimization firmware information is judged by judging whether the safety optimization application data is matched with the optimization performance of the safety optimization firmware information, so that whether the safety performance optimization meets the safety performance optimization condition can be determined, and if yes, the target safety optimization firmware information can be added to a safety upgrading library to carry out upgrading basic resource recording. Therefore, high-reliability security upgrade library resources are continuously formed, and prompt information for updating the threat perception thermodynamic diagram information of a security optimization firmware information pushing basis is generated when the security upgrade library resources do not accord with the threat perception thermodynamic diagram information so as to prompt that the current threat perception thermodynamic diagram information needs to be updated.

Description

technical field [0001] The present application relates to the technical field of big data and information security, and for example, relates to an information generation method based on threat-aware big data and an artificial intelligence perception system. Background technique [0002] With the explosive development of big data, the importance of information security is self-evident. Situational awareness is an environment-based, dynamic, and holistic ability to understand security risks. It is based on threat perception big data, and it is a way to improve the ability to discover, identify, understand, analyze, and respond to security threats from a global perspective. Ultimately, it is for decision-making and action, and it is the implementation of security capabilities. That is, the perception and understanding of the various components in the environment within a certain time and space, and then predict the subsequent changes of these components. [0003] In related t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06K9/62
CPCG06F21/57G06F18/214
Inventor 张倩田俭莫晓东
Owner 广州天悦科技信息有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products