Vulnerability manufacturer name matching method

A vulnerability, a vendor's technology, applied in the field of big data, can solve problems such as difficult to correctly identify character strings, and achieve the effect of saving workload

Active Publication Date: 2021-10-01
北京华云安信息技术有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In short, the various abbreviations make it difficult to correctly identify when matching strings
The traditional solution is usually to maintain a Mapping relationship between a company's full name and abbreviated name as a knowledge base, but if it is only solved by relying on the knowledge base, due to the large number of companies and changes over time, maintaining and updating the knowledge base will become a big problem. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability manufacturer name matching method
  • Vulnerability manufacturer name matching method
  • Vulnerability manufacturer name matching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0053] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this article ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a vulnerability manufacturer name matching method and device, equipment and a computer readable storage medium. The method comprises the following steps: acquiring vulnerability description information input by a user; performing word segmentation processing on the vulnerability description information to obtain one or more identification words; determining the similarity between the identification word and an abbreviation in a constructed vulnerability manufacturer abbreviation set; determining the manufacturer abbreviation with the highest score based on the similarity and the weight value corresponding to the corresponding manufacturer abbreviation; and taking the manufacturer full name corresponding to the manufacturer short name with the highest score as the vulnerability manufacturer full name corresponding to the vulnerability description information. In this way, intelligent matching of manufacturers and products to which the vulnerabilities belong is achieved, and the workload of manual matching is greatly reduced.

Description

technical field [0001] Embodiments of the present disclosure generally relate to the technical field of big data, and more specifically, relate to a method, device, device, and computer-readable storage medium for matching vulnerability vendor names. Background technique [0002] In practical applications, for the sake of brevity, the abbreviation is generally used to describe the name with a long full name, especially in the text with strict word count, it is often recorded in the abbreviation form, such as Shenzhen Tencent Computer System Co., Ltd. The abbreviation of the company is Tencent. Using a certain part of the company's full name as the abbreviation is easy to match by including the string. However, the abbreviations of many companies are in other forms. For example, the abbreviation of Bank of China Co., Ltd. is called Bank of China, and the abbreviation of China Petroleum and Chemical Corporation is Sinopec. It is difficult to blur the abbreviation directly thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/332G06F40/289G06F40/30G06F40/253
CPCG06F16/332G06F40/289G06F40/30G06F40/253
Inventor 卢敏沈传宝吴璇万会来
Owner 北京华云安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products