Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asset safety operation system, method and device

A technology for operating systems and assets, applied in the computer field, can solve problems such as the lack of effective quantitative evaluation and reflection

Pending Publication Date: 2021-11-26
JD DIGITS HAIYI INFORMATION TECHNOLOGY CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a lack of effective quantitative evaluation of the quantity and quality of security incidents handled by security operators on a daily basis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset safety operation system, method and device
  • Asset safety operation system, method and device
  • Asset safety operation system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0033] It should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings and embodiments.

[0034] figure 1 A schematic architecture diagram of an asset security operation system is shown.

[0035] Such as figure 1 As shown, the asset security operation system communicates with each public cloud platform, private cloud platform, and IDC computer room through...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an asset safety operation system, method and device. The specific embodiment of the asset security operation system comprises a data processing layer configured to collect information and logs of various on-cloud and under-cloud assets, and analyze the logs to obtain risk information; a security service layer which is configured to dispose the assets according to the risk information; a security display layer which is configured to output the asset information and the risk information; and a security hosting layer which is configured to receive a hosting request comprising at least one cloud account and uniformly hosting the at least one cloud account to a security account. According to the implementation mode, a security hosting system in a multi-cloud scene is constructed, and a multi-cloud scene security operation closed loop is realized through security visualization, security protection, threat detection and investigation response.

Description

technical field [0001] The embodiments of the present disclosure relate to the field of computer technology, and in particular to an asset security operation system, method and device. Background technique [0002] In the hybrid multi-cloud scenario, more and more large-scale government and enterprise customers are faced with assets scattered on various cloud platforms, unable to conduct centralized security monitoring and operations, and can only disperse limited manpower on many cloud platforms for daily inventory and maintenance of assets . These architectures have huge investment in business systems in various public clouds, private clouds, and local IDC (Internet Data Center, Internet Data Center) computer rooms, but they lack timely inventory and repair of the entire system asset vulnerabilities. A series of extortion incidents. Due to the lack of intuitive presentation of the security situation, when a security attack occurs, it is impossible to know in real time wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F21/55G06N20/00
CPCH04L63/1425H04L63/1433H04L63/1441H04L63/145H04L63/1491H04L63/20H04L63/10H04L63/1416H04L67/10G06N20/00G06F21/55
Inventor 陈桐乐
Owner JD DIGITS HAIYI INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products