Unlock instant, AI-driven research and patent intelligence for your innovation.

A vulnerability threat discovery method and system based on intelligent matching

A technology for finding methods and loopholes, applied in the fields of instruments, computing, electrical digital data processing, etc., can solve problems such as low detection efficiency, and achieve the effect of improving detection efficiency

Active Publication Date: 2022-04-01
CHANGCHUN JIACHENG NETWORK ENG
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a vulnerability threat discovery method and system based on intelligent matching, aiming at solving the existing security vulnerability threat detection method, mainly adopting the scheme of sequentially detecting each node device of the Internet of Things, resulting in detection The problem of inefficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability threat discovery method and system based on intelligent matching
  • A vulnerability threat discovery method and system based on intelligent matching
  • A vulnerability threat discovery method and system based on intelligent matching

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] The invention proposes a method and system for discovering vulnerability threats based on intelligent matching.

[0052] as attached figure 1 As shown, in the first embodiment of the intelligent matching-based vulnerability threat discovery method proposed by the present invention, the intelligent matching-based vulnerability threat discovery method is applied to the intelligent matching-based vulnerability threat discovery system; the system includes a server and a plurality of Internet of Things terminals; a plurality of Internet of Things terminals form a local area network; each of the Internet of Things terminals is communicatively connected with the server; the server stores a public network security loophole database; the present embodiment includes the following steps:

[0053] Step S110: The server co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for discovering vulnerabilities and threats based on intelligent matching. The invention proposes a method and system for discovering vulnerabilities and threats based on intelligent matching. Every first preset time length, the server obtains all Internet of Things in the local area network. The vulnerability risk value corresponding to the terminal, and then determine a risk terminal based on the vulnerability risk value; that is, the technical solution proposed by the present invention only needs to perform vulnerability detection on the risk terminal in the same local area network, and can analyze and deduce whether other common terminals are Threat loopholes appear, and then different countermeasures are taken in a targeted manner; that is to say, the technical solution proposed by the present invention no longer needs to sequentially detect each node device of the Internet of Things, which greatly improves the detection efficiency.

Description

technical field [0001] The invention relates to the technical field of vulnerability threats, in particular to a method and system for discovering vulnerability threats based on intelligent matching. Background technique [0002] With the rapid development of the Internet of Things technology, which facilitates people's daily life, work, and study, the Internet of Things is widely used in the production and life of various industries; in the process, Internet of Things devices also store a large amount of information resources. [0003] Therefore, how to protect the information stored in the Internet of Things devices has become particularly important. However, since the loopholes in the Internet of Things have always existed, they pose a great threat to the information security of the Internet of Things. Therefore, it is necessary to detect the loopholes in the Internet of Things at all times. and correct accordingly. [0004] However, the existing security vulnerability d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 李忆平庞景秋齐井春李绍俊崔放陈兴钰董铖白东鑫高起
Owner CHANGCHUN JIACHENG NETWORK ENG
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More