Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat intelligence application method and device

An application method and intelligence technology, applied in the field of blockchain, can solve the problems of large manual intervention, inability to realize automatic distribution and linkage application, etc., to achieve the effect of improving efficiency, promoting the continuous and effective development of ecological closed loop, and improving the effect.

Active Publication Date: 2022-02-25
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the distribution and application of threat intelligence, each system is independent of each other. On the one hand, it requires a lot of manual intervention to apply threat intelligence. On the other hand, it is currently impossible to realize automatic distribution and linkage application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence application method and device
  • Threat intelligence application method and device
  • Threat intelligence application method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0067] The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequences other than those illustrate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a threat intelligence application method and device. The method comprises the steps of: acquiring threat intelligence information; operating a first smart contract, and automatically screening a second node, wherein the second node is operated equipment needing to issue the threat intelligence information; based on a consensus mechanism, writing automatic screening state information output by the first smart contract and information of the second node into a blockchain; operating a second smart contract, automatically issuing the threat intelligence information to the second node, and writing issuing state information output by the second smart contract into a blockchain based on the consensus mechanism; and operating a third smart contract, and writing the threat intelligence application state information of the second node into the blockchain based on the consensus mechanism. According to the threat intelligence application method and device, automatic issuing and linkage application of threat intelligence can be realized, and the efficiency of network security protection is improved.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an application method and equipment for threat intelligence. Background technique [0002] With the rapid development of computer and network technology, various network security incidents occur frequently, and new vulnerabilities emerge in an endless stream, giving rise to a large number of new security risks, which pose a serious threat to network security and business security. In the traditional network security model, security protection works independently, and various information is relatively isolated. Network security protection has lagged behind the development of attack technologies. The security subsystems are independent of each other, which is easy to cause island effect. The lack of coordination among various systems makes it difficult to work collaboratively and efficiently. This is especially true when cross-industry, cross-organization, and cross-region a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/302H04L63/00
Inventor 程叶霞何申顾宁伦李伟付俊郭智慧陈璨璨胡古宇
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products