Unlock instant, AI-driven research and patent intelligence for your innovation.

Vehicle network security assessment method and device, terminal equipment and storage medium

A network security and security assessment technology, applied in the computer field, can solve problems such as insufficient intelligence and high requirements for assessors

Pending Publication Date: 2022-04-01
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiment of the present application is to provide a vehicle network security assessment method, device, terminal equipment, and storage medium to solve the problem that the existing vehicle network security assessment method requires the evaluator to manually determine the test items corresponding to the assessment object, which is not intelligent enough , a question that requires more evaluators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle network security assessment method and device, terminal equipment and storage medium
  • Vehicle network security assessment method and device, terminal equipment and storage medium
  • Vehicle network security assessment method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In order to solve the problem that in the existing vehicle network security assessment method, the assessors need to manually determine the test items corresponding to the assessment objects, which are not intelligent enough and have high requirements for the assessors, a vehicle network security assessment method is provided in the embodiment of this application , the method provided in the embodiment of this application can be applied to any terminal device, and the terminal device can replace the evaluator to perform some operations, or instruct the evaluator to perform the evaluation operation, which reduces the requirements for the evaluator. For details, please refer to figure 1 as shown, figure 1 It is a schematic flow chart of the vehicle network security assessment method provided in the embodiment of this application, including:

[0050] S11: Determine the network security unit to be evaluated of the vehicle to be evaluated.

[0051]The network security unit ...

Embodiment 2

[0077] In order to better understand the solution provided by this application, the embodiment of this application provides a more specific vehicle network security assessment method, which is applied to terminal equipment, please refer to Figure 4 shown, including the following steps:

[0078] S41: Receive an evaluation instruction for the vehicle to be evaluated, where the evaluation instruction includes information about the network security unit to be evaluated and identification information of the vehicle to be evaluated.

[0079] S42: Determine the target key test item corresponding to the network security unit to be evaluated according to the preset corresponding relationship between the network security unit and the key test item.

[0080] In this embodiment, the vehicle network security system composition structure of the vehicle is pre-stored on the terminal device. Part of the composition structure can be found in figure 2 shown.

[0081] S43: For each target ke...

Embodiment 3

[0090] The embodiment of this application provides a vehicle network security assessment device, please refer to Figure 5As shown, it includes a first determination module 501, a second determination module 502, an acquisition module 503 and a calculation module 504, wherein:

[0091] The first determination module 501 is used to determine the network security unit to be evaluated of the vehicle to be evaluated, and the second determination module 502 is used to determine the network security unit corresponding to the network security unit to be evaluated according to the preset correspondence between the network security unit and key test items. The target key test item, the acquisition module 503 is used to obtain the network security score of each target key test item, and the calculation module 504 is used to calculate the network security score of the network security unit to be evaluated according to the network security score of each target key test item.

[0092] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the vehicle network security assessment method and device, the terminal equipment and the storage medium provided by the invention, the target key test item corresponding to the to-be-assessed network security unit can be directly determined according to the preset corresponding relationship between the network security unit and the key test item, so that the target key test item can be directly determined during each assessment; according to the method, the evaluation personnel do not need to manually determine which test items need to be evaluated, so that the evaluation personnel do not need to carry out whole-course analysis and calculation, and compared with the existing scheme, the method is more intelligent, lower in requirement on the evaluation personnel and more accurate in evaluation result.

Description

technical field [0001] The present application relates to the field of computer technology, in particular, to a vehicle network security assessment method, device, terminal equipment and storage medium. Background technique [0002] The rapid development of intelligent networked vehicle technology is closely related to the scientific quantitative evaluation method of vehicle network security level. In the existing technology, whenever the network security of a certain part of the vehicle needs to be evaluated, the evaluators need to sort out and analyze the network security technical indicators related to the part, artificially determine the test items corresponding to the part, and then separately This test item is evaluated, and then the evaluator conducts a comprehensive evaluation of the network security of the component based on the evaluation results of each test item, which is not intelligent enough and has high requirements for the evaluators, and when the evaluators...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/12
Inventor 安冬旭胡雨翠范雪俭陈强
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More