Vehicle network security assessment method and device, terminal equipment and storage medium
A network security and security assessment technology, applied in the computer field, can solve problems such as insufficient intelligence and high requirements for assessors
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] In order to solve the problem that in the existing vehicle network security assessment method, the assessors need to manually determine the test items corresponding to the assessment objects, which are not intelligent enough and have high requirements for the assessors, a vehicle network security assessment method is provided in the embodiment of this application , the method provided in the embodiment of this application can be applied to any terminal device, and the terminal device can replace the evaluator to perform some operations, or instruct the evaluator to perform the evaluation operation, which reduces the requirements for the evaluator. For details, please refer to figure 1 as shown, figure 1 It is a schematic flow chart of the vehicle network security assessment method provided in the embodiment of this application, including:
[0050] S11: Determine the network security unit to be evaluated of the vehicle to be evaluated.
[0051]The network security unit ...
Embodiment 2
[0077] In order to better understand the solution provided by this application, the embodiment of this application provides a more specific vehicle network security assessment method, which is applied to terminal equipment, please refer to Figure 4 shown, including the following steps:
[0078] S41: Receive an evaluation instruction for the vehicle to be evaluated, where the evaluation instruction includes information about the network security unit to be evaluated and identification information of the vehicle to be evaluated.
[0079] S42: Determine the target key test item corresponding to the network security unit to be evaluated according to the preset corresponding relationship between the network security unit and the key test item.
[0080] In this embodiment, the vehicle network security system composition structure of the vehicle is pre-stored on the terminal device. Part of the composition structure can be found in figure 2 shown.
[0081] S43: For each target ke...
Embodiment 3
[0090] The embodiment of this application provides a vehicle network security assessment device, please refer to Figure 5As shown, it includes a first determination module 501, a second determination module 502, an acquisition module 503 and a calculation module 504, wherein:
[0091] The first determination module 501 is used to determine the network security unit to be evaluated of the vehicle to be evaluated, and the second determination module 502 is used to determine the network security unit corresponding to the network security unit to be evaluated according to the preset correspondence between the network security unit and key test items. The target key test item, the acquisition module 503 is used to obtain the network security score of each target key test item, and the calculation module 504 is used to calculate the network security score of the network security unit to be evaluated according to the network security score of each target key test item.
[0092] The ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



