Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability defense method and device and computer equipment

A computer and computer program technology, applied in the direction of platform integrity maintenance, etc., can solve the problem of inability to protect the security of user equipment, and achieve the effect of improving efficiency and security.

Pending Publication Date: 2022-04-05
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the face of sudden zero-day vulnerability incidents, the above traditional solutions cannot protect the security of user equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability defense method and device and computer equipment
  • Vulnerability defense method and device and computer equipment
  • Vulnerability defense method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to better understand the above technical solutions, the technical solutions of the embodiments of the present application will be described in detail below through the accompanying drawings and specific examples. It should be understood that the embodiments of the present application and the specific features in the embodiments are the technical solutions of the embodiments of the present application. A detailed description, rather than a limitation to the technical solutions of the present application, the embodiments of the present application and the technical features in the embodiments can be combined with each other under the condition of no conflict.

[0025] see figure 1 , a vulnerability defense method provided by an embodiment of the present invention is applied to a security monitoring center, and the method specifically includes steps S101-step S105:

[0026] Step S101, acquiring device information of a device to be defended.

[0027] Wherein, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability defense method and device and computer equipment, relates to the technical field of network security, and is used for improving the vulnerability defense efficiency. The method mainly comprises the following steps: acquiring equipment information of to-be-defended equipment; determining whether the equipment information is matched with vulnerability information in a vulnerability knowledge base, wherein the vulnerability knowledge base comprises a corresponding relationship between the vulnerability information and attack mode information; if yes, acquiring attack mode information corresponding to the equipment information in the vulnerability knowledge base; determining a vulnerability defense strategy according to the attack mode information; and sending the vulnerability defense strategy to the to-be-defended device, so that the to-be-defended device executes the vulnerability defense strategy to defend vulnerabilities.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a vulnerability defense method, device, computer equipment and storage medium. Background technique [0002] At present, most security vendors provide vulnerability detection and vulnerability repair functions for operating system vulnerabilities and software vulnerabilities, but this function is a post-installed function, which needs to be implemented after the operating system manufacturers and software manufacturers that have discovered vulnerabilities provide patches. [0003] In the face of sudden zero-day vulnerability incidents, the above-mentioned traditional solutions cannot protect the security of user equipment. At present, emergencies may require multiple tools, multiple platforms to jointly deal with, and even human intervention to achieve defensive effects. Contents of the invention [0004] Embodiments of the present application provide a loop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 胡金园盖秋明孙洪伟徐翰隆肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products