Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

124 results about "Attack surface" patented technology

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment. Keeping the attack surface as small as possible is a basic security measure.

Process for removing stale users, accounts and entitlements from a networked computer environment

A method for collecting, presenting to stake-holders, reviewing and cleansing data about users and their entitlements in a networked computer environment, called access certification, is presented. This method begins with automated prompts sent to stake-holders, such as managers or application owners, asking them to review a list of their subordinates or users. Stake-holders are required to either certify or mark for later deletion each user. Next, stake-holders review the detailed security entitlements of each subordinate or user, again either certifying or flagging for deletion each item. Finally, stake-holders are asked to provide an electronic signature, indicating completion of their review process. To motivate stake-holder completion of the process, and to roll-up results across an organization, stake-holders are prevented from completing the signature step until all subordinate stake-holders have likewise completed. The present invention provides a feasible method for identifying and eliminating user accounts that are either no longer needed by their owners, or belong to owners who are no longer legitimate users of an organization's computer systems. The same method is used to identify and eliminate entitlements assigned to users who no longer need them. Removal of such stale, obsolete or incorrect users, login accounts, user objects, group memberships and security, entitlements is essential in order to reduce the security exposure (attack surface) posed by excessive privileges and unused accounts, and to comply with government and other regulations stipulating effective internal controls, especially over financial data, and computer security best practices.
Owner:M TECH INFORMATION TECH

Mining method for built-in application vulnerability of Android system

The invention belongs to the field of the information technology, and particularly relates to a mining method for the built-in application vulnerability of an Android system. The codes of each class of vulnerabilities are analyzed in detail, the class of vulnerability rule is sorted for each class of vulnerabilities, and different weights are attached according to the threat degree of each class of vulnerabilities; an APK (Android Package) file is decompiled, a corresponding executable file is disassembled, and a disassembling code is segmented; collected codes are generated into feature data, and an IDA (Interactive Disassembler) tool is imported to analyze a .so file; vulnerability matching is carried out; a .so file analysis result is combined to finally obtain a static weight report; before dynamic detection is started, an appointed APK file static report is obtained, the calling of an API (Application Program Interface) function is monitored; and through the integration of a Drozer dynamic analysis frame, various test commands are input in a command line, an attack surface is determined, and a test is carried out by aiming at an assaultable place. By use of the method, the safety of the developed APK can be quickly found, and the method has an important meaning for maintaining the stability and the business safety of the Android system.
Owner:BEIJING UNIV OF TECH

Cross-domain data security interconnection method and system based on federated learning

The invention provides a cross-domain data security interconnection method and system based on federated learning, being characterized in that a federated learning concept is expanded to the field ofcross-domain data sharing in joint operation; under the condition that effective transverse information intercommunication cannot be carried out in each combat domain, through coordination of the third party trusted environment, the cooperative analysis of the combat situation and the execution of related combat tasks are completed by efficiently cooperating with each combat domain, and then the purpose that the original data of each combat domain cannot be locally transmitted is achieved, and the data transmission service and the data security interconnection are minimized, and the attack surface, the exposed surface and the network bandwidth of the combat data are effectively reduced, and the systematic performance of the joint combat is ensured; moreover, the combat domains and the third-party trusted environment only interact with the encrypted and signed models and parameters, so that data security interconnection among the combat domains is realized while data barriers among thecombat domains are broken through, and effective support is provided for cross-domain data security sharing in a joint combat process.
Owner:CHINA ACADEMY OF ELECTRONICS & INFORMATION TECH OF CETC

Security micro-service architecture based on zero-trust access strategy and implementation method

The invention provides a security micro-service architecture based on a zero-trust access policy and an implementation method. The architecture comprises an identity authentication center, a micro-service domain, an internal security domain, a public API agent and a private API agent; the identity authentication center comprises an access policy module, an encryption and decryption module, a security production authentication module and a trust engine module; the trust engine module is used for executing identity verification and generating a short-term Access Token and a Refresh Token; the implementation process comprises the steps of requesting resources, performing single sign-on and identity verification, allocating permissions, returning Token, filtering and checking the validity of the Token to execute access. And when the calling party needs to arrive at the internal security domain, the private API agent is accessed through the Facade service, and the matched additional authorization level is transmitted. According to the method, the short-term Token is generated through identity verification and an authorization mechanism so as to protect the distributed micro-service isolated from the front-end system, the security priority level of the micro-service is adjusted in real time through the private API agent, the possible attack surface of the micro-service system is reduced, and a deep defense strategy is realized.
Owner:WUHAN UNIV

Safety evaluation method, device and equipment for AI framework and storage medium

The invention relates to the technical field of software security, and discloses an AI framework security evaluation method, device and equipment and a storage medium, and the method comprises the steps: obtaining a framework source code of a to-be-evaluated AI framework, carrying out the module composition analysis of the to-be-evaluated AI framework according to the framework source code, obtaining a framework composition analysis result, and carrying out the attack surface analysis of the to-be-evaluated AI framework; obtaining an attack surface analysis result, and performing security riskevaluation on the to-be-evaluated AI framework based on the framework composition analysis result and the attack surface analysis result to obtain a security risk evaluation result. According to themethod, the security risk evaluation is carried out on the AI framework by combining the component analysis of the module in the AI framework with the attack surface analysis of the module, so that compared with the existing traditional vulnerability mining technology and manual reverse analysis mode; on one hand, the comprehensiveness and accuracy of the risk evaluation can be ensured; on the other hand, the automation degree of risk evaluation and the perceptibility to safety risks can be improved.
Owner:苏州三六零智能安全科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products