Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

610 results about "Penetration test" patented technology

A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. The test is performed to identify both weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed.

Automatic penetration testing method for information system security

The invention belongs to the technical field of network security and discloses an automatic penetration testing method for information system security. A penetration testing platform is built to automatically scan the mainframe state of an information system and the security loopholes of a topological structure and the information system, to analyze the loophole information, to automatically transfer a verification script in a loophole verification base for attacking a target system, to obtain and improve the target control authority and to remove the access trace after finishing the penetration attack. Finally, the whole penetration testing process and result are recorded and analyzed to generate a testing report. According to the method, the penetration testing flow is comprehensively considered and the existing security analyzing tools are fully utilized to design various tools for packing an automatic penetration testing module, so that the automatic transfer and execution of the tools are achieved, and the completeness of the penetration testing process is improved. Through the exchange utilization of data among different modules and the automatic analysis and arrangement of the result output of the security analyzing tools, the efficiency and automatic degree of the penetration testing are improved.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Cross-site script vulnerability detection method based on percolation test

The invention discloses a cross-site script vulnerability detection method based on a percolation test. According to the cross-site script vulnerability detection method, the technical problem of low detection efficiency in a traditional cross-site script vulnerability detection method is solved. The technical scheme provided by the invention is that the cross-site script vulnerability detection method comprises the following steps of: firstly, acquiring a page; secondly, extracting form information and carrying out the percolation test on the extracted form; and finally, carrying out session retaining and redirection tracking. Due to the adoption of a session retaining and redirection tracking method, the conditions that the analysis for Web pages is incomprehensive are reduced, all pages of a Web site are analyzed and detected and further the automatic detection capability is improved. According to a percolation test strategy, the detection range of the XSS (Cross-Site Script) is gradually narrowed and the depth detection for the safe pages is avoided. While test statements are injected, test statements for closing HTML (Hypertext Markup Language) statements are actively constructed according to the returned page information, so that interaction frequencies with a server are reduced and the detection efficiency of the XXS vulnerabilities of large complex Websites is improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Multi-field coupling penetration test device and method for cracked rock

ActiveCN104819926AGuaranteed real temperaturePermeability/surface area analysisChemical solutionAxial pressure
The invention discloses a multi-field coupling penetration test device and a multi-field coupling penetration test method for cracked rock. The device comprises a computer servo control system, a confining pressure chamber, a hydraulic system, a temperature control system and a chemical solution system, wherein the hydraulic system and the confining pressure chamber are connected by virtue of a confining pressure device, an axial pressure device and a seepage device respectively; the temperature control system is arranged outside the confining pressure chamber; and the chemical solution system is connected with the seepage device. The test method comprises the following steps: opening the hydraulic system, and loading an oil source; putting a sample into a pressure chamber; loading axial pressure and confining pressure; loading the seepage pressure; loading a chemical field; applying temperature; and measuring the data. The four-field loading systems are independent from one another, the evolution test research of permeability characteristics and mechanical properties of the cracked rock can be really simulated under high water pressure, large hydraulic gradient, temperature change and water chemistry complicated conditions, and the whole-process experimental research of rock deformation damage and penetration, stress, chemistry and temperature coupling can be performed.
Owner:HOHAI UNIV

Penetration testing method for GAP isolation and exchange device

The invention discloses a penetration testing method for a GAP isolation and exchange device. The method comprises the concrete steps that (a) policy configuration is tested, wherein according to the working principle, the function and the implementation mode of the tested device, applicable test cases are selected from a preset penetration testing rule base, and test environment parameters are configured; (b) a network attack session is generated, wherein an independent client program and an independent server program are established, hosts in networks at the two ends of the tested device are respectively simulated, afterwards, test plugins corresponding to the test cases are respectively called, and the test environment parameters configured in the step (a) are passed to the test plugins; the test plugins produce corresponding data packets in real time, the data packets are sent through a client or a server, and therefore the network attack session is generated; (c) test results are evaluated, wherein the test results of the test cases are evaluated according to the completion condition of the network attack session and the warning information of the tested device. By the application of the penetration testing method for the GAP isolation and exchange device, automated security testing for the GAP isolation and exchange device can be achieved.
Owner:中国人民解放军信息安全测评认证中心 +1

Industrial control system security experiment platform for penetration testing

The invention discloses an industrial control system security experiment platform for penetration testing. The platform comprises a virtual industrial control network, a control device, a control object, an attacker module, a data acquisition module and an anomaly detection module, wherein the virtual industrial control network is a three-layer network structure, which is successively an enterprise network, a demilitarized zone, and a control intranet from the outside to the inside; the enterprise network with the demilitarized zone, and the demilitarized zone with the control intranet are allconnected through a gateway; the control device is connected to the control intranet through an Ethernet protocol; the control object comprises a physical model and a simulation model and communicates with the control device; the attacker module is connected to a public network, simulates an attacker, and performs penetration testing on the industrial control system; the data acquisition module collects network flow data of the gateway; and the anomaly detection module is used for implementing anomaly detection of industrial control systems based on network flow data. The platform of the invention can deeply dig into the safety hazards of the industrial control system and has a positive effect on protecting the safety performance of the industrial control system.
Owner:ZHEJIANG UNIV

Multifunctional integrated cap pressing type pressure chamber in rock coupling penetration test and test method

The invention belongs to the field of penetration experimental apparatuses and specifically relates to a multifunctional integrated cap pressing type pressure chamber in a rock coupling penetration test and a test method. The multifunctional integrated cap pressing type pressure chamber comprises a pressure chamber body, a pressure chamber base, a pressure chamber cover, a confining pressure oil inlet, a seepage outlet, a seepage inlet, a pressure chamber lock cap, a hoisting cylinder, an upper pressing head, an upper penetrating plate, a test part, a lower penetrating plate and a lower pressing head, wherein the pressure chamber base is located at the bottom of the pressure chamber; the pressure chamber cover is located at the top of the pressure chamber; the confining pressure oil inlet and the seepage outlet are located at the bottom of the pressure chamber; the seepage inlet is located close to the top of the pressure chamber; the pressure chamber lock cap is located on the outer side of the pressure chamber base and is connected with the pressure chamber base; the hoisting cylinder is arranged at the top of the pressure chamber; the upper pressing head, the upper penetrating plate, the test part, the lower penetrating plate and the lower pressing head are successively arranged in the pressure chamber body; the seepage outlet is successively connected with a cooling water tank and a volume variation gauge. The invention provides a pressure chamber with high safety, degree of automation and multifunction and the test method; complex operation and potential safety hazards are avoided; the pressure chamber is fit for the rock tri-axial coupling penetration test under the coupling effect of temperature-seepage-stress- chemistry (THMC).
Owner:HOHAI UNIV

Visual uniaxial penetrating test-based bituminous mixture homogeneity evaluation method

The invention discloses a visual uniaxial penetrating test-based bituminous mixture homogeneity evaluation method, which comprises the following steps: carrying out indoor molding or drilling a cylindrical core sample on site, acquiring two-dimensional horizontal section images of a plurality of bituminous mixture test pieces through tomoscan of an industrial CT machine, and then preprocessing and intensifying the two-dimensional horizontal section images acquired by the CT machine to generate gray images; recognizing and segmenting the processed bituminous mixture section gray images to obtain a boundary coordinate of each aggregate and gap in the bituminous mixture section images, establishing a three-dimensional discrete element model of the bituminous mixture and carrying out a virtual uniaxial penetration test, and evaluating the bituminous mixture homogeneity by using the uniaxial penetration strength index variable coefficient obtained by the test. The bituminous mixture homogeneity evaluation method is based on the visual uniaxial penetrating test, and the bituminous mixture homogeneity is quantitatively evaluated by using the uniaxial penetration strength index variable coefficient, so the industrial practicability and maneuverability are very strong.
Owner:ZHEJIANG UNIV

System and method for controlling on-demand security

An on-demand security service ensures isolation of the service provider's customers where the customers share resources at the system, subsystem, and storage level. The security service is provided in a pre-production phase and in a post production phase. The pre-production phase takes place prior to boarding the customer. In the pre-production phase the resources to be protected are defined in a security guide, and using the security guide, physical segregation at the facility, network, and technical and delivery support levels is planned and then implemented. In the post production phase, on going activities are proactive and reactive. Proactive activities include maintaining physical segregation by reviewing and updating the security guide, and testing physical segregation by performing security audits and penetration tests. Observations and finding of the audits and penetration tests are resolved. Reactive activities include identifying isolation failures, coordinating appropriate actions, and resolving the isolation failure. The service may be embodied in a system and in a computer implemented process comprising a security guide file (SGF), a security guide application (SGA), a security implementation application (SIA), a security validation application (SVA), and an event coordination application (ECA).
Owner:IBM CORP

Web security vulnerability detection system and detection method based on information collection

The invention provides a Web security vulnerability detection system and detection method based on information collection. The Web security vulnerability detection system based on information collection includes a project management module, an information collection module, a scanning detection module, a vulnerability utilization module, an auxiliary tool module, a Web integrated penetration module and a custom function module. The Web security vulnerability detection system and detection method based on information collection enable each scanning tool to form a complete penetration system, perform modular classification on the penetration test tools to enable the penetration test flow to be clear at a glance, so that each tool of the system can be switched freely and coordinated with each other, can accurately position and verify the vulnerability after the related information of the target network service is scanned and detected so as to avoid the situation that a large quantity of FUZZ tests are fuzzed during the scanning process of a traditional scanner, so that normal operation of the target service is influenced, and have the advantages of being wide in the aspect of the scanned and collected information and being relatively more thorough in scanning.
Owner:四维创智(北京)科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products