Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Risk vulnerability" patented technology

A vulnerability is a weakness or gap in our protection efforts. Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. ... Risk is a function of threats exploiting vulnerabilities to obtain, damage or destroy assets. Thus, threats (actual, conceptual, or inherent) may exist, but if there are no vulnerabilities then there is little/no risk.

Method, device and system for preventing services from being attacked

The invention discloses a method, device and system for preventing services from being attacked, which belong to the technical field of information security. The method comprises the following steps: receiving a service request sent by a client, and issuing verification information to the client, wherein the verification information at least comprises plaintexts generated randomly and user identifications encrypted by private keys; receiving a signature which is returned by the client and encrypted by a public key for verification information; and verifying the legality of the client according to the signature returned by the client, if passing the verification, continuing to serve the client, otherwise, determining that the client is an illegal client, and discarding a data packet sent by the illegal client. The method, device and system disclosed by the invention have the advantages that because the client is subjected to legality verification before being provided with services, no excessive spending is added in the process of verification, and the secret key interaction between a server and a client is not required, the risk vulnerabilities existing in secret key interaction can be avoided, and then the effect of preventing services from being attacked can be achieved.
Owner:SHENZHEN TENCENT COMP SYST CO LTD

Vulnerability detection method and system for information system, storage medium and electronic equipment

The invention provides a vulnerability detection method and system for an information system, a storage medium and electronic equipment. The method comprises the steps that all hosts in the information system and ports open in all the hosts are acquired; application programs corresponding to the ports open in all the hosts are acquired; all the hosts and all the application programs are used as information assets to establish an information asset library; the information asset library is traversed according to a key code of an external vulnerability, and information assets matched with the keycode are screened out to serve as a suspected risk library; an attempt attack code is sent to the information assets in the suspected risk library according to an attack code of the external vulnerability; whether execution results returned by all the information assets after the attempt attack code is executed are consistent with a pre-stored result is judged; and if yes, alarm information is sent to the hosts where the information assets are located. When a high-risk vulnerability is reported externally, by use of the vulnerability detection method and system, the position with a risk can be found at the first time in an intranet environment, the vulnerability is automatically verified, and the influenced hosts or applications are output.
Owner:携程旅游信息技术(上海)有限公司

Vulnerability restructuring sequence determining method and system based on attack links

The invention discloses a vulnerability restructuring sequence determining method and system based on attack links. The method comprises the steps of determining an indirect loss coefficient corresponding to each host according to attack link information of an access connection structure; through utilization of the indirect loss coefficient of each host and the direct loss coefficient of each host, determining a total loss coefficient of each host; and determining a final score and a vulnerability restructuring sequence corresponding to each vulnerability according to the total loss coefficient of each host corresponding to each vulnerability and a weight coefficient of each vulnerability. Visibly, different vulnerabilities are scored through combination of the attack link information of an information network; the harmfulness scores of the vulnerabilities and the hosts can be calculated according to the harmfulness of the vulnerabilities themselves and a topological structure, so under the condition that the manpower is limited, the vulnerabilities and hosts badly in need of restoration are distinguished, the operation and maintenance personnel are prevented from excessively paying close attention to the internal network high-risk vulnerabilities hardly possible to be used, while the external network high-risk vulnerabilities with higher risk are ignored.
Owner:STATE GRID CORP OF CHINA +1

Big data-based security interception rule updating method and artificial intelligence security system

The embodiment of the invention provides a big data-based security interception rule updating method and an artificial intelligence security system, and the method comprises the steps: carrying out the matching of a security interception rule cluster of an information security operation framework for intercepting an application service according to a service risk vulnerability; and screening a plurality of target screening security interception rule clusters for the service risk vulnerability according to the security interception service interval of each security interception rule in the security interception rule clusters, and performing vulnerability pre-repair according to the target screening security interception rule clusters. According to the technical scheme, the security interception rule characteristics of the information security operation framework for intercepting the application service are considered, and the security interception service interval of the security interception rule is also considered, so that the matching degree with the intercepted application service can be improved during vulnerability pre-repair, and the vulnerability repair effect can be improved.
Owner:深圳市合美鑫精密电子有限公司

Power network information physical potential safety hazard assessment method and system, and power system

ActiveCN111641596AOvercoming the shortcomings of static analysisImprove accuracyResourcesTransmissionAttackNetwork attack
The invention discloses a power network information physical potential safety hazard assessment method, a power network information physical potential safety hazard assessment system and a power system. The power network information physical potential safety hazard assessment method comprises the steps of: comprehensively considering a basic index, a time index and a network attack capability index, and calculating high-risk vulnerability availability of power information equipment; establishing a power information equipment network security vulnerability assessment model, and calculating an attack success probability of defense measures of the power information equipment; establishing a network attack graph model according to the high-risk vulnerability availability of the power information equipment and the attack success probability of the defense measures of the power information equipment, and calculating an attack success probability of the power information equipment; and establishing a power information equipment-physical element failure association model, and assessing physical consequences caused by network attacks on the power information equipment. The power network information physical potential safety hazard assessment method overcomes the defects that an existing method is insufficient in attack behavior analysis and lacks consideration of power business features, and improves the accuracy and credibility of power network potential safety hazard risk assessment.
Owner:HUNAN UNIV

Method and device for evaluating network assets

The embodiment of the invention provides a method and a device for evaluating network assets, and the method comprises the steps: calculating a component vulnerability parameter, reflecting a networkasset component level, corresponding to each classification according to the classification of vulnerabilities in the network assets and the vulnerability parameter of each vulnerability; according toall the component vulnerability parameters corresponding to all the classifications, calculating overall vulnerability parameters reflecting the overall level of the network assets; determining the number of high-risk vulnerabilities and the total number of vulnerabilities according to all vulnerability parameters in the network assets; and determining a total evaluation value reflecting the overall vulnerability of the network assets according to the overall vulnerability parameters, the number of the high-risk vulnerabilities and the evaluation values corresponding to the total number of the vulnerabilities, and evaluating the overall vulnerability level of the network assets according to the total evaluation value. The device executes the method. According to the method and the deviceprovided by the embodiment of the invention, the vulnerability of the network assets can be accurately and comprehensively evaluated.
Owner:POTEVIO INFORMATION TECH

Method and device for evaluating risk vulnerability of mobile network

The invention provides a method and device for evaluating risk vulnerability of mobile network. The method provided by the invention comprises the steps of traversing a to-be-evaluated mobile network, and obtaining basic information data of the to-be-evaluated mobile network; comparing the basic information data with a preset comparison database to obtain initial processing data, wherein the comparison database is established according to historical information data and historical determination results of experts; inputting the initial processing data into a pre-trained first evaluation model to obtain a first evaluation result; inputting the initial processing data into a pre-trained second evaluation model to obtain a second evaluation result, wherein the second evaluation model comprises a corresponding relationship between the initial processing data and the evaluation result; and determining an evaluation result according to the initial processing data, the first evaluation result and the second evaluation result. According to the embodiment of the invention, the comparison database is adopted, and subjective factors are introduced in a mobile network risk assessment process, so that the evaluation process is more targeted.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Internet of Things admission gateway for video network system

The invention discloses an Internet of Things admission gateway for a video network system. The Internet of Things admission gateway comprises hardware equipment and a cloud shield gateway system, wherein the hardware equipment comprises an acquisition and analysis engine and a detection engine; the cloud shield gateway system comprises a device and asset management module, a device security admission control module, a device availability monitoring module, a security attack prevention module, a video device risk vulnerability detection module and an infrastructure management module. The system integrates the functions of equipment management, security admission, availability monitoring, attack prevention, vulnerability detection, equipment automatic discovery, equipment state detection, vulnerability automatic detection, access automatic discrimination, behavior automatic analysis, violation automatic blocking and the like, three-dimensional monitoring is formed from boundaries to core data, deep defense is established, security operation management is enhanced, functions of clear assets in the video private network at a glance, real-time alarm of equipment faults, real-time control of safety risks, timely blocking of illegal invasion and the like are realized, and the problem of safe operation of the video private network is solved.
Owner:INFORMATION & COMMNUNICATION BRANCH STATE GRID JIANGXI ELECTRIC POWER CO +1

Server asset management system based on integrated monitoring

PendingCN113556348ATo achieve the purpose of increasing revenue and reducing expenditureHardware monitoringPlatform integrity maintainanceData classIntegrated monitoring
The invention provides a server asset management system based on integrated monitoring. The server asset management system comprises a production service cluster, a data analysis center and an operation and maintenance management system, wherein the production service cluster is composed of a plurality of independent servers and collects data through service nodes and data nodes; after receiving the data, the data analysis center distributes the data to an asset monitoring subsystem, an intrusion monitoring subsystem and a risk perception subsystem for processing according to data types, and sends a processing result to the operation and maintenance management system; the asset monitoring subsystem judges whether the server has the problem of performance excess or performance shortage; the intrusion monitoring subsystem mainly aims at network access flow data, and judges whether an intrusion risk exists or not according to a network access behavior; the risk perception subsystem mainly aims at network flow data and risk vulnerabilities of the server; and the operation and maintenance management system allocates the processing results to different management subsystems according to the types of the processing results, and gives corresponding management prompts and operations.
Owner:中能融合智慧科技有限公司

Method for actively discovering distributed self-built system and scanning security vulnerabilities

The invention discloses a method for actively discovering a distributed self-built system and scanning security vulnerabilities, and relates to the technical field of information security. The methodcan be applied to management of distributed self-built systems deployed by subordinate units in large enterprises. According to the invention, active discovery of the whole-network self-built information system is realized by using a port scanning technology, an HTTP/HTTPS fingerprint identification technology, a distributed message queue technology, a browser engine rendering technology and a multi-process concurrent vulnerability scanning technology, and high-risk vulnerability scanning is carried out, so that explosive growth of the self-built information system and high-risk vulnerabilities is effectively restrained; a user can actively discover a database and a high-risk vulnerability database from a self-built system to guide out a scanning result report and a high-risk vulnerabilityreport of a self-built application system, and real-time and reliable data support is provided for a company informatization management layer for informatization construction conditions and information security conditions of organizational structure units at all levels.
Owner:BC P INC CHINA NAT PETROLEUM CORP +1

Method, device and system for preventing services from being attacked

The invention discloses a method, device and system for preventing services from being attacked, which belong to the technical field of information security. The method comprises the following steps: receiving a service request sent by a client, and issuing verification information to the client, wherein the verification information at least comprises plaintexts generated randomly and user identifications encrypted by private keys; receiving a signature which is returned by the client and encrypted by a public key for verification information; and verifying the legality of the client according to the signature returned by the client, if passing the verification, continuing to serve the client, otherwise, determining that the client is an illegal client, and discarding a data packet sent by the illegal client. The method, device and system disclosed by the invention have the advantages that because the client is subjected to legality verification before being provided with services, no excessive spending is added in the process of verification, and the secret key interaction between a server and a client is not required, the risk vulnerabilities existing in secret key interaction can be avoided, and then the effect of preventing services from being attacked can be achieved.
Owner:SHENZHEN TENCENT COMP SYST CO LTD

Method, system and power system for assessing hidden dangers of information physical security in electric power network

ActiveCN111641596BOvercoming the shortcomings of static analysisImprove accuracyResourcesTransmissionPhysical securityAttack
The invention discloses a method, system and power system for assessing hidden dangers of power network information physical security, which comprehensively considers basic indicators, time indicators, and network attack ability indicators, and calculates the utilization rate of high-risk loopholes in power information equipment; establishes network security for power information equipment Vulnerability assessment model to calculate the attack success probability of power information equipment defense measures; according to the exploitability rate of high-risk vulnerabilities of power information equipment and the attack success probability of power information equipment defense measures, a network attack graph model is established to calculate the attack success probability of power information equipment ;Establish a power information equipment-physical component failure correlation model to evaluate the physical consequences of power information equipment being attacked by a network. The invention overcomes the deficiencies of the existing method in analyzing the attack behavior and the lack of consideration of the characteristics of the power service, and improves the accuracy and credibility of the risk assessment of the hidden danger of the power network security.
Owner:HUNAN UNIV

A method and system for determining the sequence of vulnerability rectification based on attack chain

The invention discloses a vulnerability restructuring sequence determining method and system based on attack links. The method comprises the steps of determining an indirect loss coefficient corresponding to each host according to attack link information of an access connection structure; through utilization of the indirect loss coefficient of each host and the direct loss coefficient of each host, determining a total loss coefficient of each host; and determining a final score and a vulnerability restructuring sequence corresponding to each vulnerability according to the total loss coefficient of each host corresponding to each vulnerability and a weight coefficient of each vulnerability. Visibly, different vulnerabilities are scored through combination of the attack link information of an information network; the harmfulness scores of the vulnerabilities and the hosts can be calculated according to the harmfulness of the vulnerabilities themselves and a topological structure, so under the condition that the manpower is limited, the vulnerabilities and hosts badly in need of restoration are distinguished, the operation and maintenance personnel are prevented from excessively paying close attention to the internal network high-risk vulnerabilities hardly possible to be used, while the external network high-risk vulnerabilities with higher risk are ignored.
Owner:STATE GRID CORP OF CHINA +1

Information processing method based on fingerprint attendance system and fingerprint attendance service system

The embodiment of the invention discloses an information processing method based on a fingerprint attendance system and a fingerprint attendance service system, and the method comprises the steps: carrying out the abnormal monitoring activity variable mining of abnormal monitoring activity big data, and outputting an abnormal monitoring activity variable; outputting each abnormal trajectory variable in the abnormal monitoring activity big data and a corresponding risk vulnerability positioning variable and a risk vulnerability field variable according to the abnormal monitoring activity variable, and outputting each risk vulnerability abnormal trajectory variable according to the risk vulnerability positioning variable and each abnormal trajectory variable, and performing connectivity aggregation on each risk vulnerability abnormal trajectory variable, and outputting risk vulnerability aggregation features in the abnormal monitoring activity big data, thereby performing comprehensive analysis of risk vulnerability categories by combining the aggregation dimension of the abnormal trajectory of the risk vulnerability and the risk vulnerability field dimension. Compared with a traditional scheme in which analysis is carried out only based on risk vulnerability field variables, the method can improve the accuracy of risk vulnerability category identification.
Owner:苏州英博特力信息科技有限公司

Vulnerability detection method, system, storage medium and electronic equipment of information system

The invention provides a vulnerability detection method and system for an information system, a storage medium and electronic equipment. The method comprises the steps that all hosts in the information system and ports open in all the hosts are acquired; application programs corresponding to the ports open in all the hosts are acquired; all the hosts and all the application programs are used as information assets to establish an information asset library; the information asset library is traversed according to a key code of an external vulnerability, and information assets matched with the keycode are screened out to serve as a suspected risk library; an attempt attack code is sent to the information assets in the suspected risk library according to an attack code of the external vulnerability; whether execution results returned by all the information assets after the attempt attack code is executed are consistent with a pre-stored result is judged; and if yes, alarm information is sent to the hosts where the information assets are located. When a high-risk vulnerability is reported externally, by use of the vulnerability detection method and system, the position with a risk can be found at the first time in an intranet environment, the vulnerability is automatically verified, and the influenced hosts or applications are output.
Owner:携程旅游信息技术(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products