Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

492 results about "Security analysis" patented technology

Security analysis is the analysis of tradeable financial instruments called securities. It deals with finding the proper value of individual securities (i.e., stocks and bonds). These are usually classified into debt securities, equities, or some hybrid of the two. Tradeable credit derivatives are also securities. Commodities or futures contracts are not securities. They are distinguished from securities by the fact that their performance is not dependent on the management or activities of an outside or third party. Options on these contracts are however considered securities, since performance is now dependent on the activities of a third party. The definition of what is and what is not a security comes directly from the language of a United States Supreme Court decision in the case of SEC v. W. J. Howey Co.. Security analysis is typically divided into fundamental analysis, which relies upon the examination of fundamental business factors such as financial statements, and technical analysis, which focuses upon price trends and momentum. Quantitative analysis may use indicators from both areas.

Graphical models for cyber security analysis in enterprise networks

A method of generating graphical models for providing security analysis in computer networks that in one embodiment includes the steps of generating a type abstract graph independent of particular networks that models abstract dependency relationships among attributes and exploits; generating network-specific attack graphs by combining the type abstract graph with specific network information; monitoring an intruder alert; and generating a real-time attack graph by correlating the intruder alert with the network-specific attack graph. The real-time attack graph can be generated using reachability checking, bridging, and exploit prediction based on consequence alerts and may further include the step of calculating the likelihood of queries using a Bayesian network model. The method may also include the steps of inferring unobserved attacks that may have been missed by intrusion detection sensors, and projecting on which hosts and using what exploits additional intruder attacks may occur. The method may further include the step of comparing alternate actions by computation, wherein the alternate actions include the step of patching some vulnerabilities, and wherein the specific network information includes network topology. The specific network information may also include firewall rules.
Owner:INTELLIGENT AUTOMATION LLC

Layered exchange and control method for real-time monitoring system data by power dispatching

The invention provides a layered exchange and control method for real-time monitoring system data by power dispatching. A CIM/XML (common information module)/(extensible markup language) interface, a CIM/E interface and other models of the electric power subsystems are processed and combined to establish a device model of the large power grid, therefore, perfect interaction of various application data including SCADA (supervisory control and data acquisition) real-time data, WAMS (wide area measurement system) data, EMS (enhanced message service) advanced application data and dynamic security analysis warning information can be realized, and power system control commands among the systems can be smoothly transmitted and executed. A data acquisition and exchange function can support multiple communication protocols, multi-application, multi-type and large amounts of data, satisfy the real-time requirements of all transmission environments, and provide comprehensive multi-scale real-time operation information of the power grid for other application analysis systems. A close integration mode is used to realize application integration and each subsystem and application can be monitored and managed, so a uniform access interface and a man-machine interface can be ensured to provide for each application system.
Owner:CHINA ELECTRIC POWER RES INST +1

Real-time security early warning method based on complex event processing

The invention discloses a real-time security early warning method based on complex event processing. The method specifically comprises the following steps: step (1), using a formalized engine to perform log field segmentation on collected security data, performing normalization on fields according to field requirements, and associating knowledge base information according to the fields that are expected to be outputted; step (2), using a data flow semantic analysis engine to perform data context analysis according to a complex event instance to be modeled as a scene, and analyzing mapping stream data based on a standardized analysis field template; and step (3), using a security analysis model calculation engine, in an analysis rule calculation module, analyzing according to scenes based on a point event, an edge event and an interval event, and generating an early warning event. The real-time security early warning method based on the complex event processing provided by the invention realizes the multi-angle association analysis of original log data through a configurable normalization rule, a semantic recognition rule and a security analysis rule, and discovers unknown threats and carries out early warning timely.
Owner:STATE GRID CORP OF CHINA +3

Threat intelligence analysis system for attack tracing

The invention discloses a threat intelligence analysis system for attack tracing. The system comprises an internal threat intelligence collection module, an external threat intelligence collection module and an attack tracing analysis module; the internal threat intelligence collection module comprises a security detection module and a security analysis module; the attack tracing analysis module comprises attacker tracing and attack host tracking; threat intelligence obtained by the internal threat intelligence collection module and the external threat intelligence collection module is uploaded to the attack tracing analysis module, the attack tracing analysis module performs attacker tracing and attack host tracking on the threat intelligence and feeds back the result to the security detection module and the security analysis module; and meanwhile, the result is performed with threat intelligence sharing and exchange with an external cooperation mechanism. The threat intelligence analysis system disclosed by the invention can not only singly and quickly accomplish threat intelligence analysis and detection, but also can provide prediction for the attacks of enterprises, the method is orientated to attack tracing, and the attack mode is analyzed from the source so as to better identify the identity of the attacker.
Owner:STATE GRID CORP OF CHINA +3

Integral electricity market operation system

InactiveCN102903063ARealize organic integrationAutomatically meet safe operation requirementsData processing applicationsMarket simulationElectricity trade
The invention relates to an integral electricity market operation system. The system comprises a system supporting layer, a platform supporting layer, an application service layer and a business application layer, wherein the system supporting layer is used for providing operation environment and development environment for the electricity market operation system; the platform supporting layer is used for managing a power gird physical model, a market economic model and a dynamic data model and providing sharing platform supporting for application; the application service layer is used for providing service for trade management, planning optimization, operational control and market simulation; and the business application layer is used for providing service for electricity market operation. By the aid of the system, the design of an integral electricity market operation system frame of multi-cycle electricity trade decision and management and the design of an integral electricity market operation system frame of integrity of the economic model and the physical model, integrity of the trade optimization and safety analysis, integrity of production operation and forward analysis, integrity of market operation and the market simulation and integrity of capital flow and electricity flow display are supported, a business decision analysis platform is constructed and the electricity source operation serves as the center.
Owner:CHINA ELECTRIC POWER RES INST +1

Detection device and method for security vulnerability of software

The invention relates to the field of computers, in particular to a detection device and method for a security vulnerability of a dedicated information system. According to the detection device and method disclosed by the invention, a tester can not only access a target system to a testing network but also access the detection device to a production system by connecting a test terminal with the target system, wherein the target system is located in the production system. As the core of the detection device, a system security analysis and test management platform comprises a vulnerability discovering system, a vulnerability authenticating and analyzing system, a permeability testing system, a vulnerability library, a test case library, a report outputting system, a user and permission management system, a system management platform and the like. When the detection device and method for the security vulnerability of the software, provided by the invention, are adopted, the vulnerability can be found before the application of the software, and corresponding strategies can be provided, so that the detection device and method meet the requirement on the emphasis on information security in the current society in a better manner; and moreover, the detection device and method have a higher application value.
Owner:AVIATION IND INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products