Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

630 results about "Security assessment" patented technology

Method, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests

A scalable method, system, and apparatus for non-intrusively auditing and improving security assessments includes capturing, storing, presenting, displaying, inspecting, monitoring, and analyzing data flow in client-server security assessments and/or network/infrastructure security assessments. The invention provides interested parties with a mechanism to non-intrusively audit in real-time the vulnerability test effort, as well as review, replay, and analyze all aspects of the security assessment during and after the test. For web application assessments, the data capture includes one of the following or some combination: an intermediary with all data passing through the intermediary; a sniffer that can passively extract all data being communicated between the application and tester; and a plurality of computing modules (e.g., software, appliances, etc.) installed in the tester environment or within the application system environment (e.g., software installed on the tester's computer, or on the computer where the intermediary is running, or software installed on the application systems proxy or web server, or an appliance in either environment) for storing, processing, analyzing, reporting, and displaying the data.
Owner:STYSLINGER BRIAN

Method and system for cyber-security vulnerability detection and compliance measurement (CDCM)

Method and System for Cyber-Security Vulnerability Detection and Compliance Measurement (CDCM) provides any entity, organization or individual with access to or possession of sensitive, confidential or secret information, defined as “protected information,” in digital format that is received, processed, stored or distributed by a computer, computer system or digital processing equipment with the capability to detect and respond to cyber security vulnerabilities and to measure compliance with cyber-security requirements as established by the Federal Security Information Management Act (FISMA) for the security of protected information and certain additional related desirable or mandatory cyber-security requirements. In one sample embodiment of the invention, the method utilizes a damage assessment function; a security assessment function; a security plan or planning function; a training management function; a response management function; a cyber-security management function; a scoring measurement function; and a review and analysis function; to establish a quantifiable and definitive numerical measurement of the relative compliance of a specific processing system, at a specific point in time, to a defined and established threshold value of performance, or compliance acceptance, and to provide, assemble and be capable of archiving the supporting parameters, status, states and analysis that is specifically associated with the numerical value which represents the specific processing system's state of compliance at the specified time and to utilize various intermediate values and parameters to manage and enhance the performance of the specific system thereby improving the systems compliance score and numerical performance measurement value.
Owner:GEARHART GLENN

Software running security measurement and estimation method based on network environment

ActiveCN102799822AObjective selectionFull selectionComputer security arrangementsConfidentialityInformation security
The invention discloses a software running security measurement and estimation method based on a network environment, and belongs to a network information security analysis and estimation technology. The method comprises the following steps of: constructing a measurement system, namely selecting a software security estimation index; performing threat modeling, namely modeling a threat of software under the network environment; and estimating the security of the software, namely performing security estimation on the software facing the threat under the network environment according to the estimation index through a software security estimation method based on reliability, a software security estimation method based on bug and a software security estimation method based on risk. The step of constructing the measurement system also comprises a substep of selecting the completeness, the non-repudiation, the confidentiality, the authorization, the availability and the identity checkability as the software security estimation indexes. By the method, the security bug and the risk of the software can be estimated in advance, so that a function and security module of the software can be immediately adjusted, and dangerous events can be effectively controlled and prevented.
Owner:CHINA INFORMATION TECH SECURITY EVALUATION CENT

Network attack and defense virtual simulation and security evaluation method and system based on virtualization technology

The invention discloses a network attack and defense virtual simulation and security evaluation method and system based on a virtualization technology. The method comprises: (1) a visual display module sending a received instruction for creating a network topological graph to a system control module, creating virtual network equipment, and a network attack and defense resource library module configuring the virtual equipment according to a performed experiment category; 2) the system control module creating a network topological structure according to the instruction of creating the network topological graph; 3) after the network attack starts, the visual display module capturing the position of the data packet sent by the virtual attacker, and dynamically displaying the position of the current attack; the system control module capturing a communication network data packet between the virtual attack machine and the virtual target machine; and 4) a security evaluation module being usedfor acquiring real-time security parameters of the virtual target drone during network attack and defense simulation, displaying the real-time security parameters in real time through a visual displaymodule, and evaluating the security of the virtual target drone.
Owner:XIDIAN UNIV +1

AADL (architecture analysis and design language) model extension based software system security verification and assessment method

The invention relates to an AADL (architecture analysis and design language) model extension based software system security verification and assessment method, which is provided in order to overcome defect of difficulty in direct processing of system models, high computation cost and high redundancy in computation in existing AADL model based verification and assessment. The method includes: establishing relationship between risk factors and an AADL architecture model to form a mechanism generating model; extracting model elements, generating a time state fault tree, a hardware software impactanalysis tree and a common cause time-dependent analysis tree according to the model elements, and backstepping a risk generation route according to the tree structure from bottom to top; setting physical resource properties and capacity of each physical device; calculating the failure probability of each physical device according to labeled risk factor probability of each physical device; converting an AADL security model into a timed automata; calling a formal verification tool UPPAAL for analysis and verification of the timed automata. The method is applicable to security assessment of software and hardware systems.
Owner:HARBIN INST OF TECH

Risk assessment algorithm for information system

The invention discloses a risk assessment algorithm for an information system. According to the GB/T20984-2007 standard, a correlation between the assessment factors of assets, the assessment factors of vulnerability and the assessment factors of threats of the information system is established, a safety assessment indicator system is achieved, and 24 pairs of risk relations are achieved. The 24 pairs of achieved risk relations are substituted into a formula (1), an asset comprehensive value A is obtained through calculation. According to asset comprehensive value A and a vulnerability value V, the comprehensive value F of the loss caused by security events is worked out. According to the vulnerability value V and a threat value T, a security event possibility comprehensive value L is worked out. The comprehensive value F of the loss caused by the security events and the security event possibility comprehensive value L are substituted into a formula (2), and then a risk comprehensive value R is worked out and obtained. The risk assessment algorithm for the information system can eliminate the influence caused by the facts that assessment factor selection is unreasonable and risk correlation analysis cannot objectively reflect the system state, and improve the objectivity and the accuracy of risk assessment.
Owner:GUIZHOU UNIV

A verification method and system for safety of expected functions of an autonomous vehicle

The invention relates to a verification method and system for safety of expected functions of an autonomous vehicle, and the method comprises the steps of determining a dangerous event and a trigger event based on a system framework of a target vehicle; assessing and screening dangerous events; determining the acceptance degree of the trigger event; and verifying whether the trigger event satisfies the preset acceptance degree. The system comprises a first platform which is used for identifying a dangerous event of the autonomous vehicle and exporting a corresponding trigger event and a trigger event probability, and a second platform which is used for exporting a dangerous event of the autonomous vehicle, determining the ASIL level of the dangerous event and determining a corresponding trigger event tolerance or error rate target according to the ASIL level and the corresponding trigger event probability; a third platform which is used for reproducing the trigger event, testing the autonomous vehicle and verifying whether the trigger event reaches a set target or not. According to the present invention, the requirement for expected function safety assessment in the function development of the autonomous vehicle is met; the quantitative and verifiable evaluation requirements are provided, and the operability is high.
Owner:TONGJI UNIV

Method for simplifying rail transit train operation control system

ActiveCN103612650AChange the way the implementationChange the way of beingRailway traffic control systemsControl systemWorkload
The invention discloses a method for simplifying a rail transit train operation control system, and belongs to the technical field of rail transit control. The method particularly includes 1), improving a process for designing a universal safety computer platform; 2), simplifying vehicular application or ground application of the rail transit train operation control system. The method has the advantages that the designed universal safety computer platform is implemented on the basis of hardware/software difference design principles and hierarchical diagnosis principles, and functions for simultaneously implementing a plurality of application control logics are supported in the aspect of software on the basis of double-determinacy principles; a plurality of traditional rail transit operation control logic processing functions can be simultaneously supported by a logic processing layer of the universal safety computer platform designed by the process, so that the quantity of equipment of the traditional rail transit train operation control system can be reduced, and the reliability of the operation control system can be improved; the universal safety computer platform designed by the process can be migrated to rail transit train operation control systems with different requirements, so that development and safety assessment workload can be reduced, and the development and safety assessment cost can be lowered.
Owner:BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products