Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

34 results about "Security metric" patented technology

Method and apparatus for technology resource management

Apparatus, and associated methods, manage technology resources in hosted applications including: demand, service level agreements, assets both hardware and software, projects, labor, knowledge and provisioning. The apparatus includes an asset manager configured to couple to host servers and a network, to manage the host servers and software deployed thereon. In embodiments of the invention the asset manager: determines demand for new assets and allocates available assets to meet the demand; determines assets not in compliance with existing software licenses; determines which host servers have actual service level metrics which are not compliant with the target service level metrics; and determines availability of a patch or upgrade for selected software and instances of the selected software among the assets. In an embodiment of the invention the asset manager couples to a contract manager with the asset manager determining the assets for which actual monitored service level metrics violate contract service level metrics. In an embodiment of the invention the asset manager couples to a product manager and scans the host severs to determine which have actual security metrics which are not compliant with the target security metrics managed by the product manager. In an embodiment of the invention the asset manager couples with a product manager, a work manager and an accounting manager to compare the actual costs of the new assets from the accounting manager and the work manager with the price of the assets from the product record.
Owner:IBM CORP

Electric power information network security measuring method based on security log data mining

The invention provides an electric power information network security measuring method based on security log data mining. The electric power information network security measuring method comprises the steps of defining a security index measurement model parameter and a measurement standard; acquiring electric power information network heterogeneous security events, normalizing the security events by means of an extensible security event standard format which is defined based on a template, and buffering the security events, thereby forming standard security events; in mass standard security events, grouping the security events according to a dimension parameter Di, extracting a parameter which reflect network safety operation condition according to an index parameter Vk, and obtaining a real-time network security index data model; dynamically updating the network security index data baseline model according to fitting between the network security index historical data and the network security index real-time data; calculating a network security measurement index; and obtaining a network abnormity position through the network security measurement index. The electric power information network security measuring method settles the technical problems such as low accuracy, low efficiency and no effective facility for performing security problem positioning in prior art.
Owner:GUIZHOU POWER GRID INFORMATION & TELECOMM

Security analysis and automatic evaluation method based on index threshold value and semantic analysis

The invention discloses a safety analysis and automatic evaluation method based on an index threshold value and semantic analysis. The method comprises the following steps: firstly, extracting a semantic relationship from an unstructured security analysis report, a regulation standard and other security analysis original corpus, and constructing a normalized security knowledge base; meanwhile, a safety index entity set is constructed according to the dimensions of activities, items and the like, and the safety index set is classified and divided in a layered mode; based on a semantic similarity calculation method, safety index entities and threshold attributes are identified and extracted from corpora such as regulatory standards, technical requirements and judgment bases, and the safety index entities and monitoring data attributes can be identified and extracted from a safety analysis report; and according to a semantic analysis result, automatic benchmarking and judgment can be carried out on a safety index satisfaction condition, and an expert experience method can be combined to carry out re-checking on an index initial judgment result. According to the method, the requirements of users on rapid, accurate and intelligent safety analysis and automatic evaluation of different activities and items are met, and the safety evaluation efficiency and accuracy can be effectively improved.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

A security analysis and automatic evaluation method based on indicator threshold and semantic parsing

The invention discloses a security analysis and automatic evaluation method based on index threshold and semantic analysis. First, extract semantic relationships from unstructured security analysis reports, regulations and standards, and other security analysis original corpora to build a standardized security knowledge base; at the same time, build security indicator entity sets according to dimensions such as activities and events, and classify and hierarchically divide security Indicator set; based on the semantic similarity calculation method, it can identify and extract security indicator entities and threshold attributes from corpora such as regulations, standards, technical requirements, and judgment basis, and can identify and extract security indicator entities and monitoring data attributes from security analysis reports; Semantic parsing results can automatically benchmark and determine the satisfaction of safety indicators, and can review and verify the initial judgment results of indicators in combination with expert experience. This method meets the needs of users for fast, accurate and intelligent safety analysis and automatic evaluation of different activities and events, and can effectively improve the efficiency and accuracy of safety evaluation.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Power grid safety evaluation method and device, computer equipment and storage medium

The invention relates to a power grid safety evaluation method and device, computer equipment, a storage medium and a computer program product. According to the invention, the operation safety and stability of the power grid system can be improved. The method comprises the following steps: taking each device of a transformer substation as a node, mapping a connection relationship among the devices as an edge among the nodes, and calculating security risk class, security state class and attack loss class evaluation elements of each node to obtain a current local security measure; calculating a first global security metric according to all the current local security metrics and the associated edges thereof; calculating various evaluation elements of each divided area, and calculating comprehensive security measurement of each divided area according to the various elements of each divided area and the first global security measurement; and calculating various evaluation elements of the target power network, and carrying out overall fusion on the various elements of the target power network and the comprehensive security measurement of each divided region by using a volleyball super-match algorithm to obtain a network security evaluation total measurement of the target power network.
Owner:GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD

Security Modeling and Quantification Method for Cyberspace Mimic Defense Based on Vulnerability Consistency Rate

The invention provides a security modeling and quantification method for network space mimicry defense based on the vulnerability consistency rate. The method comprises: step 1: determining the defense parameter information that affects the security of the DHR system; step 2: determining the attack parameter information that affects the attacker's ability; step 3: establishing the DHR system about the defense parameter information and the attack parameter information Model; step 4: deriving the DHR system security metrics about the defense parameter information and the attack parameter information, the metrics include: the system attack success rate of an attack and the system attack success rate of the attack task; step 5 : According to the DHR system model, the system attack success rate of an attack and the system attack success rate of an attack task, calculate the system attack success rate of the DHR system for a specific vulnerability and the system attack success rate of the DHR system for a combination of vulnerabilities. A mathematical model is established for the DHR system, and the security of the system is represented by indicators such as output consistency rate and system attack success rate, and the security and anti-attack ability of the DHR system are analyzed by solving the model.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

A security monitoring method in a distributed network environment

ActiveCN103916397BSolve real-time security issuesTransmissionSecurity metricSecurity Measure
The invention discloses a safety monitoring method in a distributed network environment, and relates to the safety monitoring problem in the field of information safety. The invention consists of three parts: a monitoring module, a safety module and a safety mechanism, wherein the safety module is composed of a safety function coordination module, a safety control module, a safety measurement module, a safety decision module and a local reference database. In the present invention, the monitored dynamic data is delivered by the monitoring module, and then measured by the safety measurement module, which is used to measure the safety of the behavior of the monitoring node; the safety decision-making module determines the qualitative safety problem according to the measurement result; the safety control module dispatches the monitored data according to the decision-making result The security mechanism in the system implements the response strategy; the security function coordination module is responsible for communicating with the security measurement module, the security decision-making module and the security control module to realize the security function collaboration. The invention can dynamically customize security policies for the distributed network environment, and maintain the security of monitoring nodes in the distributed network environment.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products