Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

299 results about "Security testing" patented technology

Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.

Penetration testing method for GAP isolation and exchange device

The invention discloses a penetration testing method for a GAP isolation and exchange device. The method comprises the concrete steps that (a) policy configuration is tested, wherein according to the working principle, the function and the implementation mode of the tested device, applicable test cases are selected from a preset penetration testing rule base, and test environment parameters are configured; (b) a network attack session is generated, wherein an independent client program and an independent server program are established, hosts in networks at the two ends of the tested device are respectively simulated, afterwards, test plugins corresponding to the test cases are respectively called, and the test environment parameters configured in the step (a) are passed to the test plugins; the test plugins produce corresponding data packets in real time, the data packets are sent through a client or a server, and therefore the network attack session is generated; (c) test results are evaluated, wherein the test results of the test cases are evaluated according to the completion condition of the network attack session and the warning information of the tested device. By the application of the penetration testing method for the GAP isolation and exchange device, automated security testing for the GAP isolation and exchange device can be achieved.
Owner:中国人民解放军信息安全测评认证中心 +1

Website login brute force crack method and system capable of identifying verification code

The invention provides a website login brute force crack method and system capable of identifying a verification code. The method comprises the steps of 1, through static webpage analysis, extracting information required for website login; 2, through dynamic webpage analysis, intercepting a login data package submitted to a website server by a client browser; 3, reading a group of user names and passwords from a brute force crack dictionary; 4, obtaining a verification code picture; 5, identifying the obtained verification code picture; 6, filling corresponding parameters in the login data package intercepted in the step 2 with a verification code identification result as well as the user names and the passwords read in the step 3, and submitting the replaced login data package to the website server; and 7, analyzing a website server response, if it is prompted that the verification code is wrong, returning to the step 4; if it is prompted that the user name or the password is wrong, returning to the step 3; and if it is prompted that the login succeeds, recording the user name and the password by which the login succeeds. According to the method and system, a website with a verification code login function can be subjected to automated security testing.
Owner:STATE GRID CORP OF CHINA +2

Testing method for network isolation of cloud platform tenants

ActiveCN107959689AConfirm connectivityTransmissionNetwork onNetwork isolation
The invention discloses a testing method for network isolation of cloud platform tenants and belongs to the technical field of computer cloud security testing. The method comprises the following steps: establishing an expectant cloud platform tenant network isolation matrix; acquiring basic information of all tenant networks on tenant control nodes and all computing nodes; acquiring isolation information of networks with three layers or above of all tenant networks on the network nodes; acquiring second-layer isolation information of tenant sub-networks on the network nodes and the computing nodes; acquiring network access information of the tenants and the tenant sub-networks on the computing nodes to generate an actual cloud platform tenant network isolation matrix Ma; comparing the generated cloud platform tenant network isolation matrix Ma with the expectant cloud platform tenant network isolation matrix. The isolating conditions of the tenant networks in the operation environmentare acquired from a bottom layer of the cloud platform network, whether the isolation of the current cloud platform network is abnormal or not is detected in real time, a visual network isolation report is provided for a cloud auditor, and an accountability path is provided for possible security problems of network services of the cloud tenants.
Owner:BEIJING UNIV OF TECH

Security testing system oriented to mobile intelligent terminal IPv6 protocol and application of protocol

The invention provides a security testing system oriented to the mobile intelligent terminal IPv6 protocol and application of the protocol. The security testing system comprises an attacking end and mobile terminal simulation equipment, wherein the attacking end and the mobile terminal simulation equipment are connected through a mobile internet heterogeneous network based on the IPv6 protocol, and the attacking end is used for scanning ports of the mobile terminal simulation equipment; reading the IPv6 address of the mobile terminal simulation equipment, and receiving an NS message sent by the mobile terminal simulation equipment for performing man-in-the-middle attack testing on the mobile terminal simulation equipment; counterfeiting a server response terminal request packet and distributing disguised IP for performing DHCPv6 attack testing on the mobile terminal simulation equipment; counterfeiting a network packet, and adopting a multi-cast address to enlarge the flow rate for performing DoS attack testing on the mobile terminal simulation equipment; outputting a security testing result according to the man-in-the-middle attack testing, the DHCPv6 attack testing and the DoS attack testing. The security testing system can be used for performing security testing on the mobile intelligent terminal IPv6 protocol and the application of the protocol under the environment of the mobile internet hybrid heterogeneous network based on the IPv6 protocol.
Owner:FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH

Information security offense and defense drill competition system for power industry

InactiveCN105282170AImprove vulnerability mining capabilitiesExcellent information security attack and defense competition platformTransmissionProduct testingAttack
The invention discloses an information security offense and defense drill competition system for the power industry, comprising an experimental platform, an experimental environment customization module and an application scenario customization module. The experimental platform is used for implementing offense and defense drill competition, being connected with the experimental environment customization module and the application scenario customization module, building attacks and carrying out security test, and includes a knowledge base management module, an online learning module and an offense and defense competition module. The experimental environment customization module is used for customizing a comprehensive drill scenario, analyzing malicious codes, and carrying out Intranet penetration and hole mining. The application scenario customization module is used for power information security training, information security offense and defense scenario drilling, industrialized depth customizing, security product testing, security technology researching and security assessment testing. According to the invention, the information security independent control capability, the safety monitoring capability, the notification and warning capability, the emergency disposal capability and the whole-process management control capability of companies can be improved.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1

Rule-based JavaScript security testing method

ActiveCN106055980AReduce missed detection rateImprove efficiency in detecting security issuesPlatform integrity maintainanceWeb siteDynamic instrumentation
The invention discloses a rule-based JavaScript security testing method. A program analysis method in which static analysis and dynamic analysis are combined is utilized for testing the security problem of a JavaScript code in a website and performing feedback, thereby finding out the security problems which comprise JavaScript coding standardization un-qualification and over-site script attack malicious codes. The method comprises the steps of dynamically finding out a JavaScript coding standardization un-qualification problem by means of a DLint tool, then testing the branched parts of a source code by means of an open-source static code standardization testing tool ESLint; then filtering a page which may contain over-site script attack malicious codes in the source code according to JavaScript page characteristics and a preset threshold according to a static analysis method; and then performing dynamic Instrumentation on the filtered page for performing strain analysis by means of a Jalangi frame, thereby determining whether the filtered page contains an over-site script attack. The rule-based JavaScript security testing method effectively improves testing efficiency for code standardization and malicious codes based on miss rate reduction.
Owner:NANJING UNIV OF POSTS & TELECOMM

Lightweight method and system for determining protocol vulnerabilities in embedded system firmware

The invention discloses a lightweight method and a system for determining protocol vulnerabilities in an embedded system firmware. The method comprises the following steps: constructing a feature vector by analyzing a protocol and parsing code feature; using the constructed feature vector and a training set to train a support vector machine SVM, determining a protocol parsing code classifier modelfor identifying a protocol parsing module; using the trained protocol parsing code classifier model to identify the protocol parsing module in the firmware image code of a target system; for the identified protocol parsing module, using a dangerous code feature library to quickly scan the suspected vulnerable points of the protocol parsing module; extracting the data source paths of the vulnerable points on the basis of constructing a control flow graph, a control dependency graph, and a data dependency graph; and constructing a multi-type vulnerability mode based on a vulnerable-point-baseddata source path, and determining protocol vulnerabilities in the embedded system firmware by pattern matching. The lightweight method and the system for determining protocol vulnerabilities in the embedded system firmware can provide a technical support for network protocol security, Internet of Things / Industrial Control System security, and security testing.
Owner:CHINA ELECTRIC POWER RES INST +2

Security protection performance evaluation method applicable to power wireless private network base stations

The invention discloses a security protection performance evaluation method applicable to power wireless private network base stations. The method comprises the steps of establishing a base station security protection performance evaluation system which comprises a terminal, a plurality of base stations, a switch, a security encryption gateway, a core network, a network management server, a network management client and a security access platform; performing a base station remote or local malicious control security test and checking device remote connection condition, manager information, user lists and sensitive operation records; performing a base station physical security protection security test, testing whether a plurality of terminals with the same USIM card are connected with the same base station or not, and testing whether the terminals access each other or not; performing an illegal base station interference test; and performing a pseudo base station attack test and testing whether the terminals are hijacked by a pseudo base station or not. According to the method, the information security threat for the base stations can be reduced, and the base station security protection control capability can be improved.
Owner:STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +2

Categorization of host security levels based on functionality implemented inside secure hardware

A system for rating security levels a device according to the characteristics of functions executing within secure hardware components in the device. The security level of a host is placed in a digital certificate along with a corresponding private key at the time of manufacture of a device. The digital certificate can be provided to an inquiring device so that more comprehensive system-wide security levels can be communicated and maintained. When a network uses ticket-based key management protocols, the security rating, or level, is transferred from the certificate to an issued ticket. Inquiring devices can then check security levels of target devices by using certificates or tickets and perform transfers or grant authorizations accordingly. In a preferred embodiment a security ratings system uses six levels of security. The levels are structured according to characteristics of a device's processing. That is, the levels provide information on the amount and type of sensitive processing that can occur in non-secure (or low security) circuitry or components within a device. This gives a better indication of how prone a device is to threats that may be of particular concern in content delivery networks. Additional qualifiers can be optionally used to provide further information about a security level. For example, the degree of handling time management processing within secure hardware and whether a particular codec, watermarks or fingerprints are supported within secure hardware can each be represented by a policy qualifier.
Owner:GENERAL INSTR CORP

Industrial control security testing system, and industrial control system

The invention discloses an industrial control security testing system, and an industrial control system. The industrial control security testing system comprises a port status scanning module, a testing case recommending module, and a fuzzy testing engine module, wherein the port status scanning module is used for scanning and acquiring a port status of equipment to be tested, which is used as a port status scanning result; the testing case recommending module is used for searching a preset testing case library for a testing case of a service protocol type matched with the port status scanning result when a port is in an open status according to the port status scanning result; and the fuzzy testing engine module is used for generating testing data according to the testing case obtained through the searching, carrying out variation of the testing data, and sending data obtained through the variation to the equipment to be tested for unknown security vulnerability mining. Therefore, the industrial control security testing system and the industrial control system provided by the invention have the advantages that security testing can be efficiently and automatically completed, so that a user can conveniently and efficiently carry out testing case selection and testing, automatic testing is achieved, and the error rate is extremely low.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +2

Automated testing method, device and system for task

The invention discloses an automated testing method, device and system for a task. The method comprises the following steps: acquiring application information of a task to be detected in a task database, and acquiring an installation package of the task to be detected by using the application information; acquiring a test machine which satisfies a testing condition in a test cluster, and obtaining a simulator which is not occupied on the test machine which satisfies the testing condition; transmitting the installation package of the task to be detected to the simulator which is not occupied on the test machine which satisfies the testing condition; after starting an application program of the task to be detected, transmitting security testing data to the application program running in the simulator; and monitoring an output result after the application program of the task to be detected receives the security testing data, and acquiring a security testing result of the task to be detected. The automated testing method, the device and the system for the task provided by the invention solve the technical problem that the safety monitoring efficiency is low since the application program safety monitoring cannot be finished automatically by the application program and the application program does not support multitask detection in the prior art.
Owner:SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products