Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Processing method and device for leak evaluation

A processing method and technology of a processing device, applied in the information field, can solve problems such as unreasonable vulnerability repair plans, incompatible system hazards, and inability to effectively play a preventive role.

Active Publication Date: 2013-08-21
HUAWEI TECH CO LTD
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the above-mentioned vulnerability evaluation scheme was used to formulate the repair plan, it was found that the risk level of each vulnerability assessed by the above-mentioned vulnerability database according to the evaluation standard did not conform to the actual harm of each vulnerability to the system, so the vulnerability repair plan formulated was not reasonable enough and could not be effectively implemented. to the preventive effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method and device for leak evaluation
  • Processing method and device for leak evaluation
  • Processing method and device for leak evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] figure 1 It is a flow chart of Embodiment 1 of the processing method for vulnerability evaluation of the present invention. The method of this embodiment can be implemented by a processing device for vulnerability evaluation, which can be implemented by hardware and / or software, and is preferably set in a device with data analysis and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a processing method and device for leak evaluation. The processing method for the leak evaluation is characterized by comprising the steps of (1) obtaining leak information of a system, wherein the leak information comprises a leak identification and a relevant parameter between a leak and the system; (2) determining a reference risk value of the leak according to the leak identification; (3) obtaining weighted values of relevant services of the leak in the system according to the relevant parameter; (4) determining a risk evaluation grade of the leak according to the reference risk value of the leak and the weighted values of the relevant services. When the processing method for the leak evaluation and the processing device for the leak evaluation are used for carrying out processing on the leak evaluation, the leak and the services relative to the leak are associated, the risk evaluation grade of the leak accords with harm degrees of leaks to the system in reality, thus a reasonable leak repair scheme can be made, and the processing method for the leak evaluation and the processing device for the leak evaluation play a role of prevention.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a processing method and device for vulnerability evaluation. Background technique [0002] Computer systems always have flaws and deficiencies in the design of hardware, software, and protocol layers. These flaws and deficiencies are called system vulnerabilities, which can be exploited by illegal users to obtain system privileges, and then perform illegal operations on the system, resulting in Serious consequences, such as hackers attacking the enterprise's server, causing the enterprise's operating system to be paralyzed, or stealing core business, thereby causing economic losses to the enterprise, etc. [0003] In order to prevent problems before they happen, it is necessary to detect the vulnerabilities of the system, find and fix the vulnerabilities before they are exploited. Usually, the system will detect multiple vulnerabilities through the vulnerability scanner, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 何远东周麟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products