Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security threat analyzing method based on service data stream model

A technology of threat analysis and data flow, applied in the field of security analysis of information technology, can solve problems such as lack of security risks, lack of pertinence of security threats, incomplete threat analysis, etc., and achieve the effect of enhancing overall security

Inactive Publication Date: 2015-05-20
STATE GRID CORP OF CHINA +2
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology helps improve the efficiency of analyzing complex systems for potential attacks or vulnerabilities related thereto. It involves starting off-line and creating an analytical framework through which different types of business processes may be identified and evaluated separately without affecting their main purpose. By doing this, it provides better understanding about how these important assets interact within them, making sure they meet certain standards before being released into public use.

Problems solved by technology

This patented technical problem addressed in this patents relates to improving the safety and reliability of electronic devices that store data securely during their lifespan (their ability to protect against potential damage caused by external factors). Current methods involve manual review and assessment after each new device starts up, which can be time-consuming and expensive due to its large size and complexity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security threat analyzing method based on service data stream model
  • Security threat analyzing method based on service data stream model
  • Security threat analyzing method based on service data stream model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0090] A power company plans to build an electric vehicle charging management system to meet four-level applications at the headquarters, provinces, cities, and stations, and realize the operation and management of the electric vehicle intelligent charging and swapping service network. When analyzing the security requirements of the system, the system is analyzed according to a security threat analysis method based on the business data flow model of the present invention.

[0091] Its specific implementation plan is:

[0092] 1. Conduct research on the basic situation of the system and conduct system decomposition. The system users mainly include headquarters users, provincial users, prefecture-level users, and station-level users. Since the system belongs to the B / S system, the client side of the system mainly includes browsers, and the servers mainly include database servers, front-end servers, and application servers. , Web server, authentication server, workstation, the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security threat analyzing method based on a service data stream model. The method includes the steps of establishing the service data stream model, decomposing an information system, analyzing key service flow, recognizing and grading sensitive data, and analyzing the security threat. According to the technical scheme, by establishing the key service data flow link of the information system on the basis of the service data stream model, introducing the security grades of the sensitive data, and recognizing the security threat of each key service flow and conducting formal representation according to the key service data flow model, a user can be helped to design the security threat analysis better conforming to the system service flow, and therefore the overall security of an application system is enhanced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products