Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability scanning method and vulnerability scanning device

A vulnerability scanning and scanning method technology, applied in the field of vulnerability scanning, can solve the problem of high labor cost and achieve the effect of alleviating the high labor cost

Inactive Publication Date: 2017-11-24
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows users to easily check if an item has been exposed during risk assessment procedures without having them manually enter their addresses into specific locations within those tests. It also helps reduce costs associated with testing new assets through automated threat detection systems (TDS).

Problems solved by technology

This patented method involves manual setting up an identifier called a risk score on each item being inspected by the system before sending it into the scanners. However this can lead to errors when assigning values or identifying specific areas that may contain potential weaknesses. Additionally, there are also issues where users cannot easily change their default settings without affecting data integrity during testing due to human error.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and vulnerability scanning device
  • Vulnerability scanning method and vulnerability scanning device
  • Vulnerability scanning method and vulnerability scanning device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] An embodiment of the present invention provides a vulnerability scanning method, such as figure 1 As shown, applied to the detector, the detector is installed between the terminal device and the server. The scanning methods for this kind of vulnerability include:

[0055] Step S103: The detector obtains a vulnerability scanning request sent by the user to scan the vulnerability of the asset, where the vulnerability scanning request includes the name information of the asset.

[0056] Step S104: The detector reads the address information of the asset according to the name information, where the address information is address information established in advance based on the user's historical access information, and the historical access information includes the name information and address information of the historically accessed assets.

[0057] Step S105: The detector pushes address information to the vulnerability scanner of the asset, so that the vulnerability scanner can scan...

Embodiment 2

[0081] A vulnerability scanning device provided by an embodiment of the present invention, such as image 3 As shown, the vulnerability scanning device is installed between the terminal device and the server, and the vulnerability scanning device includes:

[0082] The first obtaining module 300 is configured to obtain a vulnerability scanning request sent by a user to scan for vulnerabilities of an asset, wherein the vulnerability scanning request includes the name information of the asset;

[0083] The reading module 400 is used to read the address information of the asset according to the name information, where the address information is the address information established in advance based on the user's historical access information, and the historical access information includes the name information and address information of the historically accessed assets;

[0084] The push module 500 is used to push address information to the vulnerability scanner of the asset so that the vul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of vulnerability scanning and provides a vulnerability scanning method and a vulnerability scanning device. The method is applied to a detector which is mounted between terminal equipment and a server. The method includes: the detector acquires an asset vulnerability scanning request sent by a user, wherein the asset vulnerability scanning request includes asset name information; the detector reads asset address information according to the name information, wherein the address information is established in advance on the basis of historical access information of the user, and the historical access information includes historical access asset name information and address information; the detector pushes the address information to an asset vulnerability scanner to make it convenient for the vulnerability scanner to perform asset vulnerability scanning. The vulnerability scanning method and the vulnerability scanning device have advantages that the technical problem of high manpower cost in vulnerability scanning with a traditional vulnerability scanner is alleviated.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products