Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network space vulnerability merging platform system

A cyberspace and vulnerability technology, applied in transmission systems, electrical components, etc., can solve problems such as hidden dangers, impact, control and destruction of Internet security, and achieve the effect of improving detection capabilities, improving industry standards, and improving work efficiency

Active Publication Date: 2018-11-16
深圳极限智能信息技术有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a network space vulnerability merging platform system, through the network communication layer, distributed control technology and scanning, use the distributed advantages and efficiency to improve the work efficiency of the system platform, and can target large-scale regional network targets Scanning can improve my country's detection capabilities in the field of information security, completely reverse the situation of Trojan horse viruses using large data carriers for advanced persistent attacks and low discovery rates, and solve the current situation based on Internet security risks. Many threats are through viruses, penetration, etc. The problem of influencing, controlling and destroying the network and stealing information on the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network space vulnerability merging platform system
  • Network space vulnerability merging platform system
  • Network space vulnerability merging platform system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0033] Refer to the attached Figure 4 and Figure 5 : First, the administrator / executor logs in to the web to submit the task; then the distribution node controls the background, and the task will be automatically assigned to the idle node; again, the node will analyze the task process (information collection->IP range / domain name arrangement- >Vulnerability scanning), and store the collected information, vulnerabilities, and services in the database; finally, the node still sends a notification to the administrator’s mailbox, reporting the completion of the task scanning and whether there is a vulnerability report and vulnerability level, and completes the entire detection report process , the program will automatically assign tasks to each distribution node, and use the distribution nodes to perform some tedious tasks such as information collection, vulnerability analysis, and report output for the target task, which can greatly save personnel usage and time, and the automa...

Embodiment 3

[0035] Refer to the attached Figure 6 : Administrators or executives can view the vulnerability distribution map of the areas or tasks under their management through the web operation terminal 2, and can clearly view the key areas of vulnerabilities and safe areas (visual display of the distribution of vulnerability areas), which can facilitate emergency response and ensure Network security.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network space vulnerability merging platform system. The network space vulnerability merging platform system comprises a network communication layer, wherein a connecting endof the network communication layer is provided with a plurality of Web operation terminals; an output end of the network communication layer is provided with a database server and a Web server respectively; the connecting end of the network communication layer is provided with a background program server; and a connecting end of the background program server is provided with a plurality of distributed servers. The network communication layer, a distributed control technology and scanning are adopted, so that the working efficiency of a system platform is increased by means of the advantages and efficiency of a distributed form; large regional network targets can be scanned; and the functions of studying how to allocate tasks and automatically distinguish idle nodes and returning result data are optimized specially. A search engine is adopted to perform information collection and target scanning operations in the Internet, so that the scanning efficiency and accuracy of a wide range ofnetwork conditions are increased.

Description

technical field [0001] The invention relates to a network platform system, in particular to a network space loophole merging platform system. Background technique [0002] With the rapid development of information technology, computer networks have been widely used, and it has become the trend of the times to use a wide and open network environment for global communication. People's daily economic and social life is increasingly dependent on the Internet. [0003] Human society has gradually entered the information age characterized by digitization, networking, and intelligence. The explosive growth of information has further led to the advent of the era of big data. Various information systems such as search engines, social networks, e-government, e-finance, e-commerce, intelligent transportation, and intelligent factories have sprung up, quietly acquiring massive amounts of data to perceive, manage, and regulate the real physical environment and social life. In all aspect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1433H04L63/145H04L67/02
Inventor 赖洪昌
Owner 深圳极限智能信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products