Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cross-regional vulnerability library sharing and cooperative processing system and method

A technology of collaborative processing and vulnerability database, which is applied in the field of cross-regional vulnerability database sharing and collaborative processing systems, and can solve problems such as multiple known vulnerabilities and configurations, economic losses, and violations

Active Publication Date: 2019-04-30
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Over time, a large number of unowned assets and zombie assets have been generated. These assets have not been maintained for a long time, resulting in more known vulnerabilities and configuration violations.
What's more serious is that these assets are difficult to be included in the daily maintenance scope of administrators, which brings great hidden dangers to enterprise security and becomes the weakness of enterprise information security.
[0003] Taking power grid enterprises as an example, common power information equipment, such as servers, switches, routers, power communication terminals, smart power transformation equipment, etc., once a security problem occurs, it will affect the normal acquisition of power information and the normal supply of power services. People's daily production and life bring a lot of inconvenience, but also cause great economic losses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cross-regional vulnerability library sharing and cooperative processing system and method
  • A cross-regional vulnerability library sharing and cooperative processing system and method
  • A cross-regional vulnerability library sharing and cooperative processing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0045] refer to figure 1 , in one embodiment, a cross-regional vulnerability library sharing and collaborative processing system, including a production control area and a management information area with respective vulnerability rapid governance management and control platforms, the production control area has no Internet connection, and There is an electric power dedicated network security isolation device between the production control area and the management information area, and the vulnerability library information of the vulnerability rapid management and control platform is shared between the two areas through a cross-region vulnerability library synchronization mechanism;

[0046] Among them, the vulnerability library of the rapid vulnerabilit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cross-regional vulnerability database sharing and cooperative processing system and method, and the system comprises a production control large area and a management information large area, the production control large area is not connected with the Internet, a power special network security isolation device exists between the production control large area and the management information large area, and vulnerability database information sharing is carried out between the two large areas through a cross-regional vulnerability database synchronization mechanism. The vulnerability database of the management information large area obtains data through the Internet, and the manufacturer vulnerability database obtains data from a preset vulnerability radar interface; The management information large area updates vulnerability database information of the management information large area through the Internet, and pushes the vulnerability database information to a vulnerability rapid management and control platform of the production control large area through a data transmission mechanism of the power private network security isolation device; The vulnerability rapid treatment management and control platform of the production control large area updates vulnerability database information through an interface and pushes the vulnerability database information tothe vulnerability rapid treatment management and control platform of the management information large area; and the management information and the production control large area periodically and synchronously exchange vulnerability library information and update respective vulnerability libraries under the strategy control.

Description

technical field [0001] The invention relates to a system and method for cross-region vulnerability database sharing and collaborative processing. Background technique [0002] Information system cyberspace is composed of numerous nodes, each node is an IT asset (or information asset) connected to the network, and information assets include host operating systems, network devices, security devices, databases, middleware, and application components. Information assets are the most basic and important carrier in information security management. With the continuous growth of the internal business of the enterprise and the rapid development of business informatization, various business support platforms and management systems are becoming more and more complex. As the resources become richer and richer, the asset management work brought to administrators becomes more and more difficult. Over time, a large number of unowned assets and zombie assets have been generated. These ass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/1433H04L67/55
Inventor 沈桂泉龙震岳刘晔沈伍强陈守明余志文艾解清肖建毅陈晓江李波吉威炎杨少滨李虹谭近军
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products