Asset vulnerability identification method, device and system
An asset and vulnerability technology, applied in the field of network security, can solve the problem of single asset vulnerability detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] According to an embodiment of the present invention, an embodiment of a method for identifying asset vulnerabilities is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0036] figure 1 is a method for identifying asset vulnerabilities according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0037] Step S102, acquiring asset information of the asset to be detected;
[0038] Step S104, sending the asset information to the cloud data center, so that the cloud data center performs vulnerability identification detection on the asset to be detected based on the asset information, and generates a vuln...
Embodiment 2
[0059] The present invention also provides an asset vulnerability identification device, which is used to implement the asset vulnerability identification method provided by the above-mentioned content of the embodiment of the present invention. The following is a specific introduction of the asset vulnerability identification device provided by the embodiment of the present invention.
[0060] Such as figure 2 As shown, the above asset identification device includes: an acquisition unit 10 , a sending unit 20 and an early warning unit 30 .
[0061] The acquisition unit 10 is used to acquire asset information of the asset to be detected;
[0062] The sending unit 20 is configured to send the asset information to the cloud data center, so that the cloud data center performs vulnerability identification detection on the asset to be detected based on the asset information, and generates a vulnerability identification result, wherein the The cloud data center stores target threa...
Embodiment 3
[0069] The present invention also provides an asset vulnerability identification system, which is used to implement the asset vulnerability identification system provided by the above-mentioned content of the embodiments of the present invention. The following is a specific introduction of the asset vulnerability identification system provided by the embodiments of the present invention.
[0070] Such as image 3 As shown, the above-mentioned asset identification system includes: a local asset information base 100 , a cloud data center 200 and a vulnerability warning platform 300 .
[0071] The local asset information library 100 is used to collect and store asset information of assets to be detected;
[0072] The cloud data center 200 is configured to perform vulnerability identification and detection on the asset to be detected based on the asset information, and generate a vulnerability identification result;
[0073] The vulnerability early warning platform 300 is used to...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com