Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection method, platform and device and computer readable medium

A vulnerability detection and computer technology, applied in the field of detection, can solve problems such as user loss and vulnerability not being repaired.

Inactive Publication Date: 2020-10-23
北京安帝科技有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because monitoring devices usually use an open source architecture, there will be more or less program loopholes in the development process, coupled with the rapid iterative update of monitoring devices, resulting in many loopholes not being fixed
Hackers will use unfixed vulnerabilities to attack or steal user data, causing losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method, platform and device and computer readable medium
  • Vulnerability detection method, platform and device and computer readable medium
  • Vulnerability detection method, platform and device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0055] As mentioned earlier, monitoring equipment usually uses an open source architecture, and there will be more or less program loopholes in the development process. Coupled with the rapid iterative update of monitoring equipment, many loopholes have not been fixed. Hackers will use unfixed vulnerabilities to attack or steal user data, cau...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detection method, platform and device and a computer readable medium. The method comprises the steps of creating a device distribution map based on a global map;selecting a target network segment, sending communication content for each IP address, and determining a target IP address corresponding to at least one online target monitoring device according to afeedback result of the monitoring device corresponding to each IP address; accessing the target IP address to connect to a corresponding target monitoring device; obtaining manufacturer information of the target monitoring device; selecting at least one vulnerability detection script corresponding to the manufacturer information; performing vulnerability detection on the target monitoring devicethrough the at least one vulnerability detection script to obtain a vulnerability condition of the target monitoring device; and acquiring longitude and latitude corresponding to the target IP addressfrom a to-be-referenced IP geographic position database according to the target IP address, and marking the vulnerability situation on the longitude and latitude corresponding to the equipment distribution map. According to the scheme, vulnerability detection of the monitoring equipment can be realized.

Description

technical field [0001] The invention relates to the technical field of detection, in particular to a vulnerability detection method, platform and device, and a computer-readable medium. Background technique [0002] At present, with the development of network technology, more and more monitoring devices have been applied to various scenes in life. Monitoring devices can help users check the conditions within their coverage area, and can also provide evidence for case detection. [0003] However, since monitoring devices usually use an open source architecture, there will be more or less program loopholes in the development process, coupled with the rapid iterative update of monitoring devices, resulting in many loopholes not being fixed. Hackers will use unfixed vulnerabilities to attack or steal user data, causing losses to users. [0004] Therefore, in view of the above deficiencies, it is necessary to provide a method capable of performing vulnerability detection on moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 王自强姜双林周磊饶志波
Owner 北京安帝科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products