CN111666570A - KXTScan vulnerability scanning tool - Google Patents

KXTScan vulnerability scanning tool Download PDF

Info

Publication number
CN111666570A
CN111666570A CN202010335150.3A CN202010335150A CN111666570A CN 111666570 A CN111666570 A CN 111666570A CN 202010335150 A CN202010335150 A CN 202010335150A CN 111666570 A CN111666570 A CN 111666570A
Authority
CN
China
Prior art keywords
module
kxtscan
electrically connected
scanning
vulnerability scanning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010335150.3A
Other languages
Chinese (zh)
Inventor
张维国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningxia Kaixinte Information Technology Co ltd
Original Assignee
Ningxia Kaixinte Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningxia Kaixinte Information Technology Co ltd filed Critical Ningxia Kaixinte Information Technology Co ltd
Priority to CN202010335150.3A priority Critical patent/CN111666570A/en
Publication of CN111666570A publication Critical patent/CN111666570A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention relates to the technical field of vulnerability scanning, and discloses a KXTScan vulnerability scanning tool which comprises an identification device, wherein the output end of the identification device is electrically connected with a login system, the output end of the login system is respectively and electrically connected with an identity identification device and a password protection module, the output ends of the identity device and the password protection module are both electrically connected with an administrator login port, and the output end of the administrator login port is electrically connected with a firewall system. This KXTScan vulnerability scanning tool, the data storage mode through data export module is hard disk storage, the inside of data export module is provided with the network card simultaneously, be connected with the control host computer through the network, thereby better assurance data's backup, and export the module through the direct control of host computer, thereby can be useful with useless difference, and the output and the KXTScan vulnerability scanning equipment electricity of browser are connected, thereby when KXTScan vulnerability scanning equipment is scanning, can realize the scanning result of word and pdf version through the browser.

Description

KXTScan vulnerability scanning tool
Technical Field
The invention relates to the technical field of vulnerability scanning, in particular to a KXTScan vulnerability scanning tool.
Background
The vulnerability scanning technology is an important network security technology, and can be matched with a firewall and an intrusion detection system to effectively improve the security of a network, through scanning the network, a network administrator can know the security setting and the running application service of the network, discover the security vulnerability in time and objectively evaluate the network risk level, the network administrator can correct the network security vulnerability and the error setting in the system according to the scanning result, and prevent the network security vulnerability and the error setting in the system before hacker attack, if the firewall and the network monitoring system are passive defense means, the security scanning is an active precaution measure, and hacker attack behaviors can be effectively avoided, so that the hacker attack behavior can be prevented in the bud.
Vulnerability scanning refers to detecting the security vulnerability of a designated remote or local computer system by means of scanning and the like based on a vulnerability database, and finding out the security detection behavior of available vulnerabilities, in the prior art, enterprises generally need to purchase vulnerability scanning tools of different types of different manufacturers in order to cope with increasingly complex information security situations, the scanning range of the vulnerability scanning tools not only covers equipment on system levels such as operating systems, firewalls, routers and the like, but also covers equipment on WEB levels in site forms such as OA, ERP and the like, and due to the limited functions and pertinence of the vulnerability scanning tools, the vulnerability scanning tools can only meet the vulnerability scanning requirements of specific types of specific equipment, and due to the security protection isolation strategy of network deployment in a local area network and the like, the vulnerability scanning tools are generally required to be deployed so as to correspond to different equipment and the vulnerability scanning requirements of specific types, and moreover, remote Web application vulnerability scanning, local vulnerability host scanning, no support for independently writing a poc script, no graphical display of scanning progress and results, and no support for exporting word and pdf version scanning results are available, so that a KXTScan vulnerability scanning tool is provided to solve the problems.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the KXTScan vulnerability scanning tool provided by the invention has the advantages of remote control, autonomous writing, multi-version scanning result support and the like, and solves the problems that vulnerability scanning of remote Web application, local vulnerability host scanning cannot be realized, autonomous writing of a poc script cannot be supported, scanning progress and result cannot be graphically displayed, and the scanning result of word and pdf versions cannot be derived.
(II) technical scheme
In order to achieve the purposes of remote control, independent compiling and supporting multi-version scanning results, the invention provides the following technical scheme: the KXTScan vulnerability scanning tool comprises an identification device, wherein the output end of the identification device is electrically connected with a login system, the output end of the login system is respectively and electrically connected with an identity identification device and a password protection module, the output ends of the identity identification device and the password protection module are respectively and electrically connected with an administrator login port, the output end of the administrator login port is electrically connected with a firewall system, the output end of the firewall system is electrically connected with a browser, the output end of the browser is electrically connected with a KXTScan vulnerability scanning device, the output end of the KXTScan vulnerability scanning device is respectively and electrically connected with a host scanning module and a Web application scanning module, the output ends of the host scanning module and the Web application scanning module are respectively and electrically connected with a data conversion module, the output end of the data conversion module is respectively and electrically connected with a data export module and an access record module, and the output end of the data export module is electrically, the output ends of the data export module and the access recording module are both electrically connected with a control host, and the output end of the control host is electrically connected with a display.
Preferably, the identification device, the login system, the identity authentication module, the password protection module, the administrator login port, the firewall system, the browser, the KXTScan vulnerability scanning device, the host scanning module, the Web application scanning module, the data conversion module, the data export module, the report generation module, the access recording module and the control host are connected through a dedicated network signal.
Preferably, the scanner is fixedly installed inside the recognition device, the administrator identity card is provided with an identity code, the identity code is a bar code, the identity code is a Morse code, and the identity code on each administrator identity card is different.
Preferably, the output end of the login system is fixedly provided with two conversion heads, and the two output ends are respectively connected with the identity authentication module and the password protection module.
Preferably, a digital password board is fixedly installed on the outer surface of the identity authentication module, the password board is electrically connected with the input end of the scanner, and passwords on the digital password board corresponding to each administrator are different.
Preferably, the outer surface of the password protection module is fixedly provided with a fingerprint identification device and a pupil identification device, the fingerprint identification device and the pupil identification device are in signal connection with the scanner, and each administrator corresponds to one fingerprint identification and one pupil identification.
Preferably, the output end of the KXTScan vulnerability scanning device is fixedly connected with a branching head, the internal part of the branching head is fixedly connected with two branching lines, one branching line is electrically connected with the input end of the host scanning module, and the other branching line is electrically connected with the input end of the Web application scanning module.
Preferably, the output end of the report generation module is electrically connected with a printer, and an image conversion module, a code conversion module and a character conversion module are fixedly installed in the report generation module.
Preferably, the data storage mode of the data export module is hard disk storage, and a network card is arranged inside the data export module and is connected with the control host through a network.
(III) advantageous effects
Compared with the prior art, the KXTScan vulnerability scanning tool provided by the invention has the following beneficial effects:
1. the KXTScan vulnerability scanning tool is electrically connected with an identity recognition device and a password protection module through the output end of a login system respectively, a scanner is fixedly installed inside the recognition device, an identity code is arranged on an administrator identity card and is a bar code, the identity code is a Morse password, the identity code on each administrator identity card is different, a digital password board is fixedly installed on the outer surface of an identity authentication module, the password board is electrically connected with the input end of the scanner, the password on the digital password board corresponding to each administrator is different, a fingerprint recognition device and a pupil recognition device are fixedly installed on the outer surface of the password protection module, the fingerprint recognition device and the pupil recognition device are both in signal connection with the scanner, each administrator corresponds to one fingerprint recognition and one pupil recognition, so that the safety of the system is ensured, and illegal things caused by the situation that the centered person finds a vulnerability can be avoided, the remote control is realized by connecting the identification device, the login system, the identity authentication module, the password protection module, the administrator login port, the firewall system, the browser, the KXTScan vulnerability scanning device, the host scanning module, the Web application scanning module, the data conversion module, the data export module, the report generation module, the access recording module and the control host through special network signals, and the autonomous vulnerability scanning of the local computer is realized by installing the KXTScan vulnerability scanning device in the tool.
2. The KXTScan vulnerability scanning tool is electrically connected with a printer through the output end of a report generation module, an image conversion module, a code conversion module and a character conversion module are fixedly installed inside the report generation module, so that a poc script is written autonomously, the scanning progress and the scanning result are displayed graphically, the scanning progress and the scanning result can be displayed through a drawing, a hard disk is stored in a data storage mode through a data export module, a network card is arranged inside the data export module and is connected with a control host through a network, so that the backup of data is better ensured, the export module is directly controlled through the host, so that the useful and useless difference can be realized, the output end of a browser is electrically connected with KXTScan vulnerability scanning equipment, and the scanning results of word and pdf versions can be realized through the browser when the KXTScan vulnerability scanning equipment is used for scanning.
Drawings
FIG. 1 is a schematic diagram of an operating system of a KXTScan vulnerability scanning tool according to the present invention.
In the figure: the system comprises an identification device 1, a login system 2, an identity authentication module 3, a password protection module 4, an administrator login port 5, a firewall system 6, a browser 7, a vulnerability scanning device 8KXTScan 9, a host scanning module 9, a Web application scanning module 10, a data conversion module 11, a data export module 12, a report generation module 13, an access record module 14, a control host 15 and a display 16.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the KXTScan vulnerability scanning tool includes an identification device 1, a scanner is fixedly installed inside the identification device 1, an identity code is set on an administrator identity card, the identity code is a bar code, the identity code is a moss password, the identity code on each administrator identity card is different, an output end of the identification device 1 is electrically connected with a login system 2, an output end of the login system 2 is electrically connected with an identity recognition device 3 and a password protection module 4, an outer surface of the password protection module 4 is fixedly installed with a fingerprint recognition device and a pupil recognition device, the fingerprint recognition device and the pupil recognition device are both in signal connection with the scanner, each administrator corresponds to one fingerprint recognition and one pupil recognition, an outer surface of the identity authentication module 3 is fixedly installed with a digital password board, the password board is electrically connected with an input end of the scanner, and the password on the digital password board corresponding to each administrator is different, the output end of the login system 2 is fixedly provided with a conversion head, the conversion head has two output ends, the two output ends are respectively connected with the identity authentication module 3 and the password protection module 4, the output ends of the identity device 3 and the password protection module 4 are both electrically connected with an administrator login port 5, the output end of the administrator login port 5 is electrically connected with a firewall system 6, the output end of the firewall system 6 is electrically connected with a browser 7, the output end of the browser 7 is electrically connected with a KXTScan vulnerability scanning device 8, the output end of the KXTScan vulnerability scanning device 8 is respectively electrically connected with a host scanning module 9 and a Web application scanning module 10, the output end of the KXTScan vulnerability scanning device 8 is fixedly connected with a branch head, the inside of the branch head is fixedly connected with two branch wires, one branch wire is electrically connected with the input end of the host scanning module 9, and the other branch wire is electrically connected with the input, the output ends of the host scanning module 9 and the Web application scanning module 10 are electrically connected with a data conversion module 11, the output end of the data conversion module 11 is electrically connected with a data export module 12 and an access recording module 14 respectively, the output end of the data export module 12 is electrically connected with a report generation module 13, the output end of the report generation module 13 is electrically connected with a printer, the inside of the report generation module 13 is fixedly provided with an image conversion module, a code conversion module and a character conversion module, the output ends of the data export module 12 and the access recording module 14 are electrically connected with a control host 15, the identification device 1, the login system 2, the identity authentication module 3, the password protection module 4, the administrator login port 5, the firewall system 6, the browser 7, the KXTan vulnerability scanning device 8, the host scanning module 9, the Web application scanning module 10, the data conversion module 11, the data export module 12, The report generating module 13, the access recording module 14 and the control host 15 are connected through a special network signal, the data storage mode of the data exporting module 12 is hard disk storage, a network card is arranged inside the data exporting module 12 and is connected with the control host 15 through a network, the output end of the control host 15 is electrically connected with a display 16, the output end of the login system 2 is respectively and electrically connected with an identity recognition device 3 and a password protection module 4, a scanner is fixedly arranged inside the recognition device 1, an identity code is arranged on an administrator identity card and is a bar code, the identity code is a Moss password, the identity code on each administrator identity card is different, a digital password board is fixedly arranged on the outer surface of the identity authentication module 3 and is electrically connected with the input end of the scanner, and the password on the digital password board corresponding to each administrator is different, the outer surface of the password protection module 4 is fixedly provided with a fingerprint identification device and a pupil identification device which are in signal connection with the scanner, each manager corresponds to one fingerprint identification and pupil identification, therefore, the security of the system is ensured, illegal operation caused by the discovery of bugs by a person with a heart is avoided, and through the connection of the identification device 1, the login system 2, the identity authentication module 3, the password protection module 4, the administrator login port 5, the firewall system 6, the browser 7, the KXTScan bug scanning device 8, the host scanning module 9, the Web application scanning module 10, the data conversion module 11, the data export module 12, the report generation module 13, the access recording module 14 and the control host 15 through special network signals, therefore, remote control is achieved, and the KXTScan vulnerability scanning equipment 8 is installed inside the tool, so that the self-contained vulnerability scanning of the local machine is achieved.
When the system is used, an administrator can open the login system 2 through the authentication of the identification device 1, a scanner is fixedly installed inside the identification device 1, an identity code is arranged on an administrator identity card and is a bar code, the identity code is a Morse code, the identity code on each administrator identity card is different, the operation of a person with caution is avoided, after the login system 2 is opened, the identity needs to be authenticated, pupils and fingerprints are detected, the equipment can be operated after the pupils and the fingerprints are matched with a database, the control host computer 15 can be opened at the moment, a tool can normally operate, after the equipment normally operates, the equipment can be displayed through the display 16, when the loopholes are scanned, the scanning comprises KXTScan loophole scanning, host computer scanning and Web application scanning, and after the scanning is finished, the data is transmitted to the data export module 12 through the data conversion module 11, the administrator may set the data in the form of an image, code or text and the guest recording module 14 will clearly record which administrator operated the tool and at which point in time.
In summary, the KXTScan vulnerability scanning tool is electrically connected with an identity recognition device 3 and a password protection module 4 through the output end of a login system 2, a scanner is fixedly installed inside the recognition device 1, an identity code is arranged on an administrator identity card, the identity code is a bar code, the identity code is a moss password, the identity code on each administrator identity card is different, a digital password board is fixedly installed on the outer surface of the identity authentication module 3, the password board is electrically connected with the input end of the scanner, the password on the digital password board corresponding to each administrator is different, a fingerprint recognition device and a pupil recognition device are fixedly installed on the outer surface of the password protection module 4, the fingerprint recognition device and the pupil recognition device are both in signal connection with the scanner, each administrator corresponds to one fingerprint recognition and one pupil recognition, thereby ensuring the security of the system, the remote control is realized by connecting the identification device 1, the login system 2, the identity authentication module 3, the password protection module 4, the administrator login port 5, the firewall system 6, the browser 7, the KXTScan vulnerability scanning device 8, the host scanning module 9, the Web application scanning module 10, the data conversion module 11, the data export module 12, the report generation module 13, the access recording module 14 and the control host 15 through special network signals, and the autonomous vulnerability scanning of the local machine is realized by installing the KXTScan vulnerability scanning device 8 in the tool.
Moreover, the output end of the report generating module 13 is electrically connected with a printer, an image conversion module, a code conversion module and a character conversion module are fixedly arranged in the report generating module 13, thereby supporting the automatic writing of the poc script, graphically displaying the scanning progress and the scanning result, and also displaying the scanning progress and the scanning result through a drawing, storing the scanning progress and the scanning result for a hard disk through a data storage mode of the data export module 12, meanwhile, a network card is arranged in the data export module 12 and is connected with the control host computer 15 through a network, thereby better ensuring the backup of data, and directly controlling the export module through the host computer, thereby being capable of distinguishing useful from useless, and the output end of the browser 7 is electrically connected with the KXTScan vulnerability scanning device 8, thus, when the KXTScan bug scanning device 8 scans, the scan results of word and pdf versions can be realized through the browser 7.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (9)

  1. KXTScan vulnerability scanning tool, including recognition device (1), its characterized in that: the output end of the identification device (1) is electrically connected with a login system (2), the output end of the login system (2) is respectively and electrically connected with an identity identification device (3) and a password protection module (4), the output ends of the identity identification device (3) and the password protection module (4) are respectively and electrically connected with an administrator login port (5), the output end of the administrator login port (5) is electrically connected with a firewall system (6), the output end of the firewall system (6) is electrically connected with a browser (7), the output end of the browser (7) is electrically connected with a KXTScan vulnerability scanning device (8), the output end of the KXTScan vulnerability scanning device (8) is respectively and electrically connected with a host scanning module (9) and a Web application scanning module (10), the output ends of the host scanning module (9) and the Web application scanning module (10) are respectively and electrically connected with a data conversion module (11), the output of data conversion module (11) is electrically connected with data derivation module (12) and visit record module (14) respectively, the output electricity of data derivation module (12) is connected with report generation module (13), the output of data derivation module (12) and visit record module (14) all is electrically connected with main control system (15), the output electricity of main control system (15) is connected with display (16).
  2. 2. The KXTScan vulnerability scanning tool of claim 1, wherein: the system comprises an identification device (1), a login system (2), an identity authentication module (3), a password protection module (4), an administrator login port (5), a firewall system (6), a browser (7), KXTScan vulnerability scanning equipment (8), a host scanning module (9), a Web application scanning module (10), a data conversion module (11), a data export module (12), a report generation module (13), an access recording module (14) and a control host (15) which are connected through a special network signal.
  3. 3. The KXTScan vulnerability scanning tool of claim 1, wherein: the inside fixed mounting of recognition device (1) has the scanner, be provided with the identity code on the administrator's ID card, the identity code is the bar code, and the identity code is the Morse password, and the identity code on every administrator's ID card is different.
  4. 4. The KXTScan vulnerability scanning tool of claim 1, wherein: the output end of the login system (2) is fixedly provided with two conversion heads, and the two output ends are respectively connected with the identity authentication module (3) and the password protection module (4).
  5. 5. The KXTScan vulnerability scanning tool of claim 1 or 3, wherein: and a digital password board is fixedly arranged on the outer surface of the identity authentication module (3), the password board is electrically connected with the input end of the scanner, and the passwords on the digital password boards corresponding to each administrator are different.
  6. 6. The KXTScan vulnerability scanning tool of claim 1 or 3, wherein: the password protection module is characterized in that a fingerprint identification device and a pupil identification device are fixedly mounted on the outer surface of the password protection module (4), the fingerprint identification device and the pupil identification device are in signal connection with a scanner, and each administrator corresponds to one fingerprint identification and one pupil identification.
  7. 7. The KXTScan vulnerability scanning tool of claim 1, wherein: the output end of the KXTScan vulnerability scanning device (8) is fixedly connected with a branching head, the number of the internal fixedly connected with the branching heads is two, one is electrically connected with the input end of the host scanning module (9), and the other is electrically connected with the input end of the Web application scanning module (10).
  8. 8. The KXTScan vulnerability scanning tool of claim 1, wherein: the output end of the report generation module (13) is electrically connected with a printer, and an image conversion module, a code conversion module and a character conversion module are fixedly installed in the report generation module (13).
  9. 9. The KXTScan vulnerability scanning tool of claim 1, wherein: the data storage mode of the data export module (12) is hard disk storage, and a network card is arranged inside the data export module (12) and is connected with the control host (15) through a network.
CN202010335150.3A 2020-04-24 2020-04-24 KXTScan vulnerability scanning tool Pending CN111666570A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010335150.3A CN111666570A (en) 2020-04-24 2020-04-24 KXTScan vulnerability scanning tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010335150.3A CN111666570A (en) 2020-04-24 2020-04-24 KXTScan vulnerability scanning tool

Publications (1)

Publication Number Publication Date
CN111666570A true CN111666570A (en) 2020-09-15

Family

ID=72382927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010335150.3A Pending CN111666570A (en) 2020-04-24 2020-04-24 KXTScan vulnerability scanning tool

Country Status (1)

Country Link
CN (1) CN111666570A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883093A (en) * 2021-02-04 2021-06-01 湖北宸威玺链信息技术有限公司 Data export method, system, device and medium based on dynamic instruction stream detection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178166B1 (en) * 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
CN104469767A (en) * 2014-10-28 2015-03-25 杭州电子科技大学 Implementation method for integrated security protection subsystem of mobile office system
CN108965305A (en) * 2018-07-25 2018-12-07 安徽三实信息技术服务有限公司 A kind of internet security monitoring system and its monitoring method
CN109194662A (en) * 2018-09-13 2019-01-11 江苏站企动网络科技有限公司 A kind of network-based business information services system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178166B1 (en) * 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
CN104469767A (en) * 2014-10-28 2015-03-25 杭州电子科技大学 Implementation method for integrated security protection subsystem of mobile office system
CN108965305A (en) * 2018-07-25 2018-12-07 安徽三实信息技术服务有限公司 A kind of internet security monitoring system and its monitoring method
CN109194662A (en) * 2018-09-13 2019-01-11 江苏站企动网络科技有限公司 A kind of network-based business information services system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883093A (en) * 2021-02-04 2021-06-01 湖北宸威玺链信息技术有限公司 Data export method, system, device and medium based on dynamic instruction stream detection

Similar Documents

Publication Publication Date Title
CN108322446B (en) Method and device for detecting vulnerability of intranet assets, computer equipment and storage medium
US8510572B2 (en) Remote access system, gateway, client device, program, and storage medium
US7437753B2 (en) Storage area network (SAN) security
CN105049659B (en) Image processing system and information processing method
CN108147241B (en) Authentication method and device for elevator debugging tool
CN110719300B (en) Method and system for automatic vulnerability verification
US20070300077A1 (en) Method and apparatus for biometric verification of secondary authentications
US20100024023A1 (en) Reactive Biometric Single Sign-on Utility
CN106170793A (en) System, method and apparatus for secure log
US11856015B2 (en) Anomalous action security assessor
CN104834853B (en) A kind of personal identification method, device and information security type duplicator
US20070061874A1 (en) System, method and program for determining a qualified support team to handle a security violation within a computer
CN106060072B (en) Authentication method and device
CN104579626A (en) Unidirectional transmission based electronic document output management and control system and method
US7660412B1 (en) Generation of debug information for debugging a network security appliance
CN111666570A (en) KXTScan vulnerability scanning tool
CN105991898A (en) Apparatus, information processing system and information processing method
CN104135483A (en) Automatic configuration management system for network security
WO2012074275A2 (en) User authentication apparatus for internet security, user authentication method for internet security, and recorded medium recording same
CN112257007B (en) Enterprise financial information management system
CN106469269A (en) A kind of method of Password Management, device and terminal
JP5418135B2 (en) Test program execution program, test program execution method, and test program execution apparatus
CN112671700A (en) Enterprise economic management information safety system
JP2003208269A (en) Secondary storage device having security mechanism and its access control method
KR100243384B1 (en) Intrusion detection method and its system system of intentional bad users for protecting ca system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200915

WD01 Invention patent application deemed withdrawn after publication