CN114239498A - Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction - Google Patents

Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction Download PDF

Info

Publication number
CN114239498A
CN114239498A CN202111443817.2A CN202111443817A CN114239498A CN 114239498 A CN114239498 A CN 114239498A CN 202111443817 A CN202111443817 A CN 202111443817A CN 114239498 A CN114239498 A CN 114239498A
Authority
CN
China
Prior art keywords
evaluation
matching
asset
library
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111443817.2A
Other languages
Chinese (zh)
Inventor
唐亚东
刘寅
罗黎明
杨维永
朱世顺
栾国强
刘苇
祁龙云
秦学嘉
张鹏
丁晓玉
徐杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Nari Network Security Technology Co ltd
Nari Information and Communication Technology Co
Original Assignee
Nari Information and Communication Technology Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nari Information and Communication Technology Co filed Critical Nari Information and Communication Technology Co
Priority to CN202111443817.2A priority Critical patent/CN114239498A/en
Publication of CN114239498A publication Critical patent/CN114239498A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/31Indexing; Data structures therefor; Storage structures
    • G06F16/316Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates

Abstract

The invention relates to the technical field of password evaluation, and aims to provide an intelligent generation method of a password evaluation operation instruction book based on fingerprint cross comparison. Acquiring the asset fingerprint of the evaluated system based on offline acquisition, nondestructive version sniffing and other modes; (2) matching compatible equipment information base keywords according to asset fingerprints in a cross mode, feeding back prompt information if matching fails, and performing format adjustment or knowledge base supplement according to the prompt; (3) accurately matching, and calling knowledge bases such as evaluation implementation contents to establish a temporary base; (4) and constructing an index relation with the report frame based on the temporary library, and realizing the generation of different equipment or layer operation instruction books. The password evaluation method aims to realize standardized output of the password evaluation operation instruction of a large number of objects by using an automatic technical measure, improve the accuracy of the operation instruction, reduce the consumption rate of manual resources, improve the update iteration efficiency, avoid the subjective intervention of manual version replacement and promote the normalization, reliability and convenience of password evaluation work.

Description

Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction
Technical Field
The invention relates to a method and a device for intelligently generating a password evaluation operation instruction based on fingerprint cross comparison, and belongs to the technical field of password evaluation.
Background
The cryptographic technology is a core technology and a basic support for guaranteeing network and information security, legal requirements of commercial cryptographic application and security evaluation are defined by the cryptographic law and related laws and regulations, and basic requirements of information security technology information system cryptographic application (GB/T39718) of a basic standard for guiding commercial cryptographic application and security evaluation work are also implemented from 10.1.2021. Therefore, normalized commercial password application and security evaluation have important significance for practically maintaining national network and information security.
At present, password application security assessment is in a starting stage, materials such as various matched assessment auxiliary tools and texts are deficient, the existing password application security assessment operation instruction book (solicited opinion draft) has a single application scene, is comprehensive in assessment method, does not refine to individual indexes, does not form a standardized system for aspects such as password acquisition and judgment method, key computing node assessment index selection, high risk judgment guidance and targeted security suggestion, and cannot meet the requirements of the existing diversified technical innovation era, so that the substantial effect of field assessment is weakened.
Aiming at the situations, most units adopt a mode of fixing a template or manually compiling a field operation instruction to advance the implementation work of password application safety evaluation; however, the current approaches still have some disadvantages: (1) the operation instruction is universal, index differentiation selection is not realized, and the accurate evaluation and the distinctive feature embodiment are not facilitated; (2) the manual compilation has subjective factor influence, and a short board exists in the aspect of multi-element cross combination, so that the standardized operation and the flow implementation are not facilitated.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides a method and a device for intelligently generating a password evaluation operation instruction book based on fingerprint cross comparison, which can realize the automatic generation of the targeted operation instruction book based on the use condition of a password product of an evaluated system and improve the field evaluation efficiency and accuracy.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
in a first aspect, the invention provides a method for intelligently generating a password evaluation operation instruction based on fingerprint cross comparison, which comprises the following steps:
collecting asset fingerprint information in a multiple combination mode;
cross-matching a compatible device information base according to asset fingerprint information;
calling a knowledge base to establish a temporary base based on the matching result;
and constructing an index relation between the temporary library and the report frame to realize the generation of the operation instruction book.
Further, the multiple combination mode comprises off-line collection and nondestructive version sniffing, and asset fingerprint information of the evaluated system is obtained;
the offline acquisition comprises: acquiring asset fingerprint information by using an acquisition script or a program or a manual checking mode;
the lossless version sniffing comprises: the asset fingerprint information of the evaluated system is collected in a passive mode, so that the load of the evaluated system is reduced;
the asset fingerprint information comprises asset type, equipment model, system version, kernel version, application system architecture and development language;
the asset types comprise an access control system, a video monitoring system, network and communication equipment, core computing equipment and an application system.
Further, cross-matching the compatible device information base according to the asset fingerprint information includes:
and fingerprint information is transferred according to the asset fingerprint, compatible equipment information base keywords are cross-matched according to the transfer result, if the matching fails, an error report node and information are prompted or knowledge base information to be supplemented is prompted, further correction and optimization of data and further secondary comparison are facilitated until the data are accurately matched, and the knowledge base data are called as required.
The fingerprint information escaping comprises: the Chinese meaning conversion is the letter full spelling, and the blank in the fingerprint information is filtered;
the information base keywords comprise asset types, equipment models, system versions, kernel versions, application system architectures and development languages.
Further, the cross matching comprises preferentially matching asset types, and cross comparison is performed according to the types, and the method comprises the following steps:
when the asset type is an access control system or a video monitoring system, the equipment model is further matched;
when the asset type is network and communication equipment, further matching the equipment model, and calling a system version resource pool for matching according to the equipment model;
when the asset type is the core computing equipment, further matching the system version, and calling a kernel version resource pool for matching according to the system version;
and when the asset type is an application system, matching the system architecture and the development language in sequence.
Further, augmenting the knowledge base information includes: according to the acquired asset fingerprint information, technical personnel perform knowledge base optimization updating;
the knowledge base comprises an instance base created in a relational database and a file stored in a specified path;
the knowledge base comprises:
the password evaluation index library is used for storing indexes covering multi-level requirements;
the compatible equipment information base is used for storing the keywords of the information base;
the evaluation implementation content library is used for storing index evaluation contents matched with different asset fingerprints;
the evaluation method example library is used for storing detailed evaluation methods corresponding to different index evaluation contents;
the expected result library is used for storing expected results meeting different asset fingerprint evaluation indexes;
and the report frame is used for storing the specific path of the report master and the index relation between the report frame and the knowledge base.
Further, invoking a knowledge base to establish a temporary base based on the matching result, comprising:
sequentially extracting knowledge base data according to cross matching logic, and storing the extracted data in a temporary base so as to preview and construct a report frame index;
the method for sequentially extracting the knowledge base data according to the cross matching logic comprises the following steps:
selecting indexes from a password evaluation index library according to the asset types;
for an access control system and a video monitoring system, extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library according to the equipment model and the selected index;
for the network equipment and the communication equipment, further determining the system version according to the equipment model, and extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library aiming at the selected indexes;
for the core computing device, further confirming the kernel version according to the system version, and extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library aiming at the decimated indexes;
for an application system, data are extracted from an evaluation implementation content library, an evaluation method example library and an expected result library according to a system architecture, a development language and a lottery index.
Further, establishing an index relationship between the temporary library and the report frame to realize generation of the operation instruction book, comprising the following steps:
and constructing an index relation between the temporary library and the report frame by using the established temporary library so as to realize the generation of the operation instruction for different equipment or layers.
Further, the report frame is a preset doc format report master, and differentiated index calling relations are established between different asset fingerprints and the report master;
the index relation is established by establishing a relation between the fields of the temporary library and the report master and establishing the index relation by using the keys and the variables in the Word template.
In a second aspect, the present invention provides an apparatus for intelligently generating a password evaluation job instruction based on fingerprint cross-matching, the apparatus comprising:
an acquisition module: the system is used for collecting asset fingerprint information in a multiple combination mode;
a matching module: the device information base is used for cross matching compatible equipment information base according to the asset fingerprint information;
a temporary library module: the system is used for calling a knowledge base to establish a temporary base based on the matching result;
a generation module: the method is used for constructing the index relation between the temporary library and the report frame and realizing the generation of the operation instruction book.
In a third aspect, the present embodiment provides an intelligent password evaluation job instruction generation apparatus based on fingerprint cross-comparison, including a processor and a storage medium;
the storage medium is used for storing instructions;
the processor is configured to operate in accordance with the instructions to perform the steps of the method according to the first aspect.
Compared with the prior art, the invention has the following beneficial effects:
the invention utilizes a multiple combination mode fingerprint acquisition means including a lossless version sniffing technology to realize high efficiency, lossless and comprehensive fingerprint information acquisition;
according to the invention, based on fingerprint characteristics and a massive knowledge base, through fingerprint cross comparison, multiple combinations of massive secret evaluation operation instruction books can be rapidly generated in an on-site fingerprint information acquisition stage, the daily consumption of preparation work in the early stage of secret evaluation is reduced, and the yield of secret evaluation projects is improved;
the invention can realize centralized optimization upgrading and distribution of massive knowledge bases according to the technical development at home and abroad and the change of password evaluation requirements, and avoid the interference of uncontrollable factors such as personal technical ability, responsibility attitude and the like;
the method can finally improve the pertinence, accuracy and frontier of the secret evaluation operation instruction, further promote the stable development of the secret evaluation operation, and practically construct a solid and reliable network security password guarantee.
Drawings
FIG. 1 is an architectural diagram of the present invention.
FIG. 2 is a process flow diagram of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
The first embodiment is as follows:
as shown in fig. 1, a method for intelligently generating a password evaluation job instruction based on fingerprint cross-comparison includes the following steps:
the method comprises the following steps: acquiring asset fingerprints of the evaluated system based on modes such as off-line acquisition, nondestructive version sniffing and the like;
step two: matching compatible equipment information base keywords according to asset fingerprints in a cross mode, feeding back prompt information if matching fails, and performing format adjustment or knowledge base supplement according to the prompt;
step three: accurately matching, and calling knowledge bases such as evaluation implementation contents to establish a temporary base;
step four: and constructing an index relation with the report frame based on the temporary library, and realizing the generation of different equipment or layer operation instruction books.
Referring to fig. 2, an embodiment of the present invention provides a method for intelligently generating a password evaluation job instruction based on fingerprint cross-comparison, including:
(1) asset collection; the asset acquisition comprises offline acquisition and lossless version sniffing;
further, the offline acquisition refers to acquiring asset fingerprint information by using an acquisition script/program or a manual checking mode; the nondestructive version sniffing comprises the steps of collecting asset fingerprints of an evaluated system in a passive mode, and reducing the load of the evaluated system; the asset fingerprint comprises an asset type, a device model, a system version, a kernel version, an application system architecture and a development language; the asset types comprise an access control system, a video monitoring system, network and communication equipment, core computing equipment and an application system. The invention realizes the high efficiency, lossless and comprehensive fingerprint information acquisition by utilizing a multiple combination mode fingerprint acquisition means including a lossless version sniffing technology.
(2) Information escaping; and performing fingerprint information escaping according to the asset fingerprint. I.e. converting the Chinese meaning of the asset fingerprint information into a letter full spelling and filtering the blank spaces in the fingerprint information.
(3) Matching keywords; and matching the compatible equipment information base keywords in a cross mode according to the escape result, prompting an error report node and information or prompting knowledge base information to be supplemented if the matching fails, facilitating further correction and optimization of data and further secondary comparison until the matching is accurate, and calling the knowledge base data as required. The method is based on fingerprint characteristics and a massive knowledge base, and can realize the multi-combination rapid generation of a large batch of secret evaluation operation instruction books in the field fingerprint information acquisition stage through fingerprint cross comparison, reduce the daily consumption of preparation work at the early stage of secret evaluation, and improve the yield of secret evaluation projects.
Specifically, the information base keywords include asset type, device model, system version, kernel version, application system architecture and development language, wherein except asset type, other characters are English characters, for example, "Huashi" is embodied as "huawei".
The asset types comprise an access control system, a video monitoring system, network and communication equipment, core computing equipment and an application system.
And the cross matching comprises the prior matching of asset types and cross comparison is carried out according to the types. And when the asset type is an access control system or a video monitoring system, the equipment model is further matched. And when the asset type is network and communication equipment, further matching the equipment model, and calling a system version resource pool for matching according to the equipment model. And when the asset type is the core computing equipment, further matching the system version, and calling a kernel version resource pool for matching according to the system version. And when the asset type is an application system, sequentially matching the system architecture and the development language.
The knowledge base augmentation includes an optimization update of the knowledge base by a technician based on the acquired asset fingerprint information.
The knowledge base comprises an instance base created in a relational database and a file stored in a specified path.
(4) And sequentially extracting the knowledge base data according to the cross matching logic, and storing the extracted data in a temporary base so as to facilitate previewing and constructing a report frame index.
The sequentially extracting comprises firstly extracting indexes from a password evaluation index library according to asset types; for an access control system and a video monitoring system, extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library according to the equipment model and the selected index; for the network equipment and the communication equipment, further determining the system version according to the equipment model, and extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library aiming at the selected indexes; for the core computing device, further confirming the kernel version according to the system version, and extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library aiming at the decimated indexes; for an application system, data are extracted from an evaluation implementation content library, an evaluation method example library and an expected result library according to a system architecture, a development language and a lottery index.
(5) And calling the report frame, and constructing an index relation between the temporary library and the report frame by using the established temporary library to realize the generation of the operation instruction of different equipment or layers.
The report frame is a preset doc format report master, and differentiated index calling relations are established between different asset fingerprints and the report master.
The index relation is to establish a relation between the field of the temporary library and $ { valuename } in the report master, such as: and (3) setting a Map set which takes ' $ { valuename } as a key and ' value ' as a value for the variable, wherein the variable is $ { valuename } in the Word template, and establishing an index relationship by using the key and the variable in the Word template.
The database includes:
the password evaluation index library is used for storing indexes covering multi-level requirements;
the compatible equipment information base is used for storing the keywords of the information base;
the evaluation implementation content library is used for storing index evaluation contents matched with different asset fingerprints;
the evaluation method example library is used for storing detailed evaluation methods corresponding to different index evaluation contents;
the expected result library is used for storing expected results meeting different asset fingerprint evaluation indexes;
and the report frame is used for storing the specific path of the report master and the index relation between the report frame and the knowledge base.
According to the invention, multiple combinations of a large batch of close evaluation operation instruction books are realized through fingerprint cross comparison based on fingerprint characteristics and a massive knowledge base, the daily consumption of preparation work in the early stage of close evaluation is reduced, the pertinence and the accuracy of the instruction books are synchronously improved, and the stable development of close evaluation work is further promoted.
The invention can realize centralized optimization upgrading and distribution of massive knowledge bases according to the technical development at home and abroad and the change of password evaluation requirements, and avoids the interference of uncontrollable factors such as personal technical ability, responsibility attitude and the like.
The method can finally improve the pertinence, accuracy and frontier of the secret evaluation operation instruction, further promote the stable development of the secret evaluation operation, and practically construct a solid and reliable network security password guarantee.
Example two:
this embodiment provides a password evaluation job instruction book intelligent generation device based on fingerprint cross comparison, the device includes:
an acquisition module: the system is used for collecting asset fingerprint information in a multiple combination mode;
a matching module: the device information base is used for cross matching compatible equipment information base according to the asset fingerprint information;
a temporary library module: the system is used for calling a knowledge base to establish a temporary base based on the matching result;
a generation module: the method is used for constructing the index relation between the temporary library and the report frame and realizing the generation of the operation instruction book.
The apparatus of the present embodiment can be used to implement the method described in the first embodiment.
Example three:
the embodiment provides a password evaluation operation instruction intelligent generation device based on fingerprint cross comparison, which comprises a processor and a storage medium;
the storage medium is used for storing instructions;
the processor is configured to operate in accordance with the instructions to perform steps in accordance with a method comprising:
the method comprises the following steps: acquiring asset fingerprints of the evaluated system based on modes such as off-line acquisition, nondestructive version sniffing and the like;
step two: matching compatible equipment information base keywords according to asset fingerprints in a cross mode, feeding back prompt information if matching fails, and performing format adjustment or knowledge base supplement according to the prompt;
step three: accurately matching, and calling knowledge bases such as evaluation implementation contents to establish a temporary base;
step four: and constructing an index relation with the report frame based on the temporary library, and realizing the generation of different equipment or layer operation instruction books.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A password evaluation operation instruction intelligent generation method based on fingerprint cross comparison is characterized by comprising the following steps:
collecting asset fingerprint information in a multiple combination mode;
cross-matching a compatible device information base according to asset fingerprint information;
calling a knowledge base to establish a temporary base based on the matching result;
and constructing an index relation between the temporary library and the report frame to realize the generation of the operation instruction book.
2. The intelligent generation method of the password evaluation operation instruction based on the fingerprint cross comparison as claimed in claim 1, wherein the multiple combination mode comprises off-line collection and lossless version sniffing to obtain the asset fingerprint information of the evaluated system;
the offline acquisition comprises: acquiring asset fingerprint information by using an acquisition script or a program or a manual checking mode;
the lossless version sniffing comprises: the asset fingerprint information of the evaluated system is collected in a passive mode, so that the load of the evaluated system is reduced;
the asset fingerprint information comprises asset type, equipment model, system version, kernel version, application system architecture and development language;
the asset types comprise an access control system, a video monitoring system, network and communication equipment, core computing equipment and an application system.
3. The intelligent generation method of a password evaluation job instruction book based on fingerprint cross-comparison as claimed in claim 2, wherein cross-matching a compatible device information base according to asset fingerprint information comprises:
performing fingerprint information escape according to the asset fingerprint, cross-matching compatible equipment information base keywords according to escape results, prompting error reporting nodes and information or prompting knowledge base information to be supplemented if matching fails, facilitating further correction and optimization data and further secondary comparison until accurate matching is achieved, and calling the knowledge base data as required;
the fingerprint information escaping comprises: the Chinese meaning conversion is the letter full spelling, and the blank in the fingerprint information is filtered;
the information base keywords comprise asset types, equipment models, system versions, kernel versions, application system architectures and development languages.
4. The intelligent generation method of password evaluation job guidance based on fingerprint cross-matching as claimed in claim 3, wherein the cross-matching includes preferentially matching asset types, and the cross-matching is performed according to the types, comprising the steps of:
when the asset type is an access control system or a video monitoring system, the equipment model is further matched;
when the asset type is network and communication equipment, further matching the equipment model, and calling a system version resource pool for matching according to the equipment model;
when the asset type is the core computing equipment, further matching the system version, and calling a kernel version resource pool for matching according to the system version;
and when the asset type is an application system, matching the system architecture and the development language in sequence.
5. The intelligent generation method of fingerprint cross-comparison based password evaluation job guidance of claim 4, wherein supplementing knowledge base information comprises: according to the acquired asset fingerprint information, technical personnel perform knowledge base optimization updating;
the knowledge base comprises an instance base created in a relational database and a file stored in a specified path;
the knowledge base comprises:
the password evaluation index library is used for storing indexes covering multi-level requirements;
the compatible equipment information base is used for storing the keywords of the information base;
the evaluation implementation content library is used for storing index evaluation contents matched with different asset fingerprints;
the evaluation method example library is used for storing detailed evaluation methods corresponding to different index evaluation contents;
the expected result library is used for storing expected results meeting different asset fingerprint evaluation indexes;
and the report frame is used for storing the specific path of the report master and the index relation between the report frame and the knowledge base.
6. The intelligent generation method of fingerprint cross-comparison based password evaluation job instruction book according to claim 1, wherein invoking knowledge base to establish a temporary base based on the matching result comprises:
sequentially extracting knowledge base data according to cross matching logic, and storing the extracted data in a temporary base so as to preview and construct a report frame index;
the method for sequentially extracting the knowledge base data according to the cross matching logic comprises the following steps:
selecting indexes from a password evaluation index library according to the asset types;
for an access control system and a video monitoring system, extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library according to the equipment model and the selected index;
for the network equipment and the communication equipment, further determining the system version according to the equipment model, and extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library aiming at the selected indexes;
for the core computing device, further confirming the kernel version according to the system version, and extracting data from an evaluation implementation content library, an evaluation method example library and an expected result library aiming at the decimated indexes;
for an application system, data are extracted from an evaluation implementation content library, an evaluation method example library and an expected result library according to a system architecture, a development language and a lottery index.
7. The intelligent generation method of the password evaluation job instruction book based on fingerprint cross comparison as claimed in claim 1, wherein constructing the index relationship between the temporary library and the report frame to realize the generation of the job instruction book comprises:
and constructing an index relation between the temporary library and the report frame by using the established temporary library so as to realize the generation of the operation instruction for different equipment or layers.
8. The intelligent generation method of password evaluation operation instruction based on fingerprint cross comparison as claimed in claim 7, wherein the report frame is a preset doc format report master, and differentiated index calling relations are established between different asset fingerprints and the report master;
the index relation is established by establishing a relation between the fields of the temporary library and the report master and establishing the index relation by using the keys and the variables in the Word template.
9. An intelligent password evaluation operation instruction generation device based on fingerprint cross comparison is characterized by comprising:
an acquisition module: the system is used for collecting asset fingerprint information in a multiple combination mode;
a matching module: the device information base is used for cross matching compatible equipment information base according to the asset fingerprint information;
a temporary library module: the system is used for calling a knowledge base to establish a temporary base based on the matching result;
a generation module: the method is used for constructing the index relation between the temporary library and the report frame and realizing the generation of the operation instruction book.
10. An intelligent password evaluation operation instruction generation device based on fingerprint cross comparison is characterized by comprising a processor and a storage medium;
the storage medium is used for storing instructions;
the processor is configured to operate in accordance with the instructions to perform the steps of the method according to any one of claims 1 to 8.
CN202111443817.2A 2021-11-30 2021-11-30 Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction Pending CN114239498A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111443817.2A CN114239498A (en) 2021-11-30 2021-11-30 Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111443817.2A CN114239498A (en) 2021-11-30 2021-11-30 Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction

Publications (1)

Publication Number Publication Date
CN114239498A true CN114239498A (en) 2022-03-25

Family

ID=80752177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111443817.2A Pending CN114239498A (en) 2021-11-30 2021-11-30 Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction

Country Status (1)

Country Link
CN (1) CN114239498A (en)

Similar Documents

Publication Publication Date Title
CN109376353B (en) Natural language processing-based power grid starting operation ticket generation device and method
CN107689887B (en) Temporary control change online management system of nuclear power plant control system
CN102654874A (en) Bill data management method and system
CN104991955A (en) Method and system for automatically constructing template library
CN111897528B (en) Low-code platform for enterprise online education
CN114895876B (en) Visual development industrial system based on model driving
CN115526605A (en) Enterprise internal control management-based approval method and system
CN115983571A (en) Construction project auditing method and system based on artificial intelligence for construction industry
CN115062117A (en) Method for automatically generating and classifying documents based on natural language processing technology
CN110675121A (en) Method for collecting picture type file material
CN112711399A (en) Audit application platform based on containerization design
CN114239498A (en) Fingerprint cross comparison-based intelligent generation method and device for password evaluation operation instruction
CN114722159B (en) Multi-source heterogeneous data processing method and system for numerical control machine tool manufacturing resources
CN113672522B (en) Test resource compression method and related equipment
CN109408592A (en) The Feature Engineering knowledge base and its implementation of AI in a kind of decision type distributed data base system
US8051026B2 (en) Rules collector system and method with user interaction
CN103177064A (en) Method for admitting appointed content of electronic document automatically
CN113918726A (en) Retrieval method and system for fault knowledge of electric power main transformer equipment
CN105354144A (en) Method and system for automatically testing consistency of business support system information models
JP5042148B2 (en) Information processing system, information processing method, and program
CN111752927B (en) Clone-based data form generation method, device, terminal equipment and medium
CN108647018A (en) Can live preview code generating system
CN116245108B (en) Verification matching guide method, verification matching guide, device, and storage medium
CN115983809B (en) Enterprise office management method and system based on intelligent portal platform
CN110515913B (en) Log processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230901

Address after: Nan Shui Road Gulou District of Nanjing city of Jiangsu Province, No. 8 210003

Applicant after: NARI INFORMATION & COMMUNICATION TECHNOLOGY Co.

Applicant after: Nanjing NARI Network Security Technology Co.,Ltd.

Address before: Nan Shui Road Gulou District of Nanjing city of Jiangsu Province, No. 8 210003

Applicant before: NARI INFORMATION & COMMUNICATION TECHNOLOGY Co.

TA01 Transfer of patent application right