The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 25, 2025

Filed:

Jul. 09, 2024
Applicant:

Huaneng Information Technology Co., Ltd., Shandong, CN;

Inventors:

Ziqiang Wen, Qingdao, CN;

Hongjian Qi, Qingdao, CN;

Shuo Han, Qingdao, CN;

Chenghua Qu, Qingdao, CN;

Yufei Wang, Qingdao, CN;

Lei Xu, Qingdao, CN;

Zhongying Pan, Qingdao, CN;

Sheng Ye, Qingdao, CN;

Shouhui Xin, Qingdao, CN;

Wei Li, Qingdao, CN;

Yujie Liu, Qingdao, CN;

Qiang Zhang, Qingdao, CN;

Chengfeng Song, Qingdao, CN;

Hongwei Zhang, Qingdao, CN;

Yanfei Xu, Qingdao, CN;

Xushuai Qin, Qingdao, CN;

Xunan Deng, Qingdao, CN;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/57 (2013.01); G06F 21/55 (2013.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 21/552 (2013.01);
Abstract

The disclosure provides a security analysis method and system based on protocol state, which relates to the technical field of protocol security protection. The method includes the following: a node traversal table is built, the node traversal table is scanned and analyzed according to the protocol trigger sequence rule, a first security evaluation factor of a protocol stack is determined, and a second security evaluation factor of each protocol is determined based on protocol normal application rule, and the trustworthiness degree of the second security factor is determined based on the first security factor, and the second security factor is revised based on the trustworthiness degree, and the security state of the protocol is determined according to the revised second security factor, thus the analysis of the protocol state is realized, and the security of the protocol can be accurately determined.


Find Patent Forward Citations

Loading…