CN101431434B - Content monitoring and plugging system and method based on WAP - Google Patents
Content monitoring and plugging system and method based on WAP Download PDFInfo
- Publication number
- CN101431434B CN101431434B CN200810147898XA CN200810147898A CN101431434B CN 101431434 B CN101431434 B CN 101431434B CN 200810147898X A CN200810147898X A CN 200810147898XA CN 200810147898 A CN200810147898 A CN 200810147898A CN 101431434 B CN101431434 B CN 101431434B
- Authority
- CN
- China
- Prior art keywords
- content
- wap
- keyword
- data
- management server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses content monitoring and plugging system based on WAP and method thereof, wherein the system includes data collector, content security management server and DB server connected by order. The method comprises the following steps: collecting data according to WAP gateway content audit strategy by data collector; processing data collected by data collector to get audit result and illegal user according to WAP gateway content audit strategy by content security management server; saving the audit result into DB server, transmitting illegal user to business support system, launching request to stop illegal user GPRS function and plugging by content security management server in the end. The completeness to WAP website content monitoring is improved, illegal information transmission through WAP by mobile phone terminal user is forbidden and WAP website content is supervised efficiently by network provider through the invention. Finding illegal information through character information is realized by key word complexity strategy and false alarm rate is reduced.
Description
Technical field
The present invention relates to the data service technical field, particularly based on contents supervision and plugging system and the method for WAP.
Background technology
Mobile Internet is to be the terminal with the mobile phone, and the Internet is a kind of network service of prototype.Along with popularizing gradually of cellphone subscriber; Mobile Internet also grows up as emerging rapidly in large numbersBamboo shoots after a spring rain; To carry out data interaction be through WAP (Wireless Application Protocol for mobile phone and the Internet at present; Home control network communication protocol) gateway, and comprised music download, Streaming Media, video, TV short-movie, positioning service, Internet resource, inside data of enterprise storehouse, business system etc. in the data interaction of mobile phone to the Internet.
The multimedia application of portable terminal has brought abundant entertainment way to the user, but in recent years, some lawless person utilizes the convenient manner of mobile phone terminal internet; A large amount of issues and propaganda are pornographic, the content of reaction; The cellphone subscriber is received much have picture, webpage and mail pornographic and the reaction content, had a strong impact on the normal life of user and handle official business, disturbed normally carrying out of social education; Reduced the image of society and enterprise; Increased factors leading to social instability, but the propagation of these contents, and the business support system of communications industry can not effectively be prevented.
Prevent that so how harmful information from passing through the generation and the propagation of the approach of mobile phone terminal internet, the managerial skills and the service quality that improve WAP site just become the problem that presses for solution with the requirement that cooperates government to satisfy internet security.
At present; Mature technique and method in the industry cycle also do not appear in contents supervision and shutoff based on WAP; Generally adopt the method that the WAP site content is reached the standard grade audit and periodically audited, the invalid information that mobile phone terminal is up can't be audited and supervise timely.
Existing WAP site contents supervision technology has defective: can only reach the standard grade to the WAP site content and audit and periodically audit, the invalid information that can't produce mobile phone terminal internet timely and effectively monitored and shutoff.
Discover that by inquiry invalid information has begun to propagate through this mode of mobile phone terminal internet at present, comprises pornographic information and reaction information etc.Propagate through the mode of mobile phone terminal internet for the control invalid information, existing means are effectively to control.Through thinking after the research to mobile phone end-user access interconnected network mode, can realize monitoring, discovery and processing based on contents supervision and the plugging system of WAP through setting up to the invalid information in the mobile phone terminal internet.
Summary of the invention
The present invention is exactly contents supervision and plugging system and the method that provides based on WAP in order to address the above problem, and realizes mobile phone terminal internet is propagated the monitoring and the shutoff of invalid information.
Based on the contents supervision of WAP and the system of shutoff, it is characterized in that: comprise the data acquisition unit (probe), content safety management server, the database server that connect successively; Data acquisition unit is responsible for receiving the monitoring rule and is carried out data decryptor by its rule; The content safety management server is used for managing the data acquisition unit that is distributed in network; Comprise set up with data acquisition unit between logic is connected, issues that monitoring is regular, monitoring data collection device fault to data acquisition unit; Also be used for the data that the data acquisition unit collection reports are audited and analyzed, and with the audit analysis result transmission to database server; Database server is used for store various kinds of data, configuration information, and control desk is to be used for control terminal that content security administration server, database server are carried out daily management and carry out artificial audit management.
Said data acquisition unit is linked into the WAP gateway front end through beam split or mirror image mode, so just can the data of flowing through be duplicated portion and be used for monitoring, and original data can normally circulate, and therefore can not have any impact to network.The beam split mode is to be used for optical transmission chain, promptly uses optical splitter that light path is split up into two-way; The mirror image mode is to be used for the circuit transmission link, promptly the exchanger circuit port is carried out the Port Mirroring setting.
Data acquisition unit is analyzed the data that listen to according to the monitoring rule in the WAP gateway content auditing strategy; When finding a certain data content with the monitoring rule match; According to user-defined corresponding actions; Take measures and warning backward immediately, the measure that can take comprises record detailed content, blocking-up data transmission procedure etc.The monitoring rule that is handed down to data acquisition unit mainly comprises illegal long keyword and short keyword in the length keyword strategy, is used for the Preliminary screening to invalid information, guarantees the quick identification of legal information.For example: when data acquisition unit collects an information, judge whether there is illegal long keyword in the information earlier,, judge whether again to have short keyword,, just can assert fast that this information is legal information if also do not exist if do not exist.
The monitoring rule of said content safety management server in a plurality of data acquisition unit issue WAP gateway content auditing strategies; Collect data acquisition unit and gather the data that report according to the monitoring rule; And it is audited according to length keyword strategy and focus incident keyword strategy and analyze, at last the audit analysis result transmission is carried out compression memory to database server.When system user need be inquired about auditing result, the content safety management server will extract data and reduce from database server, guarantee that the data content that system user sees is in full accord with the content of real network transmission at that time.
The content safety management server also possesses the shutoff function, stops user GPRS function through the informing business support system.
The content safety management server also possesses warning function, reports to the police audible alarm, Email warning etc. like SMS.
Said database server adopts large database, stores the mass network data that data acquisition unit is collected, and these data are managed.
Database server possesses the user right of multiple different role to be divided, and satisfies the management expectancy to system applies.
Database server also provides user interface, comprises the user interface that system uses and manages, and data server can also make things convenient for configuration rule, browses Audit data, inquires about Audit data, form various statistical report forms.
Said system also comprises control desk, and control desk is to be used for control terminal that content security administration server, database server are carried out daily management and carry out artificial audit management.
Based on the contents supervision of WAP and the method for shutoff; It is characterized in that: at first data acquisition unit is according to WAP gateway content auditing strategy image data; The data of data collector collection are handled according to WAP gateway content auditing strategy through the content safety management server again and drawn auditing result and disabled user; Last content safety management server stores auditing result into database server; Simultaneously the disabled user is sent to business support system, the request of concurrent inactive disabled user GPRS function, thus just realized monitoring of WAP internet content and shutoff.
The idiographic flow of the method for said WAP internet content monitoring and shutoff is:
A, contents supervision keeper formulate WAP gateway content auditing strategy, and WAP gateway content auditing strategy is input to control desk;
B, control desk submit to WAP gateway content auditing strategy to the content safety management server;
C, content safety management server are given data acquisition unit with WAP gateway content auditing policy distribution;
D, data acquisition unit are gathered WAP up-downgoing data according to the WAP gateway content auditing strategy that issues, and are reported the content safety management server;
E, content safety management server are analyzed the wap data of gathering, and generate auditing result, judge the disabled user, and the result is dumped to database server.
F, content safety management server will be judged definite disabled user and send to business support system, the request of concurrent inactive disabled user GPRS function.
User's (mainly being the user who uploads illegal pictorial information) that can't accurately judge for the content safety management server; The content safety management server reports suspicious disabled user's alarm to control desk; By contents supervision keeper artificial judgment; And update content audit monitoring strategies, confirm the disabled user through the contents supervision keeper is artificial at last, and the result is passed through control desk returned content management server; By the content safety management server disabled user is sent to business support system again, the request of concurrent inactive disabled user GPRS function.
Said WAP gateway content auditing strategy comprises length keyword strategy and focus incident keyword strategy.
Said length keyword strategy will be lacked keyword exactly and effectively made up with long keyword, can the alarm rate of false alarm be reduced to zero.
Said length keyword strategy is divided into 3 types with keyword: short keyword, illegal long keyword, legal long keyword.Short keyword is traditional keyword, promptly common invalid information, as: " Falun Gong ", " six or four evening paper " etc.; Illegal long keyword is the invalid information that comprises short keyword; Legal long keyword then is by the legal information that comprises short keyword.The use of this strategy can utilize short keyword to carry out the Preliminary screening of WAP gateway content-data, extracts detailed invalid information when on WAP gateway, finding the illegal contents data as illegal long keyword, and legal information is then as legal long keyword.Short keyword is to add through the mode that contents supervision keeper manual work is provided with in advance, and long keyword then is when the artificial audit of contents supervision keeper, to add.
Said focus incident keyword strategy is that all keywords that current focus incident (like Sanlu incident, 512 earthquakes, Nude Picture Scandal etc.) is relevant (comprising short keyword, illegal long keyword, legal long keyword) are combined to form the focus incident groups of keywords.Focus incident has very strong ageing, promptly a certain incident focus in the time period related keyword to occur will very frequent, so can preferentially detect it.After a certain incident focus period finishes, can reduce the priority of this focus incident groups of keywords or cancel the relevant focus incident groups of keywords of this incident.Can effectively improve the efficient that detects invalid information through focus incident keyword strategy.The focus incident keyword is to find the WAP gateway abnormal flow through log information is analyzed earlier; Carry out analysis of central issue through report form statistics again; And it is tactful to form the focus incident acceptance of the bid through focus incident Top10 rank, and combine artificial audit process to form the focus incident groups of keywords.
Said disabled user is meant the user who transmits invalid information.
Beneficial effect of the present invention is following:
The present invention has remedied the deficiency that prior art can't monitoring cell-phone terminal upstream data; Improved integrality to the WAP site contents supervision; Solved and forbidden that the mobile phone terminal user utilizes WAP to carry out the problem that invalid information is propagated, and makes network provider to supervise the WAP site content effectively;
In addition, the present invention has realized finding invalid information through Word message through the formulation of keyword sophisticated strategies, has reduced rate of false alarm; Through the flow that notes abnormalities of the monitoring to the WAP gateway flow, focus of attention incident is formulated the correspondent keyword group policy; Contents supervision's handling process that foundation is carried out artificial audit and analysis of central issue based on length keyword and focus incident keyword strategy, the mode through management and technology combine realizes effective processing and control to invalid information.
Description of drawings
Fig. 1 is that system of the present invention forms sketch map
Fig. 2 is work disposal schematic flow sheet of the present invention
Fig. 3 is a monitoring schematic flow sheet of the present invention
Fig. 4 is a length keyword strategy handling process sketch map of the present invention
Fig. 5 is a focus incident keyword strategy handling process sketch map of the present invention
Embodiment
As shown in Figure 1, based on the contents supervision of WAP and the system of shutoff, comprise the data acquisition unit (probe), content safety management server, the database server that connect successively; Data acquisition unit is responsible for receiving the monitoring rule and is carried out data decryptor by its rule; The content safety management server is used for managing the data acquisition unit that is distributed in network; Comprise set up with data acquisition unit between logic is connected, issues that monitoring is regular, monitoring data collection device fault to data acquisition unit; Also be used for the data that the data acquisition unit collection reports are audited and analyzed, and with the audit analysis result transmission to database server; Database server is used for store various kinds of data, configuration information, and control desk is to be used for control terminal that content security administration server, database server are carried out daily management and carry out artificial audit management.
Said data acquisition unit is linked into the WAP gateway front end through beam split or mirror image mode, so just can the data of flowing through be duplicated portion and be used for monitoring, and original data can normally circulate, and therefore can not have any impact to network.The beam split mode is to be used for optical transmission chain, promptly uses optical splitter that light path is split up into two-way; The mirror image mode is to be used for the circuit transmission link, promptly the exchanger circuit port is carried out the Port Mirroring setting.
Data acquisition unit is analyzed the data that listen to according to the monitoring rule in the WAP gateway content auditing strategy; When finding a certain data content with the monitoring rule match; According to user-defined corresponding actions; Take measures and warning backward immediately, the measure that can take comprises record detailed content, blocking-up data transmission procedure etc.The monitoring rule that is handed down to data acquisition unit mainly comprises illegal long keyword and short keyword in the length keyword strategy, is used for the Preliminary screening to invalid information, guarantees the quick identification of legal information.For example: when data acquisition unit collects an information, judge whether there is illegal long keyword in the information earlier,, judge whether again to have short keyword,, just can assert fast that this information is legal information if also do not exist if do not exist.
The monitoring rule of said content safety management server in a plurality of data acquisition unit issue WAP gateway content auditing strategies; Collect data acquisition unit and gather the data that report according to the monitoring rule; And it is audited according to length keyword strategy and focus incident keyword strategy and analyze, at last the audit analysis result transmission is carried out compression memory to database server.When system user need be inquired about auditing result, the content safety management server will extract data and reduce from database server, guarantee that the data content that system user sees is in full accord with the content of real network transmission at that time.
The content safety management server also possesses the shutoff function, stops user GPRS function through the informing business support system.
The content safety management server also possesses warning function, reports to the police audible alarm, Email warning etc. like SMS.
Said database server adopts large database, stores the mass network data that data acquisition unit is collected, and these data are managed.
Database server possesses the user right of multiple different role to be divided, and satisfies the management expectancy to system applies.
Database server also provides user interface, comprises the user interface that system uses and manages, and data server can also make things convenient for configuration rule, browses Audit data, inquires about Audit data, form various statistical report forms.
Said system also comprises control desk, and control desk is to be used for control terminal that content security administration server, database server are carried out daily management and carry out artificial audit management.
Shown in Fig. 2-5; Based on the contents supervision of WAP and the method for shutoff; At first data acquisition unit is according to WAP gateway content auditing strategy image data; The data of data collector collection are handled according to WAP gateway content auditing strategy through the content safety management server and drawn auditing result and disabled user, last content safety management server stores auditing result into database server, simultaneously the disabled user is sent to business support system; The request of concurrent inactive disabled user GPRS function, thus just realized monitoring of WAP internet content and shutoff.
The idiographic flow of the method for said WAP internet content monitoring and shutoff is:
A, contents supervision keeper formulate WAP gateway content auditing strategy, and WAP gateway content auditing strategy is input to control desk;
B, control desk submit to WAP gateway content auditing strategy to the content safety management server;
C, content safety management server are given data acquisition unit with WAP gateway content auditing policy distribution;
D, data acquisition unit are gathered WAP up-downgoing data according to the WAP gateway content auditing strategy that issues, and are reported the content safety management server;
E, content safety management server are analyzed the wap data of gathering, and generate auditing result, judge the disabled user, and the result is dumped to database server;
F, content safety management server will be judged definite disabled user and send to business support system, the request of concurrent inactive disabled user GPRS function.
User's (mainly being the user who uploads illegal pictorial information) that can't accurately judge for the content safety management server; The content safety management server reports suspicious disabled user's alarm to control desk; By contents supervision keeper artificial judgment; And update content audit monitoring strategies, confirm the disabled user through the contents supervision keeper is artificial at last, and the result is passed through control desk returned content management server; By the content safety management server disabled user is sent to business support system again, the request of concurrent inactive disabled user GPRS function.
Said WAP gateway content auditing strategy comprises length keyword strategy and focus incident keyword strategy.
Said length keyword strategy will be lacked keyword exactly and effectively made up with long keyword, can the alarm rate of false alarm be reduced to zero.
Said length keyword strategy is divided into 3 types with keyword: short keyword, illegal long keyword, legal long keyword.Short keyword is traditional keyword, promptly common invalid information, as: " Falun Gong ", " six or four evening paper " etc.; Illegal long keyword is the invalid information that comprises short keyword; Legal long keyword then is by the legal information that comprises short keyword.The use of this strategy can utilize short keyword to carry out the Preliminary screening of WAP gateway content-data, extracts detailed invalid information when on WAP gateway, finding the illegal contents data as illegal long keyword, and legal information is then as legal long keyword.Short keyword is to add through the mode that contents supervision keeper manual work is provided with in advance, and long keyword then is when the artificial audit of contents supervision keeper, to add.
Said focus incident keyword strategy is that all keywords that current focus incident (like Sanlu incident, 512 earthquakes, Nude Picture Scandal etc.) is relevant (comprising short keyword, illegal long keyword, legal long keyword) are combined to form the focus incident groups of keywords.Focus incident has very strong ageing, promptly a certain incident focus in the time period related keyword to occur will very frequent, so can preferentially detect it.After a certain incident focus period finishes, can reduce the priority of this focus incident groups of keywords or cancel the relevant focus incident groups of keywords of this incident.Can effectively improve the efficient that detects invalid information through focus incident keyword strategy.The focus incident keyword is to find the WAP gateway abnormal flow through log information is analyzed earlier; Carry out analysis of central issue through report form statistics again; And it is tactful to form the focus incident acceptance of the bid through focus incident Top10 rank, and combine artificial audit process to form the focus incident groups of keywords.
Said disabled user is meant the user who transmits invalid information.
Claims (14)
1. based on the contents supervision of WAP and the system of shutoff, it is characterized in that: comprise the data acquisition unit, content safety management server, the database server that connect successively; Data acquisition unit is responsible for receiving the monitoring rule and is carried out data decryptor by its rule; The content safety management server is used for managing the data acquisition unit that is distributed in network; Comprise set up with data acquisition unit between logic is connected, issues that monitoring is regular, monitoring data collection device fault to data acquisition unit; Also be used for the data that the data acquisition unit collection reports are audited and analyzed; And with the audit analysis result transmission to database server; Judge the disabled user, and will judge definite disabled user and send to business support system, the request of concurrent inactive disabled user GPRS function; Database server is used for store various kinds of data, configuration information, and control desk is to be used for control terminal that content security administration server, database server are carried out daily management and carry out artificial audit management;
Said data acquisition unit is linked into the WAP gateway front end through beam split or mirror image mode, monitors all data of flowing through.
2. said based on the contents supervision of WAP and the system of shutoff according to claim 1; It is characterized in that: said data acquisition unit is analyzed the data that listen to according to the monitoring rule of WAP gateway content auditing policy distribution; When finding a certain data content with the monitoring rule match; According to user-defined corresponding actions, take measures and warning backward immediately; The said monitoring rule that issues comprises the illegal long keyword and short keyword in the length keyword strategy, is used for the Preliminary screening to invalid information, guarantees the quick identification of legal information.
3. said based on the contents supervision of WAP and the system of shutoff according to claim 1; It is characterized in that: said content safety management server is to the monitoring rule of a plurality of data acquisition unit issue WAP gateway content auditing policy distributions; Collect data acquisition unit and gather the data that report according to the monitoring rule; And it is audited according to length keyword strategy and focus incident keyword strategy and analyze, at last the audit analysis result transmission is carried out compression memory to database server; When system user need be inquired about auditing result, the content safety management server will extract data and reduce from database server, guarantee that the data content that system user sees is in full accord with the content of real network transmission at that time.
4. said based on the contents supervision of WAP and the system of shutoff according to claim 1, it is characterized in that: said content safety management server also possesses the shutoff function, stops user GPRS function through the informing business support system.
5. said based on the contents supervision of WAP and the system of shutoff according to claim 1, it is characterized in that: said content safety management server also possesses warning function.
6. said based on the contents supervision of WAP and the system of shutoff according to claim 1, it is characterized in that: said database server is provided with the user right rank.
7. said based on the contents supervision of WAP and the system of shutoff according to claim 1; It is characterized in that: said database server also provides user interface; Comprise the user interface that system uses and manages, database server is used for configuration rule, browses Audit data, inquires about Audit data, forms various statistical report forms.
8. based on the contents supervision of WAP and the method for shutoff; It is characterized in that: at first data acquisition unit is according to WAP gateway content auditing strategy image data; The data of data collector collection are handled according to WAP gateway content auditing strategy through the content safety management server again and drawn auditing result and disabled user; Last content safety management server stores auditing result into database server; Simultaneously the disabled user is sent to business support system, the request of concurrent inactive disabled user GPRS function is carried out shutoff to the disabled user;
Idiographic flow is following:
A, contents supervision keeper formulate WAP gateway content auditing strategy, and WAP gateway content auditing strategy is input to control desk;
B, control desk submit to WAP gateway content auditing strategy to the content safety management server;
C, content safety management server are given data acquisition unit with WAP gateway content auditing policy distribution;
D, data acquisition unit are gathered WAP up-downgoing data according to the WAP gateway content auditing strategy that issues, and are reported the content safety management server;
E, content safety management server are analyzed the wap data of gathering, and generate auditing result, judge the disabled user, and the result is dumped to database server.
F, content safety management server will be judged definite disabled user and send to business support system, the request of concurrent inactive disabled user GPRS function.
9. said according to Claim 8 based on the contents supervision of WAP and the method for shutoff; It is characterized in that: the user that said content safety management server can't accurately be judged; The content safety management server reports suspicious disabled user's alarm to control desk, by contents supervision keeper artificial judgment, and update content audit monitoring strategies; At last through the artificial affirmation of contents supervision keeper disabled user; And with the result through control desk returned content management server, by the content safety management server disabled user is sent to business support system again, the request of concurrent inactive disabled user GPRS function.
10. said according to Claim 8 based on the contents supervision of WAP and the method for shutoff, it is characterized in that: said WAP gateway content auditing monitoring strategies comprises length keyword application strategy and focus incident keyword strategy.
11. said based on the contents supervision of WAP and the method for shutoff according to claim 10, it is characterized in that: said length keyword application strategy will be lacked keyword exactly and effectively made up with long keyword, can the alarm rate of false alarm be reduced to zero.
12. according to claim 10 or 11 said based on the contents supervision of WAP and the method for shutoff; It is characterized in that: said length keyword application strategy is divided into 3 types with keyword: short keyword, illegally long keyword and legal long keyword; Said short keyword is common invalid information; Said illegal long keyword is the invalid information that comprises short keyword, and said legal long keyword is by the legal information that comprises short keyword; Said length keyword application strategy is to utilize short keyword to carry out the Preliminary screening of WAP gateway content-data, extracts detailed invalid information when on WAP gateway, finding the illegal contents data as illegal long keyword, and legal information is then as legal long keyword.
13. said based on the contents supervision of WAP and the method for shutoff according to claim 10, it is characterized in that: said focus incident keyword strategy is that all key combinations that current focus incident is relevant form the focus incident groups of keywords.
14. according to Claim 8 or 9 said methods based on WAP internet content monitoring and shutoff, it is characterized in that: said disabled user is meant the user who transmits invalid information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810147898XA CN101431434B (en) | 2008-12-17 | 2008-12-17 | Content monitoring and plugging system and method based on WAP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810147898XA CN101431434B (en) | 2008-12-17 | 2008-12-17 | Content monitoring and plugging system and method based on WAP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101431434A CN101431434A (en) | 2009-05-13 |
CN101431434B true CN101431434B (en) | 2012-03-21 |
Family
ID=40646613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810147898XA Active CN101431434B (en) | 2008-12-17 | 2008-12-17 | Content monitoring and plugging system and method based on WAP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101431434B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101610474B (en) * | 2009-07-27 | 2012-12-26 | 成都思维世纪科技有限责任公司 | WAP content monitoring method and monitoring device thereof |
CN102082703A (en) * | 2009-11-26 | 2011-06-01 | ***通信集团贵州有限公司 | Method and device for monitoring equipment performance of service supporting system |
CN102088468A (en) * | 2009-12-08 | 2011-06-08 | 徐克林 | Method for limiting Internet surfing with mobile phone |
CN102088369A (en) * | 2010-12-30 | 2011-06-08 | 天津市国瑞数码安全***有限公司 | Automatic auditing method of Internet website record information |
CN102413143B (en) * | 2011-12-01 | 2018-05-22 | 深圳艾迪宝智能***有限公司 | Safety auditing system and method based on cloud computing |
CN102685215B (en) * | 2012-04-18 | 2015-12-16 | 华为技术有限公司 | The methods, devices and systems of mobile terminal Internet access monitoring |
CN104780145B (en) * | 2014-01-13 | 2020-04-10 | 腾讯科技(深圳)有限公司 | Data transmission method, device and system |
CN104378228B (en) * | 2014-09-30 | 2018-07-13 | 上海宾捷信息科技有限公司 | Network data security manages system and method |
CN104626166A (en) * | 2014-12-19 | 2015-05-20 | 东莞市易辉自动化机械有限公司 | Hardware controller of mechanical arm |
CN110555011B (en) * | 2018-03-29 | 2021-07-06 | 深信服科技股份有限公司 | Application audit failure identification method, device and system and readable storage medium |
CN109325044A (en) * | 2018-09-20 | 2019-02-12 | 快云信息科技有限公司 | A kind of the audit log processing method and relevant apparatus of database |
CN110149563A (en) * | 2019-05-06 | 2019-08-20 | 上海科光通信技术有限公司 | A kind of security management platform based on OTN transmission network |
CN112073391A (en) * | 2020-08-25 | 2020-12-11 | 深圳市安络科技有限公司 | Method and device for monitoring network traffic |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232643A (en) * | 2008-02-25 | 2008-07-30 | ***通信集团广东有限公司 | Network information automatic monitoring system and method |
-
2008
- 2008-12-17 CN CN200810147898XA patent/CN101431434B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232643A (en) * | 2008-02-25 | 2008-07-30 | ***通信集团广东有限公司 | Network information automatic monitoring system and method |
Also Published As
Publication number | Publication date |
---|---|
CN101431434A (en) | 2009-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101431434B (en) | Content monitoring and plugging system and method based on WAP | |
CN102648464B (en) | System and method for generating vocabulary from network data | |
CN102208992B (en) | The malicious information filtering system of Internet and method thereof | |
CN102833111B (en) | A kind of visual HTTP data monitoring and managing method and device | |
CN100365975C (en) | Delivering system of webpage information of internet | |
CN107730647A (en) | A kind of smart mobile phone cruising inspection system and its method for inspecting based on SCADA | |
CN102231873A (en) | Method and system for monitoring garbage message and monitor processing apparatus | |
CN101257671A (en) | Method for real time filtering large scale rubbish SMS based on content | |
CN102064975A (en) | Network equipment supervision method and system | |
CN101610169A (en) | Internet multimedia content monitoring method and device thereof | |
CN106992886A (en) | A kind of log analysis method and device based on distributed storage | |
CN106095575B (en) | A kind of devices, systems, and methods of log audit | |
CN102567101A (en) | Multi-process management system for recognizing and monitoring pornographic images of WAP (wireless application protocol) mobile phone media | |
CN111405001A (en) | Node monitoring system applied to block chain | |
CN103888919A (en) | Short message monitoring method and device thereof | |
CN104734894A (en) | Flow data screening method and device | |
CN110968571A (en) | Big data analysis and processing platform for financial information service | |
CN111552885A (en) | System and method for realizing automatic real-time message pushing operation | |
CN102271331B (en) | Method and system for detecting reliability of service provider (SP) site | |
CN111858924A (en) | System with network public opinion monitoring and analyzing functions | |
CN101610474B (en) | WAP content monitoring method and monitoring device thereof | |
CN104202389A (en) | Monitoring method for storage space and running state in cloud environment and cloud storage system | |
CN101610473A (en) | MMS content method for supervising and realize the device of this method | |
CN109151258A (en) | A kind of cloud cuts method of video distribution and system | |
Liu et al. | The application of data mining in the classification of spam messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |