CN102111440A - Real-time information safety service method and system for supporting dynamic interaction - Google Patents

Real-time information safety service method and system for supporting dynamic interaction Download PDF

Info

Publication number
CN102111440A
CN102111440A CN2010106178279A CN201010617827A CN102111440A CN 102111440 A CN102111440 A CN 102111440A CN 2010106178279 A CN2010106178279 A CN 2010106178279A CN 201010617827 A CN201010617827 A CN 201010617827A CN 102111440 A CN102111440 A CN 102111440A
Authority
CN
China
Prior art keywords
security
service
management
network
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010106178279A
Other languages
Chinese (zh)
Other versions
CN102111440B (en
Inventor
戚建淮
郑伟范
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Y&D Electronics Information Co Ltd
Original Assignee
SHENZHEN RONGDA ELECTRONICS CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN RONGDA ELECTRONICS CO Ltd filed Critical SHENZHEN RONGDA ELECTRONICS CO Ltd
Priority to CN 201010617827 priority Critical patent/CN102111440B/en
Publication of CN102111440A publication Critical patent/CN102111440A/en
Application granted granted Critical
Publication of CN102111440B publication Critical patent/CN102111440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a real-time information safety service method and system for supporting dynamic interaction, and provides a system capable of supporting an information safety service provider and an information safety service receiver to carry out dynamic safety service in the process of remote real-time interaction and a method thereof. During the remote real-time interaction, if more difficult information safety problems are confronted, multiple information safety experts are required to participate in by a web, thus carrying out collaborative diagnosis and offering safety proposals in an online mode so as to finally finish the safety service. Compared with an original manual safety service method and an information technology (IT) service method, the service method provided by the invention has the advantage of preferable instantaneity and interactivity, and is used to quickly solve the information safety service problems which are confronted by organizations and save huge costs. The service method provided by the invention is simple and practical and can be applied to the safety service for large, medium and small information systems and organizations.

Description

A kind of real time information security service method and system of supporting dynamic interaction
Technical field
The present invention relates to information security field, specifically be meant a kind of information safety service method and system that supports real-time, interactive, provide long-range and real-time information security service information system.
Background technology
Along with information technology, development of internet technology, information security issue becomes problem demanding prompt solution, mainly faces following problem: problem one: assault is rampant further, and the third party software leak will become the main path that the hacker utilizes; Problem two: pernicious worm-type virus incident is frequent, the serious threat network security; Problem three: spam becomes public hazards; Existing security solution has just solved the safety problem of part, wants to guarantee the real safety of network, information, just must all add security strategy in each link of seven layers on network; The information security solution, product system and the service system that need the whole network integral body.
All trades and professions are in full flourish at home for the safety product that present safe producer disposes, yet reality is that really security service is included in the general safety structure system mainly still is confined to important large-scale industry and enterprise customers such as telecommunications, finance.Limited and security service static state that safety system provided that the security service of other industry and government department's information system only limits to dispose.Because increasingly sophisticated network environment and the attack means that emerges in an endless stream, the problem of information security can not solve by the information safety devices of simple static state, must seek specialized security service and security service expert's help and diagnosis.
And, contrast the kind of domestic and international information security service, the present situation of service, present China client of medium-sized and small enterprises safety management scarce capacity, the security service system that oneself does not also have capacity building oneself, though large enterprise and other industry user have certain information security management ability and safe construction experiences, but owing to lack the troop of specialty, industry construction security service system separately can cause repeated construction separately simultaneously, produce huge waste, therefore society goes up and is badly in need of building a third-party public safety service platform, to provide every profession and trade required general character security service.
The security service that present information security is served manufacturer to be provided mainly contains multiple modes such as security evaluation, security hardening, penetration testing, monitoring in real time, emergency response, long-range emergency relief, safe information circular, on-the-spot periodic maintenance, exclusive telephone channel.The number of patent application of people such as Zhang Rujiong photograph invention is 200410033537.4 patent " information security service system ", a kind of information security service system is disclosed, set up one in order to the network platform of information security service to be provided by the Internet service provider, mainly serve server according to its defined routing table by remote access, give the tendency to develop of network-termination device institute defeated IP (Internet Protocol) package one label, by transmission path with the assigned ip package, and see through core router and pass on table according to it and save the center from damage so that the IP package is transferred to, save the center from damage with facility and provide the information security service this IP package, to guarantee the safe and punctual of IP package, eliminate suffering the possibility of network attack.And the number of patent application of people such as Chen Jianyong invention is 200610144072.9 patent " a kind of network of differentiation security service, system and method ", discloses a kind of network, system and method for differentiation security service.Comprise at least one security service server, at least two security service graders and at least two security gateways.The security service server is used for store discrepancy security service policy library, according to the security strategy that the security service grader triggers, determines safety level information, management and control security service grader.
But these modes all are static, passive, can only be at individual information system and industry, can only be to fill a vacancy afterwards, can not satisfy social informatization to continuing the demand of security service, these traditional security service enterprises lack accurate positioning, comprehensive, the lasting dynamic security service means of system because cost of labor is too high, and manual service speed is limited simultaneously, the information security issue that the user faces can not be effectively solved, the value of expectation can not be created for the user.Press for the public information security service platform of third party, the information security service of the socialization of specialty is provided to provide for the user.
In addition, because the assault gimmick emerges in an endless stream, technical merit improves constantly.Corresponding Prevention-Security technology is follow-up synchronously also, therefore security assurance information can not only rely on product, can not only rest on the conceptive of " three fens technology, management in seven fens ", safety should not go to treat as a target, and should go to implement as a process.The safety management process that should regard security assurance information as a spiral escalation that constitutes by risk analysis, policy development, design, enforcement, assessment, improvement, monitoring and early warning and some stages such as emergent.
Simultaneously, information security is a dynamic security system, is the problem of a more complicated.It relates to many levels such as network boundary, network infrastructure, core business application and desktop terminal, contains router, switch, fire compartment wall, access server, operating system, database, DNS, WWW, MAIL and some other crucial application system.Static safety product can not solve dynamic safety problem.By unified service interface, employing safety management hierarchy of control framework, centralized management of structure on the basis of user's original information safety system, unified audit, unified monitoring, unified assessment and unification are that diagnose, comprehensive, specialized information security service system is the development trend of following information security service.
In sum, the service of present information security also rests on the starting stage, and shortage can be supported remote interlocking and the information security means of services and the service system of service side and serviced side's real-time, interactive; These traditional security service enterprises are because cost of labor is too high simultaneously, manual service speed is limited, lack accurate positioning, comprehensive, the lasting dynamic security service means of system, the information security issue that the user faces can not be effectively solved, the requirement of RESEARCH OF CHAOS-BASED SECURITY COMMUNICATION service ensured sustained development and real-time, interactive can not be satisfied.
Summary of the invention
The objective of the invention is to overcome present information security service and can not satisfy modern defective, a kind of real time information security service method that can support effectively that Remote Dynamic is mutual is provided for the mutual sustainableization service of remote live, and the realization system.
In view of this, the present invention proposes a kind of information safety service method of supporting that dynamic real-time is mutual, the thinking of this method is main by in security service centring system deployment information safety management controlling platform, is used to handle conventional static information security service problem; And by supporting many people platform of the dynamic interaction of Online Video simultaneously, be used for when carrying out the information security service, under the situation of having relatively high expectations for exceptional fault and real-time, the attendant of attendant and serviced unit can by many people video long-range see the real system scene, under can situation by the online participation of a plurality of information security experts, the now comprehensive diagnosis of real-time carrying out, formulate the security service measure and carry out concrete security service, reach the purpose of real-time processing, do not need simultaneously the attendant that fixes, and the various losses that cause such as the delay that mutual confusing communication causes in the service process, reduce service cost.
The purpose of this invention is to provide a kind of can support information security service provider with can the remote live mutual process of service reciever in carry out the dynamic security service method, if the information security issue of meeting difficulty therebetween, need a plurality of information security experts to add to come in by webpage (web), work in coordination with diagnosis and propose safety recommendation in online mode, finally finish security service.Wherein, finish to the main automation of information security service centre platform the content of routine information security service, carry out automation services; Information security service content when interaction platform is finished information security service problem under the situation that runs into especially severe or can't adjudicate automatically, service reciever personnel (or serve provider's dispatch personnel, only need a people to get final product in principle), ISP and information security expert etc. can be simultaneously online, the collaborative consultation of doctors, finish the information security service jointly, have the real-time characteristics, can avoid postponing in the manually solution process of information security fault to wait the loss that brings; Serving the mutual of reciever simultaneously only needs a people on-the-spot in service, and all the other personnel can be long-range and expert's interim participation, solved the cost that the service O﹠M needs to a great extent.
Information security service platform system of the present invention comprises service centre's platform and a real-time, interactive platform at least, and wherein interaction platform is realized in the web mode, by network, supports audio frequency, video system that a plurality of people are simultaneously online.
Security service central platform of the present invention is mainly based on the safety management hierarchy of control; set up the information security service service platform of unified security monitoring and audit; this platform is behind process user authorization of service; by unified safety management controlling platform service interface; initiatively gather user's security service information; adopt security monitoring; security audit and imitation technology; the remote monitoring that utilizes the backstage to dispose; audit; assessment and expert diagnostic system; realization is to the monitoring of user network security context; audit; assessment; diagnosis and analysis-by-synthesis; automatically help the security configuration of user processing system; the assets security management; the security incident that the call flow of security mechanism and security service comes responding system to occur; the target that the protection user sets, the dynamic security problem that lasting solution user occurs in the information system running.
Information security service platform of the present invention is mainly mainly realized unified management and control are carried out in the security service that a plurality of service platforms such as security service emulation platform, security audit platform, security monitoring platform provide based on the security service management console, for whole service platform provides core calculations and service ability.At least form by following unit: the network topology management assembly, the configuration management assembly, security service tactical management assembly, host resource Management Unit, network appliance safe management assembly, the Security Target configuration component, the database of security monitoring and management system (ISMS) and knowledge base assembly, safety management and control assembly, security incident centralized monitor assembly, the risk control strategy generates and executive module, and safe workform management assembly.
Real-time, interactive platform of the present invention mainly based on the Internet, by modes such as literal, audio frequency, video, omnibearing the Internet basis communication service such as timely communication, IP calling, video conference and internet voice, Video service are provided, support between two people and the many people online chatting, in time transmit voice, video, (from) broadcasting of the video text of line, long-range function such as share, satisfy numerous personal users' communication interactive functions such as IP calling, online chatting, sound, video transmissions, file transmission; Simultaneously, also can be tissue or user and make the multiple demand of the collaborative consultation of doctors, daily meeting and professional training etc. efficiently, make communication lighter, more effective, reach and reduce the target of linking up cost, improving communication efficient.
Interaction platform comprises the web terminal at least, video system, and audio system, and support many people management control assembly of online collaborative audio frequency, video simultaneously.
From the above, the invention has the beneficial effects as follows: under the increasingly serious form of information security, informatization enterprise or tissue can't be born under the security service personnel's that set up own special information system the situation, need again can be more real-time acquired information security service content, as consulting, the information security failure diagnosis, event handling, the virus virus killing, system security management etc., when reaching the situation of the healthy purpose of runing of organizational information system safety, the real time information safety service platform and the interaction platform that provide by the third party, under the situation that a plurality of information security experts participate in, the real-time collaborative consultation of doctors, the common information security service problem that solves tissue.Method of servicing of the present invention and original artificial security service, and the IT method of servicing is by comparison, has good real-time performance, interactivity, can solve the information security service problem that tissue faces fast, and save cost in a large number; Method is simple and practical, can be applied to large, medium and small information system and tissue, applied range.
Description of drawings
Fig. 1 is a security service central platform composition diagram of the present invention;
Fig. 2 is a security service interaction platform composition diagram of the present invention;
Fig. 3 is the logical construction graph of a relation between the interaction platform system module of the present invention
Fig. 4 is the mutual prerequisite flow chart of steps of security service of the present invention;
Fig. 5 is the mutual client personnel flow chart of security service of the present invention;
Fig. 6 is the mutual attendant's flow chart of security service of the present invention;
Embodiment
Below in conjunction with embodiment and accompanying drawing, to the detailed description further of the present invention's do, but embodiments of the present invention are not limited thereto.
Embodiment:
As shown in Figure 1, security service central platform 11 mainly comprises following assembly:
Security service central platform 11 provides the information security service for the first client terminal A and the second client terminal B.
Network topology management assembly 12 is mainly finished following function: network configuration management, network equipment Topology Management and network security Topology Management.Topological structure structure: be used to find network topology, various types of equipment in the recognition network, topological diagram can layering display network topological structure; Network topology is browsed: correctly reflect the annexation between network element and network element, and can locate particular device smoothly according to the topological diagram navigation feature of network element tree graph; Topological diagram network monitoring: be used for the equipment running status and the operation conditions of monitoring network, the change situation of reflection network equipments configuration; Topological diagram can be edited: network element membership tree is provided, is used for manually adding network element in topological diagram.
Configuration management assembly 13, mainly finish following function: network element main in the administration network is carried out unified configuration management, dynamically manage configuration data, equipment guarantee, status checkout and the installation function of the crucial network element device of the whole network (NED) by the standard interface of network management and control; By standard interface, configuration comprises safety means (SD), IDS/IPS and other checkout equipment, security sweep equipment and the anti-virus assembly of fire compartment wall; And the basic data of security management center is configured.
Security service tactical management assembly 14 is mainly finished security policy manager and is comprised global policies management and system configuration management; The security policy manager object should be contained the network equipment, host computer system and the safety devices of being administered, and provides the safety manager to login identity and differentiates and access control mechanisms; And the formulation and the distribution that realize basic network security strategy template.
Host resource Management Unit 15, mainly to the host resource management, different safety class should satisfy following of requiring selectively: log management, the monitor server systematic function, the monitoring network systematic function is to the supervision of key area, to the supervision of core data;
Network appliance safe management assembly 16, mainly finish following function: network appliance safe management mainly is the situation of change of monitor network equipment (NE) hardware resource, according to the hardware resource that changes is carried out logout, effectively prevention dismounting hardware resource causes divulging a secret.
Database and knowledge base assembly 17 for security monitoring and management system (ISMS), complete life cycle around information system, the various security information of energy unified management, comprise that specifically vulnerability database deposits the leak information of standard, the leak that prompting enterprise may exist, the disposal options of general leak rank and suggestion.Threaten the stock to put the threat information of standard, the threat that prompting enterprise may face, the disposal options of general threat level and suggestion.Security rule base realizes sharing of security information and utilizes, provide one leave concentratedly, the environment of management, query safe knowledge.The major function of security rule base is security incident method and the measure that processing is finished, standard Event information gathering is got up, form safety and share knowledge base, the data of this knowledge base provide resource with the form storage and the management of database for cultivating high-quality network security technology personnel.The condition information that relates to the system safety aspect with port, service and system configuration etc. constitutes security baseline, safe condition by the safety management platform real-time monitoring system, contrast by security baseline, produce with security incident and similarly report to the police and solution with predefined.
Safety management and control assembly 18 are by safety management consensus standard system and the security coordination management and the hierarchy of control, set up security monitoring and management system and the emergency response system, carry out management and control main process equipment, the network equipment and basic protective equipment, set up protection and prevention ability, information and detectability, detection and recognition capability, assessment and decision-making capability, perception and display capabilities and response and recovery capability from difference defence aspect, thereby realize host computer system safety, network system security, business application system safety, reach the safe operation the set goal.
Security incident centralized monitor assembly 19, its major function comprise the association analysis and the report of system status monitoring, log collection, real-time event monitoring, real-time event warning/response and incident; By log informations such as monitor network equipment, host computer systems, and the warning message of safety product etc., in time finding and the security incident that has taken place; Take measures by security response mechanism, guarantee the safe and reliable operation of network and operation system; Audit analysis comprises that log query and statistics, association analysis and report generate.
The security strategy that risk assessment assembly 110 is mainly formulated according to system is responsible for the agency and is carried out relevant specific instructions such as relevant access control, authentication discriminating, confidentiality, integrality, fault recovery, security risk assessment; And require the relevant execution result of feedback to SOC actual time safety control system and relevant tactical management control system.
Safety on line is checked assembly 111 real time monitoring network running states of resources and safe conditions, verifies its safety label; The system tool that may jeopardize system safety is carried out strict control.Remove illegal process; The generation of Realtime Alerts; The cancellation of service when detecting when having the security violation incident, is cancelled current service; The disconnection of user account and inefficacy.
Safe workform management assembly 112, tabulation, risk tabulation, early warning information, historical events are tabulated, threatened to correlation inquiry associated safety object information, leak easily when handling worker's list.And can be associated with related content, for the event handling personnel offer help and tutorial message.
This safe each worker of workform management component record is singly in the processing time in each stage, and from accepting the time that processing finishes, after the worker singly finished, the experience of formation will add the experience storehouse.Can realize and security incident monitoring management module, Security Object risk management module, safe early warning module, and the interface of module such as security policy manager, receive the single information of worker that these modules produce, and the result and the corresponding information of worker's list can be fed back in the above-mentioned module, can upgrade and revise according to the single result of worker to guarantee the related data in the above-mentioned module.
After safe O﹠M personnel receive that the worker is single, will use suitable technique or management means to finish listed task in worker's list.Start the real-time, interactive platform when needing, carry out the real-time online communication and finish.
Shown in Fig. 2,3, real-time, interactive platform of the present invention is made of video interactive client (21,22,23), at least one MCU video server 24 and WEB background management device 25 3 parts generally.The video interactive client can be configured to software client pattern 21, hardware client mode 22, and 23 3 kinds of patterns of intelligent mobile phone terminal pattern.It is mutual that this video interactive client is responsible for finishing user's vision operation, is daily user's operation interface.MCU video server 24 is finished route, the exchange of video transmission, the loading of miscellaneous service assembly and management, media play interaction process, transmitting/receiving file interaction process etc.; WEB background management device 25 has comprised the management of basic system configuration information, user group, office meeting management, and function such as data management.Logical construction relation between the system as shown in Figure 3.
According to Fig. 3, first, second MCU server comprises WEB server, WEBCHAT server component, IM server, database server DB, document management server, professional front server and videoconference server respectively.And a MCU server is finished calling the WEB of the 2nd MCU server service.
When the video interactive client is configured to software client pattern 21 or hardware client mode 22, its function mainly comprises, the multimode login function, realize many videos, many pictures, windows display, double fluid unification (the same screen of data and video), dual camera is concurrent and double screen is two shows, and electronic whiteboard, WEB share, and support disconnection reconnecting to login function automatically;
When the video interactive client is configured to intelligent mobile phone terminal pattern 23, its function mainly comprises passes through 3G data network, log on the Internet MCU server, the synthetic video of office meeting is accepted in support, the audio frequency of office meeting contract is accepted in support, support far-end to check the video that mobile phone cam is gathered, support to participate in the office meeting speech utterance, the cellphone subscriber can check information such as conference room name in the active conference chamber, meeting number.
MCU video server 24 mainly comprise Service Manager, this Service Manager is responsible for the loading and the management of miscellaneous service assembly, such as loading and the management to assemblies such as front server, Conference server, media server, file servers; Wherein,
Front server comprises user's route assembly, conference management assembly, preposition cascade management, and prestage joint group spare obtains tabulation of higher level's subtended conference chamber and meeting room address when mainly being responsible for multistage server cascade;
Conference server, the user lands the signaling process assembly of concrete meeting room, comprises other signaling process such as meeting room user management, data function processing (electronic whiteboard, shared, the file cabinet of WEB), text chat;
Media server, the audio-video frequency media interaction data is transmitted processing components, and carries out audio frequency and video and synthesize;
The Long-distance Control server, multipad shared processing assembly;
Database component: the unified database access interface assembly of all component visit MySQL;
Monitoring server (MonitorServer), MCU serves finger daemon, and start starts automatically, is responsible for starting and monitoring core component server, WEB server, database.WEB backstage communication module, from management of webpage MCU, such as IP address management, service restart, operation condition of server inquiry etc.
WEB backstage 25 major functions comprise organization and administration, user management, Admin Administration, meeting room management, cascade management, log management, server admin.
Interaction platform interactive mode provided by the invention mainly shows as, the simultaneously online real-time audio and video system support of the many videos of the many people that rely on interaction platform to provide, multicenter voice that provides and streaming media video support etc., the attendant, customer's common management personnel and more complicated problem have information security expert etc. in many ways under the situation of personnel's online adding simultaneously when occurring, by video frequency pick-up head in many ways personnel simultaneously the multiple tracks video window on the terminal desktop of oneself see the actual symptoms of the situ configuration scene and the system failure, and hear sound in many ways by the multiple tracks audio system, fault sound as the customer scene, common management personnel's feedback speech, the expert instructs speech, and personnel's suggestion is instructed or the like in many ways, arrival is actual in control to the security service object, really accomplish collaborative studying and judging, Shared Decision Making, form service plan and concrete operations step, and guide the Field Force to carry out actual act, the figure's of the finally real-time service of finishing action required step; For simple information security service problem, only need service side personnel and customer ordinary person to transmit the terminal desktop of actual scene picture by video at the scene to service side personnel, just can finish the required operating procedure of service by voice dialogue.This interactive service mode has avoided mainly that personnel's fault reports symptom to describe erroneous judgement unclear, that not even definitely do not cause under the general information security service mode, and the loss that brings of the time delay of the side of service personnel engineering allotment, have the characteristics of dynamic and real-time information security service.
Security service flow process of the present invention comprises three steps at least, prerequisite step, client personnel process step and attendant's process step.
As shown in Figure 4, prerequisite step is as follows:
Step 31: the client provides inventories such as system equipment, carries out the security service assessment;
Step 32: judge,, continue to require the client that inventories such as system equipment are provided, from new assessment if, then return not by assessment;
Step 33:, sign the information security service agreement with the client, clear and definite service entry content if, then enter next step by assessment;
Step 34: serve the provider and generate network topology structure figure according to client's system equipment, assets composition, network composition etc.;
Step 35: enter first branch's step of two steps, promptly the client lands interactive system
Step 36: enter second branch's step of two steps, promptly the side of service personnel land interactive system; If desired, invite a plurality of information security experts to land interactive system simultaneously; Landing approach is opened many people Online Video voice web for by network, can see many people place scene simultaneously, carries out real-time, interactive;
This flow process finishes, and enters client personnel flow process and attendant's flow process respectively.
As shown in Figure 5, client personnel process step is as follows:
Step 451: the client lands interactive system;
Step 452: by information security issue classification or on topology selection equipment carry out fault and declare;
Step 453:, make things convenient for the attendant to check or the navigation system fault point in the red fault warning of topological diagram subscript;
Step 454: open the video of interaction platform and voice tool etc. simultaneously, carry out accident analysis, and submit fault detection address to;
Step 455: wait for that service side personnel carry out accident analysis, diagnosis and definite reason, and in real time and the attendant, or the information security expert links up phenomenon that fault takes place and affirmation process etc. alternately, form the fault solution at last, and carry out fault according to the scheme step and get rid of;
Step 456: under service side personnel and information security expert's coordinated, determine that fault solves, and removes failure warning;
As shown in Figure 6, attendant's process step is as follows:
Step 461: attendant's login system:
Step 462: enter and safeguard real-time monitoring interface;
Step 463: show that by the customer network topological diagram user alarm equipment, particularly contact staff have marked red fault point;
Step 464: click the topological diagram faulty equipment, show basic condition and phenomenon of the failure; If the analysis of phenomenon of the failure has indefinite place, can onlinely link up alternately with the client personnel, check fault in-situ if desired, can be by client personnel's video clip, real time inspection fault actual scene;
Step 465: open the video of interaction platform and voice tool etc. simultaneously, carry out accident analysis; And submission fault detection address;
Step 466: carry out network fault diagnosis by checking tool, need in case of necessity to obtain specialized information security knowledge, experience by the communicating with each other in real time of information security expert, and diagnostic means and method, final fault location reason, and generate examining report;
Step 467: fill in the troubleshooting step, form processing scheme;
Step 468: under the existing online situation that also can't finish service content, call out the expert and add and serve;
Step 469: existing line personnel communicate with each other and still can not solve service problem alternately the time, the person of sending someone is on-the-spot serves;
Step 4610: final fault is got rid of, and fills in the service conclusion, summarizes the experience.
The typical deployed mode of interaction platform as shown in Figure 6.According to the system architecture hierarchical design, corresponding system deployment also adopts the dispositions method of layering, distribution, cluster, makes system have more flexibility, style of opening, extensibility, sustainable development, reaches the requirement of planning.
As mentioned above, just can realize the present invention preferably.

Claims (10)

1. real time information safety service system of supporting dynamic interaction, it is characterized in that, at least the information security service system that comprises a security service central platform system and this support real-time, interactive of real-time, interactive plateform system is configured to, can finish automatically under the situation of security service at the security service central platform, not need the real-time, interactive platform can finish information security service timely; Can not finish automatically under the situation of service at the security service central platform, need to start interaction platform under the situation of attendant and customer personnel intervention, work in coordination with the real-time information security service of finishing.
2. the real time information safety service system of described support dynamic interaction according to claim 1; it is characterized in that: security service central platform system is by unified safety management controlling platform service interface; initiatively gather user's security service information; adopt security monitoring; security audit and imitation technology; the remote monitoring that utilizes the backstage to dispose; audit; assessment and expert diagnostic system; realization is to the monitoring of user network security context; audit; assessment; diagnosis and analysis-by-synthesis; automatically help the security configuration of user processing system; the assets security management; the security incident that the call flow of security mechanism and security service comes responding system to occur; the target that the protection user sets, the dynamic security problem that lasting solution user occurs in the information system running.
3. as the real time information safety service system of right 1 described support dynamic interaction, it is characterized in that, the safety service platform that relates to is mainly mainly realized unified management and control are carried out in the security service that security service emulation platform, security audit platform, security monitoring platform provide based on the security service management console, for whole service platform provides core calculations and service ability.
4. as the real time information safety service system of right 1 described support dynamic interaction, it is characterized in that, the safety service platform that relates to is made up of the following unit of mutual rational and orderly coupling at least: the network topology management assembly, the configuration management assembly, security service tactical management assembly, the host resource Management Unit, the network appliance safe management assembly, the Security Target configuration component, the database of security monitoring and management system and knowledge base assembly, safety management and control assembly, security incident centralized monitor assembly, the risk control strategy generates and executive module, and safe workform management assembly; Wherein, the network topology management assembly is finished following function: network configuration management, network equipment Topology Management and network security Topology Management.Topological structure structure: be used to find network topology, various types of equipment in the recognition network, topological diagram can layering display network topological structure; Network topology is browsed: correctly reflect the annexation between network element and network element, and can locate particular device smoothly according to the topological diagram navigation feature of network element tree graph; Topological diagram network monitoring: be used for the equipment running status and the operation conditions of monitoring network, the change situation of reflection network equipments configuration; Topological diagram can be edited: network element membership tree is provided, is used for manually adding network element in topological diagram;
The configuration management assembly is finished following function: network element main in the administration network is carried out unified configuration management, dynamically manage configuration data, equipment guarantee, status checkout and the installation function of the crucial network element device of the whole network (NED) by the standard interface of network management and control; By standard interface, configuration comprises safety means (SD), IDS/IPS and other checkout equipment, security sweep equipment and the anti-virus assembly of fire compartment wall; And the basic data of security management center is configured;
Security service tactical management assembly is finished security policy manager and is comprised global policies management and system configuration management; The security policy manager object should be contained the network equipment, host computer system and the safety devices of being administered, and provides the safety manager to login identity and differentiates and access control mechanisms; And the formulation and the distribution that realize basic network security strategy template; The host resource Management Unit is managed host resource, and different safety class should satisfy following of requiring selectively: log management, and the monitor server systematic function, the monitoring network systematic function is to the supervision of key area, to the supervision of core data;
The network appliance safe management assembly is finished following function: network appliance safe management mainly is the situation of change of monitor network equipment (NE) hardware resource, and according to the hardware resource that changes is carried out logout, effectively prevention dismounting hardware resource causes divulging a secret;
Be the database of security monitoring and management system (ISMS) and knowledge base assembly complete life cycle around information system, the various security information of energy unified management, comprise that specifically vulnerability database deposits the leak information of standard, the leak that prompting enterprise may exist, the disposal options of general leak rank and suggestion.Threaten the stock to put the threat information of standard, the threat that prompting enterprise may face, the disposal options of general threat level and suggestion;
The major function of security rule base is security incident method and the measure that processing is finished, standard Event information gathering is got up, form safety and share knowledge base, the data of this knowledge base provide resource with the form storage and the management of database for cultivating high-quality network security technology personnel; The condition information that relates to the system safety aspect with port, service and system configuration etc. constitutes security baseline, safe condition by the safety management platform real-time monitoring system, contrast by security baseline, produce with security incident and similarly report to the police and solution with predefined;
Safety management and control assembly are by safety management consensus standard system and the security coordination management and the hierarchy of control, set up security monitoring and management system and the emergency response system, carry out management and control main process equipment, the network equipment and basic protective equipment, set up protection and prevention ability, information and detectability, detection and recognition capability, assessment and decision-making capability, perception and display capabilities and response and recovery capability from difference defence aspect, thereby realize host computer system safety, network system security, business application system safety, reach the safe operation the set goal;
The function of security incident centralized monitor assembly comprises the association analysis and the report of system status monitoring, log collection, real-time event monitoring, real-time event warning/response and incident; By log informations such as monitor network equipment, host computer systems, and the warning message of safety product etc., in time finding and the security incident that has taken place; Take measures by security response mechanism, guarantee the safe and reliable operation of network and operation system; Audit analysis comprises that log query and statistics, association analysis and report generate;
The security strategy that the risk assessment assembly is formulated according to system is responsible for the agency and is carried out relevant specific instructions such as relevant access control, authentication discriminating, confidentiality, integrality, fault recovery, security risk assessment; And require the relevant execution result of feedback to SOC actual time safety control system and relevant tactical management control system;
Safety on line is checked assembly real time monitoring network running states of resources and safe condition, verifies its safety label; The system tool that may jeopardize system safety is carried out strict control.Remove illegal process; The generation of Realtime Alerts; The cancellation of service when detecting when having the security violation incident, is cancelled current service; The disconnection of user account and inefficacy;
Tabulation, risk tabulation, early warning information, historical events are tabulated, threatened to correlation inquiry associated safety object information, leak to safe workform management assembly easily when handling worker's list; And can be associated with related content, for the event handling personnel offer help and tutorial message.
5. as the real time information safety service system of any described support dynamic interaction in the right 1 to 4, it is characterized in that the interaction platform that relates to is realized in the web mode, by network, supports audio frequency, video system that a plurality of people are simultaneously online.
6. as the real time information safety service system of any described support dynamic interaction in the right 1 to 4, it is characterized in that, the real-time, interactive platform that relates to is mainly based on the Internet, pass through literal, audio frequency, modes such as video, timely communication is provided, IP calls out, omnibearing the Internet basis communication service such as video conference and internet voice, Video service, support the online chatting between two people and the many people, in time transmit voice, video, (from) broadcasting of the video text of line, long-range function such as share, the IP that satisfies numerous personal users calls out, online chatting, sound, video transmits, interactive function is linked up in file transmission etc.
7. a real time information security service method of supporting dynamic interaction is characterized in that, can finish automatically under the situation of security service at the security service central platform, does not need the real-time, interactive platform can finish information security service timely; Can not finish automatically under the situation of service at the security service central platform, need to start interaction platform under the situation of attendant and customer personnel intervention, work in coordination with the real-time information security service of finishing.
8. as the real time information security service method of right 7 described support dynamic interactions, it is characterized in that comprise prerequisite step, this step comprises following substep:
Step S1: the client provides inventories such as system equipment, carries out the security service assessment;
Step S2: judge,, continue to require the client that inventories such as system equipment are provided, from new assessment if, then return not by assessment;
Step S3:, sign the information security service agreement with the client, clear and definite service entry content if, then enter next step by assessment;
Step S4: serve the provider and generate network topology structure figure according to client's system equipment, assets composition, network composition etc.;
Step S5: step 1 client of branch who enters two steps lands interactive system;
Step S6: the step 2 service side personnel of branch that enter two steps land interactive system; If desired, invite a plurality of information security experts to land interactive system simultaneously; Landing approach is opened many people Online Video voice web for by network, can see many people place scene simultaneously, carries out real-time, interactive;
9. as the real time information security service method of right 7 described support dynamic interactions, it is characterized in that comprise client personnel process step, this step comprises following substep:
Step K 1: the client lands interactive system;
Step K 2: by information security issue classification or on topology selection equipment carry out fault and declare;
Step K 3:, make things convenient for the attendant to check or the navigation system fault point in the red fault warning of topological diagram subscript;
Step K 4: open the video of interaction platform and voice tool etc. simultaneously, carry out accident analysis, and submit fault detection address to;
Step K 5: wait for that service side personnel carry out accident analysis, diagnosis and definite reason, and in real time and the attendant, or the information security expert links up phenomenon that fault takes place and affirmation process etc. alternately, form the fault solution at last, and carry out fault according to the scheme step and get rid of;
Step K 6: under service side personnel and information security expert's coordinated, determine that fault solves, and removes failure warning;
10. as the real time information security service method of right 7 described support dynamic interactions, it is characterized in that comprise attendant's process step, this step comprises following substep:
Step F 1: attendant's login system:
Step F 2: enter and safeguard real-time monitoring interface;
Step F 3: the attendant shows that by the customer network topological diagram user alarm equipment, particularly client personnel have marked red fault point;
Step F 4: the attendant clicks the topological diagram faulty equipment, shows basic condition and phenomenon of the failure; If the analysis of phenomenon of the failure has indefinite place, can onlinely link up alternately with the client personnel, check fault in-situ if desired, can be by client personnel's video clip, real time inspection fault actual scene;
Step F 5: the attendant opens the video of interaction platform and voice tool etc. simultaneously, carries out accident analysis; And submission fault detection address;
Step F 6: carry out network fault diagnosis by checking tool, need in case of necessity to obtain specialized information security knowledge, experience by the communicating with each other in real time of information security expert, and diagnostic means and method, final fault location reason, and generate examining report;
Step F 7: the attendant fills in the troubleshooting step, forms processing scheme;
Step F 8: under the existing online situation that also can't finish service content, call out the expert and add and serve;
Step F 9: existing line personnel communicate with each other and still can not solve service problem alternately the time, the person of sending someone is on-the-spot serves;
Step F 10: final fault is got rid of, and fills in the service conclusion, summarizes the experience.
CN 201010617827 2010-12-31 2010-12-31 Real-time information safety service method and system for supporting dynamic interaction Active CN102111440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010617827 CN102111440B (en) 2010-12-31 2010-12-31 Real-time information safety service method and system for supporting dynamic interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010617827 CN102111440B (en) 2010-12-31 2010-12-31 Real-time information safety service method and system for supporting dynamic interaction

Publications (2)

Publication Number Publication Date
CN102111440A true CN102111440A (en) 2011-06-29
CN102111440B CN102111440B (en) 2013-09-11

Family

ID=44175468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010617827 Active CN102111440B (en) 2010-12-31 2010-12-31 Real-time information safety service method and system for supporting dynamic interaction

Country Status (1)

Country Link
CN (1) CN102111440B (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413198A (en) * 2011-09-30 2012-04-11 山东中创软件工程股份有限公司 Security-marker-based access control method and related system
CN102647419A (en) * 2012-04-06 2012-08-22 北京空间飞行器总体设计部 Security policy online detection system facing to terminal computers
WO2013106979A1 (en) * 2012-01-18 2013-07-25 Sun Mingzhao System for realizing network platform information interaction by utilizing identifier
CN103944758A (en) * 2014-04-14 2014-07-23 张薇 Interconnection and intercommunication state monitoring system
CN104333597A (en) * 2014-11-11 2015-02-04 湖北中网科技有限公司 IT online service system and method
CN105227340A (en) * 2014-12-05 2016-01-06 远聆(上海)信息科技有限公司 A kind of man-machine network information exchange method and system
CN105578132A (en) * 2015-12-14 2016-05-11 西安科技大学 Belt conveyer remote video maintenance auxiliary diagnosis system
CN105915658A (en) * 2016-07-04 2016-08-31 上海优刻得信息科技有限公司 Data calling method for acquiring client IP address and data transmission method
CN106066824A (en) * 2016-05-26 2016-11-02 湖南洋达信息科技有限公司 Breakdown Maintenance management system and method
CN106384048A (en) * 2016-08-30 2017-02-08 北京奇虎科技有限公司 Threat message processing method and device
CN106534186A (en) * 2016-12-07 2017-03-22 北京数字观星科技有限公司 Remote emergency response system and response method thereof
CN106897779A (en) * 2017-03-02 2017-06-27 苏州紫方数据科技有限公司 A kind of processing method of data center's operational system event
CN108881278A (en) * 2018-07-10 2018-11-23 江苏满运软件科技有限公司 Methods of risk assessment and system
CN109146086A (en) * 2017-06-15 2019-01-04 中兴通讯股份有限公司 Device service supports method, service support platform, system and storage medium
CN109271368A (en) * 2018-10-19 2019-01-25 长沙科锐消防工程技术有限公司 A kind of Database Systems and maintaining method of fire Safety Assessment system
CN109660396A (en) * 2018-12-21 2019-04-19 中国电子科技集团公司第三十四研究所 A kind of method for monitoring network and device
CN110324308A (en) * 2019-05-17 2019-10-11 国家工业信息安全发展研究中心 Network security emergency disposal system
WO2020001444A1 (en) * 2018-06-25 2020-01-02 南京中兴软件有限责任公司 Video conference server and system, control method, and storage medium
CN111176867A (en) * 2020-01-16 2020-05-19 创意信息技术股份有限公司 Data sharing exchange and open application platform
CN111260988A (en) * 2020-03-12 2020-06-09 国网山东省电力公司威海供电公司 Troubleshooting method suitable for power system training and courseware system thereof
CN111784209A (en) * 2020-07-30 2020-10-16 中国电子科技集团公司第十四研究所 Asset visualization and safe operation management system
CN112202640A (en) * 2020-09-30 2021-01-08 中国工商银行股份有限公司 Monitoring method and device applied to container cloud platform
CN114048303A (en) * 2022-01-11 2022-02-15 北京安博通科技股份有限公司 System and method for disposing response of man-machine cooperative combat
CN114168973A (en) * 2021-12-21 2022-03-11 江西省锐华互联网科技有限公司 APP security vulnerability analysis method based on cloud computing and server
CN114697230A (en) * 2022-03-18 2022-07-01 国网浙江省电力有限公司绍兴市上虞区供电公司 Energy station safety monitoring system and method based on zero trust
CN115102865A (en) * 2022-06-27 2022-09-23 李泽宾 Network security device topology management method and system
CN115633065A (en) * 2022-10-18 2023-01-20 深圳市富联芯微科技有限公司 Method for real-time information service center distribution management
CN115664846A (en) * 2022-12-08 2023-01-31 深圳市永达电子信息股份有限公司 Network security management and control system and method
CN117056110A (en) * 2023-08-17 2023-11-14 北京优特捷信息技术有限公司 System fault investigation method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108387A1 (en) * 2003-10-31 2005-05-19 Bingjun Li System and apparatus for a network management system using presence and instant message techniques
CN101257694A (en) * 2007-11-22 2008-09-03 ***通信集团山东有限公司 Mobile communication network managing intelligent sending method based on information support system
CN101282237A (en) * 2008-05-27 2008-10-08 中山大学 Synthetic network management system based on SNMP

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108387A1 (en) * 2003-10-31 2005-05-19 Bingjun Li System and apparatus for a network management system using presence and instant message techniques
CN101257694A (en) * 2007-11-22 2008-09-03 ***通信集团山东有限公司 Mobile communication network managing intelligent sending method based on information support system
CN101282237A (en) * 2008-05-27 2008-10-08 中山大学 Synthetic network management system based on SNMP

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413198A (en) * 2011-09-30 2012-04-11 山东中创软件工程股份有限公司 Security-marker-based access control method and related system
WO2013106979A1 (en) * 2012-01-18 2013-07-25 Sun Mingzhao System for realizing network platform information interaction by utilizing identifier
CN102647419A (en) * 2012-04-06 2012-08-22 北京空间飞行器总体设计部 Security policy online detection system facing to terminal computers
CN102647419B (en) * 2012-04-06 2014-08-27 北京空间飞行器总体设计部 Security policy online detection system facing to terminal computers
CN103944758A (en) * 2014-04-14 2014-07-23 张薇 Interconnection and intercommunication state monitoring system
CN104333597A (en) * 2014-11-11 2015-02-04 湖北中网科技有限公司 IT online service system and method
CN105227340A (en) * 2014-12-05 2016-01-06 远聆(上海)信息科技有限公司 A kind of man-machine network information exchange method and system
CN105578132A (en) * 2015-12-14 2016-05-11 西安科技大学 Belt conveyer remote video maintenance auxiliary diagnosis system
CN106066824A (en) * 2016-05-26 2016-11-02 湖南洋达信息科技有限公司 Breakdown Maintenance management system and method
CN105915658B (en) * 2016-07-04 2019-07-23 优刻得科技股份有限公司 Obtain data calling method, the data transmission method of client ip address
CN105915658A (en) * 2016-07-04 2016-08-31 上海优刻得信息科技有限公司 Data calling method for acquiring client IP address and data transmission method
CN106384048A (en) * 2016-08-30 2017-02-08 北京奇虎科技有限公司 Threat message processing method and device
CN106534186B (en) * 2016-12-07 2019-08-16 北京数字观星科技有限公司 A kind of remote emergency response system and its response method
CN106534186A (en) * 2016-12-07 2017-03-22 北京数字观星科技有限公司 Remote emergency response system and response method thereof
CN106897779A (en) * 2017-03-02 2017-06-27 苏州紫方数据科技有限公司 A kind of processing method of data center's operational system event
CN109146086A (en) * 2017-06-15 2019-01-04 中兴通讯股份有限公司 Device service supports method, service support platform, system and storage medium
WO2020001444A1 (en) * 2018-06-25 2020-01-02 南京中兴软件有限责任公司 Video conference server and system, control method, and storage medium
CN108881278A (en) * 2018-07-10 2018-11-23 江苏满运软件科技有限公司 Methods of risk assessment and system
CN109271368B (en) * 2018-10-19 2022-02-01 中联科锐消防科技有限公司 Database system and maintenance method of fire safety assessment system
CN109271368A (en) * 2018-10-19 2019-01-25 长沙科锐消防工程技术有限公司 A kind of Database Systems and maintaining method of fire Safety Assessment system
CN109660396A (en) * 2018-12-21 2019-04-19 中国电子科技集团公司第三十四研究所 A kind of method for monitoring network and device
CN110324308A (en) * 2019-05-17 2019-10-11 国家工业信息安全发展研究中心 Network security emergency disposal system
CN111176867A (en) * 2020-01-16 2020-05-19 创意信息技术股份有限公司 Data sharing exchange and open application platform
CN111260988A (en) * 2020-03-12 2020-06-09 国网山东省电力公司威海供电公司 Troubleshooting method suitable for power system training and courseware system thereof
CN111784209A (en) * 2020-07-30 2020-10-16 中国电子科技集团公司第十四研究所 Asset visualization and safe operation management system
CN112202640B (en) * 2020-09-30 2022-02-22 中国工商银行股份有限公司 Monitoring method and device applied to container cloud platform
CN112202640A (en) * 2020-09-30 2021-01-08 中国工商银行股份有限公司 Monitoring method and device applied to container cloud platform
CN114168973A (en) * 2021-12-21 2022-03-11 江西省锐华互联网科技有限公司 APP security vulnerability analysis method based on cloud computing and server
CN114048303A (en) * 2022-01-11 2022-02-15 北京安博通科技股份有限公司 System and method for disposing response of man-machine cooperative combat
CN114697230A (en) * 2022-03-18 2022-07-01 国网浙江省电力有限公司绍兴市上虞区供电公司 Energy station safety monitoring system and method based on zero trust
CN114697230B (en) * 2022-03-18 2023-12-15 国网浙江省电力有限公司绍兴市上虞区供电公司 Zero trust-based energy station safety monitoring system and method
CN115102865A (en) * 2022-06-27 2022-09-23 李泽宾 Network security device topology management method and system
CN115633065A (en) * 2022-10-18 2023-01-20 深圳市富联芯微科技有限公司 Method for real-time information service center distribution management
CN115633065B (en) * 2022-10-18 2024-06-07 深圳市富联芯微科技有限公司 Method for distributing and managing real-time information service center
CN115664846A (en) * 2022-12-08 2023-01-31 深圳市永达电子信息股份有限公司 Network security management and control system and method
CN117056110A (en) * 2023-08-17 2023-11-14 北京优特捷信息技术有限公司 System fault investigation method and device, electronic equipment and storage medium
CN117056110B (en) * 2023-08-17 2024-02-23 北京优特捷信息技术有限公司 System fault investigation method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN102111440B (en) 2013-09-11

Similar Documents

Publication Publication Date Title
CN102111440A (en) Real-time information safety service method and system for supporting dynamic interaction
Kokulu et al. Matched and mismatched SOCs: A qualitative study on security operations center issues
CN105139139B (en) Data processing method and device and system for O&M audit
CN101252441B (en) Acquired safety control method and system based on target capable of setting information safety
Kantzavelou et al. A game-based intrusion detection mechanism to confront internal attackers
CN108028763A (en) The telecommunication platform of cloud computing
CN104378365A (en) Safety management center capable of conducting collaborative analysis
US11526825B2 (en) Cloud-based multi-tenancy computing systems and methods for providing response control and analytics
Petrenj et al. Information sharing and collaboration for critical infrastructure resilience–a comprehensive review on barriers and emerging capabilities
CN110875943A (en) Security service delivery method and related device
Killer et al. Security management and visualization in a blockchain-based collaborative defense
Choucri et al. Institutions for cyber security: International responses and data sharing initiatives
WO2018052281A1 (en) System and method for task management
Killer et al. Threat management dashboard for a blockchain collaborative defense
Luiijf et al. Organisational structures & considerations
Haber et al. Collaboration in System Administration: For sysadmins, solving problems usually involves collaborating with others. How can we make it more effective?
Cheng et al. Integrated situational awareness for cyber attack detection, analysis, and mitigation
CN106447813A (en) Intelligent office platform
Gill et al. Social architecture: An emergency management case study
Ntouskas et al. S-PORT:" A Secure, Collaborative Environment for the Security Management of Port Information Systems"
CN112907217A (en) Block chain-based security service system
KR20140087117A (en) Remote monitoring system and method based on a smart collaboration
CN112291263A (en) Data blocking method and device
Lubis et al. Designing Secured Cafe Network with Security Awareness Domain and Resource (SADAR) by Simulation using Cisco Packet Tracer
Choucri et al. Institutional Foundations for Cyber Security: Current Responses and New Challenges

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHENZHEN YONGDA ELECTRONIC INFORMATION CO., LTD.

Free format text: FORMER NAME: SHENZHEN RONGDA ELECTRONICS CO., LTD.

CP01 Change in the name or title of a patent holder

Address after: 518000 research and development building of Shenzhen International Innovation Research Institute, Nanshan District hi tech Southern District, Guangdong, Shenzhen D301-309

Patentee after: Shenzhen Yongda electronic Touchplus information Corp

Address before: 518000 research and development building of Shenzhen International Innovation Research Institute, Nanshan District hi tech Southern District, Guangdong, Shenzhen D301-309

Patentee before: Shenzhen Rongda Electronics Co., Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Real-time information safety service method and system for supporting dynamic interaction

Effective date of registration: 20190807

Granted publication date: 20130911

Pledgee: Bank of Beijing Limited by Share Ltd Shenzhen branch

Pledgor: Shenzhen Yongda electronic Touchplus information Corp

Registration number: Y2019440020003

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20201203

Granted publication date: 20130911

Pledgee: Bank of Beijing Limited by Share Ltd. Shenzhen branch

Pledgor: SHENZHEN Y&D ELECTRONICS INFORMATION Co.,Ltd.

Registration number: Y2019440020003

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A real time information security service method and system supporting dynamic interaction

Effective date of registration: 20201216

Granted publication date: 20130911

Pledgee: Bank of Beijing Limited by Share Ltd. Shenzhen branch

Pledgor: SHENZHEN Y&D ELECTRONICS INFORMATION Co.,Ltd.

Registration number: Y2020980009416

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20220408

Granted publication date: 20130911

Pledgee: Bank of Beijing Limited by Share Ltd. Shenzhen branch

Pledgor: SHENZHEN Y&D ELECTRONICS INFORMATION Co.,Ltd.

Registration number: Y2020980009416