CN103869740A - Cipher equipment monitoring method based on hierarchical graph form - Google Patents

Cipher equipment monitoring method based on hierarchical graph form Download PDF

Info

Publication number
CN103869740A
CN103869740A CN201410109247.7A CN201410109247A CN103869740A CN 103869740 A CN103869740 A CN 103869740A CN 201410109247 A CN201410109247 A CN 201410109247A CN 103869740 A CN103869740 A CN 103869740A
Authority
CN
China
Prior art keywords
encryption device
monitored
monitoring
monitor message
monitored item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410109247.7A
Other languages
Chinese (zh)
Inventor
廖成军
帅军军
寇建波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201410109247.7A priority Critical patent/CN103869740A/en
Publication of CN103869740A publication Critical patent/CN103869740A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention discloses a cipher equipment monitoring method based on a hierarchical graph form, and relates to the information security technology in order to provide a multi-hierarchy cipher equipment monitoring method. The method is characterized by including the following steps of monitoring configuration, monitoring service and monitoring information display, wherein in the step of monitoring configuration, monitoring items are defined for each set of cipher equipment according to monitored objects, and a monitoring strategy and an alarming threshold value are configured for each monitoring item; in the step of monitoring service, the current state information of the monitored objects is received, monitoring information of the monitoring items is obtained, and an alarming prompt is given out when the current state information of the monitored objects exceeds the alarming threshold value of the monitoring items; in the step of monitoring information display, overall conditions and specific monitoring information of the cipher equipment are displayed in the graph form.

Description

A kind of encryption device method for supervising based on stratification diagrammatic form
Technical field
The invention belongs to information security technology, especially a kind of encryption device method for supervising.
Background technology
Monitoring technique is the basic technology of information security, and graphical information shows it is the core element of encryption device monitoring technique basis and information-based monitoring management.Along with the high speed development in an all-round way of the information-based industry of China, the operation system based on the management of encryption device Centralized Monitoring also enters the comprehensive construction period, and in system, encryption device monitoring, information display and centralized management are faced with more and more stricter technical requirement.
Encryption device for confidential information is encrypted, the hardware device of digital signature, deciphering, sign test etc., be widely used in the place such as bank, national security community, need to take situation, internal memory service condition to the CPU of these encryption devices, whether the monitoring state such as online is to guarantee information security.
Current traditional encryption device monitoring management system is mainly to utilize single list or patterned way to show the monitor message of encryption device, and monitor message is directly perceived, be unfavorable for that keeper comprehensively grasps every monitored condition of current password equipment in time.Simultaneously, in a fairly large number of situation of encryption device, system lacks the displaying of stratification monitor message, the displaying way to manage of chart and figure is not combined, cause the every monitor message of encryption device to be shown more in disorder, be not beneficial to the abnormal encryption device of keeper's locating query.In addition, system password monitoring of tools ladder of management is single, process is simple, does not meet the monitoring management requirement of encryption device in enormous quantities, has increased difficulty and cost that encryption device monitoring management is safeguarded, be difficult for expansion, be more unfavorable for diversification, comprehensive encryption device monitoring management requirement.
Summary of the invention
Technical matters to be solved by this invention is: for the problem of above-mentioned existence, provide a kind of multi-levelization encryption device method for supervising.
The technical solution used in the present invention is as follows: comprise following monitoring configuration step, monitor service step, monitor message displaying step, wherein,
Monitoring configuration step comprises:
Steps A 1: be every encryption device definition monitored item according to monitored object, the essential information that described each monitored item comprises encryption device and the current state information of monitored object;
Steps A 2: be each monitored item configuration monitoring strategy and alarm threshold;
Monitor service step comprises:
Step B1: control each encryption device and upload the current state information of monitored object, and receive described monitored object current state information;
Step B2: the monitored object current state information in this monitored item is monitored to the monitor message that obtains this monitored item according to the monitoring strategies of monitored item, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt;
Monitor message shows that step comprises:
Step C1: the general status of adding up and showing encryption device according to the monitor message of each monitored item of each encryption device;
Step C2: the monitor message of each monitored item of described each encryption device is classified according to the region of encryption device, node, encryption device type;
Step C3: again by the monitor message of each monitored item of same encryption device according to the displaying of classifying of monitored object type.
Preferably, in described step C1, the essential information of described encryption device and general status are shown with tabular form.
Preferably, in described step C3, the monitor message of described monitored item and mode classification thereof are shown with patterned way.
Preferably, described monitor message shows that step also comprises step C4: the monitored item that monitored object current state information is exceeded to alarm threshold carries out alarm identifier; In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by step C4.
Preferably, described monitor message shows that step also comprises step C4: in displaying interface, abnormality control is set, described abnormality control is carried out following steps in the time being triggered by user:
Step C41: the monitor message of abnormal monitored item is classified according to the region of encryption device, node, encryption device type;
Step C42: again by the monitor message of the abnormal monitored item of same encryption device according to the displaying of classifying of monitored object type;
In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by enabling described abnormality control.
Preferably, in described step C42, the monitor message of described abnormal monitored item and mode classification thereof are shown with patterned way.
Preferably, in described steps A 2, user need to be each monitored item configuration monitoring strategy and alarm threshold according to monitoring.
In sum, owing to having adopted technique scheme, the invention has the beneficial effects as follows:
1. the present invention introduces monitored item, the definition standard of monitored item the monitor message that reports of encryption device monitoring management, be convenient to the unified management to encryption device monitor message and maintenance to keeper, there is higher practicality.
2. the present invention defines monitoring strategies and alarm threshold value by monitored item.The corresponding monitoring strategies of monitored item and alarm threshold value, system is according to monitoring strategies and monitor message corresponding to alarm threshold value automatic Display encryption device monitored item.Keeper can, according to the self-defined monitoring strategies of actual conditions and alarm threshold value, be convenient to keeper encryption device monitoring strategies is administered and maintained, and has higher extendability.
3. the present invention has introduced layering, set up stratification monitoring mode, determine the overall monitoring situation of encryption device leading indicator, system is carried out layering according to the region of encryption device, node, type and is checked, successively filter and check for the monitor message that encryption device is dissimilar, solve because of encryption device Centralized Monitoring management in enormous quantities and cannot unify encryption device information to monitor the drawback of showing, met the monitoring management requirement of encryption device in enormous quantities, there is adaptability widely.
4. adopt the chart mode that combines jointly to show encryption device monitor message, list mode is shown encryption device essential information and current overall status, and patterned way is shown the concrete monitor message of encryption device.When encryption device state in list occurs when abnormal, can clicking abnormality control, show current monitor message and the situation of encryption device with patterned way, can be according to the patterned alarm prompt abnormal encryption device in location fast, and dispose in time; Or keeper can locate rapidly and occur abnormal encryption device from the concrete monitor message of the encryption device of patterned way displaying.The present invention can show the overall state of encryption device comprehensively, can intuitively, clearly reflect the every detailed monitor message of encryption device, reduce encryption device Centralized Monitoring management difficulty and cost, promote in enormous quantities, the centralized efficiency to the management of encryption device Centralized Monitoring.
 
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is that the present invention monitors process flow diagram.
Fig. 2 is the design sketch that encryption device general status is shown in list of the present invention.
Fig. 3 is the design sketch that the present invention graphically shows encryption device details.
Embodiment
Disclosed all features in this instructions, or step in disclosed all methods or process, except mutually exclusive feature and/or step, all can combine by any way.
Disclosed arbitrary feature in this instructions, unless narration especially all can be replaced by other equivalences or the alternative features with similar object.,, unless narration especially, each feature is an example in a series of equivalences or similar characteristics.
As Fig. 1, encryption device method for supervising provided by the invention comprises following monitoring configuration step, monitor service step and monitor message displaying step.
Wherein, monitoring configuration step comprises:
Steps A 1: be every encryption device definition monitored item, described monitored item defines according to monitored object, such as monitored object can be that the CPU of encryption device takies situation, internal memory service condition, online or off-line state etc., monitored object is the knowledge in encryption device monitoring technique, again exemplifies no longer one by one.For every encryption device, monitored item can be multiple.For the ease of management, can be numbered monitored item, be defined as VID.The essential information that described each monitored item comprises encryption device and the current state information of monitored object; Here said encryption device essential information refers to the identity information that can distinguish encryption device, as produces name's information of producer, model.The current state of monitored object, for example CPU takies 50%, EMS memory occupation 12%, encryption device is online etc.
Steps A 2: be each monitored item configuration monitoring strategy and alarm threshold; Here the judge agreement that said monitoring strategies is taked for described monitored object current state information for system, for example, when CPU usage is lower than 50% time, think that encryption device workload is unsaturated, in the time that CPU usage is between 50% ~ 80%, think that encryption device workload is saturated, exceed while setting alarm threshold 80%, think that encryption device works overloadingly.System is monitored the monitor message that obtains each monitored item to the current state information of monitored object according to monitoring strategies, also can be understood as the monitor message of monitored object.The monitoring strategies here and alarm threshold can need self-defining according to monitoring by keeper or user, are conducive to like this increase the extensibility of management system.
Each encryption device is initiated registration request by administration agent (Agent) to encryption device supervisory system, completes registration, and the encryption device after registration can carry out the monitoring management that signal is communicated by letter and received supervisory system with supervisory system.
Monitor service step comprises:
Step B1: the each encryption device of system control is uploaded the current state information of monitored object, and receive described monitored object current state information;
Step B2: the monitored object current state information in this monitored item is monitored to the monitor message that obtains monitored object according to the monitoring strategies of monitored item, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt;
Monitor message shows that step comprises:
Step C1: the general status of adding up and showing encryption device according to the monitor message of each encryption device monitored item; Here said general status is for example that the encryption device that workload is saturated accounts for total ratio, online encryption device accounts for the overall informations such as total ratio.
Step C2: the concrete monitor message of the each monitored item of described each encryption device is classified according to the region of encryption device, node, encryption device type;
Step C3: again by the monitor message of same encryption device according to the displaying of classifying of monitored object type.
In one embodiment, in described step C1, the essential information of described encryption device and general status are shown with tabular form.As Fig. 2.
In another embodiment, in described step C3, the current state information of described monitored object and mode classification thereof are shown with patterned way.As Fig. 3.
Find fast from various encryption device monitor message for the ease of keeper and occur abnormal encryption device and region of living in thereof, in another embodiment of the present invention, described monitor message shows that step also comprises step C4: the monitored item that exceeds alarm threshold is carried out to alarm identifier; As shown the monitor message of this monitored item or this monitored item by highlighted mode.In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, by step, C4 sends alarm prompt.Because the concrete monitor message of all encryption devices is all to classify and show according to the region of encryption device, node, encryption device type, therefore keeper can determine rapidly encryption device and the residing position of encryption device that appearance is abnormal.
Equally for the consideration of the abnormal encryption device in location fast, the present invention can also have such embodiment distortion, be that described monitor message shows that step also comprises step C4: in displaying interface, abnormality control is set, and be this control editor trigger event, in the time that triggering, the described abnormality control person of being managed carries out following steps:
Step C41: the monitor message of abnormal monitored object is classified according to the region of encryption device, node, encryption device type;
Step C42: again by the monitor message of the abnormal monitored object of same encryption device according to the displaying of classifying of monitored object type;
In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by enabling described abnormality control.
For more directly perceived, in described step C42, the current state information of described abnormal monitored object and mode classification thereof are shown with patterned way.
The present invention is not limited to aforesaid embodiment.The present invention expands to any new feature or any new combination disclosing in this manual, and the arbitrary new method disclosing or step or any new combination of process.

Claims (7)

1. an encryption device method for supervising, is characterized in that, comprises following monitoring configuration step, monitor service step and monitor message displaying step, wherein,
Monitoring configuration step comprises:
Steps A 1: be every encryption device definition monitored item according to monitored object, the essential information that described each monitored item comprises encryption device and the current state information of monitored object;
Steps A 2: be each monitored item configuration monitoring strategy and alarm threshold;
Monitor service step comprises:
Step B1: control each encryption device and upload the current state information of monitored object, and receive described monitored object current state information;
Step B2: the monitored object current state information in this monitored item is monitored to the monitor message that obtains this monitored item according to the monitoring strategies of monitored item, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt;
Monitor message shows that step comprises:
Step C1: the general status of adding up and showing encryption device according to the monitor message of each monitored item of each encryption device;
Step C2: the monitor message of each monitored item of described each encryption device is classified according to the region of encryption device, node, encryption device type;
Step C3: again by the monitor message of each monitored item of same encryption device according to the displaying of classifying of monitored object type.
2. a kind of encryption device method for supervising according to claim 1, is characterized in that, in described step C1, the essential information of described encryption device and general status is shown with tabular form.
3. according to claim a kind of encryption device method for supervising according to claim 1 and 2, it is characterized in that, in described step C3, the monitor message of described monitored item and mode classification thereof are shown with patterned way.
4. a kind of encryption device method for supervising according to claim 1, is characterized in that, described monitor message shows that step also comprises step C4: the monitored item that monitored object current state information is exceeded to alarm threshold carries out alarm identifier; In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by step C4.
5. a kind of encryption device method for supervising according to claim 1, it is characterized in that, described monitor message shows that step also comprises step C4: in displaying interface, abnormality control is set, described abnormality control is carried out following steps in the time being triggered by user:
Step C41: the monitor message of abnormal monitored item is classified according to the region of encryption device, node, encryption device type;
Step C42: again by the monitor message of the abnormal monitored item of same encryption device according to the displaying of classifying of monitored object type;
In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by enabling described abnormality control.
6. a kind of encryption device method for supervising according to claim 5, is characterized in that, in described step C42, the monitor message of described abnormal monitored item and mode classification thereof is shown with patterned way.
7. a kind of encryption device method for supervising according to claim 1, is characterized in that, in described steps A 2, user need to be each monitored item configuration monitoring strategy and alarm threshold according to monitoring.
CN201410109247.7A 2014-03-24 2014-03-24 Cipher equipment monitoring method based on hierarchical graph form Pending CN103869740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410109247.7A CN103869740A (en) 2014-03-24 2014-03-24 Cipher equipment monitoring method based on hierarchical graph form

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410109247.7A CN103869740A (en) 2014-03-24 2014-03-24 Cipher equipment monitoring method based on hierarchical graph form

Publications (1)

Publication Number Publication Date
CN103869740A true CN103869740A (en) 2014-06-18

Family

ID=50908386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410109247.7A Pending CN103869740A (en) 2014-03-24 2014-03-24 Cipher equipment monitoring method based on hierarchical graph form

Country Status (1)

Country Link
CN (1) CN103869740A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109324950A (en) * 2018-09-18 2019-02-12 郑州云海信息技术有限公司 The output method and device of monitored results in monitoring system
CN111651323A (en) * 2020-05-29 2020-09-11 山东中创软件商用中间件股份有限公司 Application software monitoring method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6011880A (en) * 1993-03-25 2000-01-04 Asahi Kogaku Kogyo Kabushiki Kaisha Digitizing encoded symbol reading device
CN101118432A (en) * 2007-06-05 2008-02-06 邱军 Equipment monitoring system and equipment monitoring method
CN102064975A (en) * 2009-11-17 2011-05-18 ***通信集团公司 Network equipment supervision method and system
CN102129228A (en) * 2010-01-13 2011-07-20 艾默生网络能源***北美公司 Monitoring system and configuration method thereof
CN203276846U (en) * 2013-04-16 2013-11-06 西安建筑科技大学 Movable multi-storage medium secure storage cabinet
CN103473626A (en) * 2013-08-20 2013-12-25 国家电网公司 Security protection method based on integrated dispatching data network operation and maintenance system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6011880A (en) * 1993-03-25 2000-01-04 Asahi Kogaku Kogyo Kabushiki Kaisha Digitizing encoded symbol reading device
CN101118432A (en) * 2007-06-05 2008-02-06 邱军 Equipment monitoring system and equipment monitoring method
CN102064975A (en) * 2009-11-17 2011-05-18 ***通信集团公司 Network equipment supervision method and system
CN102129228A (en) * 2010-01-13 2011-07-20 艾默生网络能源***北美公司 Monitoring system and configuration method thereof
CN203276846U (en) * 2013-04-16 2013-11-06 西安建筑科技大学 Movable multi-storage medium secure storage cabinet
CN103473626A (en) * 2013-08-20 2013-12-25 国家电网公司 Security protection method based on integrated dispatching data network operation and maintenance system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109324950A (en) * 2018-09-18 2019-02-12 郑州云海信息技术有限公司 The output method and device of monitored results in monitoring system
CN111651323A (en) * 2020-05-29 2020-09-11 山东中创软件商用中间件股份有限公司 Application software monitoring method, device and equipment

Similar Documents

Publication Publication Date Title
CN105095048B (en) A kind of monitoring system alarm association processing method based on business rule
CN105163091B (en) Pump station engineering management integrated linkage system
WO2016019748A1 (en) Mine safety management method and apparatus based on geographic information system
CN104734871A (en) Method and device for positioning failures
CN112688819A (en) Comprehensive management system for network operation and maintenance
CN105487914A (en) Method and device for presenting topological graph of virtualization platform
CN201909992U (en) Remote room environment monitoring device based on VPN (virtual private network) technology
CN106846748A (en) A kind of fire information is classified processing system and hierarchical processing method
CN104092730A (en) Cloud computing system
CN103888236A (en) Clock synchronization monitoring method applicable to intelligent substation
CN106287225A (en) A kind of combustion gas on-line monitoring early warning system and detection control method thereof
CN103365963B (en) Database audit system compliance method for quickly detecting
CN110119171A (en) A kind of computer room O&M monitoring management system
CN109110646A (en) Implementation method, system and the storage medium of a kind of pair of safety of tower crane inspection management
CN103869740A (en) Cipher equipment monitoring method based on hierarchical graph form
CN105449859B (en) The methods of exhibiting of panorama intelligent power system based on Away3D engines
CN103905271A (en) Alarm storm suppression method
CN106871963B (en) Reservoir water supply real-time monitoring management system
CN107220784A (en) A kind of engineering construction safety management system and method based on wechat
CN208043973U (en) Alternating current-direct current mixed running surveys note alarm device in DC circuit system
CN106776193B (en) The virtual measuring method of apparatus for monitoring power supply slave failure
CN104778812A (en) Machine room door access auto-alarm system and method
CN108599366A (en) Power grid real-time monitoring system
CN206479254U (en) Device of overheating of electrical detection means under a kind of hot environment
CN113381872A (en) Partition-based electric power system abnormal alarm processing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140618

RJ01 Rejection of invention patent application after publication