CN106055984A - Classified management method applied to security baseline software - Google Patents
Classified management method applied to security baseline software Download PDFInfo
- Publication number
- CN106055984A CN106055984A CN201610359269.8A CN201610359269A CN106055984A CN 106055984 A CN106055984 A CN 106055984A CN 201610359269 A CN201610359269 A CN 201610359269A CN 106055984 A CN106055984 A CN 106055984A
- Authority
- CN
- China
- Prior art keywords
- management
- security
- node
- administration
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a classified management method applied to security baseline software, pertaining to the technical field of host security. The method comprises following respects including nodal point management, strategy management, knowledge base management, resource management, user management, log forms, alarm management and a security center. The classified management method applied to security baseline software has following beneficial effects: the method can be applied to the government, and enterprises and institutions so that comprehensive security kernel configuration services for computer terminals can be provided to help government-related departments set up a system for standardizing terminal security management, thereby obtaining the best management effect. The security and operation and management efficiency of computer terminals can be significantly improved so that security of government information is ensured.
Description
Technical field
The present invention relates to Host Security technical field, particularly relate to a kind of administration by different levels side being applied to security baseline software
Method.
Background technology
" security baseline " is that the minimum safe of an information system ensures, in general, and the peace that the system that is unsatisfactory for is most basic
Full demand, the most just cannot bear the security risk thus brought, rather than satisfied then may the bringing of basic security demand is exceeded the quata
Paying of safety cost.In the face of huge all kinds of assets of information system, pacify as information system operation maintenance personnel or information system
Full management personnel, it is a thing being difficult to that the information assets of magnanimity carry out security configuration analysis, accordingly, it would be desirable to one
Money can be based on various different baseline configuration strategies, the baseline inspection management platform of batch remotely detection various information assets,
And support that the risk to detecting is repaired.
At present, large enterprise's system is numerous and jumbled, has numerous affiliated institutions, and Main Branches Distribution of Institutions is in the scope of this province
In, enterprise network is in large scale, and structure is complicated, and a large number of services data were transmitted by network and processed every day, total nearly thousand visitors
Family end computer, therefore, it is possible to realize administration by different levels to become the matter of utmost importance that enterprise selects to consider during safety information product.For
Enterprise's multiple management demand, present aspect provides enterprise network multiple management method, allows enterprise easily control the letter of complex network
Breath safety.
For management level, high-level leader, each operating officer leader etc. are required for from respective angle, to the whole network
Or the general safety operation conditions of related service information system has one to get information about, controls clearly, it is possible to learn current
Security postures, protection defect, grasp security defensive system build level and the level of safety management capacity building.
Summary of the invention
In order to solve this problem, the present invention proposes a kind of grading management method being applied to security baseline software, this
Bright can be complicated, multistage the network user provide concentration, classification, the management system of security baseline software of infinite cascade extension
System, comprehensive gathering system vulnerability information and safety problem, investigate all kinds of potential safety hazards are unified, security centre can be whole
Close and issue network-wide security to report to the police and relevant safe condition, focus on to set up, filter, link and certain issue machine in advance
System, improves network Global Information Security Construction level.
The invention mainly comprises the following aspects:
1) node administration: node refers to that a set of independent security baseline product (includes that concentrate tube pats under administration by different levels pattern
Platform and client).Node administration major function includes 3:
The essential information configuration of this node.It is used for arranging this grade of node level and IP address;
The configuration of parent information.It is used for arranging the information such as the IP address of father node, COM1, connection password;
The management of child node: be used for inquiring about the essential information of the child node of this node.Can also be by arranging the IP ground of child node
The child node of location section, only this address field and connect password match and just can be attached certification.
2) tactical management: carried out the setting of strategy by concatenation tactic functional module, be assigned to node by allocation rule
(this node or child node).Strategy is divided into according to the scope of application:
Concatenation tactic: formulated by industry general headquarters are unified, it is adaptable to all terminals in system private network, networks at different levels must be tight
Lattice perform, and must not ratify without general headquarters and revise without authorization or disable;
Local policy: managers at different levels can need to formulate according to the management of one's respective area network, strengthens the management to terminal.
If strategy clashes, the priority of concatenation tactic is higher than local policy.
3) KBM: knowledge base is the most basic baseline entry that the configuration of security baseline strategy needs, and can periodically enter
Row synchronization check, it is possible to autonomous setting synchronization check cycle and time.When there being new knowledge base to import, it is also possible to automatically trigger
And the simultaneously operating between child node administrative center.
4) resource management: be managed the terminal in this meshed network, in addition to basic assets attribute, it is provided that spirit
The group of assets function lived, it is achieved the Classification Management to assets, improves the motility of strategy distribution simultaneously.
5) user's management: the resource that can access user carries out careful delineation of power, is divided into safety officer, system
Manager and audit administrator, different operators has different feature operation authorities, supports the authentication of user, awards
The functions such as power, user password amendment.
6) journaling: include log collection daily record filter with merge, log collector manage, log statistic analysis.System
The report form template that to have united built-in abundant, including statistical report form, Audit Report, self-defined report, auditor can be as required
Generate different forms.System built-in report generation manager, can timing automatic generation daily paper, weekly, monthly magazine, quarterly report, year
Report, and support automatically to deliver in modes such as mails, supporting to derive with forms such as PDF, Excel, Word, user can be with designed, designed
Form, including the page layout of form, statistical content, display styles.
7) alarm management: by the index threshold values of monitoring system resource, or the grade of security incident arranges alarm, including
Alarm triggered condition and alarm response action.The alarm response action support of system send mail, eject prompting frame, send short
The modes such as letter, equipment linkage, transmission MSN, transmission Syslog.
8) security centre: be exactly infomation apparatus dial plate (Dashboard), it is simply that manager initially enters after logging in administrative center
The page, allow the manager of different rights that business and system running state to be had and experience intuitively.Security centre is provided with many
Individual view, is used for representing conventional business and system from all angles and runs relevant chart-information, acquiescence display for making a summary
View, user can add the chart being concerned about in other views to abstract view, can be with the content of flexible customization abstract view.
Wherein, cascade statistical views is used for representing the cascade statistical information under administration by different levels pattern, is used for integrating and issue the whole network risk
And relevant safe condition.
A kind of grading management method being applied to security baseline software that the present invention proposes, for large-scale multiple locals
Net or cross-region wide area network (including network structure based on multiple management patterns such as country, province, city, counties), can use cascade
Centralized management framework.The most each management node can set up multiple child node (i.e. administrative center of subordinate) as required, simultaneously can
To manage concentratedly.Statistics and the warning message of this grade are transmitted to upper management system, and upper management is to whole
The situation of network also is able to grasp completely.By node administration, tactical management, KBM, security centre, journaling,
Multiple management systems can be cascaded data summarization by the modules such as resource management, alarm management, user's management, it is achieved the level of alert data
Connection reports and the issuing of policy data, and cascade function is not intended to progression, facilitates manager according to intramural organizational structure, builds
Vertical rational father and son's hierarchical relationship.Security centre supports that multiple views, cascade view can show that swimming not peer system collects step by step
Network equipment change, Risk statistic, reparation statistics, system operation situation abnormal information, facilitate webmaster personnel to inquire about.This
Bright can apply to government, enterprises and institutions, it is provided that comprehensively terminal security kernel configuration service, assist government affairs department
Set up the Terminal Security Management system of specification, reach optimal management effect, the safety of terminal and operational management effect
Rate can be significantly improved, and ensures government information safety.
The network user that can be complicated, multistage provides the security baseline software of concentration, classification, infinite cascade extension
Management system, comprehensive gathering system vulnerability information and safety problem, it is provided that comprehensively terminal security kernel configuration clothes
Business, safety and the operational management efficiency of terminal can be significantly improved, and ensure government information safety.
Manage internodal communication and carried out asynchronous transmission and the process of message by messaging bus, between system function module
Realize loose couplings, higher visit capacity and portfolio can be born, greatly improve handling capacity and the performance of system.
Accompanying drawing explanation
Fig. 1. the centralized management pattern fundamental diagram of security baseline software;
Fig. 2. catenet cascade is disposed;
Fig. 3. system deployment Organization Chart;
Fig. 4. security baseline product function structural representation;
Fig. 5. message between nodes bus foundation Organization Chart.
Detailed description of the invention
Below present disclosure is carried out more detailed elaboration:
Security baseline software is mainly protected by the configuration item of protection server, is mainly used in by protection server
The operating system run and application software.By scanning being simply provided, repairing parameter, can automatically scan and repair and serviced by protection
Device configuration item.A kind of grading management method being applied to security baseline software that the present invention provides, it supports the cascade tube of multilamellar
Reason pattern, it is adaptable to the centralized management of multiple-limb mechanism of large enterprise, or group management and control.Under cascade management mode, subordinate collects
Middle management platform can perform, according to management Platform Requirements, the security strategy that upper management platform is formulated;Important thing can also be realized
Part, abnormal conditions and alarm, and early warning information distribution platform can be set up using this and report to the police as upper and lower cascade Mach-Zehnder interferometer
Communications conduit.
Functionally, following module is mainly included:
1) node administration: node refers to that a set of independent security baseline product (includes that concentrate tube pats under administration by different levels pattern
Platform and client).Node administration major function includes 3:
The essential information configuration of this node.It is used for arranging this grade of node level and IP address;
The configuration of parent information.It is used for arranging the information such as the IP address of father node, COM1, connection password;
The management of child node: be used for inquiring about the essential information of the child node of this node.Can also be by arranging the IP ground of child node
The child node of location section, only this address field and connect password match and just can be attached certification.
2) tactical management: carried out the setting of strategy by concatenation tactic functional module, be assigned to node by allocation rule
(this node or child node).Strategy is divided into according to the scope of application:
Concatenation tactic: formulated by industry general headquarters are unified, it is adaptable to all terminals in system private network, networks at different levels must be tight
Lattice perform, and must not ratify without general headquarters and revise without authorization or disable;
Local policy: managers at different levels can need to formulate according to the management of one's respective area network, strengthens the management to terminal.
If strategy clashes, the priority of concatenation tactic is higher than local policy.
3) KBM: knowledge base is the most basic baseline entry that the configuration of security baseline strategy needs, and can periodically enter
Row synchronization check, it is possible to autonomous setting synchronization check cycle and time.When there being new knowledge base to import, it is also possible to automatically trigger
And the simultaneously operating between child node administrative center.
4) resource management: be managed the terminal in this meshed network, in addition to basic assets attribute, it is provided that spirit
The group of assets function lived, it is achieved the Classification Management to assets, improves the motility of strategy distribution simultaneously.
5) user's management: the resource that can access user carries out careful delineation of power, is divided into safety officer, system
Manager and audit administrator, different operators has different feature operation authorities, supports the authentication of user, awards
The functions such as power, user password amendment.
6) journaling: include log collection daily record filter with merge, log collector manage, log statistic analysis.System
The report form template that to have united built-in abundant, including statistical report form, Audit Report, self-defined report, auditor can be as required
Generate different forms.System built-in report generation manager, can timing automatic generation daily paper, weekly, monthly magazine, quarterly report, year
Report, and support automatically to deliver in modes such as mails, supporting to derive with forms such as PDF, Excel, Word, user can be with designed, designed
Form, including the page layout of form, statistical content, display styles.
7) alarm management: by the index threshold values of monitoring system resource, or the grade of security incident arranges alarm, including
Alarm triggered condition and alarm response action.The alarm response action support of system send mail, eject prompting frame, send short
The modes such as letter, equipment linkage, transmission MSN, transmission Syslog.
8) security centre: be exactly infomation apparatus dial plate (Dashboard), it is simply that manager initially enters after logging in administrative center
The page, allow the manager of different rights that business and system running state to be had and experience intuitively.Security centre is provided with many
Individual view, is used for representing conventional business and system from all angles and runs relevant chart-information, acquiescence display for making a summary
View, user can add the chart being concerned about in other views to abstract view, can be with the content of flexible customization abstract view.
Wherein, cascade statistical views is used for representing the cascade statistical information under administration by different levels pattern, is used for integrating and issue the whole network risk
And relevant safe condition.
From functional realiey, the cascade of administration by different levels mainly alert data reports and the issuing, all from not of policy data
Open internodal communication.Management platform is that each child node creates a message queue, is used for carrying out issuing and knowing of strategy
Know the synchronization in storehouse, have a unified uplink synchronous passage, be used for collecting warning information and Risk statistic.
Claims (4)
1. the grading management method being applied to security baseline software, it is characterised in that
Mainly include the following aspects:
1) node administration: node refers to a set of independent security baseline product under administration by different levels pattern;
2) tactical management: carried out the setting of strategy by concatenation tactic functional module, be assigned to node by allocation rule;
3) KBM: knowledge base is the most basic baseline entry that the configuration of security baseline strategy needs, can periodically carry out same
Step verification, it is possible to autonomous setting synchronization check cycle and time;When there being new knowledge base to import, it is also possible to automatically trigger and son
Simultaneously operating in the heart in node administration;
5) resource management: be managed the terminal in this meshed network, in addition to basic assets attribute, it is provided that flexibly
Group of assets function;
6) user's management: the resource that can access user carries out careful delineation of power, is divided into safety officer, system administration
Member and audit administrator, different operators has different feature operation authorities, supports the authentication of user, authorizes, uses
Registered permanent residence order amendment;
7) journaling: include log collection daily record filter with merge, log collector manage, log statistic analysis;
8), alarm management: by the index threshold values of monitoring system resource, or the grade of security incident arranges alarm, including accusing
Alert trigger condition and alarm response action;
9), security centre: be exactly infomation apparatus dial plate, it is simply that the page that manager initially enters after logging in administrative center, allows difference
Business and system running state are had and experience intuitively by the manager of authority.
Method the most according to claim 1, it is characterised in that
Node administration major function includes 3:
The essential information configuration of this node;It is used for arranging this grade of node level and IP address;
The configuration of parent information;It is used for arranging the IP address of father node, COM1, connection password;
The management of child node: be used for inquiring about the essential information of the child node of this node;Can also be by arranging the IP ground of child node
The child node of location section, only this address field and connect password match and just can be attached certification.
Method the most according to claim 1, it is characterised in that
Strategy is divided into according to the scope of application:
Concatenation tactic: formulated by industry general headquarters are unified, it is adaptable to all terminals in system private network, networks at different levels must be tight
Lattice perform, and must not ratify without general headquarters and revise without authorization or disable;
Local policy: managers at different levels can need to formulate according to the management of one's respective area network, strengthens the management to terminal;
If strategy clashes, the priority of concatenation tactic is higher than local policy.
Method the most according to claim 1, it is characterised in that
Security centre is provided with multiple view, is used for representing conventional business from all angles and runs relevant chart letter with system
Breath, acquiescence display for abstract view, user can add the chart being concerned about in other views to abstract view, can be flexible
The content of custom digest view;Wherein, cascade statistical views is used for representing the cascade statistical information under administration by different levels pattern, is used for
Integrate and issue the whole network risk and relevant safe condition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610359269.8A CN106055984A (en) | 2016-05-27 | 2016-05-27 | Classified management method applied to security baseline software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610359269.8A CN106055984A (en) | 2016-05-27 | 2016-05-27 | Classified management method applied to security baseline software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106055984A true CN106055984A (en) | 2016-10-26 |
Family
ID=57174696
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610359269.8A Pending CN106055984A (en) | 2016-05-27 | 2016-05-27 | Classified management method applied to security baseline software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106055984A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106845244A (en) * | 2016-12-19 | 2017-06-13 | 郑州云海信息技术有限公司 | A kind of detection method and device |
CN107247904A (en) * | 2017-06-16 | 2017-10-13 | 郑州云海信息技术有限公司 | A kind of security baseline project synchronous method and device |
CN107276830A (en) * | 2017-07-28 | 2017-10-20 | 郑州云海信息技术有限公司 | A kind of cascade management system and method for secure network |
CN107704522A (en) * | 2017-09-11 | 2018-02-16 | 郑州云海信息技术有限公司 | A kind of violation log-rank management method and system |
CN108055315A (en) * | 2017-12-08 | 2018-05-18 | 郑州云海信息技术有限公司 | The method and system of knowledge base synchronization between a kind of cascade management platform |
CN108768732A (en) * | 2018-05-31 | 2018-11-06 | 广东电网有限责任公司韶关供电局 | A kind of IP Asset Visualizations management method and system |
CN109413642A (en) * | 2018-11-22 | 2019-03-01 | 中邮科通信技术股份有限公司 | Terminal security detection and monitoring system method |
CN109547264A (en) * | 2018-12-28 | 2019-03-29 | 深圳竹云科技有限公司 | A kind of method alerted in thing |
CN110866492A (en) * | 2019-11-13 | 2020-03-06 | 广州品唯软件有限公司 | Baseline branch identification method and device and computer system |
CN111162929A (en) * | 2019-12-04 | 2020-05-15 | 杭州迪普科技股份有限公司 | Hierarchical management method and system |
CN113992422A (en) * | 2021-11-04 | 2022-01-28 | 中海油信息科技有限公司北京分公司 | Dynamic configuration method for firewall rules |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101174973A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Network safety control construction |
CN101399698A (en) * | 2007-09-30 | 2009-04-01 | 华为技术有限公司 | Safety management system, device and method |
KR101059199B1 (en) * | 2011-01-13 | 2011-08-25 | 주식회사 이글루시큐리티 | A cloud computing enterprise security management system and a method thereof |
CN103166794A (en) * | 2013-02-22 | 2013-06-19 | 中国人民解放军91655部队 | Information security management method with integration security control function |
CN103338128A (en) * | 2013-02-25 | 2013-10-02 | 中国人民解放军91655部队 | Information security management system with integrated security management and control function |
CN103716184A (en) * | 2013-12-13 | 2014-04-09 | 广东电网公司信息中心 | Operation maintenance system of multistage interconnection domain system |
CN105025006A (en) * | 2015-06-09 | 2015-11-04 | 南京联成科技发展有限公司 | An active information safety operation platform |
-
2016
- 2016-05-27 CN CN201610359269.8A patent/CN106055984A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101174973A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Network safety control construction |
CN101399698A (en) * | 2007-09-30 | 2009-04-01 | 华为技术有限公司 | Safety management system, device and method |
KR101059199B1 (en) * | 2011-01-13 | 2011-08-25 | 주식회사 이글루시큐리티 | A cloud computing enterprise security management system and a method thereof |
CN103166794A (en) * | 2013-02-22 | 2013-06-19 | 中国人民解放军91655部队 | Information security management method with integration security control function |
CN103338128A (en) * | 2013-02-25 | 2013-10-02 | 中国人民解放军91655部队 | Information security management system with integrated security management and control function |
CN103716184A (en) * | 2013-12-13 | 2014-04-09 | 广东电网公司信息中心 | Operation maintenance system of multistage interconnection domain system |
CN105025006A (en) * | 2015-06-09 | 2015-11-04 | 南京联成科技发展有限公司 | An active information safety operation platform |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106845244A (en) * | 2016-12-19 | 2017-06-13 | 郑州云海信息技术有限公司 | A kind of detection method and device |
CN107247904B (en) * | 2017-06-16 | 2020-07-07 | 郑州云海信息技术有限公司 | Safety baseline item synchronization method and device |
CN107247904A (en) * | 2017-06-16 | 2017-10-13 | 郑州云海信息技术有限公司 | A kind of security baseline project synchronous method and device |
CN107276830A (en) * | 2017-07-28 | 2017-10-20 | 郑州云海信息技术有限公司 | A kind of cascade management system and method for secure network |
CN107704522A (en) * | 2017-09-11 | 2018-02-16 | 郑州云海信息技术有限公司 | A kind of violation log-rank management method and system |
CN108055315A (en) * | 2017-12-08 | 2018-05-18 | 郑州云海信息技术有限公司 | The method and system of knowledge base synchronization between a kind of cascade management platform |
CN108768732A (en) * | 2018-05-31 | 2018-11-06 | 广东电网有限责任公司韶关供电局 | A kind of IP Asset Visualizations management method and system |
CN109413642B (en) * | 2018-11-22 | 2022-02-18 | 中邮科通信技术股份有限公司 | Terminal safety detection and monitoring systematization method |
CN109413642A (en) * | 2018-11-22 | 2019-03-01 | 中邮科通信技术股份有限公司 | Terminal security detection and monitoring system method |
CN109547264A (en) * | 2018-12-28 | 2019-03-29 | 深圳竹云科技有限公司 | A kind of method alerted in thing |
CN110866492A (en) * | 2019-11-13 | 2020-03-06 | 广州品唯软件有限公司 | Baseline branch identification method and device and computer system |
CN110866492B (en) * | 2019-11-13 | 2022-12-13 | 广州品唯软件有限公司 | Baseline branch identification method and device and computer system |
CN111162929A (en) * | 2019-12-04 | 2020-05-15 | 杭州迪普科技股份有限公司 | Hierarchical management method and system |
CN111162929B (en) * | 2019-12-04 | 2022-11-01 | 杭州迪普科技股份有限公司 | Hierarchical management method and system |
CN113992422A (en) * | 2021-11-04 | 2022-01-28 | 中海油信息科技有限公司北京分公司 | Dynamic configuration method for firewall rules |
CN113992422B (en) * | 2021-11-04 | 2024-03-26 | 中海油信息科技有限公司北京分公司 | Firewall rule dynamic configuration method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106055984A (en) | Classified management method applied to security baseline software | |
CN208227074U (en) | Electric power monitoring system network security monitors terminal | |
US10021138B2 (en) | Policy/rule engine, multi-compliance framework and risk remediation | |
US10019677B2 (en) | Active policy enforcement | |
WO2021017614A1 (en) | Threat intelligence data collection and processing method and system, apparatus, and storage medium | |
CN109831327A (en) | IMS full service network based on big data analysis monitors intelligent operation support system | |
CN108960456A (en) | Private clound secure, integral operation platform | |
CN103166794A (en) | Information security management method with integration security control function | |
CN101174973A (en) | Network safety control construction | |
CN105119750A (en) | Distributed information security operation and maintenance management platform based on massive data | |
CN103026345A (en) | Dynamic multidimensional schemas for event monitoring priority | |
CN103338128A (en) | Information security management system with integrated security management and control function | |
CN103400226A (en) | Integrated tobacco industry information security, operation and maintenance application platform system | |
CN105868914A (en) | Cloud management system and management method of automobile electronic health archive | |
CN103941652A (en) | Method and device suitable for security protection and security audit of various DCS production control systems | |
CN106779485A (en) | Total management system and data processing method based on SOA framework | |
CN101938460A (en) | Coordinated defense method of full process and full network safety coordinated defense system | |
CN106027462A (en) | Operation request control method and device | |
CN107730647A (en) | A kind of smart mobile phone cruising inspection system and its method for inspecting based on SCADA | |
CN109639756A (en) | A kind of terminal network incidence relation is shown and equipment accesses real-time monitoring system | |
KR100918370B1 (en) | Web management system and the method thereof | |
CN107547228A (en) | A kind of safe operation management platform based on big data realizes framework | |
CN109656909A (en) | A kind of transmission of electricity expert data management system | |
Liang et al. | Information security monitoring and management method based on big data in the internet of things environment | |
CN103489073A (en) | Enterprise safe production monitoring information system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161026 |
|
WD01 | Invention patent application deemed withdrawn after publication |