CN106055984A - Classified management method applied to security baseline software - Google Patents

Classified management method applied to security baseline software Download PDF

Info

Publication number
CN106055984A
CN106055984A CN201610359269.8A CN201610359269A CN106055984A CN 106055984 A CN106055984 A CN 106055984A CN 201610359269 A CN201610359269 A CN 201610359269A CN 106055984 A CN106055984 A CN 106055984A
Authority
CN
China
Prior art keywords
management
security
node
administration
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610359269.8A
Other languages
Chinese (zh)
Inventor
梁媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201610359269.8A priority Critical patent/CN106055984A/en
Publication of CN106055984A publication Critical patent/CN106055984A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a classified management method applied to security baseline software, pertaining to the technical field of host security. The method comprises following respects including nodal point management, strategy management, knowledge base management, resource management, user management, log forms, alarm management and a security center. The classified management method applied to security baseline software has following beneficial effects: the method can be applied to the government, and enterprises and institutions so that comprehensive security kernel configuration services for computer terminals can be provided to help government-related departments set up a system for standardizing terminal security management, thereby obtaining the best management effect. The security and operation and management efficiency of computer terminals can be significantly improved so that security of government information is ensured.

Description

A kind of grading management method being applied to security baseline software
Technical field
The present invention relates to Host Security technical field, particularly relate to a kind of administration by different levels side being applied to security baseline software Method.
Background technology
" security baseline " is that the minimum safe of an information system ensures, in general, and the peace that the system that is unsatisfactory for is most basic Full demand, the most just cannot bear the security risk thus brought, rather than satisfied then may the bringing of basic security demand is exceeded the quata Paying of safety cost.In the face of huge all kinds of assets of information system, pacify as information system operation maintenance personnel or information system Full management personnel, it is a thing being difficult to that the information assets of magnanimity carry out security configuration analysis, accordingly, it would be desirable to one Money can be based on various different baseline configuration strategies, the baseline inspection management platform of batch remotely detection various information assets, And support that the risk to detecting is repaired.
At present, large enterprise's system is numerous and jumbled, has numerous affiliated institutions, and Main Branches Distribution of Institutions is in the scope of this province In, enterprise network is in large scale, and structure is complicated, and a large number of services data were transmitted by network and processed every day, total nearly thousand visitors Family end computer, therefore, it is possible to realize administration by different levels to become the matter of utmost importance that enterprise selects to consider during safety information product.For Enterprise's multiple management demand, present aspect provides enterprise network multiple management method, allows enterprise easily control the letter of complex network Breath safety.
For management level, high-level leader, each operating officer leader etc. are required for from respective angle, to the whole network Or the general safety operation conditions of related service information system has one to get information about, controls clearly, it is possible to learn current Security postures, protection defect, grasp security defensive system build level and the level of safety management capacity building.
Summary of the invention
In order to solve this problem, the present invention proposes a kind of grading management method being applied to security baseline software, this Bright can be complicated, multistage the network user provide concentration, classification, the management system of security baseline software of infinite cascade extension System, comprehensive gathering system vulnerability information and safety problem, investigate all kinds of potential safety hazards are unified, security centre can be whole Close and issue network-wide security to report to the police and relevant safe condition, focus on to set up, filter, link and certain issue machine in advance System, improves network Global Information Security Construction level.
The invention mainly comprises the following aspects:
1) node administration: node refers to that a set of independent security baseline product (includes that concentrate tube pats under administration by different levels pattern Platform and client).Node administration major function includes 3:
The essential information configuration of this node.It is used for arranging this grade of node level and IP address;
The configuration of parent information.It is used for arranging the information such as the IP address of father node, COM1, connection password;
The management of child node: be used for inquiring about the essential information of the child node of this node.Can also be by arranging the IP ground of child node The child node of location section, only this address field and connect password match and just can be attached certification.
2) tactical management: carried out the setting of strategy by concatenation tactic functional module, be assigned to node by allocation rule (this node or child node).Strategy is divided into according to the scope of application:
Concatenation tactic: formulated by industry general headquarters are unified, it is adaptable to all terminals in system private network, networks at different levels must be tight Lattice perform, and must not ratify without general headquarters and revise without authorization or disable;
Local policy: managers at different levels can need to formulate according to the management of one's respective area network, strengthens the management to terminal.
If strategy clashes, the priority of concatenation tactic is higher than local policy.
3) KBM: knowledge base is the most basic baseline entry that the configuration of security baseline strategy needs, and can periodically enter Row synchronization check, it is possible to autonomous setting synchronization check cycle and time.When there being new knowledge base to import, it is also possible to automatically trigger And the simultaneously operating between child node administrative center.
4) resource management: be managed the terminal in this meshed network, in addition to basic assets attribute, it is provided that spirit The group of assets function lived, it is achieved the Classification Management to assets, improves the motility of strategy distribution simultaneously.
5) user's management: the resource that can access user carries out careful delineation of power, is divided into safety officer, system Manager and audit administrator, different operators has different feature operation authorities, supports the authentication of user, awards The functions such as power, user password amendment.
6) journaling: include log collection daily record filter with merge, log collector manage, log statistic analysis.System The report form template that to have united built-in abundant, including statistical report form, Audit Report, self-defined report, auditor can be as required Generate different forms.System built-in report generation manager, can timing automatic generation daily paper, weekly, monthly magazine, quarterly report, year Report, and support automatically to deliver in modes such as mails, supporting to derive with forms such as PDF, Excel, Word, user can be with designed, designed Form, including the page layout of form, statistical content, display styles.
7) alarm management: by the index threshold values of monitoring system resource, or the grade of security incident arranges alarm, including Alarm triggered condition and alarm response action.The alarm response action support of system send mail, eject prompting frame, send short The modes such as letter, equipment linkage, transmission MSN, transmission Syslog.
8) security centre: be exactly infomation apparatus dial plate (Dashboard), it is simply that manager initially enters after logging in administrative center The page, allow the manager of different rights that business and system running state to be had and experience intuitively.Security centre is provided with many Individual view, is used for representing conventional business and system from all angles and runs relevant chart-information, acquiescence display for making a summary View, user can add the chart being concerned about in other views to abstract view, can be with the content of flexible customization abstract view. Wherein, cascade statistical views is used for representing the cascade statistical information under administration by different levels pattern, is used for integrating and issue the whole network risk And relevant safe condition.
A kind of grading management method being applied to security baseline software that the present invention proposes, for large-scale multiple locals Net or cross-region wide area network (including network structure based on multiple management patterns such as country, province, city, counties), can use cascade Centralized management framework.The most each management node can set up multiple child node (i.e. administrative center of subordinate) as required, simultaneously can To manage concentratedly.Statistics and the warning message of this grade are transmitted to upper management system, and upper management is to whole The situation of network also is able to grasp completely.By node administration, tactical management, KBM, security centre, journaling, Multiple management systems can be cascaded data summarization by the modules such as resource management, alarm management, user's management, it is achieved the level of alert data Connection reports and the issuing of policy data, and cascade function is not intended to progression, facilitates manager according to intramural organizational structure, builds Vertical rational father and son's hierarchical relationship.Security centre supports that multiple views, cascade view can show that swimming not peer system collects step by step Network equipment change, Risk statistic, reparation statistics, system operation situation abnormal information, facilitate webmaster personnel to inquire about.This Bright can apply to government, enterprises and institutions, it is provided that comprehensively terminal security kernel configuration service, assist government affairs department Set up the Terminal Security Management system of specification, reach optimal management effect, the safety of terminal and operational management effect Rate can be significantly improved, and ensures government information safety.
The network user that can be complicated, multistage provides the security baseline software of concentration, classification, infinite cascade extension Management system, comprehensive gathering system vulnerability information and safety problem, it is provided that comprehensively terminal security kernel configuration clothes Business, safety and the operational management efficiency of terminal can be significantly improved, and ensure government information safety.
Manage internodal communication and carried out asynchronous transmission and the process of message by messaging bus, between system function module Realize loose couplings, higher visit capacity and portfolio can be born, greatly improve handling capacity and the performance of system.
Accompanying drawing explanation
Fig. 1. the centralized management pattern fundamental diagram of security baseline software;
Fig. 2. catenet cascade is disposed;
Fig. 3. system deployment Organization Chart;
Fig. 4. security baseline product function structural representation;
Fig. 5. message between nodes bus foundation Organization Chart.
Detailed description of the invention
Below present disclosure is carried out more detailed elaboration:
Security baseline software is mainly protected by the configuration item of protection server, is mainly used in by protection server The operating system run and application software.By scanning being simply provided, repairing parameter, can automatically scan and repair and serviced by protection Device configuration item.A kind of grading management method being applied to security baseline software that the present invention provides, it supports the cascade tube of multilamellar Reason pattern, it is adaptable to the centralized management of multiple-limb mechanism of large enterprise, or group management and control.Under cascade management mode, subordinate collects Middle management platform can perform, according to management Platform Requirements, the security strategy that upper management platform is formulated;Important thing can also be realized Part, abnormal conditions and alarm, and early warning information distribution platform can be set up using this and report to the police as upper and lower cascade Mach-Zehnder interferometer Communications conduit.
Functionally, following module is mainly included:
1) node administration: node refers to that a set of independent security baseline product (includes that concentrate tube pats under administration by different levels pattern Platform and client).Node administration major function includes 3:
The essential information configuration of this node.It is used for arranging this grade of node level and IP address;
The configuration of parent information.It is used for arranging the information such as the IP address of father node, COM1, connection password;
The management of child node: be used for inquiring about the essential information of the child node of this node.Can also be by arranging the IP ground of child node The child node of location section, only this address field and connect password match and just can be attached certification.
2) tactical management: carried out the setting of strategy by concatenation tactic functional module, be assigned to node by allocation rule (this node or child node).Strategy is divided into according to the scope of application:
Concatenation tactic: formulated by industry general headquarters are unified, it is adaptable to all terminals in system private network, networks at different levels must be tight Lattice perform, and must not ratify without general headquarters and revise without authorization or disable;
Local policy: managers at different levels can need to formulate according to the management of one's respective area network, strengthens the management to terminal.
If strategy clashes, the priority of concatenation tactic is higher than local policy.
3) KBM: knowledge base is the most basic baseline entry that the configuration of security baseline strategy needs, and can periodically enter Row synchronization check, it is possible to autonomous setting synchronization check cycle and time.When there being new knowledge base to import, it is also possible to automatically trigger And the simultaneously operating between child node administrative center.
4) resource management: be managed the terminal in this meshed network, in addition to basic assets attribute, it is provided that spirit The group of assets function lived, it is achieved the Classification Management to assets, improves the motility of strategy distribution simultaneously.
5) user's management: the resource that can access user carries out careful delineation of power, is divided into safety officer, system Manager and audit administrator, different operators has different feature operation authorities, supports the authentication of user, awards The functions such as power, user password amendment.
6) journaling: include log collection daily record filter with merge, log collector manage, log statistic analysis.System The report form template that to have united built-in abundant, including statistical report form, Audit Report, self-defined report, auditor can be as required Generate different forms.System built-in report generation manager, can timing automatic generation daily paper, weekly, monthly magazine, quarterly report, year Report, and support automatically to deliver in modes such as mails, supporting to derive with forms such as PDF, Excel, Word, user can be with designed, designed Form, including the page layout of form, statistical content, display styles.
7) alarm management: by the index threshold values of monitoring system resource, or the grade of security incident arranges alarm, including Alarm triggered condition and alarm response action.The alarm response action support of system send mail, eject prompting frame, send short The modes such as letter, equipment linkage, transmission MSN, transmission Syslog.
8) security centre: be exactly infomation apparatus dial plate (Dashboard), it is simply that manager initially enters after logging in administrative center The page, allow the manager of different rights that business and system running state to be had and experience intuitively.Security centre is provided with many Individual view, is used for representing conventional business and system from all angles and runs relevant chart-information, acquiescence display for making a summary View, user can add the chart being concerned about in other views to abstract view, can be with the content of flexible customization abstract view. Wherein, cascade statistical views is used for representing the cascade statistical information under administration by different levels pattern, is used for integrating and issue the whole network risk And relevant safe condition.
From functional realiey, the cascade of administration by different levels mainly alert data reports and the issuing, all from not of policy data Open internodal communication.Management platform is that each child node creates a message queue, is used for carrying out issuing and knowing of strategy Know the synchronization in storehouse, have a unified uplink synchronous passage, be used for collecting warning information and Risk statistic.

Claims (4)

1. the grading management method being applied to security baseline software, it is characterised in that
Mainly include the following aspects:
1) node administration: node refers to a set of independent security baseline product under administration by different levels pattern;
2) tactical management: carried out the setting of strategy by concatenation tactic functional module, be assigned to node by allocation rule;
3) KBM: knowledge base is the most basic baseline entry that the configuration of security baseline strategy needs, can periodically carry out same Step verification, it is possible to autonomous setting synchronization check cycle and time;When there being new knowledge base to import, it is also possible to automatically trigger and son Simultaneously operating in the heart in node administration;
5) resource management: be managed the terminal in this meshed network, in addition to basic assets attribute, it is provided that flexibly Group of assets function;
6) user's management: the resource that can access user carries out careful delineation of power, is divided into safety officer, system administration Member and audit administrator, different operators has different feature operation authorities, supports the authentication of user, authorizes, uses Registered permanent residence order amendment;
7) journaling: include log collection daily record filter with merge, log collector manage, log statistic analysis;
8), alarm management: by the index threshold values of monitoring system resource, or the grade of security incident arranges alarm, including accusing Alert trigger condition and alarm response action;
9), security centre: be exactly infomation apparatus dial plate, it is simply that the page that manager initially enters after logging in administrative center, allows difference Business and system running state are had and experience intuitively by the manager of authority.
Method the most according to claim 1, it is characterised in that
Node administration major function includes 3:
The essential information configuration of this node;It is used for arranging this grade of node level and IP address;
The configuration of parent information;It is used for arranging the IP address of father node, COM1, connection password;
The management of child node: be used for inquiring about the essential information of the child node of this node;Can also be by arranging the IP ground of child node The child node of location section, only this address field and connect password match and just can be attached certification.
Method the most according to claim 1, it is characterised in that
Strategy is divided into according to the scope of application:
Concatenation tactic: formulated by industry general headquarters are unified, it is adaptable to all terminals in system private network, networks at different levels must be tight Lattice perform, and must not ratify without general headquarters and revise without authorization or disable;
Local policy: managers at different levels can need to formulate according to the management of one's respective area network, strengthens the management to terminal;
If strategy clashes, the priority of concatenation tactic is higher than local policy.
Method the most according to claim 1, it is characterised in that
Security centre is provided with multiple view, is used for representing conventional business from all angles and runs relevant chart letter with system Breath, acquiescence display for abstract view, user can add the chart being concerned about in other views to abstract view, can be flexible The content of custom digest view;Wherein, cascade statistical views is used for representing the cascade statistical information under administration by different levels pattern, is used for Integrate and issue the whole network risk and relevant safe condition.
CN201610359269.8A 2016-05-27 2016-05-27 Classified management method applied to security baseline software Pending CN106055984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610359269.8A CN106055984A (en) 2016-05-27 2016-05-27 Classified management method applied to security baseline software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610359269.8A CN106055984A (en) 2016-05-27 2016-05-27 Classified management method applied to security baseline software

Publications (1)

Publication Number Publication Date
CN106055984A true CN106055984A (en) 2016-10-26

Family

ID=57174696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610359269.8A Pending CN106055984A (en) 2016-05-27 2016-05-27 Classified management method applied to security baseline software

Country Status (1)

Country Link
CN (1) CN106055984A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845244A (en) * 2016-12-19 2017-06-13 郑州云海信息技术有限公司 A kind of detection method and device
CN107247904A (en) * 2017-06-16 2017-10-13 郑州云海信息技术有限公司 A kind of security baseline project synchronous method and device
CN107276830A (en) * 2017-07-28 2017-10-20 郑州云海信息技术有限公司 A kind of cascade management system and method for secure network
CN107704522A (en) * 2017-09-11 2018-02-16 郑州云海信息技术有限公司 A kind of violation log-rank management method and system
CN108055315A (en) * 2017-12-08 2018-05-18 郑州云海信息技术有限公司 The method and system of knowledge base synchronization between a kind of cascade management platform
CN108768732A (en) * 2018-05-31 2018-11-06 广东电网有限责任公司韶关供电局 A kind of IP Asset Visualizations management method and system
CN109413642A (en) * 2018-11-22 2019-03-01 中邮科通信技术股份有限公司 Terminal security detection and monitoring system method
CN109547264A (en) * 2018-12-28 2019-03-29 深圳竹云科技有限公司 A kind of method alerted in thing
CN110866492A (en) * 2019-11-13 2020-03-06 广州品唯软件有限公司 Baseline branch identification method and device and computer system
CN111162929A (en) * 2019-12-04 2020-05-15 杭州迪普科技股份有限公司 Hierarchical management method and system
CN113992422A (en) * 2021-11-04 2022-01-28 中海油信息科技有限公司北京分公司 Dynamic configuration method for firewall rules

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174973A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Network safety control construction
CN101399698A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Safety management system, device and method
KR101059199B1 (en) * 2011-01-13 2011-08-25 주식회사 이글루시큐리티 A cloud computing enterprise security management system and a method thereof
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN103338128A (en) * 2013-02-25 2013-10-02 中国人民解放军91655部队 Information security management system with integrated security management and control function
CN103716184A (en) * 2013-12-13 2014-04-09 广东电网公司信息中心 Operation maintenance system of multistage interconnection domain system
CN105025006A (en) * 2015-06-09 2015-11-04 南京联成科技发展有限公司 An active information safety operation platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174973A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Network safety control construction
CN101399698A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Safety management system, device and method
KR101059199B1 (en) * 2011-01-13 2011-08-25 주식회사 이글루시큐리티 A cloud computing enterprise security management system and a method thereof
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN103338128A (en) * 2013-02-25 2013-10-02 中国人民解放军91655部队 Information security management system with integrated security management and control function
CN103716184A (en) * 2013-12-13 2014-04-09 广东电网公司信息中心 Operation maintenance system of multistage interconnection domain system
CN105025006A (en) * 2015-06-09 2015-11-04 南京联成科技发展有限公司 An active information safety operation platform

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845244A (en) * 2016-12-19 2017-06-13 郑州云海信息技术有限公司 A kind of detection method and device
CN107247904B (en) * 2017-06-16 2020-07-07 郑州云海信息技术有限公司 Safety baseline item synchronization method and device
CN107247904A (en) * 2017-06-16 2017-10-13 郑州云海信息技术有限公司 A kind of security baseline project synchronous method and device
CN107276830A (en) * 2017-07-28 2017-10-20 郑州云海信息技术有限公司 A kind of cascade management system and method for secure network
CN107704522A (en) * 2017-09-11 2018-02-16 郑州云海信息技术有限公司 A kind of violation log-rank management method and system
CN108055315A (en) * 2017-12-08 2018-05-18 郑州云海信息技术有限公司 The method and system of knowledge base synchronization between a kind of cascade management platform
CN108768732A (en) * 2018-05-31 2018-11-06 广东电网有限责任公司韶关供电局 A kind of IP Asset Visualizations management method and system
CN109413642B (en) * 2018-11-22 2022-02-18 中邮科通信技术股份有限公司 Terminal safety detection and monitoring systematization method
CN109413642A (en) * 2018-11-22 2019-03-01 中邮科通信技术股份有限公司 Terminal security detection and monitoring system method
CN109547264A (en) * 2018-12-28 2019-03-29 深圳竹云科技有限公司 A kind of method alerted in thing
CN110866492A (en) * 2019-11-13 2020-03-06 广州品唯软件有限公司 Baseline branch identification method and device and computer system
CN110866492B (en) * 2019-11-13 2022-12-13 广州品唯软件有限公司 Baseline branch identification method and device and computer system
CN111162929A (en) * 2019-12-04 2020-05-15 杭州迪普科技股份有限公司 Hierarchical management method and system
CN111162929B (en) * 2019-12-04 2022-11-01 杭州迪普科技股份有限公司 Hierarchical management method and system
CN113992422A (en) * 2021-11-04 2022-01-28 中海油信息科技有限公司北京分公司 Dynamic configuration method for firewall rules
CN113992422B (en) * 2021-11-04 2024-03-26 中海油信息科技有限公司北京分公司 Firewall rule dynamic configuration method

Similar Documents

Publication Publication Date Title
CN106055984A (en) Classified management method applied to security baseline software
CN208227074U (en) Electric power monitoring system network security monitors terminal
US10021138B2 (en) Policy/rule engine, multi-compliance framework and risk remediation
US10019677B2 (en) Active policy enforcement
WO2021017614A1 (en) Threat intelligence data collection and processing method and system, apparatus, and storage medium
CN109831327A (en) IMS full service network based on big data analysis monitors intelligent operation support system
CN108960456A (en) Private clound secure, integral operation platform
CN103166794A (en) Information security management method with integration security control function
CN101174973A (en) Network safety control construction
CN105119750A (en) Distributed information security operation and maintenance management platform based on massive data
CN103026345A (en) Dynamic multidimensional schemas for event monitoring priority
CN103338128A (en) Information security management system with integrated security management and control function
CN103400226A (en) Integrated tobacco industry information security, operation and maintenance application platform system
CN105868914A (en) Cloud management system and management method of automobile electronic health archive
CN103941652A (en) Method and device suitable for security protection and security audit of various DCS production control systems
CN106779485A (en) Total management system and data processing method based on SOA framework
CN101938460A (en) Coordinated defense method of full process and full network safety coordinated defense system
CN106027462A (en) Operation request control method and device
CN107730647A (en) A kind of smart mobile phone cruising inspection system and its method for inspecting based on SCADA
CN109639756A (en) A kind of terminal network incidence relation is shown and equipment accesses real-time monitoring system
KR100918370B1 (en) Web management system and the method thereof
CN107547228A (en) A kind of safe operation management platform based on big data realizes framework
CN109656909A (en) A kind of transmission of electricity expert data management system
Liang et al. Information security monitoring and management method based on big data in the internet of things environment
CN103489073A (en) Enterprise safe production monitoring information system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161026

WD01 Invention patent application deemed withdrawn after publication