CN106453432A - Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform - Google Patents
Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform Download PDFInfo
- Publication number
- CN106453432A CN106453432A CN201611181197.9A CN201611181197A CN106453432A CN 106453432 A CN106453432 A CN 106453432A CN 201611181197 A CN201611181197 A CN 201611181197A CN 106453432 A CN106453432 A CN 106453432A
- Authority
- CN
- China
- Prior art keywords
- vulnerability
- management
- module
- engine
- scanning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a vulnerability scanning and threat intelligence based unified vulnerability management and warning platform. The platform comprises a multi-form vulnerability scanning engine module, an engine equipment management module, an accurate asset warning module, a priority analysis module, a process optimization analysis module, an internal plan communication module, a vulnerability management module and a system management module. Through a unified management mode, multiple lower multi-mode vulnerability scanning engines are subjected to unified dispatching, task issue and result return, asset statistic information and external intelligence information can be combined to realize threat warning of assets in the corporate scope, the platform can be used in the corporate information internal-external network single-network environment as well as in information internal-external network province, city and county cascade environment, the advantages of the platform in the longitudinal cascade or transverse distribution network environment can be reflected more fully, and integrated defense in electric power company information security is realized.
Description
Technical field
The present invention relates to Vulnerability-scanning technology and threat intelligence sharing technical field, specially it is based on vulnerability scanning and threat
Unified vulnerability management and the early warning platform of information.
Background technology
Carry out the internet security problem of network attack using security breaches, as the shade under sunlight, all the time along with interconnection
The application development of net industry.In recent years, the form of network security threats also occurred in that different changes, and attack pattern is from single emerging
The simple tool that interesting fan arbitrarily downloads is attacked, and changes to the attacker of organized professional and technical personnel's bespoke,
Attack purpose and steal transformation from proof individual skill strength to business or national information.
The change of new attack mode, still can utilize various leaks, such as:It is utilized in Google aurora attack
IE browser Overflow Vulnerability, the FEATHEADER remote code execution of the EXCEL program being utilized in Shady RAT attack
Leak.Attacker's attack process not all can utilize 0day leak, such as FEATHEADER Remote Code Execution Vulnerability in fact, real
On border, great majority attack the known bugs being all to utilize.For attacker, all there is fragility in the every aspect of IT system
Property, these aspects include common Loopholes of OS, application system leak, weak passwurd, also include easily ignored mistake
Security configuration problem, and violate the open unnecessary account of minimization principle, service, port etc..Threaten in new attack
In the case of transformed, network security management personnel still with traditional hole scanner, quarterly or half a year, Jin Jinjin
Row network system leak inspection is it is impossible to be really achieved the purpose repairing network security vulnerabilities by safety inspection in advance.
For many years, build with state's net company informationization, company information level of security more and more higher, for corporate assets
Attention rate is also increasing, and outside severe network attack environmental factorss also gradually result in and threaten the coverage with leak to get over
Come bigger, although the estimation flow that many tissues have maturation can effectively find leak, potential risk, leak affect
Analysis, repairs priority, mending course management, lacks and still suffer from challenging.Risk management promotes Vulnerability Management success and has
Effect.But risk management lacks practice, frequent and business objective offset direction.
Additionally, for the utilization threatening information, good intelligence channel sets up the model of intelligence, and the model of intelligence provides wisdom
Decision, wise decision brings more preferable security practices, and more preferable security practices improve the visual angle treating risk, these, just
It is that efficient, successful leak finds and management process, these steps can be accomplished, these risks would not occur the body at us
On.
Content of the invention
It is an object of the invention to provide the unified vulnerability management based on vulnerability scanning and threatening information and early warning platform, it is
In conjunction with tradition but rationally the integrating with of comprehensive Vulnerability-scanning technology and threat information, and be applied to the daily Hole Detection of company
In early warning work, achievable 1+1>2 security protection effect, can be used in company information intranet and extranet list network environment,
Can be applicable to information intranet and extranet province, city, in environment at county level, and more can body in the longitudinally network environment of cascade or cross direction profiles
Existing platform advantage, to solve the problems, such as to propose in above-mentioned background technology.
For achieving the above object, the present invention provides following technical scheme:Unified leakage based on vulnerability scanning and threat information
Hole management and early warning platform, including polymorphic vulnerability scanning engine modules, engine apparatus management module, assets accurate early warning mould
Block, priority analysis module, process optimization analysis module, inner solution AC module, Vulnerability Management module and system administration mould
Block;Be configured with polymorphic vulnerability scanning engine modules web site scan engine, system configuration engine, system scanning engine and
With the hardware device of its supporting setting, virtualization mirror image and cluster engine;The port of polymorphic vulnerability scanning engine modules also with
The port of engine apparatus management module is electrically connected with, and is attached with engine apparatus and adds function, engine in engine apparatus management module
Linkage function and engine management function.
Preferably, polymorphic vulnerability scanning engine modules are used for what realization can cover to lower end polymorphic vulnerability scanning engine
The leak of the server host in region, operating system, data base, web application, the network equipment, safety equipment etc. and configuration scanning
And assets find etc. effect.
Preferably, engine apparatus management module is used for realizing unifying to manage for all lower ends polymorphic vulnerability scanning engine
The work such as reason scheduling, task issue, collection.
Preferably, it is attached with the automatic discovery feature of assets in the accurate warning module of assets, assets confirm that function and assets are pre-
Alert function, accurate to assets information, leak information acquisition and screening and leak early warning in institute's compass of competency for realizing
The work such as positioning.
Preferably, priority analysis module is used for realizing the priority intelligent decision to built scan task and leak threatens
The priority suggestion of information is formed.
Preferably, process optimization analysis module be used for realizing for the reception of the horizontal information of trade management and management optimization according to
According to formation function.
Preferably, inner solution AC module is used for realizing sharing for leak repairing scheme and issues function in time.
Preferably, Vulnerability Management module be used for realize platform has been scanned leak overall process supervision, include scan,
Analysis, repairing, improved overall process monitoring function.
Preferably, system management module is used for realizing for user right control, equipment state management and user operation
The functions such as management.
Compared with prior art, the invention has the beneficial effects as follows:
1st, this based on polymorphic vulnerability scanning engine and threatens the unified vulnerability that information combines to manage and early warning platform, is manager institute
Leak present in administration business or configuration hidden danger provide the platform of a unified management, decrease original artificial one by one
Domain or one by one system go the situation scanning, and decrease labor workload.
2nd, this based on polymorphic vulnerability scanning engine and threatens the unified vulnerability that information combines to manage and early warning platform, Ke Yijie
Close external infornation information and assets information, the assets in our company administrative area are given warning in advance, peace can be supervised simultaneously
Full personnel carry out repairing or preventive measure in advance, it is to avoid the potential safety hazard brought because of leak.
3rd, this based on polymorphic vulnerability scanning engine and threatens the unified vulnerability that information combines to manage and early warning platform, Ke Yishi
Referring now to the unified management of cross-region polymorphic vulnerability scanning engine apparatus, decrease equipment control and O&M cost, lift work
Make efficiency.
Brief description
Fig. 1 is the business structure schematic diagram of the present invention;
Fig. 2 is the present invention each module configuration interface diagram;
Fig. 3 is present system framework diagram.
In figure:1 polymorphic vulnerability scanning engine modules;11 web site scan engines;12 system configuration engines;13 systems
Scanning engine;14 hardware devices;15 virtualization mirror images;16 cluster engines;2 engine apparatus management modules;3 assets accurate early warning mould
Block;4 priority analysis modules;5 process optimization analysis modules;6 inner solution AC module;7 Vulnerability Management modules;8 system pipes
Reason module.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out with close Chu, complete
Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work
Embodiment, broadly falls into the scope of protection of the invention.
Refer to Fig. 1-3, the present invention provides a kind of technical scheme:Unified vulnerability pipe based on vulnerability scanning and threat information
Reason with early warning platform, including polymorphic vulnerability scanning engine modules 1, engine apparatus management module 2, the accurate warning module of assets 3,
Priority analysis module 4, process optimization analysis module 5, inner solution AC module 6, Vulnerability Management module 7 and system administration mould
Block 8;It is configured with web site scan engine 11, system configuration engine 12, system scanning in polymorphic vulnerability scanning engine modules 1
Engine 13 and the hardware device 14 with its supporting setting, virtualization mirror image 15 and cluster engine 16, for realizing to lower end multiform
The server host in region that state vulnerability scanning engine can cover, operating system, data base, web application, the network equipment, safety
The leak of equipment etc. and the effect such as configuration scanning and assets discovery;The port of polymorphic vulnerability scanning engine modules 1 also with draw
The port holding up device management module 2 is electrically connected with, and engine apparatus management module 2 is used for realizing for all lower ends polymorphic leak
The work such as the unified management scheduling of scanning engine, task issue, collection;It is attached with engine in engine apparatus management module 2
Equipment adds function, engine linkage function and engine management function, and engine apparatus add that function is used for adding or to delete lower end many
Form vulnerability scanning engine, in order to be managed collectively;Engine linkage function is used for after adding engine, its connectivity being surveyed
Examination, confirms whether administrative center can carry out proper communication with the polymorphic vulnerability scanning engine modules 1 newly increasing;Engine management work(
The communication transmission between administrative center and lower end engine can be used for, issue including the task for engine, task scheduling between engine, sweep
Retouch the functions such as result passback reception;The accurate warning module of assets 3 is used for realizing to assets information, leak in institute's compass of competency
Information acquisition and screening and leak early warning such as are accurately positioned at the work, be attached with assets and automatically send out in the accurate warning module of assets 3
Existing function, assets confirm function and assets warning function, and the automatic discovery feature of assets can find to assets in network, pass through
After scan task is issued to polymorphic vulnerability scanning engine modules 1, the assets information scanning is reported by scanning engine,
This module carries out new assets and assets alteration is shown, can automatically find assets association attributes, including operating system class simultaneously
The information such as type, version, component type used, version;Assets confirm that function is used for manager and carries out for the automatic assets finding
Artificial mate, for put on record but do not include sweep limitss assets carry out confirming and artificial add, for non-assets of putting on record
Alerted;Assets warning function is used for carrying out early warning to the risk that assets assembly faces, and process is realized in early warning:Receive feelings first
Report message, filters out rapid information according to certain matched rule, is mated in conjunction with Asset Attributes, realize assets accurately pre-
Alert, for example say if locally there are not Struts2 Vulnerability events, but in external infornation, produced Struts2 leak, Ke Yili
Use this information, compare with Asset Attributes, find out first in assets carry Struts2 assembly assets, fit version number, then
Complete to be accurately positioned and warning function;Priority analysis module 4 is used for realizing the priority intelligent decision to built scan task
The priority suggestion threatening information with leak is formed;Process optimization analysis module 5 is used for realizing for trade management horizontal information
Reception and management optimization according to formed function;Inner solution AC module 6 is used for realizing sharing for leak repairing scheme
With issue function in time;Vulnerability Management module 7 is used for the overall process supervision of leak realizing platform has been scanned, including sweeping
Retouch, analyze, repairing, improved overall process monitoring function;System management module 8 is used for realizing for user right control, equipment
The function such as condition managing and user operation management.
In sum:This based on polymorphic vulnerability scanning engine and threatens the unified vulnerability management that information combines to put down with early warning
Platform, by being managed collectively pattern, carries out United Dispatching to subordinate's multiple stage polymorphic vulnerability scanning engine, task issues and result is returned
Pass, the threat early warning to assets in firm-wide, the present invention can be realized in conjunction with asset statistical information and external infornation information simultaneously
On the basis of traditional vulnerability scanning, broken away from passive situation, enabled to make an initiative sally, added in conjunction with scanning, assets information and
Threaten information to make to give warning in advance, it can be used in company information intranet and extranet list network environment, also apply be applicable in information
Outer net province, city, in environment at county level, and more can embody platform advantage in the longitudinally network environment of cascade or cross direction profiles;It is
Will tradition but comprehensive Vulnerability-scanning technology with threaten rationally integrating with of information, and be applied to the daily Hole Detection of company and
In early warning work, achievable 1+1>2 security protection effect.
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto,
Any those familiar with the art the invention discloses technical scope in, technology according to the present invention scheme and its
Inventive concept equivalent or change in addition, all should be included within the scope of the present invention.
Claims (9)
1. the unified vulnerability management based on vulnerability scanning and threatening information and early warning platform are it is characterised in that include polymorphic leakage
Hole scanning engine module(1), engine apparatus management module(2), the accurate warning module of assets(3), priority analysis module(4)、
Process optimization analysis module(5), inner solution AC module(6), Vulnerability Management module(7)And system management module(8);Multiform
State vulnerability scanning engine modules(1)Inside it is configured with web site scan engine(11), system configuration engine(12), system scanning draw
Hold up(13)And the hardware device with its supporting setting(14), virtualization mirror image(15)With cluster engine(16);Polymorphic leak is swept
Retouch engine modules(1)Port also with engine apparatus management module(2)Port be electrically connected with, engine apparatus management module(2)
Inside it is attached with engine apparatus and add function, engine linkage function and engine management function.
2. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, polymorphic vulnerability scanning engine modules(1)For realizing the region that lower end polymorphic vulnerability scanning engine can be covered
Server host, operating system, data base, web application, the network equipment, the leak of safety equipment etc. and configuration scanning and
The effects such as assets discovery.
3. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, engine apparatus management module(2)For realizing adjusting for the unified management of all lower ends polymorphic vulnerability scanning engine
The work such as degree, task issue, collection.
4. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, the accurate warning module of assets(3)Inside it is attached with the automatic discovery feature of assets, assets confirm function and assets early warning work(
Can, for realizing assets information, leak information acquisition and screening and leak early warning in institute's compass of competency are accurately positioned
Deng work.
5. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, priority analysis module(4)Threaten information for realizing the priority intelligent decision to built scan task and leak
Priority suggestion formed.
6. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, process optimization analysis module(5)For realizing the reception for the horizontal information of trade management and management optimization foundation shape
Become function.
7. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, inner solution AC module(6)For realizing sharing for leak repairing scheme and issuing function in time.
8. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, Vulnerability Management module(7)For realize platform has been scanned leak overall process supervision, include scanning, analyze,
Repairing, improved overall process monitoring function.
9. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special
Levy and be, system management module(8)For realizing for user right control, equipment state management and user operation management work(
Energy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611181197.9A CN106453432A (en) | 2016-12-20 | 2016-12-20 | Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611181197.9A CN106453432A (en) | 2016-12-20 | 2016-12-20 | Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106453432A true CN106453432A (en) | 2017-02-22 |
Family
ID=58215385
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611181197.9A Pending CN106453432A (en) | 2016-12-20 | 2016-12-20 | Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453432A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107239705A (en) * | 2017-05-25 | 2017-10-10 | 中国东方电气集团有限公司 | A kind of contactless industrial control system or the static leakage location of equipment and detection method |
CN107370763A (en) * | 2017-09-04 | 2017-11-21 | ***通信集团广东有限公司 | Assets security method for early warning and device based on outside threat intelligence analysis |
CN107526630A (en) * | 2017-07-31 | 2017-12-29 | 杭州安恒信息技术有限公司 | A kind of method for solving Distributed engine communication |
CN107634945A (en) * | 2017-09-11 | 2018-01-26 | 平安科技(深圳)有限公司 | Website vulnerability scan method, device, computer equipment and storage medium |
CN108737425A (en) * | 2018-05-24 | 2018-11-02 | 北京凌云信安科技有限公司 | Fragility based on multi engine vulnerability scanning association analysis manages system |
CN110225018A (en) * | 2019-05-31 | 2019-09-10 | 江苏百达智慧网络科技有限公司 | A method of based on more equipment evaluation web application fragility |
CN110753047A (en) * | 2019-10-16 | 2020-02-04 | 杭州安恒信息技术股份有限公司 | Method for reducing false alarm of vulnerability scanning |
CN111199042A (en) * | 2019-12-17 | 2020-05-26 | 中国南方电网有限责任公司超高压输电公司 | Safe and efficient vulnerability management system |
CN111695120A (en) * | 2020-06-12 | 2020-09-22 | 公安部第三研究所 | Information system safety deep threat early warning system and method |
CN111989678A (en) * | 2018-10-17 | 2020-11-24 | 松下电器(美国)知识产权公司 | Information processing apparatus, information processing method, and program |
CN112532647A (en) * | 2020-12-07 | 2021-03-19 | 中国南方电网有限责任公司超高压输电公司 | Deep attack identification method and device for core service of power system |
CN112615812A (en) * | 2020-11-19 | 2021-04-06 | 贵州电网有限责任公司 | Information network unified vulnerability multi-dimensional security information collection, analysis and management system |
CN113206825A (en) * | 2021-03-25 | 2021-08-03 | 国网浙江省电力有限公司衢州供电公司 | Scanning result comparison analysis method of missing scanning device |
CN114866285A (en) * | 2022-04-07 | 2022-08-05 | 水利部信息中心 | Vulnerability full-life-cycle automatic intelligent system for unified command |
CN114978614A (en) * | 2022-04-29 | 2022-08-30 | 广州市昊恒信息科技有限公司 | IP asset rapid scanning processing system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030140250A1 (en) * | 2002-01-18 | 2003-07-24 | Yoshihito Taninaka | Method and system of monitoring vulnerabilities |
CN104778414A (en) * | 2015-05-06 | 2015-07-15 | 广州万方计算机科技有限公司 | Vulnerability management system and method |
-
2016
- 2016-12-20 CN CN201611181197.9A patent/CN106453432A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030140250A1 (en) * | 2002-01-18 | 2003-07-24 | Yoshihito Taninaka | Method and system of monitoring vulnerabilities |
CN104778414A (en) * | 2015-05-06 | 2015-07-15 | 广州万方计算机科技有限公司 | Vulnerability management system and method |
Non-Patent Citations (2)
Title |
---|
俞承杭: "《计算机网络与信息安全技术》", 31 March 2008 * |
黄凯: "电力行业信息安全管理平台的研究与应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107239705A (en) * | 2017-05-25 | 2017-10-10 | 中国东方电气集团有限公司 | A kind of contactless industrial control system or the static leakage location of equipment and detection method |
CN107526630A (en) * | 2017-07-31 | 2017-12-29 | 杭州安恒信息技术有限公司 | A kind of method for solving Distributed engine communication |
CN107370763A (en) * | 2017-09-04 | 2017-11-21 | ***通信集团广东有限公司 | Assets security method for early warning and device based on outside threat intelligence analysis |
CN107370763B (en) * | 2017-09-04 | 2020-10-20 | ***通信集团广东有限公司 | Asset safety early warning method and device based on external threat information analysis |
CN107634945A (en) * | 2017-09-11 | 2018-01-26 | 平安科技(深圳)有限公司 | Website vulnerability scan method, device, computer equipment and storage medium |
CN107634945B (en) * | 2017-09-11 | 2018-06-22 | 平安科技(深圳)有限公司 | Website vulnerability scan method, device, computer equipment and storage medium |
CN108737425A (en) * | 2018-05-24 | 2018-11-02 | 北京凌云信安科技有限公司 | Fragility based on multi engine vulnerability scanning association analysis manages system |
CN111989678A (en) * | 2018-10-17 | 2020-11-24 | 松下电器(美国)知识产权公司 | Information processing apparatus, information processing method, and program |
CN110225018A (en) * | 2019-05-31 | 2019-09-10 | 江苏百达智慧网络科技有限公司 | A method of based on more equipment evaluation web application fragility |
CN110753047A (en) * | 2019-10-16 | 2020-02-04 | 杭州安恒信息技术股份有限公司 | Method for reducing false alarm of vulnerability scanning |
CN110753047B (en) * | 2019-10-16 | 2022-02-11 | 杭州安恒信息技术股份有限公司 | Method for reducing false alarm of vulnerability scanning |
CN111199042A (en) * | 2019-12-17 | 2020-05-26 | 中国南方电网有限责任公司超高压输电公司 | Safe and efficient vulnerability management system |
CN111695120A (en) * | 2020-06-12 | 2020-09-22 | 公安部第三研究所 | Information system safety deep threat early warning system and method |
CN112615812A (en) * | 2020-11-19 | 2021-04-06 | 贵州电网有限责任公司 | Information network unified vulnerability multi-dimensional security information collection, analysis and management system |
CN112532647A (en) * | 2020-12-07 | 2021-03-19 | 中国南方电网有限责任公司超高压输电公司 | Deep attack identification method and device for core service of power system |
CN113206825A (en) * | 2021-03-25 | 2021-08-03 | 国网浙江省电力有限公司衢州供电公司 | Scanning result comparison analysis method of missing scanning device |
CN114866285A (en) * | 2022-04-07 | 2022-08-05 | 水利部信息中心 | Vulnerability full-life-cycle automatic intelligent system for unified command |
CN114866285B (en) * | 2022-04-07 | 2023-10-27 | 水利部信息中心 | Uniform command vulnerability full life cycle automatic intelligent system |
CN114978614A (en) * | 2022-04-29 | 2022-08-30 | 广州市昊恒信息科技有限公司 | IP asset rapid scanning processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453432A (en) | Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform | |
Chin et al. | Energy big data security threats in IoT-based smart grid communications | |
CN103999089B (en) | For the system and method for scanning computer leak in a network environment | |
CN106595565B (en) | A kind of intellectual faculties based on BIM | |
CN107786640A (en) | A kind of city intelligent manhole cover system and management method | |
CN107516282A (en) | Three look into the Land Change Survey information management system of unification | |
CN110401661A (en) | A kind of network security target range system of electric power monitoring system | |
CN103227797A (en) | Distributive management system of information network security for power enterprises | |
CN106780154A (en) | The electricity transmitting and converting construction process environmental practice monitoring system and method for multithreading information fusion | |
CN104899922A (en) | Three-dimensional holographic generation method for intelligent power grid visualization application | |
CN103118036A (en) | Cloud end based intelligent security protection system and method | |
CN104680318A (en) | BIM-based engineering personnel control system and method | |
CN101938459A (en) | CRNET (China Railcom Net) sSafe cooperative defense system for whole course communication network | |
CN103995936A (en) | Simulation system platform used for practical training of water supply and drainage pump operators | |
CN105975863A (en) | Method for evaluating and calculating information security risk of power distribution automation terminal equipment | |
CN109327471A (en) | A kind of loophole discovery and verifying implementation method of meeting an urgent need | |
CN106779485A (en) | Total management system and data processing method based on SOA framework | |
CN103944763A (en) | Network-assistant management system and method of electrical power system | |
CN1614941A (en) | Method for establishing complex network running environmental analog stimulative platform | |
CN105939200A (en) | Method and system for performing network security risk evaluation by utilizing expert system | |
CN109376527A (en) | A kind of management method and system based on receipts and trustship in account | |
CN202870564U (en) | Digital mine safety production local area network system | |
CN106911673A (en) | A kind of electric power wide area Internet cooperates with safely guard system and its means of defence | |
CN101488203A (en) | Method and system for real-time browsing production technique document in production field | |
CN114124436B (en) | APN access trusted computing management system based on electric power Internet of things universal terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |