CN103440168A - Method and system for program change - Google Patents

Method and system for program change Download PDF

Info

Publication number
CN103440168A
CN103440168A CN201310407418XA CN201310407418A CN103440168A CN 103440168 A CN103440168 A CN 103440168A CN 201310407418X A CN201310407418X A CN 201310407418XA CN 201310407418 A CN201310407418 A CN 201310407418A CN 103440168 A CN103440168 A CN 103440168A
Authority
CN
China
Prior art keywords
program
risk
audit
program terminal
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310407418XA
Other languages
Chinese (zh)
Other versions
CN103440168B (en
Inventor
郭会
孙志伟
丁利
陈小庆
王强
高文宏
黄婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN201310407418.XA priority Critical patent/CN103440168B/en
Publication of CN103440168A publication Critical patent/CN103440168A/en
Application granted granted Critical
Publication of CN103440168B publication Critical patent/CN103440168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a method and a system for program change. The method comprises the following steps: a control terminal acquires state data of a program terminal, and performs a risk analysis on the state data, so as to obtain the risk grade of the program terminal; the control terminal adjusts an audit flow for a changed program for the program terminal in real time according to the risk grade, and audits a changed program according to the audit flow; the control terminal issues the audited changed program to the program terminal. The system specifically comprises an acquisition module, a risk module, a flow audit module and an issuing module; the acquisition module is used for acquiring the state data of the program terminal; the risk module is used for performing risk analysis on the state data, so as to obtain the risk grade of the program terminal; the flow audit module is used for adjusting the audit flow of the changed program for the program terminal in real time according to the risk grade, and auditing the changed program according to the audit flow; the issuing module is used for issuing the audited changed program to the program terminal.

Description

A kind of programing change method and system
Technical field
The present invention relates to the data management technique field, particularly a kind of programing change method and system.
Background technology
Along with the develop rapidly of financial circles, banking has realized the informationization of height already at present, to meet the user's request become increasingly abundant.Informationalized banking system is in large scale, complex structure, and also very strict for the requirement of security.Constantly improve and optimize so banking system is all passed through programing change all the time.And the process of the programing change banking system the most responsive process that also the most easily has potential safety hazard comparatively speaking often, so it is particularly important to strengthen the security of programing change.
So-called programing change, be exactly application program on terminal due to various factorss such as demand response, change in resources, defect repair, system upgrades, and adaptability is made the process that changes or revise.In prior art, each terminal needs typing modification information voluntarily, and management server need to be examined modification information according to normalized flow process, thereby judges whether to allow terminal to carry out programing change according to described modification information.Each terminal is according to the difference of its importance or risk, and corresponding auditing flow is also different.
The defect of prior art is, auditing flow corresponding to terminal is generally and presets, and can't change.If there is the special circumstances that cause terminal importance or risk to change, prior art can't realize adjusting automatically its corresponding auditing flow.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of programing change method and system, described method is carried out venture analysis to terminal, and then changes auditing flow according to risk factor.
For achieving the above object, the present invention has following technical scheme:
A kind of programing change method said method comprising the steps of:
The status data of control end capture program terminal, and described status data is carried out to risk analysis, obtain the risk class of program terminal;
The auditing flow that control end is the real-time adjustment program in program terminal according to described risk class, and examined altering the procedure according to described auditing flow;
Control end will be published to program terminal through altering the procedure of audit.
Described control end acquisition state data are specially:
Gather the status data of user's typing, the historical state data that gathers the control end storage or collection change status data.
Described status data is specially:
Any one or combination in any in trading volume, client's amount, volatility, adjusted rate, historical coefficient of stabilization, development risk parameter and risk assessment.
Described described status data is carried out to risk analysis, the risk class that obtains program terminal is specially:
Formulate the risk model, and, by status data substitution risk model, obtain risk class.
Described control end will be published to program terminal through altering the procedure of audit and be specially:
Control end obtains program issue configuration, and described program issue configuration comprises, issuing time, program terminal information, stops service list and opens service list;
Control end stops in the issuing time utilization service that service list stops this program terminal;
Control end is with the original program of alternative program terminal that alters the procedure through audit;
The service of service list opening program terminal is opened in the control end utilization.
Described program issue configuration also comprises authorization information, describedly will be published to program terminal through altering the procedure of examining and also comprise:
After the original program of alternative program terminal that alters the procedure with through audit, the input incoming message is concluded the business to start, and obtains outgoing message;
Utilize described authorization information to be verified outgoing message, if by verifying thinking to alter the procedure and issue successfully.
Described method also comprises:
Obtain the flow process list by the described auditing flow altered the procedure, according to the flow process list, the audit altered the procedure is carried out to the poll monitoring, when this audit and flow process list are inconsistent, to program terminal, do not send alarm.
Described method also comprises:
Generate audit statement altering the procedure after being published to program terminal;
Described audit statement comprises changing process, change quantity, illegal change item and unsuccessfully change.
A kind of programing change system, described system specifically comprises:
Acquisition module, the status data of capture program terminal;
The risk module, for described status data is carried out to risk analysis, obtain the risk class of program terminal;
The flow process auditing module, the auditing flow that is the real-time adjustment program in program terminal according to described risk class, and examined altering the procedure according to described auditing flow;
Release module, for being published to program terminal through altering the procedure of audit.
Described system also comprises:
Monitoring module, for by the described auditing flow altered the procedure, obtaining the flow process list, carry out the poll monitoring according to the flow process list to the audit altered the procedure, and when this audit and flow process list are inconsistent, to control end and program terminal, do not send alarm.
As seen through the above technical solutions, the beneficial effect that the present invention exists is: realized in operational process, program terminal being carried out the analysis of risk, and changed accordingly the auditing flow of its corresponding programing change; Realize that each program terminal all can still complete programing change according to rational flow process after risk situation changes; Described method makes the audit of programing change more reasonable, meets the actual demand of using, and has also fully ensured security.
The accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the described method flow diagram of the embodiment of the present invention;
Fig. 2 is the described system architecture schematic diagram of the embodiment of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment obtained, belong to the scope of protection of the invention.
In the prior art, complete in advance for the judgement of program terminal risk class and the arranging all of auditing flow of programing change, and do not have the change according to actual conditions, the mechanism that real time modifying is adjusted.That is to say, the process of prior art Program change may be summarized to be following: the risk class of pre-set program terminal, and according to the auditing flow of the corresponding formulation programing change of risk class; Examined altering the procedure according to auditing flow, and then will alter the procedure and be distributed to program terminal.But the aforesaid way dirigibility is poor, can't change along with the variation of program terminal actual conditions its risk class and auditing flow.
Shown in Figure 1, be a specific embodiment of the method for the invention.Described in the present embodiment, method comprises the following steps:
The status data of step 101, control end capture program terminal, and described status data is carried out to risk analysis, obtain the risk class of program terminal.
No matter whether program terminal had before existed the risk class of setting, and the described method of the present embodiment, in the process of program terminal operation, all needs the status data of capture program terminal, and the sector-style of going forward side by side danger is analyzed.Because the state in operational process Program terminal may change at any time, so its risk also may change thereupon.For example, the trading volume that certain program terminal relates to increases substantially, and has exceeded the scope of estimating, and the actual risk faced in this program terminal must increase so, probably no longer meet its original risk class, namely this program terminal demand of risk class that will change.
In the present embodiment, the purpose of acquisition state data is in order to evaluate the risk of certain programing change of a certain program terminal, thus described status data all should with risk have associated, so described gatherer process mainly comprises three kinds of modes:
Gather the status data of user's typing, for example risk assessment, the risk self-appraisal altered the procedure that user will issue this; And become other data such as corresponding program terminal and change time;
Gather the historical state data of control end storage, the Main Basis that historical data is risk assessment, described historical data can be the historical coefficient of stabilization, development risk parameter (such as developer's experience can abstractly be this parameter) etc. of trading volume, client amount, the program terminal of this program terminal;
Gather the change status data, the described status data that becomes is mainly specifically for this programing change, and the inevitable risk of the difference of change degree is also distinct; For example, certain programing change has only changed a source code, and inevitable risk is lower, if more treated 80% source code risk is inevitable higher.So described change status data comprises volatility and adjusted rate.
After obtaining described status data, can formulate a risk model according to status data, status data is carried out to the assessment of risk according to described risk model.The model of risk described in the present embodiment can specific as followsly be shown:
Risk High In Low
Trading volume 1,000 ten thousand 1000000~1,000 ten thousand < 1,000,000
Client's amount 1,000,000 100000~1,000,000 < 100,000
The development risk parameter < 2 years experiences 2 years~4 years experiences >4 years experiences
Adjusted rate >1% 0.5%~1% <0.5%
Historical coefficient of stabilization 5 faults 1~5 fault Non-fault
Table 1
Excessive risk item number Risk item number Low-risk item number Risk class
5 0 0 High
4 1 0 High
0 4 1 High
0 2 3 In
0 0 5 Low
Table 2
If the status data that collects a program terminal in the present embodiment shows: this program terminal trading volume 1,500 ten thousand, client measure 2,000,000, the program development personnel possess 3 years experiences, the adjusted rate of program is 11.5%, 7 these faults appearred in this program terminal history.Above-mentioned status data is brought in table 1, the status data of this program terminal exists 4 excessive risk items and 1 risk item as seen.By this conclusion substitution table 2, if having 4 excessive risk items and 1 risk item, risk class is assessed as " height " so.
The auditing flow that step 102, control end are the real-time adjustment program in program terminal according to described risk class, and examined altering the procedure according to described auditing flow.
Its corresponding review process of program terminal of different risk class is also different, and the higher audit of risk class is also just more strict.The meaning of abovementioned steps evaluation risk class just is, learns in real time the risk situation of program terminal, in order to for every kind of risk class, corresponding auditing flow is set in real time, and also adjusts accordingly auditing flow when risk class changes.The emphasis of method described in the present embodiment just is, the risk class obtained according to abovementioned steps is adjusted in real time to the auditing flow of programing change.Due to the risk class obtained in the abovementioned steps current practical risk of terminal of being in order, so can carry out the auditing flow be complementary with it in this step accordingly, make the audit of programing change more reasonable, meet the actual demand of using and also ensured security.
Described auditing flow is preserved with the text of XML form at control end, as need, adjusts auditing flow, can directly to corresponding XML file, be edited.
According to disclosed risk model in the present embodiment, risk class is excessive risk, risk and low-risk from low to high, and the auditing flow of corresponding programing change is rudimentary audit, middle rank audit and senior audit.The audit node that rudimentary audit only need to be controlled authority by the project manager completes audit; The middle rank audit is except the project manager examines the node audit, and the audit node that also needs the upper level departmental manager to control authority carries out reexamination; Senior audit, on the basis of middle rank audit, further adds the upper level general manager (GM) to control the authentication node and carries out last instance.
If be that low-risk program terminal A is judged to be risk by the script risk class in step 101, further by program terminal A, corresponding auditing flow is adjusted into the middle rank audit by rudimentary audit.In program terminal A typing while altering the procedure, according to the flow process of middle rank audit, the change data are examined.
In addition, in the present embodiment, be legal the carrying out of monitoring auditing flow, following steps are also disclosed:
Step 1021, by the described auditing flow altered the procedure, obtain the flow process list, according to the flow process list, the audit altered the procedure is carried out to the poll monitoring, when this audit and flow process list are inconsistent, to program terminal, do not send alarm.
Data sheet field Implication For example
ChangeNo The change numbering 201308250001
RiskLevel Risk class High
TopManagerCheck General manager's audit Y/N
ManagerCheck Departmental manager's audit Y/N
ProjectManagerCheck Project manager's audit Y/N
CurrentProcess Current step ProjectManagerCheck
ProcessStartTime The current step start time 2013080240305
Table 3
Table 3 is the concrete form of described flow process list in the present embodiment medium or high risk grade situation.Control end can be monitored a review process poll altered the procedure with reference to table 3, and for example arranging 5 minutes is polling cycle, and whether control end conform to the flow process regulation every the actual audit of carrying out of monitoring in 5 minutes; Whether exceeded official hour length, to avoid auditing flow, occur that wrong or audit delays if can also monitor the time that current step carries out.But monitoring finds that actual audit is present in the situation that the flow process list is not inconsistent, and control end can send alarm to program terminal, in order to take further remedial measures.
Step 103, control end will be published to program terminal through altering the procedure of audit.
When becoming program by after examining, can be published to program terminal, namely the actual change that thrusts executive routine in program.The described issuing process altered the procedure is specific as follows:
Step 1031, control end obtain program issue configuration, and described program issue configuration comprises, issuing time, program terminal information, stop service list, unlatching service list and authorization information.
Step 1032, control end stop in the issuing time utilization service that service list stops this program terminal.
As need, issue alters the procedure, and at first program terminal must stop all services, stops service and need to utilize the service list that stops in program issue configuration.Control end finds the program terminal that needs the executive routine change according to described program terminal information, and arrives the service that makes the shut down procedure terminal in the issuing time of setting, and starts the executive routine change.
Step 1033, control end are with the original program of alternative program terminal that alters the procedure through audit.
The actual execution that this step is programing change, make the program terminal Program be replaced by redaction.
Step 1034, input incoming message are concluded the business to start, and obtain outgoing message, utilize described authorization information to be verified outgoing message, if by verifying thinking to alter the procedure and issue successfully.
After programing change completes, also need further to verify that whether this change is successful.Proof procedure needs pre-configured authorization information, namely moves the result that the program expectation obtains after changing.Call program after changing and input an incoming message to it, program can produce an outgoing message accordingly; Contrast outgoing message and authorization information, namely judge whether outgoing message is consistent with previous desired result, changes successfully if meet read-me, has reached the effect of envisioning, otherwise think failure.If change unsuccessfully, can send alarm to program terminal equally, in order to further take measures.
The service of service list opening program terminal is opened in step 1035, control end utilization.
After change finishes, restart the service of program terminal, the normal operation of recovery routine terminal.
Step 104, generate audit statement altering the procedure after being published to program terminal.
Described audit statement comprises changing process, change quantity, illegal change item and unsuccessfully change.Can more visual and clear being represented to the user by the change process by audit statement.
As seen through the above technical solutions, the beneficial effect that the described method of the present embodiment exists is: realized in operational process, program terminal being carried out the analysis of risk, and changed accordingly the auditing flow of its corresponding programing change; Realize that each program terminal all can still complete programing change according to rational flow process after risk situation changes; Described method makes the audit of programing change more reasonable, meets the actual demand of using, and has also fully ensured security.
Programing change method described in corresponding embodiment illustrated in fig. 1, disclose a kind of programing change system accordingly in the present embodiment.Described system constructing is described control end in the aforementioned embodiment.Method described in previous embodiment just is being based on following system and is being achieved, and the two technical scheme is consistent in itself.System described in the present embodiment specifically comprises following:
Acquisition module, the status data of capture program terminal.
In the present embodiment, the purpose of acquisition state data is in order to evaluate the risk of certain programing change of a certain program terminal, so described status data all should have associated with risk, so described gatherer process mainly comprises typing collecting unit, historical collecting unit and state acquisition unit, is specially:
The typing collecting unit mainly gathers the status data of user's typing, for example risk assessment, the risk self-appraisal altered the procedure that user will issue this; And become other data such as corresponding program terminal and change time;
Historical collecting unit gathers the historical state data of control end storage, the Main Basis that historical data is risk assessment, described historical data can be the historical coefficient of stabilization, development risk parameter (such as developer's experience can abstractly be this parameter) etc. of trading volume, client amount, the program terminal of this program terminal;
State acquisition unit collection change status data, the described status data that becomes is mainly specifically for this programing change, and the inevitable risk of the difference of change degree is also distinct; For example, certain programing change has only changed a source code, and inevitable risk is lower, if more treated 80% source code risk is inevitable higher.So described change status data comprises volatility and adjusted rate.
The risk module, for described status data is carried out to risk analysis, obtain the risk class of program terminal.
After obtaining described status data, can formulate a risk model according to status data, status data is carried out to the assessment of risk according to described risk model.
The flow process auditing module, the auditing flow that is the real-time adjustment program in program terminal according to described risk class, and examined altering the procedure according to described auditing flow.
Its corresponding review process of program terminal of different risk class is also different, and the higher audit of risk class is also just more strict.The meaning of abovementioned steps evaluation risk class just is, learns in real time the risk situation of program terminal, in order to for every kind of risk class, corresponding auditing flow is set in real time, and also adjusts accordingly auditing flow when risk class changes.The emphasis of method described in the present embodiment just is, the risk class obtained according to abovementioned steps is adjusted in real time to the auditing flow of programing change.Due to the risk class obtained in the abovementioned steps current practical risk of terminal of being in order, so can carry out the auditing flow be complementary with it in this step accordingly, make the audit of programing change more reasonable, meet the actual demand of using and also ensured security.
Described auditing flow is preserved with the text of XML form at control end, as need, adjusts auditing flow, can directly to corresponding XML file, be edited.
Monitoring module, for by the described auditing flow altered the procedure, obtaining the flow process list, carry out the poll monitoring according to the flow process list to the audit altered the procedure, and when this audit and flow process list are inconsistent, to control end and program terminal, do not send alarm.
Release module, for being published to program terminal through altering the procedure of audit.
When becoming program by after examining, can be published to program terminal, namely the actual change that thrusts executive routine in program.Described release module specifically comprises:
Dispensing unit, for obtaining program issue configuration, described program issue configuration comprises, issuing time, program terminal information, stops service list, opens service list and authorization information.
Stop service unit, in the issuing time utilization, stopping the service that service list stops this program terminal.
As need, issue alters the procedure, and at first program terminal must stop all services, stops service and need to utilize the service list that stops in program issue configuration.Stop service unit and find the program terminal that needs the executive routine change according to described program terminal information, and arrive the service that makes the shut down procedure terminal in the issuing time of setting, start the executive routine change.
Replacement unit, the original program of alternative program terminal that alters the procedure for examining with process.
The actual execution that this step is programing change, make the program terminal Program be replaced by redaction.
Authentication unit, for inputting incoming message to start transaction, and obtain outgoing message, utilize described authorization information to be verified outgoing message, if by checking think to alter the procedure and issue successfully.
After programing change completes, also need further to verify that whether this change is successful.Proof procedure needs pre-configured authorization information, namely moves the result that the program expectation obtains after changing.Call program after changing and input an incoming message to it, program can produce an outgoing message accordingly; Contrast outgoing message and authorization information, namely judge whether outgoing message is consistent with previous desired result, changes successfully if meet read-me, has reached the effect of envisioning, otherwise think failure.If change unsuccessfully, can send alarm to program terminal equally, in order to further take measures.
Open service unit, for utilizing the service of opening service list opening program terminal.
After change finishes, restart the service of program terminal, the normal operation of recovery routine terminal.
The beneficial effect that the described system of the present embodiment exists is: realized in operational process, program terminal being carried out the analysis of risk, and changed accordingly the auditing flow of its corresponding programing change; Realize that each program terminal all can still complete programing change according to rational flow process after risk situation changes; Described method makes the audit of programing change more reasonable, meets the actual demand of using, and has also fully ensured security.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. a programing change method, is characterized in that, said method comprising the steps of:
The status data of control end capture program terminal, and described status data is carried out to risk analysis, obtain the risk class of program terminal;
The auditing flow that control end is the real-time adjustment program in program terminal according to described risk class, and examined altering the procedure according to described auditing flow;
Control end will be published to program terminal through altering the procedure of audit.
2. method according to claim 1, is characterized in that, described control end acquisition state data are specially:
Gather the status data of user's typing, the historical state data that gathers the control end storage or collection change status data.
3. according to the described method of claim 1 or 2, it is characterized in that, described status data is specially:
Any one or combination in any in trading volume, client's amount, volatility, adjusted rate, historical coefficient of stabilization, development risk parameter and risk assessment.
4. method according to claim 3, is characterized in that, described described status data carried out to risk analysis, and the risk class that obtains program terminal is specially:
Formulate the risk model, and, by status data substitution risk model, obtain risk class.
5. method according to claim 1, is characterized in that, described control end will be published to program terminal through altering the procedure of audit and be specially:
Control end obtains program issue configuration, and described program issue configuration comprises, issuing time, program terminal information, stops service list and opens service list;
Control end stops in the issuing time utilization service that service list stops this program terminal;
Control end is with the original program of alternative program terminal that alters the procedure through audit;
The service of service list opening program terminal is opened in the control end utilization.
6. method according to claim 5, is characterized in that, described program issue configuration also comprises authorization information, describedly will be published to program terminal through altering the procedure of examining and also comprise:
After the original program of alternative program terminal that alters the procedure with through audit, the input incoming message is concluded the business to start, and obtains outgoing message;
Utilize described authorization information to be verified outgoing message, if by verifying thinking to alter the procedure and issue successfully.
7. method according to claim 1, is characterized in that, described method also comprises:
Obtain the flow process list by the described auditing flow altered the procedure, according to the flow process list, the audit altered the procedure is carried out to the poll monitoring, when this audit and flow process list are inconsistent, to program terminal, do not send alarm.
8. method according to claim 1, is characterized in that, described method also comprises:
Generate audit statement altering the procedure after being published to program terminal;
Described audit statement comprises changing process, change quantity, illegal change item and unsuccessfully change.
9. a programing change system, is characterized in that, described system specifically comprises:
Acquisition module, the status data of capture program terminal;
The risk module, for described status data is carried out to risk analysis, obtain the risk class of program terminal;
The flow process auditing module, the auditing flow that is the real-time adjustment program in program terminal according to described risk class, and examined altering the procedure according to described auditing flow;
Release module, for being published to program terminal through altering the procedure of audit.
10. system according to claim 9, is characterized in that, described system also comprises:
Monitoring module, for by the described auditing flow altered the procedure, obtaining the flow process list, carry out the poll monitoring according to the flow process list to the audit altered the procedure, and when this audit and flow process list are inconsistent, to control end and program terminal, do not send alarm.
CN201310407418.XA 2013-09-09 2013-09-09 Method and system for program change Active CN103440168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310407418.XA CN103440168B (en) 2013-09-09 2013-09-09 Method and system for program change

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310407418.XA CN103440168B (en) 2013-09-09 2013-09-09 Method and system for program change

Publications (2)

Publication Number Publication Date
CN103440168A true CN103440168A (en) 2013-12-11
CN103440168B CN103440168B (en) 2017-01-18

Family

ID=49693858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310407418.XA Active CN103440168B (en) 2013-09-09 2013-09-09 Method and system for program change

Country Status (1)

Country Link
CN (1) CN103440168B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016062193A1 (en) * 2014-10-22 2016-04-28 中国银联股份有限公司 Method for dynamically controlling application function based on environment detection
CN107679749A (en) * 2017-09-30 2018-02-09 新奥(中国)燃气投资有限公司 The measures and procedures for the examination and approval and Current Authorization Management Platform of a kind of authority application
CN110046784A (en) * 2018-12-14 2019-07-23 阿里巴巴集团控股有限公司 A kind of risk of user's access determines method and device
CN111324370A (en) * 2020-02-19 2020-06-23 支付宝(杭州)信息技术有限公司 Method and device for carrying out risk processing on to-be-on-line small program
CN111582771A (en) * 2020-06-16 2020-08-25 深圳前海微众银行股份有限公司 Risk assessment method, device, equipment and computer readable storage medium
CN113238994A (en) * 2021-05-17 2021-08-10 上海中通吉网络技术有限公司 Report file management and publishing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101000667A (en) * 2006-01-12 2007-07-18 鸿富锦精密工业(深圳)有限公司 System and method of dynamic examining procedure
CN101616018A (en) * 2008-06-27 2009-12-30 中兴通讯股份有限公司 The method of upgrading network management software and device
CN101673366A (en) * 2008-09-10 2010-03-17 北京正辰科技发展有限责任公司 It service management technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101000667A (en) * 2006-01-12 2007-07-18 鸿富锦精密工业(深圳)有限公司 System and method of dynamic examining procedure
CN101616018A (en) * 2008-06-27 2009-12-30 中兴通讯股份有限公司 The method of upgrading network management software and device
CN101673366A (en) * 2008-09-10 2010-03-17 北京正辰科技发展有限责任公司 It service management technology

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016062193A1 (en) * 2014-10-22 2016-04-28 中国银联股份有限公司 Method for dynamically controlling application function based on environment detection
US10719605B2 (en) 2014-10-22 2020-07-21 China Unionpay Co., Ltd. Method for dynamically controlling application function based on environment detection
CN107679749A (en) * 2017-09-30 2018-02-09 新奥(中国)燃气投资有限公司 The measures and procedures for the examination and approval and Current Authorization Management Platform of a kind of authority application
CN107679749B (en) * 2017-09-30 2021-05-25 新奥(中国)燃气投资有限公司 Authority application approval method and authorization management platform
CN110046784A (en) * 2018-12-14 2019-07-23 阿里巴巴集团控股有限公司 A kind of risk of user's access determines method and device
CN111324370A (en) * 2020-02-19 2020-06-23 支付宝(杭州)信息技术有限公司 Method and device for carrying out risk processing on to-be-on-line small program
CN111324370B (en) * 2020-02-19 2022-10-18 支付宝(杭州)信息技术有限公司 Method and device for carrying out risk processing on to-be-on-line small program
CN111582771A (en) * 2020-06-16 2020-08-25 深圳前海微众银行股份有限公司 Risk assessment method, device, equipment and computer readable storage medium
CN113238994A (en) * 2021-05-17 2021-08-10 上海中通吉网络技术有限公司 Report file management and publishing method

Also Published As

Publication number Publication date
CN103440168B (en) 2017-01-18

Similar Documents

Publication Publication Date Title
US11741105B2 (en) Intelligent remote monitoring method for fire-fighting
CN103440168A (en) Method and system for program change
CA2874189C (en) Cyber security analzer
AU2011255477B2 (en) Bug clearing house
CN102158527B (en) Household electrical appliance maintenance system and household electrical appliance with self-checking function
CN108492092A (en) A kind of bidding management system and method
CN105978147B (en) The long-range fixed value modification system of automatic safety device based on file interaction
CN109460223A (en) A kind of API gateway management system and its method
CN101321084A (en) Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining
CN108470313A (en) A kind of operation operation overall process management-control method and system based on mobile internet
CN107194256A (en) Riskless asset baseline reinforcement means and device
CN106096960A (en) The method and apparatus of the outside payment system of monitoring and method of payment and system
CN103440460A (en) Application system change validation method and system
CN106982141A (en) Weblogic examples monitoring method and device
US20190081984A1 (en) Method and computing device for commissioning an industrial automation control system
CN107135089A (en) A kind of method and apparatus upgraded to operation maintenance center&#39;s system
KR20160087280A (en) Method and system for providing integrated managing service based smart water grid
CN109686070B (en) Terminal automatic debugging method of electricity consumption information acquisition system, medium and equipment thereof
CN110210192A (en) Approaches to IM, device, equipment and readable storage medium storing program for executing
WO2017065818A1 (en) Selective delivery state change of valve of remote metering device
US20140075008A1 (en) Distributed Maintenance Mode Control
CN105577369B (en) A kind of the remote validation method, apparatus and system of credible evidence
CN114282194A (en) IT risk monitoring method and device and storage medium
CN105656724A (en) Monitoring method and system of server
Lal et al. Error and failure analysis of a unix server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant