CN101931544A - Method and system for identifying unauthorized amendment of website content - Google Patents

Method and system for identifying unauthorized amendment of website content Download PDF

Info

Publication number
CN101931544A
CN101931544A CN2009100533490A CN200910053349A CN101931544A CN 101931544 A CN101931544 A CN 101931544A CN 2009100533490 A CN2009100533490 A CN 2009100533490A CN 200910053349 A CN200910053349 A CN 200910053349A CN 101931544 A CN101931544 A CN 101931544A
Authority
CN
China
Prior art keywords
website
task
group
content
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100533490A
Other languages
Chinese (zh)
Inventor
郭诺
郭剑波
许晨光
纪明敏
汪海强
张红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI JIDIXIONG SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI JIDIXIONG SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI JIDIXIONG SOFTWARE TECHNOLOGY Co Ltd filed Critical SHANGHAI JIDIXIONG SOFTWARE TECHNOLOGY Co Ltd
Priority to CN2009100533490A priority Critical patent/CN101931544A/en
Publication of CN101931544A publication Critical patent/CN101931544A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method and a system for identifying unauthorized amendment of website content. The method and the system meet the monitoring requirement for unauthorized amendment of contents of a website group on a large scale; all kinds of alarming, switching, blocking and other operation can be linked by automatic discovery action and automatic trigger action of a monitoring centre; and thus the method and the system play active roles in improving protection of information security, particularly preventing unauthorized falsification action. The technical scheme comprises the steps of: examining a group of web pages; performing iterative operation on a logic expression defined by an entire group of tasks based on the change of each web page, accordance with a key word, expression examination conditions and the like serving as basic data; and triggering a linkage module according to the logic operation return valve to fulfill the aim of commanding network equipment or service to make corresponding action. The method and the system are used for the field of networks.

Description

A kind of method and system of discerning unauthorized amendment of website content
Technical field
The present invention relates to the technology of web portal security operation, relate in particular to a kind of method and system of realizing monitoring and discern the unauthorized amendment of web site contents.
Background technology
The operation of a website, for the website of some key sectors, have authority owing to release news, seriousness, uniqueness and do not allow basic demand such as distorting property, simultaneously, the continuous availability of these websites also is the focus that various circles of society pay close attention to, and for these vital websites, how to accomplish whether unauthorized amendment of monitoring and identification web site contents, be discovering of being distorted of website, just become current numerous website thorny problem that runs in service.The tamper resistant systems of current use, implementation method is numerous, but need to install corresponding software or hardware mostly, these are soft, hardware device is by certain pre-stored technology, various alignment algorithm technology, watermark recognition technology or the like, realize discovering of other content tampering of each grade, driving various isolation, recovery and emergent content afterwards the operation of technological system such as provides, and finishes relevant work.These systems are because real time execution, or parallel operation work, or become whole webpage and output to a part in the whole process of user browser, increase cost cost soft, that computer hardware drops into from needs, cost to the software and hardware consume system resources, and increasing time waiting cost that equipment placing space cost and user pay etc. in obtaining the content process, the degree of all having nothing in common with each other is gesture slightly, therefore can not realize widespread adoption.
Summary of the invention
The objective of the invention is to address the above problem, a kind of method and system of realizing the monitoring unauthorized amendment of website content of low cost, widespread adoption is provided.
Another object of the present invention is to provide a kind of method that realizes website disaster-tolerating and error-tolerating and anti-tamper operation.
Technical scheme of the present invention is: the present invention has disclosed a kind of method of discerning unauthorized amendment of website content, comprise: a website Surveillance center, carry out one group of plural webpage according to preset rule and check task, at the attribute that has obtained each webpage, state, content-data, and after the logic determines value that whether changes of described data, again according to carrying out logical operation at the logical operation rule of this group task, this logical operation return value triggers carries out follow-up program, or externally sends out corresponding instruction.
The method of above-mentioned identification unauthorized amendment of website content, wherein, website Surveillance center checks in the group task process, attribute, content, state to each different web pages are done data record, and this record comprises: file attribute, return state, connection availability, read availability, web page contents value, file size, special key words occurs, certain content etc. occurs.Surveillance center compares the data record of this data record and last stored, analyze, judge, thereby obtains the logic determines value that whether changes of these records.
The method of above-mentioned identification unauthorized amendment of website content, wherein, website Surveillance center is according to the data record and the logic determines value of each webpage, carries out the computing of the logical expression of explaining at this group task once more, and the success of this group inspection task or the logical value of failure are returned in this computing.This logical operation value is determined different down-stream operations or is externally sent command adapted thereto.
The method of above-mentioned identification unauthorized amendment of website content, wherein, this monitoring operational system has the triggering following program running and externally sends the ability of instruction, comprise: can start the operation local program, or make it to start operation, or connect a network address and port to make it to make operation response etc. by the program that network connects non-machine.
The present invention has placed whole Surveillance center to check the outermost layer of task flow incident owing to logical relation and logical operation, therefore can be combined into a lot of schemes according to various return values, is used for the normal and improper relation of identification.Then the processing of triggering following incident.
The present invention has also disclosed a kind of system that discerns unauthorized amendment of website content, comprising:
More than one website monitoring scanning node system, this website monitoring scanning node is carried out one group of plural webpage according to preset rule and is checked task, at the attribute that has obtained each webpage, state, content-data, and after the logic determines value that whether changes of described data, again according to carrying out logical operation at the logical operation rule of this group task definition, this logical operation return value triggers carries out follow-up blas, or externally sends out corresponding instruction.A task distribution management center system is used for set task queue, is distributed in each scanning node system, and is used to collect and respectively scans the scan-data that node returns, and comprising: gather, analysis, tabulated data, drafting figure are released, form etc.
A Message Processing center is used for combined data, through checking the non-wrong report of action of confirming trigger notice or order, triggers the corresponding apparatus interlock then, and the work that triggers personnel's alarm notification modules such as Email, phone, note.
Above-mentioned a kind of system that discerns unauthorized amendment of website content, wherein, website monitoring scanning node is in the group task process of inspection, attribute, content, state to each different web pages keep a record, and these record data comprise: file attribute, return state, connection availability, read availability, web page contents value, file size, special key words occurs, certain content etc. occurs.This monitor node is these inspection data that task keeps a record simultaneously, and the respective record of being stored when carrying out this inspection task last time compares, analyzes, judges, thereby obtains the logic determines value that whether changes of these records.
Above-mentioned a kind of website monitoring scanning node of discerning the system of unauthorized amendment of website content, after affiliated record numerical value that has obtained each webpage and the logic determines value that whether changes, again according to the logical expression that defines at this group task, calculate the logic return value of this group inspection task, this logical operation return value is determined to trigger different down-stream operations, or externally sends out command adapted thereto.
Above-mentioned a kind of system that discerns unauthorized amendment of website content, monitoring scanning node or Message Processing centronucleus to data after, have according to program running of logical operation return value triggering following and the external ability that sends instruction, comprise: can start the operation local program, or make it to start operation, or connect a network address and port to make it to make operation response etc. by the program that network connects non-machine.
The present invention contrasts prior art following beneficial effect: the present invention carries out by the task of checking the website operation conditions, in this checking process, work as and webpage occurs by unauthorized amendment, and (power failure during all kinds of other fault, network failure, the hardware facility fault, the software program fault, human failure in the website maintenance, website high capacity operation and system crash, the website suffers assault, natural calamity etc.) can in time discover problem, and triggering respective inner, the operation of external program operation or equipment, stop service to finish, switch and enable standby service, or be DNS and drift about, or equipment done the distribute work again of various IP address, thereby make (or one a group) website can keep operation continuously and the least possible show fault and mistake to the visitor.This programme preferably resolves the important department website that is arranged in wide area network to anti-tamper, fault-tolerant, disaster tolerance and the emergency guarantee demand that proposes of operation continuously.
Description of drawings
Fig. 1 is a kind of general introduction figure that discerns the preferred embodiment of unauthorized amendment of website content method of the present invention.
Fig. 2 is the general introduction figure of the another kind of embodiment of the present invention's method of discerning unauthorized amendment of website content.
Fig. 3 is the schematic flow sheet of the unauthorized method for updating in identification of the present invention website.
Fig. 4 is a kind of preferred embodiment general introduction figure that discerns the system of the unauthorized renewal in website of the present invention.
Fig. 5 is a kind of preferred embodiment flow chart of discerning the unauthorized method for updating in website of the present invention.
Embodiment
The invention will be further described below in conjunction with drawings and Examples.
Fig. 1 shows the embodiment general introduction figure that realizes finding automatically the unauthorized renewal in website:
The S101 of Surveillance center independently is provided with and moves, by various means one web pages is grasped and analyzes, and then obtain attribute, state and the web page contents of one group of correspondence, when the inspection task of agreement is carried out, can obtain easily as final updating time, file size, server return state, and complete webpage content etc., compare by the corresponding data of last time when checking with storage, can obtain the logical value whether this website has been updated easily, promptly upgrade and the judgment value of not upgrading.
Another inspection task gets access to the content in certain webpage that is in other equipment or agreement network address simultaneously, this content can be analyzed and extract one group of numerical value, numerical value can be the combination of a current time value and a time segment value, when promptly preparing to upgrade, need land an authentication center, authentication center generates certain webpage that comprises these two numerical value automatically, and these two values have just been finished the time period declaration that when begins update content and need how long finish, this inspection task calculates a time segment value with these two numerical value, and compare with the current standard time, if the standard time exceeds this during scope dictates time period, then the web site contents that is checked through of this subtask is updated to unauthorized renewal, otherwise the legal renewal for declaring.
By the judgement of these set logics, when being judged as illegal renewal, trigger S102 then, begin to switch the work IP address of this website among the DNS.
Dns server S103 begins to do newly the work IP address declaration of unit of the whole network, finishes the change of respective record in the whole network DNS CACHE server and provides these resolution datas to the visitor.
Visitor S104 begins to visit the WEB service that emergent alternate device provides by obtaining new IP address, and the website of being distorted, after these a series of triggerings and IP drift process, will be isolated by essence, new user will be not be distorted content obtaining by this website of domain name access.
About working mechanism, the principle of DNS, it is a lot of and support it and provide equipment of the whole network service also numerous to relate to content, only does the description of general principles here, and its operational detail technology has exceeded the scope that this patent is described content, repeats no more here.
Fig. 2 shows the general introduction figure that realizes finding automatically another embodiment of the unauthorized renewal in website:
The S201 of Surveillance center independently is provided with and moves, by various means one web pages is grasped and analyzes, and then obtain attribute, state and the web page contents of one group of correspondence, when the inspection task of agreement is carried out, can obtain easily as final updating time, file size, server return state, and complete webpage content etc., compare by the corresponding data of last time when checking with storage, can obtain the logical value whether this website has been updated easily, promptly upgrade and the judgment value of not upgrading.
Another inspection task gets access to certain content of pages that is in this TV station equipment or the network address simultaneously, this content can extract certain numerical value, the appearance of this numerical value indicates that preparing normal authorization upgrades, and if do not find this agreement numerical value would think this more new behavior be the illegal renewal of not doing declaration.
By the judgement of these set logics, when judging illegal renewal, trigger S202 then, the announcement server headend equipment begins blocking-up or switch operating server.
Therefore visitor S203 begins to obtain the web site contents do not distorted, or is blocked visit and has distorted content etc.
Fig. 3 shows the workflow schematic diagram of realizing the unauthorized method for updating in identification website:
Step S301 Surveillance center starts a group task, after doing necessary numerical value filling, enter step S302 and judge scan task formation implementation status, when judging that scan task is not finished in addition, enter step S303 and carry out the scanography task, otherwise enter full The Logic of Tasks computing and determining step S307.
Step S303 finishes the scanography work of an independent task, and this includes but not limited to: attempt the record connectivity, downloading page content, performance computing, do any type of coding arrangement and computing.
Step S304 uses the current content that downloads to, carry out doing the keyword inspection or doing the analysis of some content and link and usability analyses etc. according to predefined expression formula, and the storage data when using data such as current content, state, attribute and last scan, according to the logic analysis etc. that compares of predefined expression formula, obtain logical consequence as: whether upgrade, whether find certain keyword, whether have head to return mistake, whether link error or the like is arranged.
The content that step S305 gets access to certain format or code storage, state, attribute and logic determines data etc., the usefulness of the computing that compares when just scan next time.
Enter step S302 afterwards, begin to circulate and carry out the scanning step of next task.When all scan tasks finish, begin to enter step S307 and do logical expression computing at whole task flow, this part computing will use the analysis data of step S304 to each page, step S307 computing includes but not limited to: whether the content of certain two page is in full accord, whether certain page successfully obtains content, whether certain page has link error, whether certain page meaningful inspection mistake, whether certain page returns the head attribute error, whether the numerical value that goes out with the content analysis of certain page is consistent with system time or in a time interval or the like, these carry out the logical operation of an integration to the data that adhere to the page separately, to obtain a logical value at step S308 returns, i.e. " very " or " vacation ", and this logical value will trigger the execution of corresponding thereafter two groups of programs or instruction set step S309 or step S310.
Step S309 and step S310 can be any program that presets, order or instruction set, and this program, order or instruction set are positioned at triggering in local machine or remote equipment and procedure service, make it to make response etc.
Fig. 4 shows a kind of preferred embodiment flow chart of discerning the system of the unauthorized renewal in website:
Task distribution and administrative center S401, be used for operational administrative scan tasks such as the user adds, deletes, stops, task distribution and administrative center are user's scan task and various definition is set, and operation behavior be distributed to dispersion each scanning node module on, scan task is moved to the mode of the whole network with load balancing.
One group of scanning work node S402 initiates poll or inspection regularly at every group task, scanning system is according to attribute, state, data to each webpage in the group task, and this webpage corresponding data of last scan storage, according to expression formula computational logic return value or calculate evaluation data based on certain algorithm, again this data iteration is gone into logical expression computing at this group scan task, draw the logic return value, when having triggered corresponding notification command according to this logic return value of definition, the scanning node is with the rapid reporting message processing center of this notification command.
After the S403 combined data of Message Processing center, confirm that through checking this triggers the non-wrong report of action, trigger the corresponding apparatus interlock then, and the work that triggers personnel's alarm notification modules such as Email, phone, note.
A kind of preferred embodiment flow chart of discerning the unauthorized method for updating in website that Fig. 5 shows:
Surveillance center implements the inspection of a group task, and S501 finishes the inspection to each webpage, and writes down attribute, state, content under it and the judgment value of whether upgrading.
Based on the data that S501 obtains, in S502, do the interative computation of checking the logical operation expression formula of task definition at whole group, obtains one at the whether qualified judgement of this task, according to the corresponding follow-up work of this judgement triggering.
The relevant work of S503 for triggering comprises: the response and the action of the triggering of alarm module, the driving of equipment, remote service and equipment, the perhaps combination in any of these work.
The foregoing description provides to those of ordinary skills and realizes or use of the present invention; those of ordinary skills can be under the situation that does not break away from invention thought of the present invention; the foregoing description is made various modifications or variation; thereby protection scope of the present invention do not limit by the foregoing description, and should be the maximum magnitude that meets the inventive features that claims mention.

Claims (12)

1. method of discerning unauthorized amendment of website content, comprise: a website Surveillance center, carry out one group of plural webpage according to preset rule and check task, at the attribute that has obtained each webpage, state, content-data, and after the logic determines value that whether changes of described data, again according to carrying out logical operation at the logical operation rule of this group task definition, this logical operation return value triggers and carries out follow-up order, program, externally sends out dispatch command or any one combination.
2. a kind of method of discerning unauthorized amendment of website content according to claim 1, it is characterized in that, website Surveillance center checks in the group task process, attribute, content, state to each different web pages keep a record, and these records comprise: file attribute, return state, connection availability, read availability, web page contents value, file size, special key words occurs, certain content etc. occurs.
3. a kind of method of discerning unauthorized amendment of website content according to claim 1, it is characterized in that, website Surveillance center checks data such as the attribute that write down affiliated webpage in the group task process, content, state, simultaneously with these inspection data that task keeps a record, the respective record of being stored when carrying out this inspection task last time compares, analyzes, judges, thereby obtains the logic determines value that whether changes of these records.
4. a kind of method of discerning unauthorized amendment of website content according to claim 1, it is characterized in that, website Surveillance center uses the affiliated record numerical value of each webpage and the logic determines value that whether changes, according to the logical expression that defines at this group task, calculate the logic return value of this group inspection task again.
5. a kind of method of discerning unauthorized amendment of website content according to claim 1, it is characterized in that, website Surveillance center carries out subsequent commands, program, externally sends out dispatch command or any one combination according to this logical operation return value after the logic return value that calculates this group inspection task.
6. a kind of method of discerning unauthorized amendment of website content according to claim 1, it is characterized in that, this Surveillance center has according to the logical operation return value, trigger operation subsequent commands, program and externally send the ability of dispatch command, comprising: action command, start the local program operation, the program that connects non-machine by network makes it to start operation, connect a network address and port to make it to make operation response, driving arrangement etc.
7. system that discerns unauthorized amendment of website content comprises:
More than one website monitoring scanning node, this website monitoring scanning node is carried out one group of plural webpage according to preset rule and is checked task, at the attribute that has obtained each webpage, state, content-data, and after the logic determines value that whether changes of described data, again according to carrying out logical operation at the logical operation rule of this group task definition, this logical operation return value triggers and carries out follow-up order, working procedure, externally sends out dispatch command or any one combination.
More than one task distribution management center is used for task queue is distributed to each scanning node system, and is used to collect the data that the scanning node returns, and comprising: gather, check data, drafting figure releases, form etc.
8. a kind of system that discerns unauthorized amendment of website content according to claim 7, it is characterized in that, website monitoring scanning node is checked in the group task process, attribute, content, state to each different web pages keep a record, and these records comprise: file attribute, return state, connection availability, read availability, web page contents value, file size, special key words occurs, certain content etc. occurs.
9. a kind of system that discerns unauthorized amendment of website content according to claim 7, it is characterized in that, website monitoring scanning node is checked data such as the attribute that write down affiliated webpage in the group task process, content, state, simultaneously with these inspection data that task keeps a record, the respective record of being stored when carrying out this inspection task last time compares, analyzes, judges, thereby obtains the logic determines value that whether changes of these records.
10. a kind of system that discerns unauthorized amendment of website content according to claim 7, it is characterized in that, website monitoring scanning node uses the affiliated record numerical value of each webpage and the logic determines value that whether changes, according to the logical expression that defines at this group task, calculate the logic return value of this group inspection task again.
11. a kind of system that discerns unauthorized amendment of website content according to claim 7, it is characterized in that, website monitoring scanning node is determined the follow-up order of execution, program, is externally sent out dispatch command or any one combination according to this logical operation return value after the logic return value that calculates this group inspection task.
12. a kind of system that discerns unauthorized amendment of website content according to claim 7, it is characterized in that, this monitoring scanning node or task distribution management center, have according to the logical operation return value and trigger operation subsequent commands, program, the external ability that sends instruction, comprise: action command, start the operation local program, the program that connects non-machine by network makes it to start operation, connects a network address and port to make it to make operation response, driving arrangement etc.
CN2009100533490A 2009-06-18 2009-06-18 Method and system for identifying unauthorized amendment of website content Pending CN101931544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100533490A CN101931544A (en) 2009-06-18 2009-06-18 Method and system for identifying unauthorized amendment of website content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100533490A CN101931544A (en) 2009-06-18 2009-06-18 Method and system for identifying unauthorized amendment of website content

Publications (1)

Publication Number Publication Date
CN101931544A true CN101931544A (en) 2010-12-29

Family

ID=43370480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100533490A Pending CN101931544A (en) 2009-06-18 2009-06-18 Method and system for identifying unauthorized amendment of website content

Country Status (1)

Country Link
CN (1) CN101931544A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124430A (en) * 2017-06-08 2017-09-01 腾讯科技(深圳)有限公司 Pagejack monitoring method, device, system and storage medium
CN109634637A (en) * 2018-12-17 2019-04-16 奇瑞汽车股份有限公司 A kind of PDM system and BOM multi version CAD data disparity comparative approach
CN109783306A (en) * 2018-11-27 2019-05-21 宝付网络科技(上海)有限公司 Respond the processing method of operating and system of alarm
CN110191515A (en) * 2014-12-19 2019-08-30 上海朗帛通信技术有限公司 A kind of method and apparatus of LAA communication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004032103A (en) * 2002-06-21 2004-01-29 Ntt Docomo Tokai Inc Network system and server switching method
CN101261630A (en) * 2008-04-22 2008-09-10 郭诺 Method and device for checking information content in network service of independently publishing information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004032103A (en) * 2002-06-21 2004-01-29 Ntt Docomo Tokai Inc Network system and server switching method
CN101261630A (en) * 2008-04-22 2008-09-10 郭诺 Method and device for checking information content in network service of independently publishing information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张磊等: "一种网页防篡改的系统模型", 《武汉大学学报(理学版)》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191515A (en) * 2014-12-19 2019-08-30 上海朗帛通信技术有限公司 A kind of method and apparatus of LAA communication
CN110191515B (en) * 2014-12-19 2022-06-17 上海朗帛通信技术有限公司 LAA communication method and device
CN107124430A (en) * 2017-06-08 2017-09-01 腾讯科技(深圳)有限公司 Pagejack monitoring method, device, system and storage medium
CN107124430B (en) * 2017-06-08 2021-07-06 腾讯科技(深圳)有限公司 Page hijacking monitoring method, device, system and storage medium
CN109783306A (en) * 2018-11-27 2019-05-21 宝付网络科技(上海)有限公司 Respond the processing method of operating and system of alarm
CN109634637A (en) * 2018-12-17 2019-04-16 奇瑞汽车股份有限公司 A kind of PDM system and BOM multi version CAD data disparity comparative approach
CN109634637B (en) * 2018-12-17 2021-11-02 奇瑞汽车股份有限公司 PDM system and BOM multi-version CAD data geometric difference comparison method

Similar Documents

Publication Publication Date Title
US8499331B1 (en) Policy based network compliance
CN100417081C (en) Method, system for checking and repairing a network configuration
US20080148398A1 (en) System and Method for Definition and Automated Analysis of Computer Security Threat Models
US8624720B2 (en) Security infrastructure
CN103685575A (en) Website security monitoring method based on cloud architecture
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
CN105868914A (en) Cloud management system and management method of automobile electronic health archive
CN113515433A (en) Alarm log processing method, device, equipment and storage medium
CN102859505B (en) The management method of management system and computer system
CN102906756A (en) Security threat detection associated with security events and actor category model
US20210182766A1 (en) Addressable smart agent data technology to detect unauthorized transaction activity
US8374320B2 (en) Environment information transmission method, service controlling system, and computer product
CN101931544A (en) Method and system for identifying unauthorized amendment of website content
CN112419130A (en) Emergency response system and method based on network security monitoring and data analysis
US20180300199A1 (en) System and method for maintaining the health of a machine
CN114625074A (en) Safety protection system and method for DCS (distributed control System) of thermal power generating unit
CN112949798B (en) Laboratory equipment management method and system based on RFID technology
CN112291264A (en) Safety control method and device
CN104104666B (en) Method of detecting abnormal cloud service and device
CN103795585A (en) Method and system for monitoring website based on black list
JP6636605B1 (en) History monitoring method, monitoring processing device, and monitoring processing program
KR101973728B1 (en) Integration security anomaly symptom monitoring system
CN113328996B (en) Intelligent security policy configuration method based on target perception
CN113360354A (en) User operation behavior monitoring method, device, equipment and readable storage medium
CN112291263A (en) Data blocking method and device

Legal Events

Date Code Title Description
DD01 Delivery of document by public notice

Addressee: Zhang Hong

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Shanghai Jidixiong Software Technology Co., Ltd.

Document name: Notification of Publication of the Application for Invention

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Shanghai Jidixiong Software Technology Co., Ltd.

Document name: the First Notification of an Office Action

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101229