CN103440168B - Method and system for program change - Google Patents

Method and system for program change Download PDF

Info

Publication number
CN103440168B
CN103440168B CN201310407418.XA CN201310407418A CN103440168B CN 103440168 B CN103440168 B CN 103440168B CN 201310407418 A CN201310407418 A CN 201310407418A CN 103440168 B CN103440168 B CN 103440168B
Authority
CN
China
Prior art keywords
program
change
terminal
risk
status data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310407418.XA
Other languages
Chinese (zh)
Other versions
CN103440168A (en
Inventor
郭会
孙志伟
丁利
陈小庆
王强
高文宏
黄婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN201310407418.XA priority Critical patent/CN103440168B/en
Publication of CN103440168A publication Critical patent/CN103440168A/en
Application granted granted Critical
Publication of CN103440168B publication Critical patent/CN103440168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention provides a method and a system for program change. The method comprises the following steps: a control terminal acquires state data of a program terminal, and performs a risk analysis on the state data, so as to obtain the risk grade of the program terminal; the control terminal adjusts an audit flow for a changed program for the program terminal in real time according to the risk grade, and audits a changed program according to the audit flow; the control terminal issues the audited changed program to the program terminal. The system specifically comprises an acquisition module, a risk module, a flow audit module and an issuing module; the acquisition module is used for acquiring the state data of the program terminal; the risk module is used for performing risk analysis on the state data, so as to obtain the risk grade of the program terminal; the flow audit module is used for adjusting the audit flow of the changed program for the program terminal in real time according to the risk grade, and auditing the changed program according to the audit flow; the issuing module is used for issuing the audited changed program to the program terminal.

Description

A kind of programing change method and system
Technical field
The present invention relates to technical field of data administration, particularly to a kind of programing change method and system.
Background technology
Developing rapidly with financial circles, current banking early has been achieved with the informationization of height, increasingly rich to meet Rich user's request.Informationalized banking system is in large scale, complex structure, and the requirement for security is extremely strict. So banking system is all passed through programing change and is constantly improved and optimize all the time.And the process of programing change is often silver The row system comparatively most sensitive process being also easiest to there is potential safety hazard, so the security strengthening programing change is particularly heavy Will.
So-called programing change is it is simply that the application program in terminal is due to demand response, change in resources, defect repair, system The various factors such as upgrading, and adaptability makes change or the process of modification.In prior art, each terminal needs voluntarily typing to become More information, and management server then needs according to normalized flow process, modification information to be audited, thus determining whether Terminal carries out programing change according to described modification information.Each terminal is according to the difference of its importance or risk, corresponding careful Core flow process is also different.
The defect of prior art is, the corresponding auditing flow of terminal generally presets it is impossible to change.If there is Lead to terminal importance or the special circumstances of risk change, prior art cannot be realized automatically adjusting its corresponding examination & verification stream Journey.
Content of the invention
In view of this, it is an object of the invention to provide a kind of programing change method and system, methods described is entered to terminal Row risk analysis, and then auditing flow is changed according to risk factor.
For achieving the above object, the present invention has a following technical scheme:
A kind of programing change method, the method comprising the steps of:
The status data of control end capture program terminal, and risk analysis are carried out to described status data, obtain program The risk class of terminal;
Control end changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and according to described Auditing flow is audited to change program;
Change program through examination & verification is published to program terminal by control end.
Described control end acquisition state data particularly as follows:
The status data of collection user's typing, the historical state data of acquisition control end storage or collection change status number According to.
Described status data particularly as follows:
Any one in trading volume, Ke Huliang, volatility, adjusted rate, history coefficient of stabilization, development risk parameter and risk assessment Item or any combination.
Described risk analysis are carried out to described status data, obtain the risk class of program terminal particularly as follows:
Formulate risk model, and status data is substituted in risk model, obtain risk class.
Described control end by through examination & verification change program be published to program terminal particularly as follows:
Control end obtains program and issues configuration, and described program is issued configuration and included, and issuing time, program terminal information, stops Only service list and unlatching service list;
Control end stops the service of this program terminal in issuing time using stopping service list;
Control end is with the original program of change program alternative program terminal through examination & verification;
Control end is using the service opening service list opening program terminal.
Described program is issued configuration and is also included checking information, then the described change program that will pass through examination & verification be published to program eventually End also includes:
So that, after the original program of change program alternative program terminal of examination & verification, input incoming message is to start friendship Easily, and obtain outgoing message;
Using described checking information, outgoing message is verified, if by checking, thinking that change program is issued into Work(.
Methods described also includes:
Flow process list is obtained by the auditing flow of described change program, according to flow process list, the examination & verification of change program is entered Monitoring ask by road wheel, then sends alarm to program terminal when this examination & verification and flow process list are not inconsistent.
Methods described also includes:
Audit statement is generated after change program is published to program terminal;
Described audit statement includes changing process, change quantity, illegal change item and unsuccessfully changes item.
A kind of programing change system, described system specifically includes:
Acquisition module, the status data of capture program terminal;
Risk module, for carrying out risk analysis to described status data, obtains the risk class of program terminal;
Flow process auditing module, changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and According to described auditing flow, change program is audited;
Release module, for being published to program terminal by the change program through examination & verification.
Described system also includes:
Monitoring module, for obtaining flow process list by the auditing flow of described change program, according to flow process list to change The examination & verification of more program is polled monitoring, and then sends alarm to control end and program terminal when this examination & verification and flow process list are not inconsistent.
As seen through the above technical solutions, the beneficial effect that the present invention exists is: achieves in running to program Terminal carries out the analysis of risk, and changes the auditing flow of its corresponding programing change accordingly;Realize each program terminal equal Still programing change can be completed according to rational flow process after risk situation change;Methods described makes the examination & verification of programing change More reasonable, meet actually used demand, also fully ensure security.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is embodiment of the present invention methods described flow chart;
Fig. 2 is system structure diagram described in the embodiment of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
In the prior art, the setting of the auditing flow of the judgement for program terminal risk class and programing change is all It is previously-completed, and there is not the change according to actual conditions, the mechanism of real time modifying adjustment.That is, existing skill The process of art Program change may be summarized to be following: the risk class of pre-set program terminal, and according to risk class phase The auditing flow of programing change should be formulated;According to auditing flow, change program is audited, and then change program is distributed to Program terminal.But aforesaid way flexibility poor it is impossible to program terminal actual conditions change change its risk class and Auditing flow.
Shown in Figure 1, it is a specific embodiment of the method for the invention.Method described in the present embodiment include with Lower step:
Step 101, the status data of control end capture program terminal, and risk analysis are carried out to described status data, Obtain the risk class of program terminal.
No matter whether program terminal had previously had the risk class of setting, and the present embodiment methods described is in program terminal During operation, it is required to the status data of capture program terminal, and carry out risk analysis.Due in running Program The state of terminal may change at any time, so its risk is likely to change therewith.For example, the transaction that certain program terminal is related to Amount increases substantially, beyond the scope estimated, then the actual risk facing in this program terminal necessarily increases it is likely that not Meet its original risk class again, that is, this program terminal will have the demand changing risk class.
In the present embodiment, the purpose of acquisition state data is the risk in order to evaluate certain programing change of a certain program terminal Property, so described status data all should be related with risk, so described gatherer process mainly includes three kinds of modes:
The status data of collection user's typing, such as risk assessment, that is, user is to the change program that this will be issued Risk self-appraisal;And become other data such as corresponding program terminal and change time;
The historical state data of acquisition control end storage, historical data is the Main Basiss of risk assessment, described history number According to can be that the trading volume of this program terminal, Ke Huliang, the history coefficient of stabilization of program terminal, development risk parameter (are such as developed The experience of personnel can abstract for this parameter) etc.;
Collection change status data, the described status data that becomes mainly is specific to this programing change, change degree Different certainty risks there is also difference;For example, certain programing change only changes a source code then inevitable risk is relatively low, And if more having treated 80% source code, risk is inevitable higher.So described change status data includes volatility and correction Rate.
After obtaining described status data, you can a risk model is formulated according to status data, according to described wind Dangerous model carries out the assessment of risk to status data.Risk model described in the present embodiment can table specific as follows:
Risk High In Low
Trading volume > 10,000,000 1000000~10,000,000 < 1,000,000
Client measures > 1,000,000 100000~1,000,000 < 100,000
Development risk parameter < 2 years experiences 2 years~4 years experiences 4 years experiences of >
Adjusted rate >1% 0.5%~1% <0.5%
History coefficient of stabilization > 5 faults 1~5 fault Fault-free
Table 1
Excessive risk item number Risk item number Low-risk item number Risk class
5 0 0 High
4 1 0 High
0 4 1 High
0 2 3 In
0 0 5 Low
Table 2
If the status data collecting a program terminal in the present embodiment shows: this program terminal trading volume 1500 Ten thousandth, client's amount 2,000,000, application developer possess 3 years experiences, the adjusted rate of program be 11.5%, this program terminal history occurs Cross 7 this fault.There are 4 excessive risk items in the status data then above-mentioned status data being brought in table 1 it is seen that this program terminal With 1 risk item.This conclusion is being substituted into table 2, if there is 4 excessive risk items and 1 risk item, then risk etc. Level is then assessed as " high ".
Step 102, control end change the auditing flow of program according to described risk class for program terminal real-time adjustment, and According to described auditing flow, change program is audited.
Its corresponding review process of the program terminal of different risk class is also different, and risk class is more high, audits Just more strict.The meaning that abovementioned steps evaluate risk class is that, learns the risk situation of program terminal in real time, so that real When for every kind of risk class, corresponding auditing flow is set, and also adjustment examination & verification accordingly is flowed when risk class change Journey.The emphasis of method described in the present embodiment is just, the examination & verification to programing change for the risk class being obtained according to abovementioned steps Flow process carries out real-time adjustment.Risk class due to obtaining in abovementioned steps is in order the current practical risk of terminal, institute So that matched auditing flow can be executed in this step so that the examination & verification of programing change is more reasonable accordingly, meet Actually used demand has also ensured security.
Described auditing flow is preserved with the text of xml form in control end, such as need to adjust auditing flow, you can Directly edlin is entered to corresponding xml document.
According to the risk model disclosed in the present embodiment, risk class is excessive risk, risk and low wind from low to high Danger, the auditing flow of corresponding programing change is rudimentary examination & verification, middle rank is audited and senior examination & verification.Rudimentary examination & verification only needs to by project The examination & verification node that manager controls authority completes to audit;Middle rank examination & verification is in addition to project manager's examination & verification node examination & verification in addition it is also necessary to upper one The examination & verification node that level line manager controls authority carries out review;Senior examination & verification, on the basis of middle rank examination & verification, adds further Upper level general manager controls authentication node and carries out last instance.
If script risk class is judged to risk for low-risk program terminal a in step 101, further by journey The corresponding auditing flow of sequence terminal a is adjusted to middle rank examination & verification by rudimentary examination & verification.In program terminal a typing during change program, that is, Flow process according to middle rank examination & verification is audited to change data.
In addition, being monitoring legal the carrying out of auditing flow in the present embodiment, also disclose following steps:
Step 1021, flow process list is obtained by the auditing flow of described change program, according to flow process list to change journey The examination & verification of sequence is polled monitoring, and then sends alarm to program terminal when this examination & verification and flow process list are not inconsistent.
Data sheet field Implication Citing
changeno Change numbering 201308250001
risklevel Risk class high
topmanagercheck General manager audits y/n
managercheck Line manager audits y/n
projectmanagercheck Project manager audits y/n
currentprocess Current procedures projectmanagercheck
processstarttime The current procedures time started 2013080240305
Table 3
Table 3 is the concrete form of described flow process list under the present embodiment medium or high risk level condition.Control end with reference to table 3 is The review process poll of one change program can be monitored, such as setting is polling cycle in 5 minutes, and control end is i.e. every 5 Minute monitors whether the actual examination & verification carrying out is consistent with flow specification;Can also monitor whether the time that current procedures carry out exceeds The time span of regulation, to avoid, mistake in auditing flow or examination & verification is delayed.But monitoring finds that actual examination & verification is present in The situation that flow process list is not inconsistent, then control end can be to program terminal transmission alarm, to take further remedial measure.
Change program through examination & verification is published to program terminal by step 103, control end.
When becoming after program passes through examination & verification, you can be published to program terminal that is, actual thrusts execution in program The change of program.The issuing process of described change program is specific as follows:
Step 1031, control end obtain program and issue configuration, and described program is issued configuration and included, and issuing time, program are eventually Client information, stopping service list, unlatching service list and checking information.
Step 1032, control end stop the service of this program terminal in issuing time using stopping service list.
As change program issued by need, then program terminal must stop all services first, and stopping service needing to utilize program Issue the stopping service list in configuration.Control end finds the program needing configuration processor change according to described program end message Terminal, and the service of terminal is made to shut down procedure in the issuing time arrival setting, start configuration processor change.
Step 1033, control end are with the original program of change program alternative program terminal through examination & verification.
This step is the actual execution of programing change, makes program terminal Program be replaced by redaction.
Step 1034, input incoming message, to start transaction, and obtain outgoing message, using described checking information to output Message is verified, if by checking, thinking that change program is issued successfully.
After programing change completes, also need further to verify whether this change is successful.Verification process need to be joined in advance Put checking information, that is, run the desired result of program after change.Call the program after change and input one to it Incoming message, program can produce an outgoing message accordingly;Contrast outgoing message and checking information, that is, judge output Whether message is consistent with previously desired result, if meeting, read-me changes successfully, has reached the effect of anticipation, no Then think failure.If changing unsuccessfully, equally alarm can be sent to program terminal, to take measures further.
Step 1035, control end are using the service opening service list opening program terminal.
After change terminates, restart the service of program terminal, the normal operation of recovery routine terminal.
Step 104, after change program is published to program terminal generate audit statement.
Described audit statement includes changing process, change quantity, illegal change item and unsuccessfully changes item.Reported by audit More visual and clear for change process can be represented by table to user.
As seen through the above technical solutions, the beneficial effect that the present embodiment methods described exists is: achieves and was running In journey, program terminal is carried out with the analysis of risk, and changes the auditing flow of its corresponding programing change accordingly;Realize each Program terminal all still can complete programing change according to rational flow process after risk situation change;Methods described makes calling program The examination & verification of change is more reasonable, meets actually used demand, has also fully ensured security.
Programing change method described in corresponding embodiment illustrated in fig. 1, discloses a kind of program accordingly and becomes in the present embodiment More system.Described system constructing control end described in the aforementioned embodiment.Method described in previous embodiment be based on as Lower system is achieved, and the two technical scheme is consistent in itself.System described in the present embodiment specifically includes following:
Acquisition module, the status data of capture program terminal.
In the present embodiment, the purpose of acquisition state data is the risk in order to evaluate certain programing change of a certain program terminal Property, so described status data all should be related with risk, so described gatherer process mainly includes typing collection Unit, history collecting unit and state acquisition unit, particularly as follows:
Typing collecting unit mainly gathers the status data of user's typing, such as risk assessment, and that is, user will to this The risk self-appraisal of the change program issued;And become other data such as corresponding program terminal and change time;
History collecting unit acquisition control end storage historical state data, historical data be risk assessment main according to Can be the trading volume of this program terminal, Ke Huliang, the history coefficient of stabilization of program terminal, development risk according to, described historical data Parameter (experience of such as developer can abstract for this parameter) etc.;
State acquisition unit collection change status data, the described status data that becomes mainly is specific to the change of this secondary program More, the different certainty risks of change degree there is also difference;For example, certain programing change only changes a source code and then must So risk is relatively low, and if more having treated 80% source code, risk is inevitable higher.So described change status data includes Volatility and adjusted rate.
Risk module, for carrying out risk analysis to described status data, obtains the risk class of program terminal.
After obtaining described status data, you can a risk model is formulated according to status data, according to described wind Dangerous model carries out the assessment of risk to status data.
Flow process auditing module, changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and According to described auditing flow, change program is audited.
Its corresponding review process of the program terminal of different risk class is also different, and risk class is more high, audits Just more strict.The meaning that abovementioned steps evaluate risk class is that, learns the risk situation of program terminal in real time, so that real When for every kind of risk class, corresponding auditing flow is set, and also adjustment examination & verification accordingly is flowed when risk class change Journey.The emphasis of method described in the present embodiment is just, the examination & verification to programing change for the risk class being obtained according to abovementioned steps Flow process carries out real-time adjustment.Risk class due to obtaining in abovementioned steps is in order the current practical risk of terminal, institute So that matched auditing flow can be executed in this step so that the examination & verification of programing change is more reasonable accordingly, meet Actually used demand has also ensured security.
Described auditing flow is preserved with the text of xml form in control end, such as need to adjust auditing flow, you can Directly edlin is entered to corresponding xml document.
Monitoring module, for obtaining flow process list by the auditing flow of described change program, according to flow process list to change The examination & verification of more program is polled monitoring, and then sends alarm to control end and program terminal when this examination & verification and flow process list are not inconsistent.
Release module, for being published to program terminal by the change program through examination & verification.
When becoming after program passes through examination & verification, you can be published to program terminal that is, actual thrusts execution in program The change of program.Described release module specifically includes:
Dispensing unit, it is used for obtaining program and issues configuration, described program is issued configuration and included, issuing time, program terminal Information, stopping service list, unlatching service list and checking information.
Stop service unit, be used for stopping the service of this program terminal in issuing time using stopping service list.
As change program issued by need, then program terminal must stop all services first, and stopping service needing to utilize program Issue the stopping service list in configuration.Stopping service unit finding according to described program end message needs configuration processor to change Program terminal, and reach in the issuing time setting and make to shut down procedure the service of terminal, start configuration processor change.
Replacement unit, the original program of change program alternative program terminal for being audited with process.
This step is the actual execution of programing change, makes program terminal Program be replaced by redaction.
Authentication unit, it is used for inputting incoming message to start transaction, and obtain outgoing message, using described checking information pair Outgoing message is verified, if by checking, thinking that change program is issued successfully.
After programing change completes, also need further to verify whether this change is successful.Verification process need to be joined in advance Put checking information, that is, run the desired result of program after change.Call the program after change and input one to it Incoming message, program can produce an outgoing message accordingly;Contrast outgoing message and checking information, that is, judge output Whether message is consistent with previously desired result, if meeting, read-me changes successfully, has reached the effect of anticipation, no Then think failure.If changing unsuccessfully, equally alarm can be sent to program terminal, to take measures further.
Open service unit, the service for utilizing unlatching service list opening program terminal.
After change terminates, restart the service of program terminal, the normal operation of recovery routine terminal.
The beneficial effect that system described in the present embodiment exists is: achieves and carries out risk to program terminal in running Analysis, and change the auditing flow of its corresponding programing change accordingly;Realizing each program terminal all can be in risk feelings Still programing change is completed according to rational flow process after condition change;Methods described makes the examination & verification of programing change more reasonable, full The actually used demand of foot, has also fully ensured security.
The above is only the preferred embodiment of the present invention it is noted that ordinary skill people for the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (9)

1. a kind of programing change method is it is characterised in that the method comprising the steps of:
The status data of control end capture program terminal, and risk analysis are carried out to described status data, obtain program terminal Risk class;
Control end changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and according to described examination & verification Flow process is audited to change program;
Change program through examination & verification is published to program terminal by control end;
Wherein, described control end acquisition state data particularly as follows:
The status data of collection user's typing, the historical state data of acquisition control end storage or collection change status data;
Described status data is all relevant with risk.
2. according to claim 1 method it is characterised in that described status data particularly as follows:
In trading volume, Ke Huliang, volatility, adjusted rate, history coefficient of stabilization, development risk parameter and risk assessment any one or Any combination.
3. method, it is characterised in that described carry out risk analysis to described status data, obtains according to claim 2 The risk class of program terminal particularly as follows:
Formulate risk model, and status data is substituted in risk model, obtain risk class.
4. method is published to journey it is characterised in that described control end will pass through the change program audited according to claim 1 Sequence terminal particularly as follows:
Control end obtains program issue configuration, and described program is issued configuration and included, issuing time, program terminal information, stopping clothes Business list and unlatching service list;
Control end stops the service of this program terminal in issuing time using stopping service list;
Control end is with the original program of change program alternative program terminal through examination & verification;
Control end is using the service opening service list opening program terminal.
5. method also includes checking information it is characterised in that described program issues configuration according to claim 4, then described Change program through examination & verification is published to program terminal also include:
After with the original program of change program alternative program terminal through auditing, input incoming message to start transaction, and Obtain outgoing message;
Using described checking information, outgoing message is verified, if by checking, thinking that change program is issued successfully.
6. according to claim 1 method it is characterised in that methods described also includes:
Flow process list is obtained by the auditing flow of described change program, road wheel is entered to the examination & verification of change program according to flow process list Ask monitoring, then send alarm to program terminal when this examination & verification and flow process list are not inconsistent.
7. according to claim 1 method it is characterised in that methods described also includes:
Audit statement is generated after change program is published to program terminal;
Described audit statement includes changing process, change quantity, illegal change item and unsuccessfully changes item.
8. a kind of programing change system is it is characterised in that described system specifically includes:
Acquisition module, the status data of capture program terminal;
Risk module, for carrying out risk analysis to described status data, obtains the risk class of program terminal;
Flow process auditing module, changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and according to Described auditing flow is audited to change program;
Release module, for being published to program terminal by the change program through examination & verification;
Wherein, described acquisition module capture program terminal status data particularly as follows:
The status data of collection user's typing, the historical state data of acquisition control end storage or collection change status data;
Described status data is all relevant with risk.
9. according to claim 8 system it is characterised in that described system also includes:
Monitoring module, for obtaining flow process list by the auditing flow of described change program, according to flow process list to change journey The examination & verification of sequence is polled monitoring, and then sends alarm to control end and program terminal when this examination & verification and flow process list are not inconsistent.
CN201310407418.XA 2013-09-09 2013-09-09 Method and system for program change Active CN103440168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310407418.XA CN103440168B (en) 2013-09-09 2013-09-09 Method and system for program change

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310407418.XA CN103440168B (en) 2013-09-09 2013-09-09 Method and system for program change

Publications (2)

Publication Number Publication Date
CN103440168A CN103440168A (en) 2013-12-11
CN103440168B true CN103440168B (en) 2017-01-18

Family

ID=49693858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310407418.XA Active CN103440168B (en) 2013-09-09 2013-09-09 Method and system for program change

Country Status (1)

Country Link
CN (1) CN103440168B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105590056B (en) 2014-10-22 2019-01-18 中国银联股份有限公司 Dynamic application function control method based on environment measuring
CN107679749B (en) * 2017-09-30 2021-05-25 新奥(中国)燃气投资有限公司 Authority application approval method and authorization management platform
CN110046784A (en) * 2018-12-14 2019-07-23 阿里巴巴集团控股有限公司 A kind of risk of user's access determines method and device
CN111324370B (en) * 2020-02-19 2022-10-18 支付宝(杭州)信息技术有限公司 Method and device for carrying out risk processing on to-be-on-line small program
CN113238994A (en) * 2021-05-17 2021-08-10 上海中通吉网络技术有限公司 Report file management and publishing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101000667A (en) * 2006-01-12 2007-07-18 鸿富锦精密工业(深圳)有限公司 System and method of dynamic examining procedure
CN101616018A (en) * 2008-06-27 2009-12-30 中兴通讯股份有限公司 The method of upgrading network management software and device
CN101673366A (en) * 2008-09-10 2010-03-17 北京正辰科技发展有限责任公司 It service management technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101000667A (en) * 2006-01-12 2007-07-18 鸿富锦精密工业(深圳)有限公司 System and method of dynamic examining procedure
CN101616018A (en) * 2008-06-27 2009-12-30 中兴通讯股份有限公司 The method of upgrading network management software and device
CN101673366A (en) * 2008-09-10 2010-03-17 北京正辰科技发展有限责任公司 It service management technology

Also Published As

Publication number Publication date
CN103440168A (en) 2013-12-11

Similar Documents

Publication Publication Date Title
US11741105B2 (en) Intelligent remote monitoring method for fire-fighting
CN103440168B (en) Method and system for program change
CA2874189C (en) Cyber security analzer
AU2011255477B2 (en) Bug clearing house
CN108492092A (en) A kind of bidding management system and method
CN109460223A (en) A kind of API gateway management system and its method
CN105978147B (en) The long-range fixed value modification system of automatic safety device based on file interaction
CN104471500A (en) Method and system for real-time performance recovery advisory for centrifugal compressors
CN101321084A (en) Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining
US10015329B2 (en) Information management apparatus, information management method, and information device
US11490176B2 (en) Selective delivery state change of valve of remote metering device
CN106096960A (en) The method and apparatus of the outside payment system of monitoring and method of payment and system
CN109656184A (en) A kind of household electrical appliances fault diagnosis method and system, intelligent appliance and Daemon maintenance terminal
CN104750095B (en) Regulation and control center inspection pilot system and method
CN106059841A (en) Method for monitoring deployed middleware
KR101663504B1 (en) Method and system for providing integrated managing service based smart water grid
CN109766239A (en) Log output control method, system and computer readable storage medium
JP2019512812A (en) Virtual Market for Distributed Tools in an Enterprise Environment
CN110210192A (en) Approaches to IM, device, equipment and readable storage medium storing program for executing
US20140075008A1 (en) Distributed Maintenance Mode Control
CN105656724A (en) Monitoring method and system of server
CN105072198A (en) B/S-mode-based PC monitoring system and method
CN107634939A (en) A kind of fuzz testing method and system for being applied to 376.1 protocol security defects detections
CN110430095A (en) A kind of cyberspace server monitoring method and system
Du Plessis et al. Results from implementing a remote diagnostic and maintenance solution on energy management systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant