CN103440168B - Method and system for program change - Google Patents
Method and system for program change Download PDFInfo
- Publication number
- CN103440168B CN103440168B CN201310407418.XA CN201310407418A CN103440168B CN 103440168 B CN103440168 B CN 103440168B CN 201310407418 A CN201310407418 A CN 201310407418A CN 103440168 B CN103440168 B CN 103440168B
- Authority
- CN
- China
- Prior art keywords
- program
- change
- terminal
- risk
- status data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The embodiment of the invention provides a method and a system for program change. The method comprises the following steps: a control terminal acquires state data of a program terminal, and performs a risk analysis on the state data, so as to obtain the risk grade of the program terminal; the control terminal adjusts an audit flow for a changed program for the program terminal in real time according to the risk grade, and audits a changed program according to the audit flow; the control terminal issues the audited changed program to the program terminal. The system specifically comprises an acquisition module, a risk module, a flow audit module and an issuing module; the acquisition module is used for acquiring the state data of the program terminal; the risk module is used for performing risk analysis on the state data, so as to obtain the risk grade of the program terminal; the flow audit module is used for adjusting the audit flow of the changed program for the program terminal in real time according to the risk grade, and auditing the changed program according to the audit flow; the issuing module is used for issuing the audited changed program to the program terminal.
Description
Technical field
The present invention relates to technical field of data administration, particularly to a kind of programing change method and system.
Background technology
Developing rapidly with financial circles, current banking early has been achieved with the informationization of height, increasingly rich to meet
Rich user's request.Informationalized banking system is in large scale, complex structure, and the requirement for security is extremely strict.
So banking system is all passed through programing change and is constantly improved and optimize all the time.And the process of programing change is often silver
The row system comparatively most sensitive process being also easiest to there is potential safety hazard, so the security strengthening programing change is particularly heavy
Will.
So-called programing change is it is simply that the application program in terminal is due to demand response, change in resources, defect repair, system
The various factors such as upgrading, and adaptability makes change or the process of modification.In prior art, each terminal needs voluntarily typing to become
More information, and management server then needs according to normalized flow process, modification information to be audited, thus determining whether
Terminal carries out programing change according to described modification information.Each terminal is according to the difference of its importance or risk, corresponding careful
Core flow process is also different.
The defect of prior art is, the corresponding auditing flow of terminal generally presets it is impossible to change.If there is
Lead to terminal importance or the special circumstances of risk change, prior art cannot be realized automatically adjusting its corresponding examination & verification stream
Journey.
Content of the invention
In view of this, it is an object of the invention to provide a kind of programing change method and system, methods described is entered to terminal
Row risk analysis, and then auditing flow is changed according to risk factor.
For achieving the above object, the present invention has a following technical scheme:
A kind of programing change method, the method comprising the steps of:
The status data of control end capture program terminal, and risk analysis are carried out to described status data, obtain program
The risk class of terminal;
Control end changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and according to described
Auditing flow is audited to change program;
Change program through examination & verification is published to program terminal by control end.
Described control end acquisition state data particularly as follows:
The status data of collection user's typing, the historical state data of acquisition control end storage or collection change status number
According to.
Described status data particularly as follows:
Any one in trading volume, Ke Huliang, volatility, adjusted rate, history coefficient of stabilization, development risk parameter and risk assessment
Item or any combination.
Described risk analysis are carried out to described status data, obtain the risk class of program terminal particularly as follows:
Formulate risk model, and status data is substituted in risk model, obtain risk class.
Described control end by through examination & verification change program be published to program terminal particularly as follows:
Control end obtains program and issues configuration, and described program is issued configuration and included, and issuing time, program terminal information, stops
Only service list and unlatching service list;
Control end stops the service of this program terminal in issuing time using stopping service list;
Control end is with the original program of change program alternative program terminal through examination & verification;
Control end is using the service opening service list opening program terminal.
Described program is issued configuration and is also included checking information, then the described change program that will pass through examination & verification be published to program eventually
End also includes:
So that, after the original program of change program alternative program terminal of examination & verification, input incoming message is to start friendship
Easily, and obtain outgoing message;
Using described checking information, outgoing message is verified, if by checking, thinking that change program is issued into
Work(.
Methods described also includes:
Flow process list is obtained by the auditing flow of described change program, according to flow process list, the examination & verification of change program is entered
Monitoring ask by road wheel, then sends alarm to program terminal when this examination & verification and flow process list are not inconsistent.
Methods described also includes:
Audit statement is generated after change program is published to program terminal;
Described audit statement includes changing process, change quantity, illegal change item and unsuccessfully changes item.
A kind of programing change system, described system specifically includes:
Acquisition module, the status data of capture program terminal;
Risk module, for carrying out risk analysis to described status data, obtains the risk class of program terminal;
Flow process auditing module, changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and
According to described auditing flow, change program is audited;
Release module, for being published to program terminal by the change program through examination & verification.
Described system also includes:
Monitoring module, for obtaining flow process list by the auditing flow of described change program, according to flow process list to change
The examination & verification of more program is polled monitoring, and then sends alarm to control end and program terminal when this examination & verification and flow process list are not inconsistent.
As seen through the above technical solutions, the beneficial effect that the present invention exists is: achieves in running to program
Terminal carries out the analysis of risk, and changes the auditing flow of its corresponding programing change accordingly;Realize each program terminal equal
Still programing change can be completed according to rational flow process after risk situation change;Methods described makes the examination & verification of programing change
More reasonable, meet actually used demand, also fully ensure security.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is embodiment of the present invention methods described flow chart;
Fig. 2 is system structure diagram described in the embodiment of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is
The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
In the prior art, the setting of the auditing flow of the judgement for program terminal risk class and programing change is all
It is previously-completed, and there is not the change according to actual conditions, the mechanism of real time modifying adjustment.That is, existing skill
The process of art Program change may be summarized to be following: the risk class of pre-set program terminal, and according to risk class phase
The auditing flow of programing change should be formulated;According to auditing flow, change program is audited, and then change program is distributed to
Program terminal.But aforesaid way flexibility poor it is impossible to program terminal actual conditions change change its risk class and
Auditing flow.
Shown in Figure 1, it is a specific embodiment of the method for the invention.Method described in the present embodiment include with
Lower step:
Step 101, the status data of control end capture program terminal, and risk analysis are carried out to described status data,
Obtain the risk class of program terminal.
No matter whether program terminal had previously had the risk class of setting, and the present embodiment methods described is in program terminal
During operation, it is required to the status data of capture program terminal, and carry out risk analysis.Due in running Program
The state of terminal may change at any time, so its risk is likely to change therewith.For example, the transaction that certain program terminal is related to
Amount increases substantially, beyond the scope estimated, then the actual risk facing in this program terminal necessarily increases it is likely that not
Meet its original risk class again, that is, this program terminal will have the demand changing risk class.
In the present embodiment, the purpose of acquisition state data is the risk in order to evaluate certain programing change of a certain program terminal
Property, so described status data all should be related with risk, so described gatherer process mainly includes three kinds of modes:
The status data of collection user's typing, such as risk assessment, that is, user is to the change program that this will be issued
Risk self-appraisal;And become other data such as corresponding program terminal and change time;
The historical state data of acquisition control end storage, historical data is the Main Basiss of risk assessment, described history number
According to can be that the trading volume of this program terminal, Ke Huliang, the history coefficient of stabilization of program terminal, development risk parameter (are such as developed
The experience of personnel can abstract for this parameter) etc.;
Collection change status data, the described status data that becomes mainly is specific to this programing change, change degree
Different certainty risks there is also difference;For example, certain programing change only changes a source code then inevitable risk is relatively low,
And if more having treated 80% source code, risk is inevitable higher.So described change status data includes volatility and correction
Rate.
After obtaining described status data, you can a risk model is formulated according to status data, according to described wind
Dangerous model carries out the assessment of risk to status data.Risk model described in the present embodiment can table specific as follows:
Risk | High | In | Low |
Trading volume | > 10,000,000 | 1000000~10,000,000 | < 1,000,000 |
Client measures | > 1,000,000 | 100000~1,000,000 | < 100,000 |
Development risk parameter | < 2 years experiences | 2 years~4 years experiences | 4 years experiences of > |
Adjusted rate | >1% | 0.5%~1% | <0.5% |
History coefficient of stabilization | > 5 faults | 1~5 fault | Fault-free |
Table 1
Excessive risk item number | Risk item number | Low-risk item number | Risk class |
5 | 0 | 0 | High |
4 | 1 | 0 | High |
0 | 4 | 1 | High |
0 | 2 | 3 | In |
0 | 0 | 5 | Low |
Table 2
If the status data collecting a program terminal in the present embodiment shows: this program terminal trading volume 1500
Ten thousandth, client's amount 2,000,000, application developer possess 3 years experiences, the adjusted rate of program be 11.5%, this program terminal history occurs
Cross 7 this fault.There are 4 excessive risk items in the status data then above-mentioned status data being brought in table 1 it is seen that this program terminal
With 1 risk item.This conclusion is being substituted into table 2, if there is 4 excessive risk items and 1 risk item, then risk etc.
Level is then assessed as " high ".
Step 102, control end change the auditing flow of program according to described risk class for program terminal real-time adjustment, and
According to described auditing flow, change program is audited.
Its corresponding review process of the program terminal of different risk class is also different, and risk class is more high, audits
Just more strict.The meaning that abovementioned steps evaluate risk class is that, learns the risk situation of program terminal in real time, so that real
When for every kind of risk class, corresponding auditing flow is set, and also adjustment examination & verification accordingly is flowed when risk class change
Journey.The emphasis of method described in the present embodiment is just, the examination & verification to programing change for the risk class being obtained according to abovementioned steps
Flow process carries out real-time adjustment.Risk class due to obtaining in abovementioned steps is in order the current practical risk of terminal, institute
So that matched auditing flow can be executed in this step so that the examination & verification of programing change is more reasonable accordingly, meet
Actually used demand has also ensured security.
Described auditing flow is preserved with the text of xml form in control end, such as need to adjust auditing flow, you can
Directly edlin is entered to corresponding xml document.
According to the risk model disclosed in the present embodiment, risk class is excessive risk, risk and low wind from low to high
Danger, the auditing flow of corresponding programing change is rudimentary examination & verification, middle rank is audited and senior examination & verification.Rudimentary examination & verification only needs to by project
The examination & verification node that manager controls authority completes to audit;Middle rank examination & verification is in addition to project manager's examination & verification node examination & verification in addition it is also necessary to upper one
The examination & verification node that level line manager controls authority carries out review;Senior examination & verification, on the basis of middle rank examination & verification, adds further
Upper level general manager controls authentication node and carries out last instance.
If script risk class is judged to risk for low-risk program terminal a in step 101, further by journey
The corresponding auditing flow of sequence terminal a is adjusted to middle rank examination & verification by rudimentary examination & verification.In program terminal a typing during change program, that is,
Flow process according to middle rank examination & verification is audited to change data.
In addition, being monitoring legal the carrying out of auditing flow in the present embodiment, also disclose following steps:
Step 1021, flow process list is obtained by the auditing flow of described change program, according to flow process list to change journey
The examination & verification of sequence is polled monitoring, and then sends alarm to program terminal when this examination & verification and flow process list are not inconsistent.
Data sheet field | Implication | Citing |
changeno | Change numbering | 201308250001 |
risklevel | Risk class | high |
topmanagercheck | General manager audits | y/n |
managercheck | Line manager audits | y/n |
projectmanagercheck | Project manager audits | y/n |
currentprocess | Current procedures | projectmanagercheck |
processstarttime | The current procedures time started | 2013080240305 |
Table 3
Table 3 is the concrete form of described flow process list under the present embodiment medium or high risk level condition.Control end with reference to table 3 is
The review process poll of one change program can be monitored, such as setting is polling cycle in 5 minutes, and control end is i.e. every 5
Minute monitors whether the actual examination & verification carrying out is consistent with flow specification;Can also monitor whether the time that current procedures carry out exceeds
The time span of regulation, to avoid, mistake in auditing flow or examination & verification is delayed.But monitoring finds that actual examination & verification is present in
The situation that flow process list is not inconsistent, then control end can be to program terminal transmission alarm, to take further remedial measure.
Change program through examination & verification is published to program terminal by step 103, control end.
When becoming after program passes through examination & verification, you can be published to program terminal that is, actual thrusts execution in program
The change of program.The issuing process of described change program is specific as follows:
Step 1031, control end obtain program and issue configuration, and described program is issued configuration and included, and issuing time, program are eventually
Client information, stopping service list, unlatching service list and checking information.
Step 1032, control end stop the service of this program terminal in issuing time using stopping service list.
As change program issued by need, then program terminal must stop all services first, and stopping service needing to utilize program
Issue the stopping service list in configuration.Control end finds the program needing configuration processor change according to described program end message
Terminal, and the service of terminal is made to shut down procedure in the issuing time arrival setting, start configuration processor change.
Step 1033, control end are with the original program of change program alternative program terminal through examination & verification.
This step is the actual execution of programing change, makes program terminal Program be replaced by redaction.
Step 1034, input incoming message, to start transaction, and obtain outgoing message, using described checking information to output
Message is verified, if by checking, thinking that change program is issued successfully.
After programing change completes, also need further to verify whether this change is successful.Verification process need to be joined in advance
Put checking information, that is, run the desired result of program after change.Call the program after change and input one to it
Incoming message, program can produce an outgoing message accordingly;Contrast outgoing message and checking information, that is, judge output
Whether message is consistent with previously desired result, if meeting, read-me changes successfully, has reached the effect of anticipation, no
Then think failure.If changing unsuccessfully, equally alarm can be sent to program terminal, to take measures further.
Step 1035, control end are using the service opening service list opening program terminal.
After change terminates, restart the service of program terminal, the normal operation of recovery routine terminal.
Step 104, after change program is published to program terminal generate audit statement.
Described audit statement includes changing process, change quantity, illegal change item and unsuccessfully changes item.Reported by audit
More visual and clear for change process can be represented by table to user.
As seen through the above technical solutions, the beneficial effect that the present embodiment methods described exists is: achieves and was running
In journey, program terminal is carried out with the analysis of risk, and changes the auditing flow of its corresponding programing change accordingly;Realize each
Program terminal all still can complete programing change according to rational flow process after risk situation change;Methods described makes calling program
The examination & verification of change is more reasonable, meets actually used demand, has also fully ensured security.
Programing change method described in corresponding embodiment illustrated in fig. 1, discloses a kind of program accordingly and becomes in the present embodiment
More system.Described system constructing control end described in the aforementioned embodiment.Method described in previous embodiment be based on as
Lower system is achieved, and the two technical scheme is consistent in itself.System described in the present embodiment specifically includes following:
Acquisition module, the status data of capture program terminal.
In the present embodiment, the purpose of acquisition state data is the risk in order to evaluate certain programing change of a certain program terminal
Property, so described status data all should be related with risk, so described gatherer process mainly includes typing collection
Unit, history collecting unit and state acquisition unit, particularly as follows:
Typing collecting unit mainly gathers the status data of user's typing, such as risk assessment, and that is, user will to this
The risk self-appraisal of the change program issued;And become other data such as corresponding program terminal and change time;
History collecting unit acquisition control end storage historical state data, historical data be risk assessment main according to
Can be the trading volume of this program terminal, Ke Huliang, the history coefficient of stabilization of program terminal, development risk according to, described historical data
Parameter (experience of such as developer can abstract for this parameter) etc.;
State acquisition unit collection change status data, the described status data that becomes mainly is specific to the change of this secondary program
More, the different certainty risks of change degree there is also difference;For example, certain programing change only changes a source code and then must
So risk is relatively low, and if more having treated 80% source code, risk is inevitable higher.So described change status data includes
Volatility and adjusted rate.
Risk module, for carrying out risk analysis to described status data, obtains the risk class of program terminal.
After obtaining described status data, you can a risk model is formulated according to status data, according to described wind
Dangerous model carries out the assessment of risk to status data.
Flow process auditing module, changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and
According to described auditing flow, change program is audited.
Its corresponding review process of the program terminal of different risk class is also different, and risk class is more high, audits
Just more strict.The meaning that abovementioned steps evaluate risk class is that, learns the risk situation of program terminal in real time, so that real
When for every kind of risk class, corresponding auditing flow is set, and also adjustment examination & verification accordingly is flowed when risk class change
Journey.The emphasis of method described in the present embodiment is just, the examination & verification to programing change for the risk class being obtained according to abovementioned steps
Flow process carries out real-time adjustment.Risk class due to obtaining in abovementioned steps is in order the current practical risk of terminal, institute
So that matched auditing flow can be executed in this step so that the examination & verification of programing change is more reasonable accordingly, meet
Actually used demand has also ensured security.
Described auditing flow is preserved with the text of xml form in control end, such as need to adjust auditing flow, you can
Directly edlin is entered to corresponding xml document.
Monitoring module, for obtaining flow process list by the auditing flow of described change program, according to flow process list to change
The examination & verification of more program is polled monitoring, and then sends alarm to control end and program terminal when this examination & verification and flow process list are not inconsistent.
Release module, for being published to program terminal by the change program through examination & verification.
When becoming after program passes through examination & verification, you can be published to program terminal that is, actual thrusts execution in program
The change of program.Described release module specifically includes:
Dispensing unit, it is used for obtaining program and issues configuration, described program is issued configuration and included, issuing time, program terminal
Information, stopping service list, unlatching service list and checking information.
Stop service unit, be used for stopping the service of this program terminal in issuing time using stopping service list.
As change program issued by need, then program terminal must stop all services first, and stopping service needing to utilize program
Issue the stopping service list in configuration.Stopping service unit finding according to described program end message needs configuration processor to change
Program terminal, and reach in the issuing time setting and make to shut down procedure the service of terminal, start configuration processor change.
Replacement unit, the original program of change program alternative program terminal for being audited with process.
This step is the actual execution of programing change, makes program terminal Program be replaced by redaction.
Authentication unit, it is used for inputting incoming message to start transaction, and obtain outgoing message, using described checking information pair
Outgoing message is verified, if by checking, thinking that change program is issued successfully.
After programing change completes, also need further to verify whether this change is successful.Verification process need to be joined in advance
Put checking information, that is, run the desired result of program after change.Call the program after change and input one to it
Incoming message, program can produce an outgoing message accordingly;Contrast outgoing message and checking information, that is, judge output
Whether message is consistent with previously desired result, if meeting, read-me changes successfully, has reached the effect of anticipation, no
Then think failure.If changing unsuccessfully, equally alarm can be sent to program terminal, to take measures further.
Open service unit, the service for utilizing unlatching service list opening program terminal.
After change terminates, restart the service of program terminal, the normal operation of recovery routine terminal.
The beneficial effect that system described in the present embodiment exists is: achieves and carries out risk to program terminal in running
Analysis, and change the auditing flow of its corresponding programing change accordingly;Realizing each program terminal all can be in risk feelings
Still programing change is completed according to rational flow process after condition change;Methods described makes the examination & verification of programing change more reasonable, full
The actually used demand of foot, has also fully ensured security.
The above is only the preferred embodiment of the present invention it is noted that ordinary skill people for the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (9)
1. a kind of programing change method is it is characterised in that the method comprising the steps of:
The status data of control end capture program terminal, and risk analysis are carried out to described status data, obtain program terminal
Risk class;
Control end changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and according to described examination & verification
Flow process is audited to change program;
Change program through examination & verification is published to program terminal by control end;
Wherein, described control end acquisition state data particularly as follows:
The status data of collection user's typing, the historical state data of acquisition control end storage or collection change status data;
Described status data is all relevant with risk.
2. according to claim 1 method it is characterised in that described status data particularly as follows:
In trading volume, Ke Huliang, volatility, adjusted rate, history coefficient of stabilization, development risk parameter and risk assessment any one or
Any combination.
3. method, it is characterised in that described carry out risk analysis to described status data, obtains according to claim 2
The risk class of program terminal particularly as follows:
Formulate risk model, and status data is substituted in risk model, obtain risk class.
4. method is published to journey it is characterised in that described control end will pass through the change program audited according to claim 1
Sequence terminal particularly as follows:
Control end obtains program issue configuration, and described program is issued configuration and included, issuing time, program terminal information, stopping clothes
Business list and unlatching service list;
Control end stops the service of this program terminal in issuing time using stopping service list;
Control end is with the original program of change program alternative program terminal through examination & verification;
Control end is using the service opening service list opening program terminal.
5. method also includes checking information it is characterised in that described program issues configuration according to claim 4, then described
Change program through examination & verification is published to program terminal also include:
After with the original program of change program alternative program terminal through auditing, input incoming message to start transaction, and
Obtain outgoing message;
Using described checking information, outgoing message is verified, if by checking, thinking that change program is issued successfully.
6. according to claim 1 method it is characterised in that methods described also includes:
Flow process list is obtained by the auditing flow of described change program, road wheel is entered to the examination & verification of change program according to flow process list
Ask monitoring, then send alarm to program terminal when this examination & verification and flow process list are not inconsistent.
7. according to claim 1 method it is characterised in that methods described also includes:
Audit statement is generated after change program is published to program terminal;
Described audit statement includes changing process, change quantity, illegal change item and unsuccessfully changes item.
8. a kind of programing change system is it is characterised in that described system specifically includes:
Acquisition module, the status data of capture program terminal;
Risk module, for carrying out risk analysis to described status data, obtains the risk class of program terminal;
Flow process auditing module, changes the auditing flow of program according to described risk class for program terminal real-time adjustment, and according to
Described auditing flow is audited to change program;
Release module, for being published to program terminal by the change program through examination & verification;
Wherein, described acquisition module capture program terminal status data particularly as follows:
The status data of collection user's typing, the historical state data of acquisition control end storage or collection change status data;
Described status data is all relevant with risk.
9. according to claim 8 system it is characterised in that described system also includes:
Monitoring module, for obtaining flow process list by the auditing flow of described change program, according to flow process list to change journey
The examination & verification of sequence is polled monitoring, and then sends alarm to control end and program terminal when this examination & verification and flow process list are not inconsistent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310407418.XA CN103440168B (en) | 2013-09-09 | 2013-09-09 | Method and system for program change |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310407418.XA CN103440168B (en) | 2013-09-09 | 2013-09-09 | Method and system for program change |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103440168A CN103440168A (en) | 2013-12-11 |
CN103440168B true CN103440168B (en) | 2017-01-18 |
Family
ID=49693858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310407418.XA Active CN103440168B (en) | 2013-09-09 | 2013-09-09 | Method and system for program change |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103440168B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105590056B (en) | 2014-10-22 | 2019-01-18 | 中国银联股份有限公司 | Dynamic application function control method based on environment measuring |
CN107679749B (en) * | 2017-09-30 | 2021-05-25 | 新奥(中国)燃气投资有限公司 | Authority application approval method and authorization management platform |
CN110046784A (en) * | 2018-12-14 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of risk of user's access determines method and device |
CN111324370B (en) * | 2020-02-19 | 2022-10-18 | 支付宝(杭州)信息技术有限公司 | Method and device for carrying out risk processing on to-be-on-line small program |
CN113238994A (en) * | 2021-05-17 | 2021-08-10 | 上海中通吉网络技术有限公司 | Report file management and publishing method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101000667A (en) * | 2006-01-12 | 2007-07-18 | 鸿富锦精密工业(深圳)有限公司 | System and method of dynamic examining procedure |
CN101616018A (en) * | 2008-06-27 | 2009-12-30 | 中兴通讯股份有限公司 | The method of upgrading network management software and device |
CN101673366A (en) * | 2008-09-10 | 2010-03-17 | 北京正辰科技发展有限责任公司 | It service management technology |
-
2013
- 2013-09-09 CN CN201310407418.XA patent/CN103440168B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101000667A (en) * | 2006-01-12 | 2007-07-18 | 鸿富锦精密工业(深圳)有限公司 | System and method of dynamic examining procedure |
CN101616018A (en) * | 2008-06-27 | 2009-12-30 | 中兴通讯股份有限公司 | The method of upgrading network management software and device |
CN101673366A (en) * | 2008-09-10 | 2010-03-17 | 北京正辰科技发展有限责任公司 | It service management technology |
Also Published As
Publication number | Publication date |
---|---|
CN103440168A (en) | 2013-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11741105B2 (en) | Intelligent remote monitoring method for fire-fighting | |
CN103440168B (en) | Method and system for program change | |
CA2874189C (en) | Cyber security analzer | |
AU2011255477B2 (en) | Bug clearing house | |
CN108492092A (en) | A kind of bidding management system and method | |
CN109460223A (en) | A kind of API gateway management system and its method | |
CN105978147B (en) | The long-range fixed value modification system of automatic safety device based on file interaction | |
CN104471500A (en) | Method and system for real-time performance recovery advisory for centrifugal compressors | |
CN101321084A (en) | Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining | |
US10015329B2 (en) | Information management apparatus, information management method, and information device | |
US11490176B2 (en) | Selective delivery state change of valve of remote metering device | |
CN106096960A (en) | The method and apparatus of the outside payment system of monitoring and method of payment and system | |
CN109656184A (en) | A kind of household electrical appliances fault diagnosis method and system, intelligent appliance and Daemon maintenance terminal | |
CN104750095B (en) | Regulation and control center inspection pilot system and method | |
CN106059841A (en) | Method for monitoring deployed middleware | |
KR101663504B1 (en) | Method and system for providing integrated managing service based smart water grid | |
CN109766239A (en) | Log output control method, system and computer readable storage medium | |
JP2019512812A (en) | Virtual Market for Distributed Tools in an Enterprise Environment | |
CN110210192A (en) | Approaches to IM, device, equipment and readable storage medium storing program for executing | |
US20140075008A1 (en) | Distributed Maintenance Mode Control | |
CN105656724A (en) | Monitoring method and system of server | |
CN105072198A (en) | B/S-mode-based PC monitoring system and method | |
CN107634939A (en) | A kind of fuzz testing method and system for being applied to 376.1 protocol security defects detections | |
CN110430095A (en) | A kind of cyberspace server monitoring method and system | |
Du Plessis et al. | Results from implementing a remote diagnostic and maintenance solution on energy management systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |