CN103869740A - Cipher equipment monitoring method based on hierarchical graph form - Google Patents
Cipher equipment monitoring method based on hierarchical graph form Download PDFInfo
- Publication number
- CN103869740A CN103869740A CN201410109247.7A CN201410109247A CN103869740A CN 103869740 A CN103869740 A CN 103869740A CN 201410109247 A CN201410109247 A CN 201410109247A CN 103869740 A CN103869740 A CN 103869740A
- Authority
- CN
- China
- Prior art keywords
- encryption device
- monitored
- monitoring
- monitor message
- monitored item
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Alarm Systems (AREA)
Abstract
The invention discloses a cipher equipment monitoring method based on a hierarchical graph form, and relates to the information security technology in order to provide a multi-hierarchy cipher equipment monitoring method. The method is characterized by including the following steps of monitoring configuration, monitoring service and monitoring information display, wherein in the step of monitoring configuration, monitoring items are defined for each set of cipher equipment according to monitored objects, and a monitoring strategy and an alarming threshold value are configured for each monitoring item; in the step of monitoring service, the current state information of the monitored objects is received, monitoring information of the monitoring items is obtained, and an alarming prompt is given out when the current state information of the monitored objects exceeds the alarming threshold value of the monitoring items; in the step of monitoring information display, overall conditions and specific monitoring information of the cipher equipment are displayed in the graph form.
Description
Technical field
The invention belongs to information security technology, especially a kind of encryption device method for supervising.
Background technology
Monitoring technique is the basic technology of information security, and graphical information shows it is the core element of encryption device monitoring technique basis and information-based monitoring management.Along with the high speed development in an all-round way of the information-based industry of China, the operation system based on the management of encryption device Centralized Monitoring also enters the comprehensive construction period, and in system, encryption device monitoring, information display and centralized management are faced with more and more stricter technical requirement.
Encryption device for confidential information is encrypted, the hardware device of digital signature, deciphering, sign test etc., be widely used in the place such as bank, national security community, need to take situation, internal memory service condition to the CPU of these encryption devices, whether the monitoring state such as online is to guarantee information security.
Current traditional encryption device monitoring management system is mainly to utilize single list or patterned way to show the monitor message of encryption device, and monitor message is directly perceived, be unfavorable for that keeper comprehensively grasps every monitored condition of current password equipment in time.Simultaneously, in a fairly large number of situation of encryption device, system lacks the displaying of stratification monitor message, the displaying way to manage of chart and figure is not combined, cause the every monitor message of encryption device to be shown more in disorder, be not beneficial to the abnormal encryption device of keeper's locating query.In addition, system password monitoring of tools ladder of management is single, process is simple, does not meet the monitoring management requirement of encryption device in enormous quantities, has increased difficulty and cost that encryption device monitoring management is safeguarded, be difficult for expansion, be more unfavorable for diversification, comprehensive encryption device monitoring management requirement.
Summary of the invention
Technical matters to be solved by this invention is: for the problem of above-mentioned existence, provide a kind of multi-levelization encryption device method for supervising.
The technical solution used in the present invention is as follows: comprise following monitoring configuration step, monitor service step, monitor message displaying step, wherein,
Monitoring configuration step comprises:
Steps A 1: be every encryption device definition monitored item according to monitored object, the essential information that described each monitored item comprises encryption device and the current state information of monitored object;
Steps A 2: be each monitored item configuration monitoring strategy and alarm threshold;
Monitor service step comprises:
Step B1: control each encryption device and upload the current state information of monitored object, and receive described monitored object current state information;
Step B2: the monitored object current state information in this monitored item is monitored to the monitor message that obtains this monitored item according to the monitoring strategies of monitored item, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt;
Monitor message shows that step comprises:
Step C1: the general status of adding up and showing encryption device according to the monitor message of each monitored item of each encryption device;
Step C2: the monitor message of each monitored item of described each encryption device is classified according to the region of encryption device, node, encryption device type;
Step C3: again by the monitor message of each monitored item of same encryption device according to the displaying of classifying of monitored object type.
Preferably, in described step C1, the essential information of described encryption device and general status are shown with tabular form.
Preferably, in described step C3, the monitor message of described monitored item and mode classification thereof are shown with patterned way.
Preferably, described monitor message shows that step also comprises step C4: the monitored item that monitored object current state information is exceeded to alarm threshold carries out alarm identifier; In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by step C4.
Preferably, described monitor message shows that step also comprises step C4: in displaying interface, abnormality control is set, described abnormality control is carried out following steps in the time being triggered by user:
Step C41: the monitor message of abnormal monitored item is classified according to the region of encryption device, node, encryption device type;
Step C42: again by the monitor message of the abnormal monitored item of same encryption device according to the displaying of classifying of monitored object type;
In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by enabling described abnormality control.
Preferably, in described step C42, the monitor message of described abnormal monitored item and mode classification thereof are shown with patterned way.
Preferably, in described steps A 2, user need to be each monitored item configuration monitoring strategy and alarm threshold according to monitoring.
In sum, owing to having adopted technique scheme, the invention has the beneficial effects as follows:
1. the present invention introduces monitored item, the definition standard of monitored item the monitor message that reports of encryption device monitoring management, be convenient to the unified management to encryption device monitor message and maintenance to keeper, there is higher practicality.
2. the present invention defines monitoring strategies and alarm threshold value by monitored item.The corresponding monitoring strategies of monitored item and alarm threshold value, system is according to monitoring strategies and monitor message corresponding to alarm threshold value automatic Display encryption device monitored item.Keeper can, according to the self-defined monitoring strategies of actual conditions and alarm threshold value, be convenient to keeper encryption device monitoring strategies is administered and maintained, and has higher extendability.
3. the present invention has introduced layering, set up stratification monitoring mode, determine the overall monitoring situation of encryption device leading indicator, system is carried out layering according to the region of encryption device, node, type and is checked, successively filter and check for the monitor message that encryption device is dissimilar, solve because of encryption device Centralized Monitoring management in enormous quantities and cannot unify encryption device information to monitor the drawback of showing, met the monitoring management requirement of encryption device in enormous quantities, there is adaptability widely.
4. adopt the chart mode that combines jointly to show encryption device monitor message, list mode is shown encryption device essential information and current overall status, and patterned way is shown the concrete monitor message of encryption device.When encryption device state in list occurs when abnormal, can clicking abnormality control, show current monitor message and the situation of encryption device with patterned way, can be according to the patterned alarm prompt abnormal encryption device in location fast, and dispose in time; Or keeper can locate rapidly and occur abnormal encryption device from the concrete monitor message of the encryption device of patterned way displaying.The present invention can show the overall state of encryption device comprehensively, can intuitively, clearly reflect the every detailed monitor message of encryption device, reduce encryption device Centralized Monitoring management difficulty and cost, promote in enormous quantities, the centralized efficiency to the management of encryption device Centralized Monitoring.
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is that the present invention monitors process flow diagram.
Fig. 2 is the design sketch that encryption device general status is shown in list of the present invention.
Fig. 3 is the design sketch that the present invention graphically shows encryption device details.
Embodiment
Disclosed all features in this instructions, or step in disclosed all methods or process, except mutually exclusive feature and/or step, all can combine by any way.
Disclosed arbitrary feature in this instructions, unless narration especially all can be replaced by other equivalences or the alternative features with similar object.,, unless narration especially, each feature is an example in a series of equivalences or similar characteristics.
As Fig. 1, encryption device method for supervising provided by the invention comprises following monitoring configuration step, monitor service step and monitor message displaying step.
Wherein, monitoring configuration step comprises:
Steps A 1: be every encryption device definition monitored item, described monitored item defines according to monitored object, such as monitored object can be that the CPU of encryption device takies situation, internal memory service condition, online or off-line state etc., monitored object is the knowledge in encryption device monitoring technique, again exemplifies no longer one by one.For every encryption device, monitored item can be multiple.For the ease of management, can be numbered monitored item, be defined as VID.The essential information that described each monitored item comprises encryption device and the current state information of monitored object; Here said encryption device essential information refers to the identity information that can distinguish encryption device, as produces name's information of producer, model.The current state of monitored object, for example CPU takies 50%, EMS memory occupation 12%, encryption device is online etc.
Steps A 2: be each monitored item configuration monitoring strategy and alarm threshold; Here the judge agreement that said monitoring strategies is taked for described monitored object current state information for system, for example, when CPU usage is lower than 50% time, think that encryption device workload is unsaturated, in the time that CPU usage is between 50% ~ 80%, think that encryption device workload is saturated, exceed while setting alarm threshold 80%, think that encryption device works overloadingly.System is monitored the monitor message that obtains each monitored item to the current state information of monitored object according to monitoring strategies, also can be understood as the monitor message of monitored object.The monitoring strategies here and alarm threshold can need self-defining according to monitoring by keeper or user, are conducive to like this increase the extensibility of management system.
Each encryption device is initiated registration request by administration agent (Agent) to encryption device supervisory system, completes registration, and the encryption device after registration can carry out the monitoring management that signal is communicated by letter and received supervisory system with supervisory system.
Monitor service step comprises:
Step B1: the each encryption device of system control is uploaded the current state information of monitored object, and receive described monitored object current state information;
Step B2: the monitored object current state information in this monitored item is monitored to the monitor message that obtains monitored object according to the monitoring strategies of monitored item, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt;
Monitor message shows that step comprises:
Step C1: the general status of adding up and showing encryption device according to the monitor message of each encryption device monitored item; Here said general status is for example that the encryption device that workload is saturated accounts for total ratio, online encryption device accounts for the overall informations such as total ratio.
Step C2: the concrete monitor message of the each monitored item of described each encryption device is classified according to the region of encryption device, node, encryption device type;
Step C3: again by the monitor message of same encryption device according to the displaying of classifying of monitored object type.
In one embodiment, in described step C1, the essential information of described encryption device and general status are shown with tabular form.As Fig. 2.
In another embodiment, in described step C3, the current state information of described monitored object and mode classification thereof are shown with patterned way.As Fig. 3.
Find fast from various encryption device monitor message for the ease of keeper and occur abnormal encryption device and region of living in thereof, in another embodiment of the present invention, described monitor message shows that step also comprises step C4: the monitored item that exceeds alarm threshold is carried out to alarm identifier; As shown the monitor message of this monitored item or this monitored item by highlighted mode.In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, by step, C4 sends alarm prompt.Because the concrete monitor message of all encryption devices is all to classify and show according to the region of encryption device, node, encryption device type, therefore keeper can determine rapidly encryption device and the residing position of encryption device that appearance is abnormal.
Equally for the consideration of the abnormal encryption device in location fast, the present invention can also have such embodiment distortion, be that described monitor message shows that step also comprises step C4: in displaying interface, abnormality control is set, and be this control editor trigger event, in the time that triggering, the described abnormality control person of being managed carries out following steps:
Step C41: the monitor message of abnormal monitored object is classified according to the region of encryption device, node, encryption device type;
Step C42: again by the monitor message of the abnormal monitored object of same encryption device according to the displaying of classifying of monitored object type;
In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by enabling described abnormality control.
For more directly perceived, in described step C42, the current state information of described abnormal monitored object and mode classification thereof are shown with patterned way.
The present invention is not limited to aforesaid embodiment.The present invention expands to any new feature or any new combination disclosing in this manual, and the arbitrary new method disclosing or step or any new combination of process.
Claims (7)
1. an encryption device method for supervising, is characterized in that, comprises following monitoring configuration step, monitor service step and monitor message displaying step, wherein,
Monitoring configuration step comprises:
Steps A 1: be every encryption device definition monitored item according to monitored object, the essential information that described each monitored item comprises encryption device and the current state information of monitored object;
Steps A 2: be each monitored item configuration monitoring strategy and alarm threshold;
Monitor service step comprises:
Step B1: control each encryption device and upload the current state information of monitored object, and receive described monitored object current state information;
Step B2: the monitored object current state information in this monitored item is monitored to the monitor message that obtains this monitored item according to the monitoring strategies of monitored item, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt;
Monitor message shows that step comprises:
Step C1: the general status of adding up and showing encryption device according to the monitor message of each monitored item of each encryption device;
Step C2: the monitor message of each monitored item of described each encryption device is classified according to the region of encryption device, node, encryption device type;
Step C3: again by the monitor message of each monitored item of same encryption device according to the displaying of classifying of monitored object type.
2. a kind of encryption device method for supervising according to claim 1, is characterized in that, in described step C1, the essential information of described encryption device and general status is shown with tabular form.
3. according to claim a kind of encryption device method for supervising according to claim 1 and 2, it is characterized in that, in described step C3, the monitor message of described monitored item and mode classification thereof are shown with patterned way.
4. a kind of encryption device method for supervising according to claim 1, is characterized in that, described monitor message shows that step also comprises step C4: the monitored item that monitored object current state information is exceeded to alarm threshold carries out alarm identifier; In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by step C4.
5. a kind of encryption device method for supervising according to claim 1, it is characterized in that, described monitor message shows that step also comprises step C4: in displaying interface, abnormality control is set, described abnormality control is carried out following steps in the time being triggered by user:
Step C41: the monitor message of abnormal monitored item is classified according to the region of encryption device, node, encryption device type;
Step C42: again by the monitor message of the abnormal monitored item of same encryption device according to the displaying of classifying of monitored object type;
In step B2, in the time that described monitored object current state information exceeds the alarm threshold in this monitored item, send alarm prompt by enabling described abnormality control.
6. a kind of encryption device method for supervising according to claim 5, is characterized in that, in described step C42, the monitor message of described abnormal monitored item and mode classification thereof is shown with patterned way.
7. a kind of encryption device method for supervising according to claim 1, is characterized in that, in described steps A 2, user need to be each monitored item configuration monitoring strategy and alarm threshold according to monitoring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410109247.7A CN103869740A (en) | 2014-03-24 | 2014-03-24 | Cipher equipment monitoring method based on hierarchical graph form |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410109247.7A CN103869740A (en) | 2014-03-24 | 2014-03-24 | Cipher equipment monitoring method based on hierarchical graph form |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103869740A true CN103869740A (en) | 2014-06-18 |
Family
ID=50908386
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410109247.7A Pending CN103869740A (en) | 2014-03-24 | 2014-03-24 | Cipher equipment monitoring method based on hierarchical graph form |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103869740A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109324950A (en) * | 2018-09-18 | 2019-02-12 | 郑州云海信息技术有限公司 | The output method and device of monitored results in monitoring system |
CN111651323A (en) * | 2020-05-29 | 2020-09-11 | 山东中创软件商用中间件股份有限公司 | Application software monitoring method, device and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6011880A (en) * | 1993-03-25 | 2000-01-04 | Asahi Kogaku Kogyo Kabushiki Kaisha | Digitizing encoded symbol reading device |
CN101118432A (en) * | 2007-06-05 | 2008-02-06 | 邱军 | Equipment monitoring system and equipment monitoring method |
CN102064975A (en) * | 2009-11-17 | 2011-05-18 | 中国移动通信集团公司 | Network equipment supervision method and system |
CN102129228A (en) * | 2010-01-13 | 2011-07-20 | 艾默生网络能源系统北美公司 | Monitoring system and configuration method thereof |
CN203276846U (en) * | 2013-04-16 | 2013-11-06 | 西安建筑科技大学 | Movable multi-storage medium secure storage cabinet |
CN103473626A (en) * | 2013-08-20 | 2013-12-25 | 国家电网公司 | Security protection method based on integrated dispatching data network operation and maintenance system |
-
2014
- 2014-03-24 CN CN201410109247.7A patent/CN103869740A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6011880A (en) * | 1993-03-25 | 2000-01-04 | Asahi Kogaku Kogyo Kabushiki Kaisha | Digitizing encoded symbol reading device |
CN101118432A (en) * | 2007-06-05 | 2008-02-06 | 邱军 | Equipment monitoring system and equipment monitoring method |
CN102064975A (en) * | 2009-11-17 | 2011-05-18 | 中国移动通信集团公司 | Network equipment supervision method and system |
CN102129228A (en) * | 2010-01-13 | 2011-07-20 | 艾默生网络能源系统北美公司 | Monitoring system and configuration method thereof |
CN203276846U (en) * | 2013-04-16 | 2013-11-06 | 西安建筑科技大学 | Movable multi-storage medium secure storage cabinet |
CN103473626A (en) * | 2013-08-20 | 2013-12-25 | 国家电网公司 | Security protection method based on integrated dispatching data network operation and maintenance system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109324950A (en) * | 2018-09-18 | 2019-02-12 | 郑州云海信息技术有限公司 | The output method and device of monitored results in monitoring system |
CN111651323A (en) * | 2020-05-29 | 2020-09-11 | 山东中创软件商用中间件股份有限公司 | Application software monitoring method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105095048B (en) | A kind of monitoring system alarm association processing method based on business rule | |
CN105163091B (en) | Pump station engineering management integrated linkage system | |
WO2016019748A1 (en) | Mine safety management method and apparatus based on geographic information system | |
CN105487914A (en) | Method and device for presenting topological graph of virtualization platform | |
CN201909992U (en) | Remote room environment monitoring device based on VPN (virtual private network) technology | |
CN106846748A (en) | A kind of fire information is classified processing system and hierarchical processing method | |
CN104092730A (en) | Cloud computing system | |
CN103888236A (en) | Clock synchronization monitoring method applicable to intelligent substation | |
CN106287225A (en) | A kind of combustion gas on-line monitoring early warning system and detection control method thereof | |
CN104811437A (en) | Industrial control network safety strategy generation system and method | |
CN103365963B (en) | Database audit system compliance method for quickly detecting | |
CN110119171A (en) | A kind of computer room O&M monitoring management system | |
CN104468224B (en) | Double-filtering fault warning method for data center monitoring system | |
CN109110646A (en) | Implementation method, system and the storage medium of a kind of pair of safety of tower crane inspection management | |
CN103869740A (en) | Cipher equipment monitoring method based on hierarchical graph form | |
CN105449859B (en) | The methods of exhibiting of panorama intelligent power system based on Away3D engines | |
CN106871963B (en) | Reservoir water supply real-time monitoring management system | |
CN107220784A (en) | A kind of engineering construction safety management system and method based on wechat | |
CN104217548B (en) | Gas turbine head goes out alarm processing method and device | |
CN208043973U (en) | Alternating current-direct current mixed running surveys note alarm device in DC circuit system | |
CN106776193B (en) | The virtual measuring method of apparatus for monitoring power supply slave failure | |
CN104778812A (en) | Machine room door access auto-alarm system and method | |
CN108599366A (en) | Power grid real-time monitoring system | |
CN113381872A (en) | Partition-based electric power system abnormal alarm processing method and system | |
CN207910794U (en) | A kind of operation managing and control system suitable for electric grid secondary equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140618 |
|
RJ01 | Rejection of invention patent application after publication |