CN105897776A - Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system - Google Patents

Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system Download PDF

Info

Publication number
CN105897776A
CN105897776A CN201610482061.5A CN201610482061A CN105897776A CN 105897776 A CN105897776 A CN 105897776A CN 201610482061 A CN201610482061 A CN 201610482061A CN 105897776 A CN105897776 A CN 105897776A
Authority
CN
China
Prior art keywords
user
grade
described user
working specification
credit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610482061.5A
Other languages
Chinese (zh)
Inventor
杨瑞
高飞
王帅
杨勇涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201610482061.5A priority Critical patent/CN105897776A/en
Publication of CN105897776A publication Critical patent/CN105897776A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a safety management and control method based on a cloud computation system and a safety management and control system based on a cloud computation system. The method comprises the following steps of: acquiring an operation log of a user at fixed period; according to the operation log, excavating and analyzing operation standard data of a user; according to the operation standard data of the user, quantifying an operation standard grade of the user; and giving a corresponding access control authority or/and a safety inspection strategy corresponding to the operation standard grade of the user. By finding the problems through logs, the management cost and the maintenance cost are reduced; according to the technical scheme, an operation standard degree of the user can be obtained according to the operation log of the user, so that the operation standard grade is quantified; the corresponding access control authority or/and the safety inspection strategy is given according to the corresponding operation standard grade of the user, so that the page view of users with irregular operation can be reduced and one part of safety risks in the cloud computation system can be avoided in terms of systems; meanwhile, the operation of the users can be standardized.

Description

A kind of security control method based on cloud computing system and system
Technical field
The present invention relates to field of cloud computer technology, particularly relate to a kind of based on cloud computing system Security control method and system.
Background technology
Along with the development of science and technology, the range of application of cloud platform is more and more extensive.
Cloud computing be calculate, store, the development of the IT technology such as virtualization, communication and network technology Development, demand driving and business model change the result collectively promoted.Cloud computing main Captivation is the transparence etc. that high performance-price ratio, high usage, high scalability and resource use Feature.Along with the development of cloud computing technology, its safety is increasingly paid close attention to by user.Cloud In calculating system, owing to information contribution rate is high, customer volume is huge, and for security threat Perception and process all will tend to unified, and therefore, the security management and control of cloud computing system is more macroscopical, Need to strengthen from many aspects security monitoring, avoid risk.Wherein, the main bag of the safety of cloud computing Include data safety, application safety and virtualization safety, generally use data isolation, data encryption, The modes such as authorization and identification evade some security risks in cloud computing.This evades at technological layer Some risk in cloud computing, but, this for cloud computing system security management and control not enough.
Thus, evade the risk in cloud computing the most further, to improve the safety of cloud computing, It is that those skilled in the art are presently required and solve the technical problem that.
Summary of the invention
It is an object of the invention to provide a kind of security control method based on cloud computing system and be System, can evade the risk in cloud computing further, to improve the safety of cloud computing further.
For solving above-mentioned technical problem, the technical scheme is that
A kind of security control method based on cloud computing system, including:
Periodically obtain the Operation Log of user;
According to described Operation Log, the working specification data of user described in mining analysis;
Working specification data according to described user, quantify the working specification grade of described user;
Give the described user access control right corresponding with described working specification grade or/and Safety inspection strategy.
Preferably, the described working specification data according to described user, quantify the behaviour of described user Make specification grade, including:
Working specification data according to described user, the credit grade amount of carrying out to described user Change;
Current credit grade according to described user is the credit score that described user adds correspondence, And the working specification grade answered according to the credit score mapping pair of described user.
Preferably, it is that described user adds in the described current credit grade according to described user right After the credit score answered, also include:
According to predetermined period, calculate the accumulation credit score of described user;
Wherein, the working specification grade answered according to the accumulation credit score mapping pair of described user.
Preferably, 20 operations of described user are preset as a predetermined period.
Preferably, the access control that the described user of described imparting is corresponding with described working specification grade Authority processed or/and safety inspection strategy, including:
According to the raising of described working specification grade, the corresponding access control improving described user Limit, or/and reduce the safety inspection policy criteria to this user;
According to the reduction of described working specification grade, the corresponding access control reducing described user Limit, or/and improve the safety inspection policy criteria to this user.
A kind of security management and control system based on cloud computing system, including:
Information acquisition module, for the Operation Log of periodically acquisition user;
Data analysis module, for according to described Operation Log, the behaviour of user described in mining analysis Make authority data;
Grade quantizing module, for the working specification data according to described user, quantifies described use The working specification grade at family;
Compose power module, for giving the access that described user is corresponding with described working specification grade Control authority is or/and safety inspection strategy.
Preferably, described grade quantizing module includes:
Credit grade quantifying unit, is used for giving described user relative with described working specification grade The access control right answered is or/and safety inspection strategy;
Credit score map unit, being used for according to the current credit grade of described user is described use Corresponding credit score, and the operation answered according to the credit score mapping pair of described user are added in family Specification grade.
Preferably, described credit score map unit includes:
Integration interpolation portion, being used for according to the current credit grade of described user is that described user adds Corresponding credit score;
Credit score cumulative unit, for according to predetermined period, calculates the accumulation credit of described user Integration;
Grade mapping portion, for the operation answered according to the accumulation credit score mapping pair of described user Specification grade.
Compared with prior art, technique scheme has the advantage that
A kind of based on cloud computing system the security control method that the embodiment of the present invention is provided, bag Include: periodically obtain the Operation Log of user;According to Operation Log, the operation of mining analysis user Authority data;Working specification data according to user, quantify the working specification grade of user;Compose Give user's access control right corresponding with working specification grade or/and safety inspection strategy.Fixed Phase obtain user Operation Log using as safeguard cloud computing system safety necessary means, periodically Poll digging user daily record, is searched problem by daily record, reduces management and the cost safeguarded; Wherein, Operation Log according to user in the technical program, it is appreciated that the operation of this user Standardized degree, thus to its quantization operation specification grade, and according to the working specification etc. of this user Level gives its corresponding access control right and safety inspection strategy, this makes it possible to reduce operation The visit capacity of nonstandard user, can evade the part peace in cloud computing system from system Full blast danger, simultaneously can be with the operation of specification user.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below The accompanying drawing used required in embodiment or description of the prior art will be briefly described, aobvious and Easily insight, the accompanying drawing in describing below is some embodiments of the present invention, common for this area From the point of view of technical staff, on the premise of not paying creative work, it is also possible to according to these accompanying drawings Obtain other accompanying drawing.
The safety based on cloud computing system that Fig. 1 is provided by a kind of detailed description of the invention of the present invention Management-control method flow chart;
The safety based on cloud computing system that Fig. 2 is provided by a kind of detailed description of the invention of the present invention Managing and control system structural representation.
Detailed description of the invention
The core of the present invention is to provide a kind of security control method based on cloud computing system and is System, can evade the risk in cloud computing further, to improve the safety of cloud computing further.
Understandable in order to enable the above-mentioned purpose of the present invention, feature and advantage to become apparent from, below In conjunction with accompanying drawing, the detailed description of the invention of the present invention is described in detail.
Elaborate detail in the following description so that fully understanding the present invention.But this Bright can be different from alternate manner described here implement with multiple, those skilled in the art can To do similar popularization in the case of intension of the present invention.Therefore the present invention is not by following public affairs The restriction being embodied as opened.
Refer to Fig. 1, Fig. 1 by a kind of detailed description of the invention of the present invention provided based on cloud meter The security control method flow chart of calculation system.
A kind of detailed description of the invention of the present invention provides a kind of safety based on cloud computing system Management-control method, including:
S11: periodically obtain the Operation Log of user;
S12: according to Operation Log, the working specification data of mining analysis user;
S13: according to the working specification data of user, quantify the working specification grade of user;
S14: give user's access control right corresponding with working specification grade or/and safety Inspection policy.
Wherein, user's access control right corresponding with working specification grade is given or/and safety Inspection policy, including: according to the raising of working specification grade, the corresponding access control improving user Authority processed, or/and reduce the safety inspection policy criteria to this user;According to working specification grade Reduction, the corresponding access control right reducing user, examine or/and improve the safety to this user Look into policy criteria.Wherein, working specification the highest grade, represents the operation more specification of user, then Characterize the security risk that cloud computing system causes by this user the lowest, therefore, it can give it more High access control right, now in order to reduce the inspection work of system, checks efficiency to improve, Then can suitably reduce the safety inspection policy criteria to this user;In contrast, when with When the working specification grade at family is relatively low, illustrate that the operation of this user is lack of standardization, then this user is to cloud Calculating system causes the probability of security risk the highest, therefore, reduces its access control right, Its safety inspection policy criteria can be improved simultaneously.
Periodically obtain the Operation Log of user using as the necessary hands safeguarding cloud computing system safety Section, periodic polling digging user daily record, searched problem by daily record, reduce management and safeguard Cost;Wherein, Operation Log according to user in the technical program, it is appreciated that this use The working specification degree at family, thus to its quantization operation specification grade, and according to the behaviour of this user Make specification grade and give its corresponding access control right and safety inspection strategy, this makes it possible to Reduce the visit capacity operating nonstandard user, can evade in cloud computing system from system A part of security risk, simultaneously can be with the operation of specification user.
On the basis of above-mentioned embodiment, in one embodiment of the present invention, according to user Working specification data, quantify user working specification grade, including:
Working specification data according to user, quantify the credit grade of user;
Current credit grade according to user be user add correspondence credit score, and according to The working specification grade that the credit score mapping pair at family is answered.
Further, according to the current credit grade of user be user add correspondence credit amass After/, also include: according to predetermined period, calculate the accumulation credit score of user;Wherein, The working specification grade that accumulation credit score mapping pair according to user is answered.
In the present embodiment, introduce this strategy of credit score, highlight the operation of user Specification credit, i.e. refers mainly to a series of visit to resource that user is carried out after entering the system Ask, transmit, the specification of the operation of the aspect such as storage.Quantify credit grade, according to the letter of user The credit score that user holds water is given by grade, to map the working specification grade of this user, The credit rating of user can be learnt exactly, differentiate that cloud computing system is caused safety by user with this The probability size of risk.
Further, accumulating credit score by the cycle, wherein predetermined period can be according to specifically Environment divide, if 20 times of pre-set user operations are as a predetermined period, then Accumulating the credit score of these 20 times operations, the credit obtaining a predetermined period operation is amassed The summation divided, and the operation rule answered with the summation mapping pair of the credit score of this predetermined period Model grade, this is without just carrying out the division of working specification grade after the operation of each user, improve Work efficiency.
In the present embodiment, after a upper end cycle, before next cycle starts, When i.e. the operation in user's one week after phase starts, according to its credit, implement different technical peaces Full strategy.As poor in certain user credit, then it is carried out higher safety inspection and lower degree Access control right.So cycle substitutes credit policy restriction, can evade cloud computing system In a part of security risk, the simultaneously specification operation of user the most well.
Refer to Fig. 2, Fig. 2 by a kind of detailed description of the invention of the present invention provided based on cloud meter The security management and control system structure schematic diagram of calculation system.
Correspondingly, one embodiment of the present invention additionally provides a kind of peace based on cloud computing system Full managing and control system, including:
Information acquisition module 21, for the Operation Log of periodically acquisition user;
Data analysis module 22, for according to Operation Log, the working specification of mining analysis user Data;
Grade quantizing module 23, for the working specification data according to user, quantifies the behaviour of user Make specification grade;
Compose power module 24, for giving the access control that user is corresponding with working specification grade Limit is or/and safety inspection strategy.
Periodically obtain the Operation Log of user using as the necessary hands safeguarding cloud computing system safety Section, periodic polling digging user daily record, searched problem by daily record, reduce management and safeguard Cost;Wherein, Operation Log according to user in the technical program, it is appreciated that this use The working specification degree at family, thus to its quantization operation specification grade, and according to the behaviour of this user Make specification grade and give its corresponding access control right and safety inspection strategy, this makes it possible to Reduce the visit capacity operating nonstandard user, can evade in cloud computing system from system A part of security risk, simultaneously can be with the operation of specification user.
On the basis of above-mentioned embodiment, in one embodiment of the present invention, grade quantizing mould Block includes: credit grade quantifying unit, corresponding with working specification grade for giving user Access control right is or/and safety inspection strategy;Credit score map unit, for according to user Current credit grade be the credit score that user adds correspondence, and according to the credit score of user The working specification grade that mapping pair is answered.
Wherein, credit score map unit includes: integration interpolation portion, for working as according to user Front credit grade is the credit score that user adds correspondence;Credit score cumulative unit, for according to Predetermined period, calculates the accumulation credit score of user;Grade mapping portion, for according to user's The working specification grade that accumulation credit score mapping pair is answered.
Introduce this strategy of credit score, highlight the working specification credit of user, mainly Refer to a series of access to resource that user carries out after entering the system, transmit, storage etc. The specification of the operation of aspect.Quantify credit grade, just give user according to the credit grade of user The most reasonably credit score, to map the working specification grade of this user, it is possible to learn exactly With this, the credit rating of user, differentiates that cloud computing system is caused the probability size of security risk by user.
Further, accumulating credit score by the cycle, wherein predetermined period can be according to specifically Environment divide, if 20 times of pre-set user operations are as a predetermined period, then Accumulating the credit score of these 20 times operations, the credit obtaining a predetermined period operation is amassed The summation divided, and the operation rule answered with the summation mapping pair of the credit score of this predetermined period Model grade, this is without just carrying out the division of working specification grade after the operation of each user, improve Work efficiency.
In sum, a kind of security control method based on cloud computing system provided by the present invention and System, periodically obtains the Operation Log of user using as the necessary hands safeguarding cloud computing system safety Section, periodic polling digging user daily record, searched problem by daily record, reduce management and safeguard Cost;Wherein, Operation Log according to user in the technical program, it is appreciated that this use The working specification degree at family, thus to its quantization operation specification grade, and according to the behaviour of this user Make specification grade and give its corresponding access control right and safety inspection strategy, this makes it possible to Reduce the visit capacity operating nonstandard user, can evade in cloud computing system from system A part of security risk, simultaneously can be with the operation of specification user.
Above to a kind of security control method based on cloud computing system provided by the present invention and be System is described in detail.Specific case used herein is to the principle of the present invention and embodiment party Formula is set forth, the explanation of above example be only intended to help to understand the method for the present invention and Its core concept.It should be pointed out that, for those skilled in the art, not On the premise of departing from the principle of the invention, it is also possible to the present invention is carried out some improvement and modification, this A little improvement and modification also fall in the protection domain of the claims in the present invention.

Claims (8)

1. a security control method based on cloud computing system, it is characterised in that including:
Periodically obtain the Operation Log of user;
According to described Operation Log, the working specification data of user described in mining analysis;
Working specification data according to described user, quantify the working specification grade of described user;
Give the described user access control right corresponding with described working specification grade or/and Safety inspection strategy.
Method the most according to claim 1, it is characterised in that described according to described use The working specification data at family, quantify the working specification grade of described user, including:
Working specification data according to described user, the credit grade amount of carrying out to described user Change;
Current credit grade according to described user is the credit score that described user adds correspondence, And the working specification grade answered according to the credit score mapping pair of described user.
Method the most according to claim 2, it is characterised in that described in described basis After the current credit grade of user is the credit score that described user adds correspondence, also include:
According to predetermined period, calculate the accumulation credit score of described user;
Wherein, the working specification grade answered according to the accumulation credit score mapping pair of described user.
Method the most according to claim 3, it is characterised in that preset described user's 20 operations are as a predetermined period.
5. according to the method described in any one of Claims 1-4, it is characterised in that described Give the described user access control right corresponding with described working specification grade or/and safety Inspection policy, including:
According to the raising of described working specification grade, the corresponding access control improving described user Limit, or/and reduce the safety inspection policy criteria to this user;
According to the reduction of described working specification grade, the corresponding access control reducing described user Limit, or/and improve the safety inspection policy criteria to this user.
6. a security management and control system based on cloud computing system, it is characterised in that including:
Information acquisition module, for the Operation Log of periodically acquisition user;
Data analysis module, for according to described Operation Log, the behaviour of user described in mining analysis Make authority data;
Grade quantizing module, for the working specification data according to described user, quantifies described use The working specification grade at family;
Compose power module, for giving the access that described user is corresponding with described working specification grade Control authority is or/and safety inspection strategy.
System the most according to claim 6, it is characterised in that described grade quantizing mould Block includes:
Credit grade quantifying unit, is used for giving described user relative with described working specification grade The access control right answered is or/and safety inspection strategy;
Credit score map unit, being used for according to the current credit grade of described user is described use Corresponding credit score, and the operation answered according to the credit score mapping pair of described user are added in family Specification grade.
System the most according to claim 7, it is characterised in that described credit score reflects Penetrate unit to include:
Integration interpolation portion, being used for according to the current credit grade of described user is that described user adds Corresponding credit score;
Credit score cumulative unit, for according to predetermined period, calculates the accumulation credit of described user Integration;
Grade mapping portion, for the operation answered according to the accumulation credit score mapping pair of described user Specification grade.
CN201610482061.5A 2016-06-27 2016-06-27 Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system Pending CN105897776A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610482061.5A CN105897776A (en) 2016-06-27 2016-06-27 Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610482061.5A CN105897776A (en) 2016-06-27 2016-06-27 Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system

Publications (1)

Publication Number Publication Date
CN105897776A true CN105897776A (en) 2016-08-24

Family

ID=56718410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610482061.5A Pending CN105897776A (en) 2016-06-27 2016-06-27 Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system

Country Status (1)

Country Link
CN (1) CN105897776A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106652626A (en) * 2016-10-31 2017-05-10 国网山东省电力公司莱芜供电公司 Special-purposed intelligent power control system of practical training and control process thereof
CN107872439A (en) * 2016-09-28 2018-04-03 腾讯科技(深圳)有限公司 A kind of personal identification method, apparatus and system
CN109726187A (en) * 2019-01-02 2019-05-07 北京信息科技大学 A kind of adaptive authority control method and device towards Hadoop

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100067383A (en) * 2008-12-11 2010-06-21 주식회사 티맥스 소프트 Server security system and server security method
CN101931534A (en) * 2010-08-30 2010-12-29 中兴通讯股份有限公司 Management method and device of operator resource usage license
CN102385632A (en) * 2011-12-02 2012-03-21 苏州阔地网络科技有限公司 Method and system for log automatic classification and notification
CN102761555A (en) * 2012-07-26 2012-10-31 郑州信大捷安信息技术股份有限公司 Mandatory access control system and control method based on access history
CN104463492A (en) * 2014-12-23 2015-03-25 国家电网公司 Operation management method of electric power system cloud simulation platform
CN105472010A (en) * 2015-12-22 2016-04-06 彭维国 Video-audio management platform system
CN105656837A (en) * 2014-11-11 2016-06-08 江苏威盾网络科技有限公司 Secure and controllable data protection system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100067383A (en) * 2008-12-11 2010-06-21 주식회사 티맥스 소프트 Server security system and server security method
CN101931534A (en) * 2010-08-30 2010-12-29 中兴通讯股份有限公司 Management method and device of operator resource usage license
CN102385632A (en) * 2011-12-02 2012-03-21 苏州阔地网络科技有限公司 Method and system for log automatic classification and notification
CN102761555A (en) * 2012-07-26 2012-10-31 郑州信大捷安信息技术股份有限公司 Mandatory access control system and control method based on access history
CN105656837A (en) * 2014-11-11 2016-06-08 江苏威盾网络科技有限公司 Secure and controllable data protection system and method
CN104463492A (en) * 2014-12-23 2015-03-25 国家电网公司 Operation management method of electric power system cloud simulation platform
CN105472010A (en) * 2015-12-22 2016-04-06 彭维国 Video-audio management platform system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872439A (en) * 2016-09-28 2018-04-03 腾讯科技(深圳)有限公司 A kind of personal identification method, apparatus and system
CN107872439B (en) * 2016-09-28 2021-02-05 腾讯科技(深圳)有限公司 Identity recognition method, device and system
CN106652626A (en) * 2016-10-31 2017-05-10 国网山东省电力公司莱芜供电公司 Special-purposed intelligent power control system of practical training and control process thereof
CN106652626B (en) * 2016-10-31 2023-02-24 国网山东省电力公司莱芜供电公司 Intelligent power supply control system special for practical training and control process thereof
CN109726187A (en) * 2019-01-02 2019-05-07 北京信息科技大学 A kind of adaptive authority control method and device towards Hadoop
CN109726187B (en) * 2019-01-02 2021-04-09 北京信息科技大学 Hadoop-oriented adaptive permission control method and device

Similar Documents

Publication Publication Date Title
CN104618343B (en) A kind of method and system of the website threat detection based on real-time logs
CN107644340A (en) Risk Identification Method, client device and risk recognition system
CN102404126B (en) Charging method of cloud computing during application process
CN106778253A (en) Threat context aware information security Initiative Defense model based on big data
CN103618652A (en) Audit and depth analysis system and audit and depth analysis method of business data
CN112307003B (en) Power grid data multidimensional auxiliary analysis method, system, terminal and readable storage medium
CN110503136A (en) Platform area line loss exception analysis method, computer readable storage medium and terminal device
CN108198408B (en) Self-adaptive anti-electricity-stealing monitoring method and system based on electricity information acquisition system
CN103701783A (en) Preprocessing unit, data processing system consisting of same, and processing method
EP4083823A2 (en) Method and apparatus for determining risk level of instance on cloud server and electronic device
CN109522190A (en) Abnormal user Activity recognition method and device, electronic equipment, storage medium
CN105897776A (en) Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system
CN108446989B (en) Method for determining commission charge and terminal equipment
CN108833442A (en) A kind of distributed network security monitoring device and its method
CN115796607A (en) Acquisition terminal security portrait assessment method based on power consumption information analysis
CN112350438A (en) Method, device, equipment and storage medium for electric quantity management
CN111800292A (en) Early warning method and device based on historical flow, computer equipment and storage medium
CN106649034B (en) Visual intelligent operation and maintenance method and platform
CN112511503A (en) Method, system, equipment and storage medium for improving safety of intelligent electric meter
CN104021079B (en) Real-time monitoring and analyzing system and method for host system data
CN110489394A (en) Intermediate data processing method and equipment
CN207882957U (en) A kind of safe big data intelligent analysis system
CN112910974B (en) System and method based on block chain system architecture
CN115471215A (en) Business process processing method and device
CN109685367A (en) Abnormal detection method, device and the terminal device for using water power

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160824