CN105897776A - Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system - Google Patents
Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system Download PDFInfo
- Publication number
- CN105897776A CN105897776A CN201610482061.5A CN201610482061A CN105897776A CN 105897776 A CN105897776 A CN 105897776A CN 201610482061 A CN201610482061 A CN 201610482061A CN 105897776 A CN105897776 A CN 105897776A
- Authority
- CN
- China
- Prior art keywords
- user
- grade
- described user
- working specification
- credit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a safety management and control method based on a cloud computation system and a safety management and control system based on a cloud computation system. The method comprises the following steps of: acquiring an operation log of a user at fixed period; according to the operation log, excavating and analyzing operation standard data of a user; according to the operation standard data of the user, quantifying an operation standard grade of the user; and giving a corresponding access control authority or/and a safety inspection strategy corresponding to the operation standard grade of the user. By finding the problems through logs, the management cost and the maintenance cost are reduced; according to the technical scheme, an operation standard degree of the user can be obtained according to the operation log of the user, so that the operation standard grade is quantified; the corresponding access control authority or/and the safety inspection strategy is given according to the corresponding operation standard grade of the user, so that the page view of users with irregular operation can be reduced and one part of safety risks in the cloud computation system can be avoided in terms of systems; meanwhile, the operation of the users can be standardized.
Description
Technical field
The present invention relates to field of cloud computer technology, particularly relate to a kind of based on cloud computing system
Security control method and system.
Background technology
Along with the development of science and technology, the range of application of cloud platform is more and more extensive.
Cloud computing be calculate, store, the development of the IT technology such as virtualization, communication and network technology
Development, demand driving and business model change the result collectively promoted.Cloud computing main
Captivation is the transparence etc. that high performance-price ratio, high usage, high scalability and resource use
Feature.Along with the development of cloud computing technology, its safety is increasingly paid close attention to by user.Cloud
In calculating system, owing to information contribution rate is high, customer volume is huge, and for security threat
Perception and process all will tend to unified, and therefore, the security management and control of cloud computing system is more macroscopical,
Need to strengthen from many aspects security monitoring, avoid risk.Wherein, the main bag of the safety of cloud computing
Include data safety, application safety and virtualization safety, generally use data isolation, data encryption,
The modes such as authorization and identification evade some security risks in cloud computing.This evades at technological layer
Some risk in cloud computing, but, this for cloud computing system security management and control not enough.
Thus, evade the risk in cloud computing the most further, to improve the safety of cloud computing,
It is that those skilled in the art are presently required and solve the technical problem that.
Summary of the invention
It is an object of the invention to provide a kind of security control method based on cloud computing system and be
System, can evade the risk in cloud computing further, to improve the safety of cloud computing further.
For solving above-mentioned technical problem, the technical scheme is that
A kind of security control method based on cloud computing system, including:
Periodically obtain the Operation Log of user;
According to described Operation Log, the working specification data of user described in mining analysis;
Working specification data according to described user, quantify the working specification grade of described user;
Give the described user access control right corresponding with described working specification grade or/and
Safety inspection strategy.
Preferably, the described working specification data according to described user, quantify the behaviour of described user
Make specification grade, including:
Working specification data according to described user, the credit grade amount of carrying out to described user
Change;
Current credit grade according to described user is the credit score that described user adds correspondence,
And the working specification grade answered according to the credit score mapping pair of described user.
Preferably, it is that described user adds in the described current credit grade according to described user right
After the credit score answered, also include:
According to predetermined period, calculate the accumulation credit score of described user;
Wherein, the working specification grade answered according to the accumulation credit score mapping pair of described user.
Preferably, 20 operations of described user are preset as a predetermined period.
Preferably, the access control that the described user of described imparting is corresponding with described working specification grade
Authority processed or/and safety inspection strategy, including:
According to the raising of described working specification grade, the corresponding access control improving described user
Limit, or/and reduce the safety inspection policy criteria to this user;
According to the reduction of described working specification grade, the corresponding access control reducing described user
Limit, or/and improve the safety inspection policy criteria to this user.
A kind of security management and control system based on cloud computing system, including:
Information acquisition module, for the Operation Log of periodically acquisition user;
Data analysis module, for according to described Operation Log, the behaviour of user described in mining analysis
Make authority data;
Grade quantizing module, for the working specification data according to described user, quantifies described use
The working specification grade at family;
Compose power module, for giving the access that described user is corresponding with described working specification grade
Control authority is or/and safety inspection strategy.
Preferably, described grade quantizing module includes:
Credit grade quantifying unit, is used for giving described user relative with described working specification grade
The access control right answered is or/and safety inspection strategy;
Credit score map unit, being used for according to the current credit grade of described user is described use
Corresponding credit score, and the operation answered according to the credit score mapping pair of described user are added in family
Specification grade.
Preferably, described credit score map unit includes:
Integration interpolation portion, being used for according to the current credit grade of described user is that described user adds
Corresponding credit score;
Credit score cumulative unit, for according to predetermined period, calculates the accumulation credit of described user
Integration;
Grade mapping portion, for the operation answered according to the accumulation credit score mapping pair of described user
Specification grade.
Compared with prior art, technique scheme has the advantage that
A kind of based on cloud computing system the security control method that the embodiment of the present invention is provided, bag
Include: periodically obtain the Operation Log of user;According to Operation Log, the operation of mining analysis user
Authority data;Working specification data according to user, quantify the working specification grade of user;Compose
Give user's access control right corresponding with working specification grade or/and safety inspection strategy.Fixed
Phase obtain user Operation Log using as safeguard cloud computing system safety necessary means, periodically
Poll digging user daily record, is searched problem by daily record, reduces management and the cost safeguarded;
Wherein, Operation Log according to user in the technical program, it is appreciated that the operation of this user
Standardized degree, thus to its quantization operation specification grade, and according to the working specification etc. of this user
Level gives its corresponding access control right and safety inspection strategy, this makes it possible to reduce operation
The visit capacity of nonstandard user, can evade the part peace in cloud computing system from system
Full blast danger, simultaneously can be with the operation of specification user.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below
The accompanying drawing used required in embodiment or description of the prior art will be briefly described, aobvious and
Easily insight, the accompanying drawing in describing below is some embodiments of the present invention, common for this area
From the point of view of technical staff, on the premise of not paying creative work, it is also possible to according to these accompanying drawings
Obtain other accompanying drawing.
The safety based on cloud computing system that Fig. 1 is provided by a kind of detailed description of the invention of the present invention
Management-control method flow chart;
The safety based on cloud computing system that Fig. 2 is provided by a kind of detailed description of the invention of the present invention
Managing and control system structural representation.
Detailed description of the invention
The core of the present invention is to provide a kind of security control method based on cloud computing system and is
System, can evade the risk in cloud computing further, to improve the safety of cloud computing further.
Understandable in order to enable the above-mentioned purpose of the present invention, feature and advantage to become apparent from, below
In conjunction with accompanying drawing, the detailed description of the invention of the present invention is described in detail.
Elaborate detail in the following description so that fully understanding the present invention.But this
Bright can be different from alternate manner described here implement with multiple, those skilled in the art can
To do similar popularization in the case of intension of the present invention.Therefore the present invention is not by following public affairs
The restriction being embodied as opened.
Refer to Fig. 1, Fig. 1 by a kind of detailed description of the invention of the present invention provided based on cloud meter
The security control method flow chart of calculation system.
A kind of detailed description of the invention of the present invention provides a kind of safety based on cloud computing system
Management-control method, including:
S11: periodically obtain the Operation Log of user;
S12: according to Operation Log, the working specification data of mining analysis user;
S13: according to the working specification data of user, quantify the working specification grade of user;
S14: give user's access control right corresponding with working specification grade or/and safety
Inspection policy.
Wherein, user's access control right corresponding with working specification grade is given or/and safety
Inspection policy, including: according to the raising of working specification grade, the corresponding access control improving user
Authority processed, or/and reduce the safety inspection policy criteria to this user;According to working specification grade
Reduction, the corresponding access control right reducing user, examine or/and improve the safety to this user
Look into policy criteria.Wherein, working specification the highest grade, represents the operation more specification of user, then
Characterize the security risk that cloud computing system causes by this user the lowest, therefore, it can give it more
High access control right, now in order to reduce the inspection work of system, checks efficiency to improve,
Then can suitably reduce the safety inspection policy criteria to this user;In contrast, when with
When the working specification grade at family is relatively low, illustrate that the operation of this user is lack of standardization, then this user is to cloud
Calculating system causes the probability of security risk the highest, therefore, reduces its access control right,
Its safety inspection policy criteria can be improved simultaneously.
Periodically obtain the Operation Log of user using as the necessary hands safeguarding cloud computing system safety
Section, periodic polling digging user daily record, searched problem by daily record, reduce management and safeguard
Cost;Wherein, Operation Log according to user in the technical program, it is appreciated that this use
The working specification degree at family, thus to its quantization operation specification grade, and according to the behaviour of this user
Make specification grade and give its corresponding access control right and safety inspection strategy, this makes it possible to
Reduce the visit capacity operating nonstandard user, can evade in cloud computing system from system
A part of security risk, simultaneously can be with the operation of specification user.
On the basis of above-mentioned embodiment, in one embodiment of the present invention, according to user
Working specification data, quantify user working specification grade, including:
Working specification data according to user, quantify the credit grade of user;
Current credit grade according to user be user add correspondence credit score, and according to
The working specification grade that the credit score mapping pair at family is answered.
Further, according to the current credit grade of user be user add correspondence credit amass
After/, also include: according to predetermined period, calculate the accumulation credit score of user;Wherein,
The working specification grade that accumulation credit score mapping pair according to user is answered.
In the present embodiment, introduce this strategy of credit score, highlight the operation of user
Specification credit, i.e. refers mainly to a series of visit to resource that user is carried out after entering the system
Ask, transmit, the specification of the operation of the aspect such as storage.Quantify credit grade, according to the letter of user
The credit score that user holds water is given by grade, to map the working specification grade of this user,
The credit rating of user can be learnt exactly, differentiate that cloud computing system is caused safety by user with this
The probability size of risk.
Further, accumulating credit score by the cycle, wherein predetermined period can be according to specifically
Environment divide, if 20 times of pre-set user operations are as a predetermined period, then
Accumulating the credit score of these 20 times operations, the credit obtaining a predetermined period operation is amassed
The summation divided, and the operation rule answered with the summation mapping pair of the credit score of this predetermined period
Model grade, this is without just carrying out the division of working specification grade after the operation of each user, improve
Work efficiency.
In the present embodiment, after a upper end cycle, before next cycle starts,
When i.e. the operation in user's one week after phase starts, according to its credit, implement different technical peaces
Full strategy.As poor in certain user credit, then it is carried out higher safety inspection and lower degree
Access control right.So cycle substitutes credit policy restriction, can evade cloud computing system
In a part of security risk, the simultaneously specification operation of user the most well.
Refer to Fig. 2, Fig. 2 by a kind of detailed description of the invention of the present invention provided based on cloud meter
The security management and control system structure schematic diagram of calculation system.
Correspondingly, one embodiment of the present invention additionally provides a kind of peace based on cloud computing system
Full managing and control system, including:
Information acquisition module 21, for the Operation Log of periodically acquisition user;
Data analysis module 22, for according to Operation Log, the working specification of mining analysis user
Data;
Grade quantizing module 23, for the working specification data according to user, quantifies the behaviour of user
Make specification grade;
Compose power module 24, for giving the access control that user is corresponding with working specification grade
Limit is or/and safety inspection strategy.
Periodically obtain the Operation Log of user using as the necessary hands safeguarding cloud computing system safety
Section, periodic polling digging user daily record, searched problem by daily record, reduce management and safeguard
Cost;Wherein, Operation Log according to user in the technical program, it is appreciated that this use
The working specification degree at family, thus to its quantization operation specification grade, and according to the behaviour of this user
Make specification grade and give its corresponding access control right and safety inspection strategy, this makes it possible to
Reduce the visit capacity operating nonstandard user, can evade in cloud computing system from system
A part of security risk, simultaneously can be with the operation of specification user.
On the basis of above-mentioned embodiment, in one embodiment of the present invention, grade quantizing mould
Block includes: credit grade quantifying unit, corresponding with working specification grade for giving user
Access control right is or/and safety inspection strategy;Credit score map unit, for according to user
Current credit grade be the credit score that user adds correspondence, and according to the credit score of user
The working specification grade that mapping pair is answered.
Wherein, credit score map unit includes: integration interpolation portion, for working as according to user
Front credit grade is the credit score that user adds correspondence;Credit score cumulative unit, for according to
Predetermined period, calculates the accumulation credit score of user;Grade mapping portion, for according to user's
The working specification grade that accumulation credit score mapping pair is answered.
Introduce this strategy of credit score, highlight the working specification credit of user, mainly
Refer to a series of access to resource that user carries out after entering the system, transmit, storage etc.
The specification of the operation of aspect.Quantify credit grade, just give user according to the credit grade of user
The most reasonably credit score, to map the working specification grade of this user, it is possible to learn exactly
With this, the credit rating of user, differentiates that cloud computing system is caused the probability size of security risk by user.
Further, accumulating credit score by the cycle, wherein predetermined period can be according to specifically
Environment divide, if 20 times of pre-set user operations are as a predetermined period, then
Accumulating the credit score of these 20 times operations, the credit obtaining a predetermined period operation is amassed
The summation divided, and the operation rule answered with the summation mapping pair of the credit score of this predetermined period
Model grade, this is without just carrying out the division of working specification grade after the operation of each user, improve
Work efficiency.
In sum, a kind of security control method based on cloud computing system provided by the present invention and
System, periodically obtains the Operation Log of user using as the necessary hands safeguarding cloud computing system safety
Section, periodic polling digging user daily record, searched problem by daily record, reduce management and safeguard
Cost;Wherein, Operation Log according to user in the technical program, it is appreciated that this use
The working specification degree at family, thus to its quantization operation specification grade, and according to the behaviour of this user
Make specification grade and give its corresponding access control right and safety inspection strategy, this makes it possible to
Reduce the visit capacity operating nonstandard user, can evade in cloud computing system from system
A part of security risk, simultaneously can be with the operation of specification user.
Above to a kind of security control method based on cloud computing system provided by the present invention and be
System is described in detail.Specific case used herein is to the principle of the present invention and embodiment party
Formula is set forth, the explanation of above example be only intended to help to understand the method for the present invention and
Its core concept.It should be pointed out that, for those skilled in the art, not
On the premise of departing from the principle of the invention, it is also possible to the present invention is carried out some improvement and modification, this
A little improvement and modification also fall in the protection domain of the claims in the present invention.
Claims (8)
1. a security control method based on cloud computing system, it is characterised in that including:
Periodically obtain the Operation Log of user;
According to described Operation Log, the working specification data of user described in mining analysis;
Working specification data according to described user, quantify the working specification grade of described user;
Give the described user access control right corresponding with described working specification grade or/and
Safety inspection strategy.
Method the most according to claim 1, it is characterised in that described according to described use
The working specification data at family, quantify the working specification grade of described user, including:
Working specification data according to described user, the credit grade amount of carrying out to described user
Change;
Current credit grade according to described user is the credit score that described user adds correspondence,
And the working specification grade answered according to the credit score mapping pair of described user.
Method the most according to claim 2, it is characterised in that described in described basis
After the current credit grade of user is the credit score that described user adds correspondence, also include:
According to predetermined period, calculate the accumulation credit score of described user;
Wherein, the working specification grade answered according to the accumulation credit score mapping pair of described user.
Method the most according to claim 3, it is characterised in that preset described user's
20 operations are as a predetermined period.
5. according to the method described in any one of Claims 1-4, it is characterised in that described
Give the described user access control right corresponding with described working specification grade or/and safety
Inspection policy, including:
According to the raising of described working specification grade, the corresponding access control improving described user
Limit, or/and reduce the safety inspection policy criteria to this user;
According to the reduction of described working specification grade, the corresponding access control reducing described user
Limit, or/and improve the safety inspection policy criteria to this user.
6. a security management and control system based on cloud computing system, it is characterised in that including:
Information acquisition module, for the Operation Log of periodically acquisition user;
Data analysis module, for according to described Operation Log, the behaviour of user described in mining analysis
Make authority data;
Grade quantizing module, for the working specification data according to described user, quantifies described use
The working specification grade at family;
Compose power module, for giving the access that described user is corresponding with described working specification grade
Control authority is or/and safety inspection strategy.
System the most according to claim 6, it is characterised in that described grade quantizing mould
Block includes:
Credit grade quantifying unit, is used for giving described user relative with described working specification grade
The access control right answered is or/and safety inspection strategy;
Credit score map unit, being used for according to the current credit grade of described user is described use
Corresponding credit score, and the operation answered according to the credit score mapping pair of described user are added in family
Specification grade.
System the most according to claim 7, it is characterised in that described credit score reflects
Penetrate unit to include:
Integration interpolation portion, being used for according to the current credit grade of described user is that described user adds
Corresponding credit score;
Credit score cumulative unit, for according to predetermined period, calculates the accumulation credit of described user
Integration;
Grade mapping portion, for the operation answered according to the accumulation credit score mapping pair of described user
Specification grade.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482061.5A CN105897776A (en) | 2016-06-27 | 2016-06-27 | Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482061.5A CN105897776A (en) | 2016-06-27 | 2016-06-27 | Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105897776A true CN105897776A (en) | 2016-08-24 |
Family
ID=56718410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610482061.5A Pending CN105897776A (en) | 2016-06-27 | 2016-06-27 | Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105897776A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106652626A (en) * | 2016-10-31 | 2017-05-10 | 国网山东省电力公司莱芜供电公司 | Special-purposed intelligent power control system of practical training and control process thereof |
CN107872439A (en) * | 2016-09-28 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of personal identification method, apparatus and system |
CN109726187A (en) * | 2019-01-02 | 2019-05-07 | 北京信息科技大学 | A kind of adaptive authority control method and device towards Hadoop |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20100067383A (en) * | 2008-12-11 | 2010-06-21 | 주식회사 티맥스 소프트 | Server security system and server security method |
CN101931534A (en) * | 2010-08-30 | 2010-12-29 | 中兴通讯股份有限公司 | Management method and device of operator resource usage license |
CN102385632A (en) * | 2011-12-02 | 2012-03-21 | 苏州阔地网络科技有限公司 | Method and system for log automatic classification and notification |
CN102761555A (en) * | 2012-07-26 | 2012-10-31 | 郑州信大捷安信息技术股份有限公司 | Mandatory access control system and control method based on access history |
CN104463492A (en) * | 2014-12-23 | 2015-03-25 | 国家电网公司 | Operation management method of electric power system cloud simulation platform |
CN105472010A (en) * | 2015-12-22 | 2016-04-06 | 彭维国 | Video-audio management platform system |
CN105656837A (en) * | 2014-11-11 | 2016-06-08 | 江苏威盾网络科技有限公司 | Secure and controllable data protection system and method |
-
2016
- 2016-06-27 CN CN201610482061.5A patent/CN105897776A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20100067383A (en) * | 2008-12-11 | 2010-06-21 | 주식회사 티맥스 소프트 | Server security system and server security method |
CN101931534A (en) * | 2010-08-30 | 2010-12-29 | 中兴通讯股份有限公司 | Management method and device of operator resource usage license |
CN102385632A (en) * | 2011-12-02 | 2012-03-21 | 苏州阔地网络科技有限公司 | Method and system for log automatic classification and notification |
CN102761555A (en) * | 2012-07-26 | 2012-10-31 | 郑州信大捷安信息技术股份有限公司 | Mandatory access control system and control method based on access history |
CN105656837A (en) * | 2014-11-11 | 2016-06-08 | 江苏威盾网络科技有限公司 | Secure and controllable data protection system and method |
CN104463492A (en) * | 2014-12-23 | 2015-03-25 | 国家电网公司 | Operation management method of electric power system cloud simulation platform |
CN105472010A (en) * | 2015-12-22 | 2016-04-06 | 彭维国 | Video-audio management platform system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107872439A (en) * | 2016-09-28 | 2018-04-03 | 腾讯科技(深圳)有限公司 | A kind of personal identification method, apparatus and system |
CN107872439B (en) * | 2016-09-28 | 2021-02-05 | 腾讯科技(深圳)有限公司 | Identity recognition method, device and system |
CN106652626A (en) * | 2016-10-31 | 2017-05-10 | 国网山东省电力公司莱芜供电公司 | Special-purposed intelligent power control system of practical training and control process thereof |
CN106652626B (en) * | 2016-10-31 | 2023-02-24 | 国网山东省电力公司莱芜供电公司 | Intelligent power supply control system special for practical training and control process thereof |
CN109726187A (en) * | 2019-01-02 | 2019-05-07 | 北京信息科技大学 | A kind of adaptive authority control method and device towards Hadoop |
CN109726187B (en) * | 2019-01-02 | 2021-04-09 | 北京信息科技大学 | Hadoop-oriented adaptive permission control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104618343B (en) | A kind of method and system of the website threat detection based on real-time logs | |
CN107644340A (en) | Risk Identification Method, client device and risk recognition system | |
CN102404126B (en) | Charging method of cloud computing during application process | |
CN106778253A (en) | Threat context aware information security Initiative Defense model based on big data | |
CN103618652A (en) | Audit and depth analysis system and audit and depth analysis method of business data | |
CN112307003B (en) | Power grid data multidimensional auxiliary analysis method, system, terminal and readable storage medium | |
CN110503136A (en) | Platform area line loss exception analysis method, computer readable storage medium and terminal device | |
CN108198408B (en) | Self-adaptive anti-electricity-stealing monitoring method and system based on electricity information acquisition system | |
CN103701783A (en) | Preprocessing unit, data processing system consisting of same, and processing method | |
EP4083823A2 (en) | Method and apparatus for determining risk level of instance on cloud server and electronic device | |
CN109522190A (en) | Abnormal user Activity recognition method and device, electronic equipment, storage medium | |
CN105897776A (en) | Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system | |
CN108446989B (en) | Method for determining commission charge and terminal equipment | |
CN108833442A (en) | A kind of distributed network security monitoring device and its method | |
CN115796607A (en) | Acquisition terminal security portrait assessment method based on power consumption information analysis | |
CN112350438A (en) | Method, device, equipment and storage medium for electric quantity management | |
CN111800292A (en) | Early warning method and device based on historical flow, computer equipment and storage medium | |
CN106649034B (en) | Visual intelligent operation and maintenance method and platform | |
CN112511503A (en) | Method, system, equipment and storage medium for improving safety of intelligent electric meter | |
CN104021079B (en) | Real-time monitoring and analyzing system and method for host system data | |
CN110489394A (en) | Intermediate data processing method and equipment | |
CN207882957U (en) | A kind of safe big data intelligent analysis system | |
CN112910974B (en) | System and method based on block chain system architecture | |
CN115471215A (en) | Business process processing method and device | |
CN109685367A (en) | Abnormal detection method, device and the terminal device for using water power |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160824 |