CN106302484A - Method for centralized management of strategies - Google Patents

Method for centralized management of strategies Download PDF

Info

Publication number
CN106302484A
CN106302484A CN201610698455.4A CN201610698455A CN106302484A CN 106302484 A CN106302484 A CN 106302484A CN 201610698455 A CN201610698455 A CN 201610698455A CN 106302484 A CN106302484 A CN 106302484A
Authority
CN
China
Prior art keywords
client
policy
centralized management
strategy
message queue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610698455.4A
Other languages
Chinese (zh)
Inventor
梁媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201610698455.4A priority Critical patent/CN106302484A/en
Publication of CN106302484A publication Critical patent/CN106302484A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for centralized management of strategies, which is composed of a centralized management platform and a client, wherein the centralized management platform customizes and distributes system security strategies for the client to realize strategy management, the client is arranged on a host needing protection, the centralized management platform is arranged on an independent host, and the communication between the centralized management platform and the client carries out asynchronous transmission and processing of messages through a message bus. Compared with the prior art, the strategy centralized management method can uniformly manage strategies, can manage thousands of servers simultaneously, can bear higher service volume, greatly improves the throughput and performance of the system, and is simple, flexible, efficient, strong in practicability and easy to popularize.

Description

A kind of method of Centralized management of policy
Technical field
The present invention relates to computer server communication and operating system security technical field, specifically a kind of practicality By force, the method for Centralized management of policy.
Background technology
The safety product disposed in network gets more and more, and safety problem does not appears to any improvement, for security function Increasing, operation system performance receives and has a strong impact on, and security strategy based on system and network is also not reaching to the granularity of application, This brings huge challenge to Information Security Construction.
In the prior art, the safety operating system security of product is reinforced software and is realized, and operating system security is reinforced Software is the server security securing software of a kernel level, possess system Initiative Defense, security configuration Baseline detection and reparation, The function such as integrity detection, safe early warning, supports and sea of clouds OS safety interaction, can protect server OS and virtualize soft Part exempts from virus wooden horse, resists assault.
But, it is too much that operating system security reinforces software, is not easy to centralized management, there is multiple servers the most simultaneously Time, every station server has the operating system security of oneself to reinforce software, causes managing cost relatively big, and the efficiency of management is relatively low, base In this, a kind of operating system security is now provided to reinforce the side that strategy can be managed collectively by the centralized management pattern of software Method, can manage thousands of station server simultaneously, can bear higher portfolio, greatly improves handling capacity and the performance of system, joins Put simple, flexible, efficient.
Summary of the invention
The technical assignment of the present invention is for above weak point, it is provided that a kind of practical, side of Centralized management of policy Method.
A kind of method of Centralized management of policy, is formed by centralized management platform and client two parts and is realized, by collection Middle management platform is that client customizes dissemination system security strategy, it is achieved tactical management, client is arranged on needs master to be protected On machine, centralized management stage+module is on single main frame, and message is passed through in the communication between this centralized management platform and client Bus carries out asynchronous transmission and the process of message.
Described System Security Policy is the set of the rule formulated according to business demand, and this System Security Policy includes system Predefining and User Defined two class, every class System Security Policy is divided into grouping strategy, separate unit strategy, can be by solving latching operation Implementation strategy is self-defined, releases and the inheritance of father's packet, is converted to separate unit strategy;Also can realize recovering by lock operation Father's grouping strategy, is converted to grouping strategy.
Tactical management includes that basic setup, Initiative Defense, security configuration, integrity detection, alarm arrange five parts, its In,
Basic setup, for arranging centralized management platform and the commitment defini interval of client, is defaulted as 30 seconds;
Initiative Defense is for arranging the pattern of Initiative Defense, defence rank, real-time protection configuration item;
Security configuration arranges cycle and security configuration item for the scanner uni reparation arranging security configuration;
Integrity detection is for arranging detection cycle and the detection of integrity detection;
Alarm is provided for arranging daily record and ALM.
Described messaging bus uses third party open source software RabbitMQ to realize managing platform concentratedly to multiple clients Asynchronous message communication, centralized management platform comprises a RabbitMQ Server, and strategically distribution and state resolve RabbitMQ Server is divided into two kinds of message queues: downstream message queue and upstream message queue, and the client of message communication End includes RabbitMQ Client and leads to the message queue corresponding for RabbitMQ Server in centralized management platform News, complete asynchronous communication.
RabbitMQ Server downstream message queue in centralized management platform, is used for issuing centralized management platform configuration Policy data, centralized management platform, it is each client that downstream message queue uniquely identifies Client ID according to client Set up unique corresponding message queue;Centralized management platform is put into the policy data of configuration and is associated with client Client ID Downstream message queue in, then in upstream message queue, waiting state returns and resolves;RabbitMQ in client Client monitors corresponding downstream message queue;After client receives policy data, completes policy deployment, strategy State together with client Client ID form status data, sent along to centralized management platform upstream message team in.
RabbitMQ Server upstream message queue in centralized management platform, for receiving what Client Policy was disposed State, the RabbitMQ Server in centralized management platform only has unique upstream message queue, the shape that different clients is uploaded This message queue of state data sharing;When, after client status data to upstream message queue, centralized management platform is according to shape Client ID in state data identifies the client of correspondence, completes the client message communication to centralized management platform.
The realization of tactical management is realized by strategy configuration, policy determination, policy distribution and four submodules of policy synchronization, Particularly as follows:
Strategy configuration, refers to that the operation by user carries out tactical management by WEB page is saved in data base;Preserve successfully After, need the operation carrying out policy distribution to join in the message queue of policy determination;
Policy determination, according to the setting of user come into force for grouping strategy or separate unit strategy, the strategy after judgement is passed through client The message queue of end is issued to the client specified;
Policy distribution, Client Policy is after judgement, in sending extremely with client id for uniquely identified message queue, client End monitors the state of this queue, is once found to have the strategy needing to issue, then the content of acquisition strategy loads;
Policy synchronization, client sends local policy information, i.e. id and version number to management platform, if strategy version differs Causing, management platform actively issues up-to-date strategy to client.
The method of a kind of Centralized management of policy of the present invention, has the advantage that
The method of a kind of Centralized management of policy of the present invention, can carry out unified management to strategy, can manage thousands of simultaneously Server, can bear higher portfolio, greatly improves handling capacity and the performance of system, and configuration is simple, flexible, efficient, logical Crossing centralized management platform can be server custom dissemination system Active defense strategy, security configuration strategy, integrity detection plan Omit and warning strategies;The Centralized management of policy method of the present invention can support to manage the client of more than 1000, configure simply, Flexibly with efficient;Centralized management platform carries out asynchronous transmission and the process of message with communicating of client by messaging bus, is Realize loose couplings between system functional module, higher portfolio can be born, greatly improve handling capacity and the performance of system, real Strong by property, it is easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is the overall structure deployment diagram of the present invention.
Accompanying drawing 2 is tactical management schematic flow sheet.
Detailed description of the invention
Below in conjunction with the accompanying drawings and specific embodiment the invention will be further described.
As shown in accompanying drawing 1, Fig. 2, the present invention provides a kind of method of Centralized management of policy, and operating system security reinforces software It is the server security securing software of a kernel level, possesses system Initiative Defense, security configuration Baseline detection and reparation, complete Property the function such as detection, safe early warning, support and sea of clouds OS safety interaction, server OS and virtualization software can be protected to exempt from Suffer virus wooden horse, resist assault.Operating system security reinforces the centralized management pattern of software for there being multiple servers User, can save the cost of user, facilitates technical staff's management to server.Can be server by centralized management platform Customization dissemination system Active defense strategy, security configuration strategy, integrity detection strategy and warning strategies.The strategy of the present invention Centralized management method can support to manage the client of more than 1000, and configuration is simple, flexible and efficient.Centralized management platform and visitor The communication of family end carries out asynchronous transmission and the process of message by messaging bus, realizes loose couplings between system function module, Higher portfolio can be born, greatly improve handling capacity and the performance of system.
The present invention relates to operating system security and reinforce the centralized management pattern of software, by centralized management platform and client End two parts form and realize, and are that client customizes dissemination system security strategy by centralized management platform, it is achieved tactical management, Client is arranged on to be needed on main frame to be protected, centralized management stage+module on single main frame, this centralized management platform and Communication between client carries out asynchronous transmission and the process of message by messaging bus.
Described System Security Policy is the set of the rule formulated according to business demand.Classify by the establishment mode of strategy, Strategy can be divided into system predefined and User Defined two class, and the predefined strategy of system does not allow to delete and edit operation, Can be by arranging opening.
Classifying by the mode that issues of strategy, strategy can be divided into grouping strategy, separate unit strategy, is defaulted as grouping strategy, single The priority of platform strategy is higher than packet.Client support packet is managed, predefined point of system of this packet default allocation Group policy, the client under this packet and subgroup all inherits this strategy.If it is intended to self-defined strategy, then can be grasped by unblock Make to release the inheritance of father's packet, then policing type is separate unit strategy, divides it is also possible to recover father by lock operation Group policy.
Tactical management includes that basic setup, Initiative Defense, security configuration, integrity detection, alarm arrange five parts, its In,
Basic setup, for arranging centralized management platform and the commitment defini interval of client, is defaulted as 30 seconds;
Initiative Defense is for arranging the pattern of Initiative Defense, defence rank, real-time protection configuration item;
Security configuration arranges cycle and security configuration item for the scanner uni reparation arranging security configuration;
Integrity detection is for arranging detection cycle and the detection of integrity detection;
Alarm is provided for arranging daily record and ALM.
Described messaging bus uses third party open source software RabbitMQ to realize managing platform concentratedly to multiple clients Asynchronous message communication, centralized management platform comprises a RabbitMQ Server, and strategically distribution and state resolve RabbitMQ Server is divided into two kinds of message queues: downstream message queue and upstream message queue, and the client of message communication End includes RabbitMQ Client and leads to the message queue corresponding for RabbitMQ Server in centralized management platform News, complete asynchronous communication.
RabbitMQ Server downstream message queue in centralized management platform, is used for issuing centralized management platform configuration Policy data, centralized management platform, it is each client that downstream message queue uniquely identifies Client ID according to client Set up unique corresponding message queue;Centralized management platform is put into the policy data of configuration and is associated with client Client ID Downstream message queue in, then in upstream message queue, waiting state returns and resolves;RabbitMQ in client Client monitors corresponding downstream message queue;After client receives policy data, completes policy deployment, strategy State together with client Client ID form status data, sent along to centralized management platform upstream message team in.
RabbitMQ Server upstream message queue in centralized management platform, for receiving what Client Policy was disposed State, the RabbitMQ Server in centralized management platform only has unique upstream message queue, the shape that different clients is uploaded This message queue of state data sharing;When, after client status data to upstream message queue, centralized management platform is according to shape Client ID in state data identifies the client of correspondence, completes the client message communication to centralized management platform.
The messaging bus that the present invention relates to is a kind of AMQP(advanced message queue protocol) message mechanism, utilize this kind senior Message queue protocol realizes storage and forwards the decoupling between message and assembly, and the sender of message is without knowing message user Exist, reach the expansibility of system.
The realization of tactical management is realized by strategy configuration, policy determination, policy distribution and four submodules of policy synchronization, Particularly as follows:
Strategy configuration, refers to that the operation by user carries out tactical management by WEB page is saved in data base;Preserve successfully After, need the operation carrying out policy distribution to join in the message queue of policy determination;
Policy determination, according to the setting of user come into force for grouping strategy or separate unit strategy, the strategy after judgement is passed through client The message queue of end is issued to the client specified;
Policy distribution, Client Policy is after judgement, in sending extremely with client id for uniquely identified message queue, client End monitors the state of this queue, is once found to have the strategy needing to issue, then the content of acquisition strategy loads;
Policy synchronization, client sends local policy information, i.e. id and version number to management platform, if strategy version differs Causing, management platform actively issues up-to-date strategy to client.
Above-mentioned detailed description of the invention is only the concrete case of the present invention, and the scope of patent protection of the present invention includes but not limited to Above-mentioned detailed description of the invention, claims of the method for any a kind of Centralized management of policy meeting the present invention and any institute The those of ordinary skill stating technical field is suitably changed what it did or replaces, and all should fall into the patent protection model of the present invention Enclose.

Claims (7)

1. the method for a Centralized management of policy, it is characterised in that be made up of centralized management platform and client two parts and real Existing, it is that client customizes dissemination system security strategy by centralized management platform, it is achieved tactical management, client is arranged on needs On the main frame of protection, manage stage+module communication on single main frame, between this centralized management platform and client concentratedly Asynchronous transmission and the process of message is carried out by messaging bus.
The method of a kind of Centralized management of policy the most according to claim 1, it is characterised in that described System Security Policy is According to the set of the rule that business demand is formulated, this System Security Policy includes that system predefines and User Defined two class, often Class System Security Policy is divided into grouping strategy, separate unit strategy, can be self-defined by solving latching operation implementation strategy, releases and father divides The inheritance of group, is converted to separate unit strategy;Also can realize recovering father's grouping strategy by lock operation, be converted to be grouped plan Slightly.
The method of a kind of Centralized management of policy the most according to claim 1, it is characterised in that tactical management includes substantially setting Put, Initiative Defense, security configuration, integrity detection, alarm arrange five parts, wherein,
Basic setup, for arranging centralized management platform and the commitment defini interval of client, is defaulted as 30 seconds;
Initiative Defense is for arranging the pattern of Initiative Defense, defence rank, real-time protection configuration item;
Security configuration arranges cycle and security configuration item for the scanner uni reparation arranging security configuration;
Integrity detection is for arranging detection cycle and the detection of integrity detection;
Alarm is provided for arranging daily record and ALM.
The method of a kind of Centralized management of policy the most according to claim 1, it is characterised in that described messaging bus uses the Tripartite open source software RabbitMQ realizes the asynchronous message communication managing platform concentratedly to multiple clients, manages platform concentratedly Comprising a RabbitMQ Server, strategically distribution and state resolve RabbitMQ Server and are divided into two kinds of message teams Arrange: downstream message queue and upstream message queue, and the client of message communication includes RabbitMQ Client and concentrate tube Message queue corresponding for RabbitMQ Server in platform carries out communication, completes asynchronous communication.
The method of a kind of Centralized management of policy the most according to claim 4, it is characterised in that in centralized management platform RabbitMQ Server downstream message queue, for issuing the policy data of centralized management platform configuration, pats at concentrate tube Platform, it is that each client sets up unique corresponding message queue that downstream message queue uniquely identifies Client ID according to client; Centralized management platform is put into the policy data of configuration in the downstream message queue associated with client Client ID, then exists In upstream message queue, waiting state returns and resolves;RabbitMQ Client in client monitors corresponding descending Message queue;After client receives policy data, completes policy deployment, Policy Status together with client Client ID Composition status data, sent along to centralized management platform upstream message team in.
The method of a kind of Centralized management of policy the most according to claim 5, it is characterised in that in centralized management platform RabbitMQ Server upstream message queue, for receiving the state that Client Policy is disposed, in centralized management platform RabbitMQ Server only has unique upstream message queue, and the status data that different clients is uploaded shares this message queue; When, after client status data to upstream message queue, centralized management platform comes according to the Client ID in status data Identify the client of correspondence, complete the client message communication to centralized management platform.
The method of a kind of Centralized management of policy the most according to claim 2, it is characterised in that the realization of tactical management is passed through Strategy configuration, policy determination, policy distribution and four submodules of policy synchronization realize, particularly as follows:
Strategy configuration, refers to that the operation by user carries out tactical management by WEB page is saved in data base;Preserve successfully After, need the operation carrying out policy distribution to join in the message queue of policy determination;
Policy determination, according to the setting of user come into force for grouping strategy or separate unit strategy, the strategy after judgement is passed through client The message queue of end is issued to the client specified;
Policy distribution, Client Policy is after judgement, in sending extremely with client id for uniquely identified message queue, client End monitors the state of this queue, is once found to have the strategy needing to issue, then the content of acquisition strategy loads;
Policy synchronization, client sends local policy information, i.e. id and version number to management platform, if strategy version differs Causing, management platform actively issues up-to-date strategy to client.
CN201610698455.4A 2016-08-22 2016-08-22 Method for centralized management of strategies Pending CN106302484A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610698455.4A CN106302484A (en) 2016-08-22 2016-08-22 Method for centralized management of strategies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610698455.4A CN106302484A (en) 2016-08-22 2016-08-22 Method for centralized management of strategies

Publications (1)

Publication Number Publication Date
CN106302484A true CN106302484A (en) 2017-01-04

Family

ID=57660833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610698455.4A Pending CN106302484A (en) 2016-08-22 2016-08-22 Method for centralized management of strategies

Country Status (1)

Country Link
CN (1) CN106302484A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657159A (en) * 2017-02-27 2017-05-10 杭州迪普科技股份有限公司 Security strategy generating method and device
CN106997435A (en) * 2017-04-14 2017-08-01 广东浪潮大数据研究有限公司 A kind of method of operating system security prevention and control, apparatus and system
CN107332863A (en) * 2017-08-16 2017-11-07 深信服科技股份有限公司 The safety detection method and system of a kind of main frame based on centralized management
CN107437037A (en) * 2017-07-31 2017-12-05 郑州云海信息技术有限公司 A kind of method that information leakage protection is realized based on fail-safe software
CN107657171A (en) * 2017-09-11 2018-02-02 郑州云海信息技术有限公司 A kind of method in SSR centralized management platform management application programs
CN108551467A (en) * 2018-03-15 2018-09-18 北京雷石天地电子技术有限公司 A kind of order programme and method
CN108551439A (en) * 2018-03-23 2018-09-18 杭州迪普科技股份有限公司 A kind of improved method and device of policy template application
CN109086625A (en) * 2018-08-08 2018-12-25 国云科技股份有限公司 A kind of method that cloud platform Host Security is reinforced
CN109150866A (en) * 2018-08-09 2019-01-04 郑州云海信息技术有限公司 A kind of policy distribution feedback and check system and method
CN109327434A (en) * 2018-09-04 2019-02-12 郑州云海信息技术有限公司 A kind of system and method for mixed management security strategy
CN109995720A (en) * 2017-12-30 2019-07-09 中国移动通信集团贵州有限公司 Heterogeneous device manages method, apparatus, system, equipment and medium concentratedly
CN110119622A (en) * 2019-05-15 2019-08-13 苏州浪潮智能科技有限公司 A kind of registration table Integrity Management method, system and equipment
CN110519221A (en) * 2019-07-12 2019-11-29 苏州浪潮智能科技有限公司 A kind of pair of host carries out the method, apparatus and management system of safeguard protection
CN110868401A (en) * 2019-10-28 2020-03-06 上海爱数信息技术股份有限公司 Parallel persistent data encryption acquisition and issuing method suitable for network single-pass scene
CN114785549A (en) * 2022-03-23 2022-07-22 新华三信息安全技术有限公司 Safety protection system and safety protection method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024060A (en) * 2012-12-20 2013-04-03 中国科学院深圳先进技术研究院 Open type cloud computing monitoring system for large scale cluster and method thereof
CN105162884A (en) * 2015-09-25 2015-12-16 浪潮(北京)电子信息产业有限公司 Cloud management platform based on micro-service architecture
CN105391684A (en) * 2015-10-14 2016-03-09 浪潮电子信息产业股份有限公司 Centralized management method and centralized management device for strategies

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024060A (en) * 2012-12-20 2013-04-03 中国科学院深圳先进技术研究院 Open type cloud computing monitoring system for large scale cluster and method thereof
CN105162884A (en) * 2015-09-25 2015-12-16 浪潮(北京)电子信息产业有限公司 Cloud management platform based on micro-service architecture
CN105391684A (en) * 2015-10-14 2016-03-09 浪潮电子信息产业股份有限公司 Centralized management method and centralized management device for strategies

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657159A (en) * 2017-02-27 2017-05-10 杭州迪普科技股份有限公司 Security strategy generating method and device
CN106997435A (en) * 2017-04-14 2017-08-01 广东浪潮大数据研究有限公司 A kind of method of operating system security prevention and control, apparatus and system
CN106997435B (en) * 2017-04-14 2020-06-02 广东浪潮大数据研究有限公司 Method, device and system for safety prevention and control of operating system
CN107437037A (en) * 2017-07-31 2017-12-05 郑州云海信息技术有限公司 A kind of method that information leakage protection is realized based on fail-safe software
CN107332863A (en) * 2017-08-16 2017-11-07 深信服科技股份有限公司 The safety detection method and system of a kind of main frame based on centralized management
CN107657171A (en) * 2017-09-11 2018-02-02 郑州云海信息技术有限公司 A kind of method in SSR centralized management platform management application programs
CN109995720A (en) * 2017-12-30 2019-07-09 中国移动通信集团贵州有限公司 Heterogeneous device manages method, apparatus, system, equipment and medium concentratedly
CN108551467A (en) * 2018-03-15 2018-09-18 北京雷石天地电子技术有限公司 A kind of order programme and method
CN108551439A (en) * 2018-03-23 2018-09-18 杭州迪普科技股份有限公司 A kind of improved method and device of policy template application
CN109086625A (en) * 2018-08-08 2018-12-25 国云科技股份有限公司 A kind of method that cloud platform Host Security is reinforced
CN109150866A (en) * 2018-08-09 2019-01-04 郑州云海信息技术有限公司 A kind of policy distribution feedback and check system and method
CN109327434A (en) * 2018-09-04 2019-02-12 郑州云海信息技术有限公司 A kind of system and method for mixed management security strategy
CN109327434B (en) * 2018-09-04 2021-07-30 郑州云海信息技术有限公司 System and method for hybrid management of security policy
CN110119622A (en) * 2019-05-15 2019-08-13 苏州浪潮智能科技有限公司 A kind of registration table Integrity Management method, system and equipment
CN110519221A (en) * 2019-07-12 2019-11-29 苏州浪潮智能科技有限公司 A kind of pair of host carries out the method, apparatus and management system of safeguard protection
CN110868401A (en) * 2019-10-28 2020-03-06 上海爱数信息技术股份有限公司 Parallel persistent data encryption acquisition and issuing method suitable for network single-pass scene
CN114785549A (en) * 2022-03-23 2022-07-22 新华三信息安全技术有限公司 Safety protection system and safety protection method
CN114785549B (en) * 2022-03-23 2024-03-12 新华三信息安全技术有限公司 Safety protection system and safety protection method

Similar Documents

Publication Publication Date Title
CN106302484A (en) Method for centralized management of strategies
CN106789755A (en) Inter-network data interchange platform
CN103152352B (en) A kind of perfect information security forensics monitor method based on cloud computing environment and system
CN110535831A (en) Cluster safety management method, device and storage medium based on Kubernetes and network domains
CN103024014A (en) Method and system for distributing and processing mass data passing through message queues
KR20100076953A (en) Aggregating and delivering information
Guo et al. Exploiting efficient and scalable shuffle transfers in future data center networks
CN104468838B (en) A kind of P2P networkings and the web service selection method of publish-subscribe model
CN104579777A (en) Log management system and implementation method
CN101834765A (en) System and method for remote file transfer
US20080301084A1 (en) Systems and methods for dynamically creating metadata in electronic evidence management
CN103034738A (en) Relevant database for managing heterogeneous unstructured data and method for creating and inquiring description information of unstructured data thereof
CN110262905A (en) The method for pushing of the message-oriented middleware of priority query based on building high performance and scalability
CN106686117A (en) Distributed calculation cluster data storage processing system and method
CN106789587A (en) The communicator and method of reliable news under a kind of cloud computing environment
CN109710435A (en) A kind of message delivery method based on the more message queues of support
CN103731426A (en) Intrusion alarming system based on virtual network
Lei et al. Integrating consortium blockchain into edge server to defense against ransomware attack
US20080301756A1 (en) Systems and methods for placing holds on enforcement of policies of electronic evidence management on captured electronic
CN103841006A (en) Method and device for intercepting junk mails in cloud computing system
CN105791015A (en) High-availability message transmission channel and method for distributed alarm processing system
US20080301099A1 (en) Systems and methods for using proxies in social network analysis in electronic evidence management
CN105743772A (en) Message processing method and system
CN103716228A (en) Mail transmission method, mail gateway and mail transmission system
CN104572859A (en) Distributive complex event processing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170104

WD01 Invention patent application deemed withdrawn after publication