CN107392042A - Electric network data monitoring method and device - Google Patents
Electric network data monitoring method and device Download PDFInfo
- Publication number
- CN107392042A CN107392042A CN201710526082.7A CN201710526082A CN107392042A CN 107392042 A CN107392042 A CN 107392042A CN 201710526082 A CN201710526082 A CN 201710526082A CN 107392042 A CN107392042 A CN 107392042A
- Authority
- CN
- China
- Prior art keywords
- electric network
- network data
- data
- illegal operation
- life cycle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 114
- 238000012544 monitoring process Methods 0.000 title claims abstract description 35
- 230000005540 biological transmission Effects 0.000 claims abstract description 15
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 12
- 238000013500 data storage Methods 0.000 claims abstract description 12
- 238000012795 verification Methods 0.000 claims abstract description 12
- 230000006378 damage Effects 0.000 claims abstract description 9
- 238000003860 storage Methods 0.000 claims description 25
- 230000008569 process Effects 0.000 claims description 13
- 238000012545 processing Methods 0.000 claims description 9
- 238000012806 monitoring device Methods 0.000 claims description 7
- 230000000694 effects Effects 0.000 abstract description 4
- 238000004590 computer program Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 10
- 230000006399 behavior Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 241001269238 Data Species 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000004148 unit process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Engineering & Computer Science (AREA)
- Water Supply & Treatment (AREA)
- Public Health (AREA)
- Databases & Information Systems (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of electric network data monitoring method and device.This method includes:Electric network data is obtained, wherein, electric network data includes the data of power network Life cycle, and power network Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether changed;If it is judged that electric network data Life cycle it is multiple during changed, then record the electric network data changed sequentially in time.By the present invention, the effect for improving electric network data security is reached.
Description
Technical field
The present invention relates to electrical network field, in particular to a kind of electric network data monitoring method and device.
Background technology
The flow of power of power network, information flow, the fusion of Business Stream very high integrity at present, production, marketing, operation, office, operation
All kinds of electric network information business such as monitoring produce a large amount of sensitive and confidential datas, and leaking data is with distorting to electric power netting safe running shadow
Sound is huge.Intelligent grid magnanimity sensitive data security protection difficulty in the complete period for producing, operate, transmitting, store, destroying
Greatly.
For the problem of electric network data security is low in correlation technique, effective solution is not yet proposed at present.
The content of the invention
It is a primary object of the present invention to provide a kind of electric network data monitoring method and device, to solve electric network data safety
The problem of property is low.
To achieve these goals, according to an aspect of the invention, there is provided a kind of electric network data monitoring method, the party
Method includes:Electric network data is obtained, wherein, the electric network data includes the data of power network Life cycle, the full life of power network
Cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;It is logical
Cross file fingerprint verification algorithm judge the electric network data Life cycle it is multiple during whether changed;If it is determined that
Go out the electric network data the Life cycle it is multiple during changed, then record the institute changed sequentially in time
State electric network data.
Further, after the electric network data is recorded sequentially in time, methods described also includes:Judge the electricity
Network data whether there is illegal operation, wherein, the illegal operation is not meet the operation of predetermined registration operation rule;Judging
State in the case that electric network data has illegal operation, record the electric network data and the illegal operation sequentially in time.
Further, after the electric network data and the illegal operation is recorded sequentially in time, methods described is also
Including:The electric network data that illegal operation be present is monitored;Receiving to the power network number that illegal operation be present
According to operation when, to current operation carry out authority identification;The authority identification pass through in the case of, it is allowed to it is described exist it is non-
The electric network data of method operation performs the current operation;In authority identification not in the case of, refuse to the presence
The electric network data of illegal operation performs the current operation.
Further, after being monitored to the electric network data that illegal operation be present, methods described also includes:
Receive identity information to after the instruction of the document print of the electric network data that illegal operation be present, verifying the document and
Whether type information meets preparatory condition;Meet the situation of the preparatory condition in the identity information and type information of the document
Under, it is allowed to the document print;The situation of the preparatory condition is not met in the identity information and type information of the document
Under, do not allow to the document print.
Further, in the case where allowing to the document print, methods described also includes:Generated according to presupposed information
Franking;Include the franking as watermark in printed document.
To achieve these goals, according to another aspect of the present invention, a kind of electric network data monitoring device is additionally provided, should
Device includes:Acquiring unit, for obtaining electric network data, wherein, the electric network data includes the data of power network Life cycle,
The power network Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure sum
According to Destruction;First judging unit, for judging the Life cycle of the electric network data by file fingerprint verification algorithm
It is multiple during whether changed;First recording unit, for judging the electric network data in the Life cycle
It is multiple during when being changed, record the electric network data changed sequentially in time.
Further, described device also includes:Second judging unit, for recording the power network number sequentially in time
According to afterwards, judging that the electric network data whether there is illegal operation, wherein, the illegal operation is does not meet predetermined registration operation rule
Operation;Second recording unit, in the case where judging that the electric network data has illegal operation, sequentially in time
Record the electric network data and the illegal operation.
Further, described device also includes:Monitoring unit, for record sequentially in time the electric network data and
After the illegal operation, the electric network data that illegal operation be present is monitored;Unit is identified, for receiving pair
During the operation of the electric network data that illegal operation be present, authority identification is carried out to current operation;Processing unit, for described
In the case that authority identification passes through, it is allowed to perform the current operation to the electric network data that illegal operation be present;Described
Authority is identified not in the case of, refuses to perform the current operation to the electric network data that illegal operation be present.
To achieve these goals, according to another aspect of the present invention, additionally providing a kind of storage medium includes storage
Program, wherein, equipment where the storage medium is controlled when described program is run performs the electric network data monitoring side of the present invention
Method.
To achieve these goals, according to another aspect of the present invention, a kind of processor is additionally provided, for running journey
Sequence, wherein, electric network data monitoring method of the invention is performed when described program is run.
The present invention by obtaining electric network data, wherein, electric network data includes the data of power network Life cycle, and power network is given birth to entirely
The life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;
Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether changed;If it is judged that
Electric network data Life cycle it is multiple during changed, then record the electric network data changed sequentially in time, solve
The problem of electric network data security of having determined is low, and then improve the effect of electric network data security.
Brief description of the drawings
The accompanying drawing for forming the part of the application is used for providing a further understanding of the present invention, schematic reality of the invention
Apply example and its illustrate to be used to explain the present invention, do not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of electric network data monitoring method according to embodiments of the present invention;
Fig. 2 is the schematic diagram of electric network data Life cycle Monitoring Data according to embodiments of the present invention;And
Fig. 3 is the schematic diagram of electric network data monitoring device according to embodiments of the present invention.
Embodiment
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the present invention in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application
Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application part, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model of the application protection
Enclose.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use
Data can exchange in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit
Process, method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include without clear
It is listing to Chu or for the intrinsic other steps of these processes, method, product or equipment or unit.
The embodiments of the invention provide a kind of electric network data monitoring method.
Fig. 1 is the flow chart of electric network data monitoring method according to embodiments of the present invention, as shown in figure 1, this method includes
Following steps:
Step S102:Electric network data is obtained, wherein, electric network data includes the data of power network Life cycle, and power network is given birth to entirely
The life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;
Step S104:Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether
Changed;
Step S106:If it is judged that electric network data Life cycle it is multiple during changed, then according to the time
The electric network data that journal is changed.
The embodiment of the present invention by obtaining electric network data, wherein, electric network data includes the data of power network Life cycle, electricity
Net Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data destroying
Process;Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether changed;If
Judge electric network data Life cycle it is multiple during changed, then record the power network number changed sequentially in time
According to solving the problems, such as that electric network data security is low, and then improve the effect of electric network data security.
Optionally, after electric network data is recorded sequentially in time, judge that electric network data whether there is illegal operation, its
In, illegal operation is not meet the operation of predetermined registration operation rule;In the case where judging that electric network data has illegal operation, press
According to sequence of event electric network data and illegal operation.Illegal operation can be inquiry of the unidentified user to electric network data
Operation, illegal operation can also meet the operations such as the modification for not conforming to specification of the user of identity to electric network data.
Optionally, after electric network data and illegal operation is recorded sequentially in time, to the power network of illegal operation be present
Data are monitored;When receiving to the operation of the electric network data of illegal operation be present, authority identification is carried out to current operation;
In the case where authority identification passes through, it is allowed to perform current operation to the electric network data of illegal operation be present;In authority identification not
In the case of, the electric network data for refusing absolute being illegal operation performs current operation.Judge active user operation whether
Have permission, if the authority of the operation, then can allow to operate these electric network datas, if the not power of the operation
Limit, then do not allow to operate these electric network datas, and then can protect electric network data, prevents safety problem.
Optionally, after the electric network data to illegal operation be present is monitored, receiving to illegal operation be present
Electric network data document print instruction after, whether the identity information and type information of verifying document meet preparatory condition;
In the case that the identity information and type information of document meet preparatory condition, it is allowed to document print;In the identity information of document
In the case of not meeting preparatory condition with type information, do not allow to document print.
Optionally, in the case where allowing to document print, franking is generated according to presupposed information;Franking is made
It is shown in for watermark in printed document.In the case where allowing printed document, except being printed to document, can also print
Document on stamp watermark carry out document protection.
The electric network data monitoring method of the embodiment of the present invention can be used for large-scale power supply enterprise's sensitive data Life cycle
Protection and monitoring model, DYNAMIC DISTRIBUTION monitoring and the tracking problem of movement locus of massive data files are captured, as a set of
Data protection and monitoring system, important leverage is provided for electric network data security protection.
Intelligent grid data Life cycle safeguard protection and monitoring model, it is proposed that a kind of power network interacted in many ways is sensitive
Information privacy protection method, intelligent grid distributed mass data access privilege control and secret protection problem are captured, researched and developed
A set of data protection and monitoring system, it was also proposed that a kind of sensitive data based on Erasure codings and Replication technology interacts
Process backup method, solve intelligent grid magnanimity distributed data high-rate fitration and backup problem, it is proposed that one kind is based on
The printing safety monitoring system implementation method of Windows bottom layer drivings, solve traditional prints safety monitoring system and take resource
The problem of rate is high.
The embodiment of the present invention has the application of following technical elements:
1st, the data Life cycle back trace technique based on time and space
Generation and implanted prosthetics using file fingerprint, by deriving the monitoring of finger print information to file fingerprint and file,
The monitoring of data Life cycle (generation, operation, storage, transmission, destruction) process is realized, shape is distributed to the information of sensitive document
Condition, terminal sensitive operation, file real-time status etc. are monitored, and realize tracing to file operation, and can be to the complete of file
Life-cycle processes are reappeared.
2nd, the print data monitoring technology based on message-driven
When user prints to agent-protected file, data protection module can according to file printout automatic acquisition of scientific information with
Associated information is printed, and the information (user name, document name, time-write interval, machine name etc.) of printed document is audited, and
Watermark protection is carried out to mimeograph documents.
3rd, high efficiency file content reverse indexing and retrieval technique
A reverse indexing mechanism is established, while data source sequence is carried out into sequential storage, has another to sequence sequence
Lists of keywords, for storing the corresponding relation of keyword and file content, utilize such mapping relations indexing key words
And there is the document of keyword, occurrence number, the frequency of occurrences, the start offset amount of position occur and terminate offset.
Increment type based on file directory monitoring, which indexes, to be established, i.e., new index text is constantly created when extending and indexing
Part, then regularly these newly-built small index files are merged into existing massive index file so that the mistake of index maintenance
Journey improves the efficiency of index on the premise of recall precision is not influenceed.
The query statement that user submits is committed in query analyzer and index manager by indexed search, and user is submitted
Fuzzy query sentence handled, be transformed into multiple languages that can be accurately inquired about using the index data information established
Sentence, and index file is analyzed and handled by memory, corresponding indexed results are extracted, and relevant information is fed back into use
Family.
Fig. 2 is the schematic diagram of electric network data Life cycle Monitoring Data according to embodiments of the present invention, as shown in Fig. 2
The data operate corresponding to being carried out in the operational order of receiving terminal, and terminal is multiple including terminal-A to terminal H etc., each
The operation of terminal log evidence can be duplication, modification and transmission etc..
It should be noted that can be in such as one group of computer executable instructions the flow of accompanying drawing illustrates the step of
Performed in computer system, although also, show logical order in flow charts, in some cases, can be with not
The order being same as herein performs shown or described step.
The embodiments of the invention provide a kind of electric network data monitoring device, the electric network data monitoring device can be used for performing
The electric network data monitoring method of the embodiment of the present invention.
Fig. 3 is the schematic diagram of electric network data monitoring device according to embodiments of the present invention, as shown in figure 3, the device includes:
Acquiring unit 10, for obtaining electric network data, wherein, electric network data includes the data of power network Life cycle, electricity
Net Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data destroying
Process;
First judging unit 20, for judged by file fingerprint verification algorithm electric network data Life cycle it is multiple
During whether changed;
First recording unit 30, for if it is judged that electric network data Life cycle it is multiple during changed,
The electric network data changed then is recorded sequentially in time.
Further, the device also includes:Second judging unit, for sequentially in time record electric network data it
Afterwards, judge that electric network data whether there is illegal operation, wherein, illegal operation is not meet the operation of predetermined registration operation rule;Second
Recording unit, in the case where judging that electric network data has illegal operation, record sequentially in time electric network data and
Illegal operation.
Further, the device also includes:Monitoring unit, for recording electric network data and illegal behaviour sequentially in time
After work, the electric network data that illegal operation be present is monitored;Unit is identified, for receiving to illegal operation be present
During the operation of electric network data, authority identification is carried out to current operation;Processing unit, in the case of passing through in authority identification,
Allow to perform current operation to the electric network data of illegal operation be present;In authority identification not in the case of, absolute being is refused
The electric network data of illegal operation performs current operation.
The embodiment obtains electric network data using acquiring unit 10, wherein, electric network data includes power network Life cycle
Data, power network Life cycle include data generating procedure, data handling procedure, data storage procedure, data transmission procedure and
Data destroying process;First judging unit 20 judges the multiple of the Life cycle of electric network data by file fingerprint verification algorithm
During whether changed;First recording unit 30 judge electric network data Life cycle it is multiple during changed
When, the electric network data changed is recorded sequentially in time, so as to solve the problems, such as that electric network data security is low, and then
Improve the effect of electric network data security.
Electric network data monitoring device includes processor and memory, above-mentioned acquiring unit, the first judging unit, the first record
Unit, the second judging unit and second recording unit etc. in memory, are deposited as program unit storage by computing device
Storage said procedure unit in memory realizes corresponding function.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one
Or more, improve electric network data security by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM), memory includes at least one deposit
Store up chip.
The embodiments of the invention provide a kind of storage medium, program is stored thereon with, it is real when the program is executed by processor
The existing electric network data monitoring method.
The embodiments of the invention provide a kind of processor, the processor is used for operation program, wherein, described program operation
Electric network data monitoring method described in Shi Zhihang.
The embodiments of the invention provide a kind of equipment, equipment includes processor, memory and storage on a memory and can
The program run on a processor, following steps are realized during computing device program:Electric network data is obtained, wherein, electric network data
Include the data of power network Life cycle, power network Life cycle includes data generating procedure, data handling procedure, data storage
Process, data transmission procedure and data Destruction;The Life cycle of electric network data is judged by file fingerprint verification algorithm
It is multiple during whether changed;If it is judged that electric network data Life cycle it is multiple during changed, then press
The electric network data changed according to sequence of event.
After electric network data is recorded sequentially in time, method also includes:Judge electric network data with the presence or absence of illegal behaviour
Make, wherein, illegal operation is not meet the operation of predetermined registration operation rule;Judging that electric network data has illegal operation
Under, electric network data and illegal operation are recorded sequentially in time.
The electric network data that illegal operation be present is monitored;Receiving to the behaviour of the electric network data of illegal operation be present
When making, authority identification is carried out to current operation;In the case where authority identification passes through, it is allowed to the power network number of illegal operation be present
According to execution current operation;In authority identification not in the case of, the electric network data for refusing absolute being illegal operation performs currently
Operation.
Whether the identity information and type information for verifying document meet preparatory condition;Believe in the identity information of document and printing
In the case that breath meets preparatory condition, it is allowed to document print;Default bar is not met in the identity information and type information of document
In the case of part, do not allow to document print.
Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program product, when being performed on data processing equipment, is adapted for carrying out just
The program of beginningization there are as below methods step:
Electric network data is obtained, wherein, electric network data includes the data of power network Life cycle, and power network Life cycle includes
Data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;Referred to by file
Line verification algorithm judge the Life cycle of electric network data it is multiple during whether changed;If it is judged that electric network data exists
Life cycle it is multiple during changed, then record the electric network data changed sequentially in time.
After electric network data is recorded sequentially in time, method also includes:Judge electric network data with the presence or absence of illegal behaviour
Make, wherein, illegal operation is not meet the operation of predetermined registration operation rule;Judging that electric network data has illegal operation
Under, electric network data and illegal operation are recorded sequentially in time.
The electric network data that illegal operation be present is monitored;Receiving to the behaviour of the electric network data of illegal operation be present
When making, authority identification is carried out to current operation;In the case where authority identification passes through, it is allowed to the power network number of illegal operation be present
According to execution current operation;In authority identification not in the case of, the electric network data for refusing absolute being illegal operation performs currently
Operation.
Whether the identity information and type information for verifying document meet preparatory condition;Believe in the identity information of document and printing
In the case that breath meets preparatory condition, it is allowed to document print;Default bar is not met in the identity information and type information of document
In the case of part, do not allow to document print.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping
Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element
Other identical element in process, method, commodity or equipment also be present.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
Embodiments herein is these are only, is not limited to the application.To those skilled in the art,
The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution,
Improve etc., it should be included within the scope of claims hereof.
Claims (10)
- A kind of 1. electric network data monitoring method, it is characterised in that including:Electric network data is obtained, wherein, the electric network data includes the data of power network Life cycle, the power network Life cycle Including data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;Judged by file fingerprint verification algorithm the Life cycle of the electric network data it is multiple during whether changed;If it is judged that the electric network data the Life cycle it is multiple during changed, then remember sequentially in time Record the electric network data changed.
- 2. according to the method for claim 1, it is characterised in that after the electric network data is recorded sequentially in time, Methods described also includes:Judge that the electric network data whether there is illegal operation, wherein, the illegal operation is not meet predetermined registration operation rule Operation;In the case where judging that the electric network data has illegal operation, the electric network data and institute are recorded sequentially in time State illegal operation.
- 3. according to the method for claim 2, it is characterised in that recording the electric network data and described sequentially in time After illegal operation, methods described also includes:The electric network data that illegal operation be present is monitored;When receiving the operation to the electric network data that illegal operation be present, authority identification is carried out to current operation;In the case where authority identification passes through, it is allowed to the current behaviour is performed to the electric network data that illegal operation be present Make;In authority identification not in the case of, refuse described current to the electric network data execution that illegal operation be present Operation.
- 4. according to the method for claim 3, it is characterised in that supervised to the electric network data that illegal operation be present After survey, methods described also includes:After receiving to the document print instruction of the electric network data that illegal operation be present, the identity of the document is verified Whether information and type information meet preparatory condition;In the case where the identity information and type information of the document meet the preparatory condition, it is allowed to which the document is beaten Print;In the case where the identity information and type information of the document do not meet the preparatory condition, do not allow to the document Printing.
- 5. according to the method for claim 4, it is characterised in that in the case where allowing to the document print, the side Method also includes:Franking is generated according to presupposed information;Include the franking as watermark in printed document.
- A kind of 6. electric network data monitoring device, it is characterised in that including:Acquiring unit, for obtaining electric network data, wherein, the electric network data includes the data of power network Life cycle, described Power network Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data pin Ruin process;First judging unit, multiple mistakes of the Life cycle for judging the electric network data by file fingerprint verification algorithm Whether changed in journey;First recording unit, for judge the electric network data the Life cycle it is multiple during changed When, the electric network data changed is recorded sequentially in time.
- 7. device according to claim 6, it is characterised in that described device also includes:Second judging unit, for after the electric network data is recorded sequentially in time, whether judging the electric network data Illegal operation be present, wherein, the illegal operation is not meet the operation of predetermined registration operation rule;Second recording unit, in the case where judging that the electric network data has illegal operation, remembering sequentially in time Record the electric network data and the illegal operation.
- 8. device according to claim 7, it is characterised in that described device also includes:Monitoring unit, for after the electric network data and the illegal operation is recorded sequentially in time, to the presence The electric network data of illegal operation is monitored;Unit is identified, for when receiving the operation to the electric network data that illegal operation be present, being carried out to current operation Authority is identified;Processing unit, in the case of passing through in authority identification, it is allowed to the electric network data that illegal operation be present Perform the current operation;In authority identification not in the case of, refuse to the power network number that illegal operation be present According to the execution current operation.
- A kind of 9. storage medium, it is characterised in that the storage medium includes the program of storage, wherein, run in described program When control the storage medium where electric network data monitoring method in equipment perform claim requirement 1 to 5 described in any one.
- A kind of 10. processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the electric network data monitoring method described in any one in 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710526082.7A CN107392042A (en) | 2017-06-30 | 2017-06-30 | Electric network data monitoring method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710526082.7A CN107392042A (en) | 2017-06-30 | 2017-06-30 | Electric network data monitoring method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107392042A true CN107392042A (en) | 2017-11-24 |
Family
ID=60333970
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710526082.7A Pending CN107392042A (en) | 2017-06-30 | 2017-06-30 | Electric network data monitoring method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392042A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108717415A (en) * | 2018-03-30 | 2018-10-30 | 广州供电局有限公司 | Production equipment life cycle state data modeling method and system |
CN109145618A (en) * | 2018-08-09 | 2019-01-04 | 山东中孚安全技术有限公司 | A method of papery black and white printing sensitive data is hidden based on greyscale transformation |
CN110601895A (en) * | 2019-09-19 | 2019-12-20 | 国家电网有限公司 | Data control method and device for power communication system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646222A (en) * | 2012-02-17 | 2012-08-22 | 中国电力科学研究院 | All-data management method of power grid |
CN102915337A (en) * | 2012-09-18 | 2013-02-06 | 中国电力科学研究院 | Variation quantity mode-based hierarchical management method for fine multistage power grid model |
CN103336923A (en) * | 2013-03-06 | 2013-10-02 | 西安电子科技大学 | Print monitoring system and method for universal printer |
CN104778420A (en) * | 2015-04-24 | 2015-07-15 | 广东电网有限责任公司信息中心 | Method for establishing safety management view of full life cycle of unstructured data |
CN105117662A (en) * | 2015-09-17 | 2015-12-02 | 国网北京市电力公司 | Power distribution network data exception processing method and device |
-
2017
- 2017-06-30 CN CN201710526082.7A patent/CN107392042A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646222A (en) * | 2012-02-17 | 2012-08-22 | 中国电力科学研究院 | All-data management method of power grid |
CN102915337A (en) * | 2012-09-18 | 2013-02-06 | 中国电力科学研究院 | Variation quantity mode-based hierarchical management method for fine multistage power grid model |
CN103336923A (en) * | 2013-03-06 | 2013-10-02 | 西安电子科技大学 | Print monitoring system and method for universal printer |
CN104778420A (en) * | 2015-04-24 | 2015-07-15 | 广东电网有限责任公司信息中心 | Method for establishing safety management view of full life cycle of unstructured data |
CN105117662A (en) * | 2015-09-17 | 2015-12-02 | 国网北京市电力公司 | Power distribution network data exception processing method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108717415A (en) * | 2018-03-30 | 2018-10-30 | 广州供电局有限公司 | Production equipment life cycle state data modeling method and system |
CN108717415B (en) * | 2018-03-30 | 2020-04-14 | 广州供电局有限公司 | Production equipment life cycle state data modeling method and system |
CN109145618A (en) * | 2018-08-09 | 2019-01-04 | 山东中孚安全技术有限公司 | A method of papery black and white printing sensitive data is hidden based on greyscale transformation |
CN109145618B (en) * | 2018-08-09 | 2022-02-22 | 山东中孚安全技术有限公司 | Method for hiding paper black and white printing sensitive data based on gray level transformation |
CN110601895A (en) * | 2019-09-19 | 2019-12-20 | 国家电网有限公司 | Data control method and device for power communication system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9245137B2 (en) | Management of digital information | |
US9123006B2 (en) | Techniques for parallel business intelligence evaluation and management | |
CN107392042A (en) | Electric network data monitoring method and device | |
CN112417492A (en) | Service providing method based on data classification and classification | |
CN117235810A (en) | Log safe storage and efficient query method based on blockchain | |
CN116910815A (en) | Information data management method based on big data | |
CN109710667A (en) | A kind of shared realization method and system of the multisource data fusion based on big data platform | |
CN116415203A (en) | Government information intelligent fusion system and method based on big data | |
Thuraisingham | Building trustworthy semantic webs | |
CN116541372A (en) | Data asset management method and system | |
CN113886890A (en) | Digital resource co-construction sharing method and device | |
CN115758435A (en) | External sharing security processing method for company marketing data and related equipment | |
US7693185B1 (en) | Method and apparatus for creation and management of intelligent packets | |
US11797705B1 (en) | Generative adversarial network for named entity recognition | |
Alabi et al. | Toward a data spillage prevention process in Hadoop using data provenance | |
Seymour | The modern records management program: an overview of electronic records management standards | |
CN103902627A (en) | Data release method and device | |
CN106326769B (en) | A kind of field monitoring information processing unit | |
Devaki et al. | A study on challenges in data security during data transformation | |
CN109583210A (en) | A kind of recognition methods, device and its equipment of horizontal permission loophole | |
Toapanta et al. | Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador | |
CN117726435B (en) | Image data management method and system | |
Asghari et al. | A Comparison Analysis of Mobile Forensic Investigation Framework | |
CN115114495B (en) | Airworthiness data management auxiliary method and system based on deep learning | |
CN111309683B (en) | Method and device for scanning full disk data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171124 |