CN107392042A - Electric network data monitoring method and device - Google Patents

Electric network data monitoring method and device Download PDF

Info

Publication number
CN107392042A
CN107392042A CN201710526082.7A CN201710526082A CN107392042A CN 107392042 A CN107392042 A CN 107392042A CN 201710526082 A CN201710526082 A CN 201710526082A CN 107392042 A CN107392042 A CN 107392042A
Authority
CN
China
Prior art keywords
electric network
network data
data
illegal operation
life cycle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710526082.7A
Other languages
Chinese (zh)
Inventor
杨林慧
孙少华
李海龙
齐花
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Qinghai Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Qinghai Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Qinghai Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Qinghai Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Qinghai Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Qinghai Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201710526082.7A priority Critical patent/CN107392042A/en
Publication of CN107392042A publication Critical patent/CN107392042A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Databases & Information Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of electric network data monitoring method and device.This method includes:Electric network data is obtained, wherein, electric network data includes the data of power network Life cycle, and power network Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether changed;If it is judged that electric network data Life cycle it is multiple during changed, then record the electric network data changed sequentially in time.By the present invention, the effect for improving electric network data security is reached.

Description

Electric network data monitoring method and device
Technical field
The present invention relates to electrical network field, in particular to a kind of electric network data monitoring method and device.
Background technology
The flow of power of power network, information flow, the fusion of Business Stream very high integrity at present, production, marketing, operation, office, operation All kinds of electric network information business such as monitoring produce a large amount of sensitive and confidential datas, and leaking data is with distorting to electric power netting safe running shadow Sound is huge.Intelligent grid magnanimity sensitive data security protection difficulty in the complete period for producing, operate, transmitting, store, destroying Greatly.
For the problem of electric network data security is low in correlation technique, effective solution is not yet proposed at present.
The content of the invention
It is a primary object of the present invention to provide a kind of electric network data monitoring method and device, to solve electric network data safety The problem of property is low.
To achieve these goals, according to an aspect of the invention, there is provided a kind of electric network data monitoring method, the party Method includes:Electric network data is obtained, wherein, the electric network data includes the data of power network Life cycle, the full life of power network Cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;It is logical Cross file fingerprint verification algorithm judge the electric network data Life cycle it is multiple during whether changed;If it is determined that Go out the electric network data the Life cycle it is multiple during changed, then record the institute changed sequentially in time State electric network data.
Further, after the electric network data is recorded sequentially in time, methods described also includes:Judge the electricity Network data whether there is illegal operation, wherein, the illegal operation is not meet the operation of predetermined registration operation rule;Judging State in the case that electric network data has illegal operation, record the electric network data and the illegal operation sequentially in time.
Further, after the electric network data and the illegal operation is recorded sequentially in time, methods described is also Including:The electric network data that illegal operation be present is monitored;Receiving to the power network number that illegal operation be present According to operation when, to current operation carry out authority identification;The authority identification pass through in the case of, it is allowed to it is described exist it is non- The electric network data of method operation performs the current operation;In authority identification not in the case of, refuse to the presence The electric network data of illegal operation performs the current operation.
Further, after being monitored to the electric network data that illegal operation be present, methods described also includes: Receive identity information to after the instruction of the document print of the electric network data that illegal operation be present, verifying the document and Whether type information meets preparatory condition;Meet the situation of the preparatory condition in the identity information and type information of the document Under, it is allowed to the document print;The situation of the preparatory condition is not met in the identity information and type information of the document Under, do not allow to the document print.
Further, in the case where allowing to the document print, methods described also includes:Generated according to presupposed information Franking;Include the franking as watermark in printed document.
To achieve these goals, according to another aspect of the present invention, a kind of electric network data monitoring device is additionally provided, should Device includes:Acquiring unit, for obtaining electric network data, wherein, the electric network data includes the data of power network Life cycle, The power network Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure sum According to Destruction;First judging unit, for judging the Life cycle of the electric network data by file fingerprint verification algorithm It is multiple during whether changed;First recording unit, for judging the electric network data in the Life cycle It is multiple during when being changed, record the electric network data changed sequentially in time.
Further, described device also includes:Second judging unit, for recording the power network number sequentially in time According to afterwards, judging that the electric network data whether there is illegal operation, wherein, the illegal operation is does not meet predetermined registration operation rule Operation;Second recording unit, in the case where judging that the electric network data has illegal operation, sequentially in time Record the electric network data and the illegal operation.
Further, described device also includes:Monitoring unit, for record sequentially in time the electric network data and After the illegal operation, the electric network data that illegal operation be present is monitored;Unit is identified, for receiving pair During the operation of the electric network data that illegal operation be present, authority identification is carried out to current operation;Processing unit, for described In the case that authority identification passes through, it is allowed to perform the current operation to the electric network data that illegal operation be present;Described Authority is identified not in the case of, refuses to perform the current operation to the electric network data that illegal operation be present.
To achieve these goals, according to another aspect of the present invention, additionally providing a kind of storage medium includes storage Program, wherein, equipment where the storage medium is controlled when described program is run performs the electric network data monitoring side of the present invention Method.
To achieve these goals, according to another aspect of the present invention, a kind of processor is additionally provided, for running journey Sequence, wherein, electric network data monitoring method of the invention is performed when described program is run.
The present invention by obtaining electric network data, wherein, electric network data includes the data of power network Life cycle, and power network is given birth to entirely The life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction; Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether changed;If it is judged that Electric network data Life cycle it is multiple during changed, then record the electric network data changed sequentially in time, solve The problem of electric network data security of having determined is low, and then improve the effect of electric network data security.
Brief description of the drawings
The accompanying drawing for forming the part of the application is used for providing a further understanding of the present invention, schematic reality of the invention Apply example and its illustrate to be used to explain the present invention, do not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of electric network data monitoring method according to embodiments of the present invention;
Fig. 2 is the schematic diagram of electric network data Life cycle Monitoring Data according to embodiments of the present invention;And
Fig. 3 is the schematic diagram of electric network data monitoring device according to embodiments of the present invention.
Embodiment
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the present invention in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application part, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model of the application protection Enclose.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use Data can exchange in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit Process, method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include without clear It is listing to Chu or for the intrinsic other steps of these processes, method, product or equipment or unit.
The embodiments of the invention provide a kind of electric network data monitoring method.
Fig. 1 is the flow chart of electric network data monitoring method according to embodiments of the present invention, as shown in figure 1, this method includes Following steps:
Step S102:Electric network data is obtained, wherein, electric network data includes the data of power network Life cycle, and power network is given birth to entirely The life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;
Step S104:Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether Changed;
Step S106:If it is judged that electric network data Life cycle it is multiple during changed, then according to the time The electric network data that journal is changed.
The embodiment of the present invention by obtaining electric network data, wherein, electric network data includes the data of power network Life cycle, electricity Net Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data destroying Process;Judged by file fingerprint verification algorithm the Life cycle of electric network data it is multiple during whether changed;If Judge electric network data Life cycle it is multiple during changed, then record the power network number changed sequentially in time According to solving the problems, such as that electric network data security is low, and then improve the effect of electric network data security.
Optionally, after electric network data is recorded sequentially in time, judge that electric network data whether there is illegal operation, its In, illegal operation is not meet the operation of predetermined registration operation rule;In the case where judging that electric network data has illegal operation, press According to sequence of event electric network data and illegal operation.Illegal operation can be inquiry of the unidentified user to electric network data Operation, illegal operation can also meet the operations such as the modification for not conforming to specification of the user of identity to electric network data.
Optionally, after electric network data and illegal operation is recorded sequentially in time, to the power network of illegal operation be present Data are monitored;When receiving to the operation of the electric network data of illegal operation be present, authority identification is carried out to current operation; In the case where authority identification passes through, it is allowed to perform current operation to the electric network data of illegal operation be present;In authority identification not In the case of, the electric network data for refusing absolute being illegal operation performs current operation.Judge active user operation whether Have permission, if the authority of the operation, then can allow to operate these electric network datas, if the not power of the operation Limit, then do not allow to operate these electric network datas, and then can protect electric network data, prevents safety problem.
Optionally, after the electric network data to illegal operation be present is monitored, receiving to illegal operation be present Electric network data document print instruction after, whether the identity information and type information of verifying document meet preparatory condition; In the case that the identity information and type information of document meet preparatory condition, it is allowed to document print;In the identity information of document In the case of not meeting preparatory condition with type information, do not allow to document print.
Optionally, in the case where allowing to document print, franking is generated according to presupposed information;Franking is made It is shown in for watermark in printed document.In the case where allowing printed document, except being printed to document, can also print Document on stamp watermark carry out document protection.
The electric network data monitoring method of the embodiment of the present invention can be used for large-scale power supply enterprise's sensitive data Life cycle Protection and monitoring model, DYNAMIC DISTRIBUTION monitoring and the tracking problem of movement locus of massive data files are captured, as a set of Data protection and monitoring system, important leverage is provided for electric network data security protection.
Intelligent grid data Life cycle safeguard protection and monitoring model, it is proposed that a kind of power network interacted in many ways is sensitive Information privacy protection method, intelligent grid distributed mass data access privilege control and secret protection problem are captured, researched and developed A set of data protection and monitoring system, it was also proposed that a kind of sensitive data based on Erasure codings and Replication technology interacts Process backup method, solve intelligent grid magnanimity distributed data high-rate fitration and backup problem, it is proposed that one kind is based on The printing safety monitoring system implementation method of Windows bottom layer drivings, solve traditional prints safety monitoring system and take resource The problem of rate is high.
The embodiment of the present invention has the application of following technical elements:
1st, the data Life cycle back trace technique based on time and space
Generation and implanted prosthetics using file fingerprint, by deriving the monitoring of finger print information to file fingerprint and file, The monitoring of data Life cycle (generation, operation, storage, transmission, destruction) process is realized, shape is distributed to the information of sensitive document Condition, terminal sensitive operation, file real-time status etc. are monitored, and realize tracing to file operation, and can be to the complete of file Life-cycle processes are reappeared.
2nd, the print data monitoring technology based on message-driven
When user prints to agent-protected file, data protection module can according to file printout automatic acquisition of scientific information with Associated information is printed, and the information (user name, document name, time-write interval, machine name etc.) of printed document is audited, and Watermark protection is carried out to mimeograph documents.
3rd, high efficiency file content reverse indexing and retrieval technique
A reverse indexing mechanism is established, while data source sequence is carried out into sequential storage, has another to sequence sequence Lists of keywords, for storing the corresponding relation of keyword and file content, utilize such mapping relations indexing key words And there is the document of keyword, occurrence number, the frequency of occurrences, the start offset amount of position occur and terminate offset.
Increment type based on file directory monitoring, which indexes, to be established, i.e., new index text is constantly created when extending and indexing Part, then regularly these newly-built small index files are merged into existing massive index file so that the mistake of index maintenance Journey improves the efficiency of index on the premise of recall precision is not influenceed.
The query statement that user submits is committed in query analyzer and index manager by indexed search, and user is submitted Fuzzy query sentence handled, be transformed into multiple languages that can be accurately inquired about using the index data information established Sentence, and index file is analyzed and handled by memory, corresponding indexed results are extracted, and relevant information is fed back into use Family.
Fig. 2 is the schematic diagram of electric network data Life cycle Monitoring Data according to embodiments of the present invention, as shown in Fig. 2 The data operate corresponding to being carried out in the operational order of receiving terminal, and terminal is multiple including terminal-A to terminal H etc., each The operation of terminal log evidence can be duplication, modification and transmission etc..
It should be noted that can be in such as one group of computer executable instructions the flow of accompanying drawing illustrates the step of Performed in computer system, although also, show logical order in flow charts, in some cases, can be with not The order being same as herein performs shown or described step.
The embodiments of the invention provide a kind of electric network data monitoring device, the electric network data monitoring device can be used for performing The electric network data monitoring method of the embodiment of the present invention.
Fig. 3 is the schematic diagram of electric network data monitoring device according to embodiments of the present invention, as shown in figure 3, the device includes:
Acquiring unit 10, for obtaining electric network data, wherein, electric network data includes the data of power network Life cycle, electricity Net Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data destroying Process;
First judging unit 20, for judged by file fingerprint verification algorithm electric network data Life cycle it is multiple During whether changed;
First recording unit 30, for if it is judged that electric network data Life cycle it is multiple during changed, The electric network data changed then is recorded sequentially in time.
Further, the device also includes:Second judging unit, for sequentially in time record electric network data it Afterwards, judge that electric network data whether there is illegal operation, wherein, illegal operation is not meet the operation of predetermined registration operation rule;Second Recording unit, in the case where judging that electric network data has illegal operation, record sequentially in time electric network data and Illegal operation.
Further, the device also includes:Monitoring unit, for recording electric network data and illegal behaviour sequentially in time After work, the electric network data that illegal operation be present is monitored;Unit is identified, for receiving to illegal operation be present During the operation of electric network data, authority identification is carried out to current operation;Processing unit, in the case of passing through in authority identification, Allow to perform current operation to the electric network data of illegal operation be present;In authority identification not in the case of, absolute being is refused The electric network data of illegal operation performs current operation.
The embodiment obtains electric network data using acquiring unit 10, wherein, electric network data includes power network Life cycle Data, power network Life cycle include data generating procedure, data handling procedure, data storage procedure, data transmission procedure and Data destroying process;First judging unit 20 judges the multiple of the Life cycle of electric network data by file fingerprint verification algorithm During whether changed;First recording unit 30 judge electric network data Life cycle it is multiple during changed When, the electric network data changed is recorded sequentially in time, so as to solve the problems, such as that electric network data security is low, and then Improve the effect of electric network data security.
Electric network data monitoring device includes processor and memory, above-mentioned acquiring unit, the first judging unit, the first record Unit, the second judging unit and second recording unit etc. in memory, are deposited as program unit storage by computing device Storage said procedure unit in memory realizes corresponding function.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one Or more, improve electric network data security by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM), memory includes at least one deposit Store up chip.
The embodiments of the invention provide a kind of storage medium, program is stored thereon with, it is real when the program is executed by processor The existing electric network data monitoring method.
The embodiments of the invention provide a kind of processor, the processor is used for operation program, wherein, described program operation Electric network data monitoring method described in Shi Zhihang.
The embodiments of the invention provide a kind of equipment, equipment includes processor, memory and storage on a memory and can The program run on a processor, following steps are realized during computing device program:Electric network data is obtained, wherein, electric network data Include the data of power network Life cycle, power network Life cycle includes data generating procedure, data handling procedure, data storage Process, data transmission procedure and data Destruction;The Life cycle of electric network data is judged by file fingerprint verification algorithm It is multiple during whether changed;If it is judged that electric network data Life cycle it is multiple during changed, then press The electric network data changed according to sequence of event.
After electric network data is recorded sequentially in time, method also includes:Judge electric network data with the presence or absence of illegal behaviour Make, wherein, illegal operation is not meet the operation of predetermined registration operation rule;Judging that electric network data has illegal operation Under, electric network data and illegal operation are recorded sequentially in time.
The electric network data that illegal operation be present is monitored;Receiving to the behaviour of the electric network data of illegal operation be present When making, authority identification is carried out to current operation;In the case where authority identification passes through, it is allowed to the power network number of illegal operation be present According to execution current operation;In authority identification not in the case of, the electric network data for refusing absolute being illegal operation performs currently Operation.
Whether the identity information and type information for verifying document meet preparatory condition;Believe in the identity information of document and printing In the case that breath meets preparatory condition, it is allowed to document print;Default bar is not met in the identity information and type information of document In the case of part, do not allow to document print.
Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program product, when being performed on data processing equipment, is adapted for carrying out just The program of beginningization there are as below methods step:
Electric network data is obtained, wherein, electric network data includes the data of power network Life cycle, and power network Life cycle includes Data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;Referred to by file Line verification algorithm judge the Life cycle of electric network data it is multiple during whether changed;If it is judged that electric network data exists Life cycle it is multiple during changed, then record the electric network data changed sequentially in time.
After electric network data is recorded sequentially in time, method also includes:Judge electric network data with the presence or absence of illegal behaviour Make, wherein, illegal operation is not meet the operation of predetermined registration operation rule;Judging that electric network data has illegal operation Under, electric network data and illegal operation are recorded sequentially in time.
The electric network data that illegal operation be present is monitored;Receiving to the behaviour of the electric network data of illegal operation be present When making, authority identification is carried out to current operation;In the case where authority identification passes through, it is allowed to the power network number of illegal operation be present According to execution current operation;In authority identification not in the case of, the electric network data for refusing absolute being illegal operation performs currently Operation.
Whether the identity information and type information for verifying document meet preparatory condition;Believe in the identity information of document and printing In the case that breath meets preparatory condition, it is allowed to document print;Default bar is not met in the identity information and type information of document In the case of part, do not allow to document print.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element Other identical element in process, method, commodity or equipment also be present.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Embodiments herein is these are only, is not limited to the application.To those skilled in the art, The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution, Improve etc., it should be included within the scope of claims hereof.

Claims (10)

  1. A kind of 1. electric network data monitoring method, it is characterised in that including:
    Electric network data is obtained, wherein, the electric network data includes the data of power network Life cycle, the power network Life cycle Including data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data Destruction;
    Judged by file fingerprint verification algorithm the Life cycle of the electric network data it is multiple during whether changed;
    If it is judged that the electric network data the Life cycle it is multiple during changed, then remember sequentially in time Record the electric network data changed.
  2. 2. according to the method for claim 1, it is characterised in that after the electric network data is recorded sequentially in time, Methods described also includes:
    Judge that the electric network data whether there is illegal operation, wherein, the illegal operation is not meet predetermined registration operation rule Operation;
    In the case where judging that the electric network data has illegal operation, the electric network data and institute are recorded sequentially in time State illegal operation.
  3. 3. according to the method for claim 2, it is characterised in that recording the electric network data and described sequentially in time After illegal operation, methods described also includes:
    The electric network data that illegal operation be present is monitored;
    When receiving the operation to the electric network data that illegal operation be present, authority identification is carried out to current operation;
    In the case where authority identification passes through, it is allowed to the current behaviour is performed to the electric network data that illegal operation be present Make;
    In authority identification not in the case of, refuse described current to the electric network data execution that illegal operation be present Operation.
  4. 4. according to the method for claim 3, it is characterised in that supervised to the electric network data that illegal operation be present After survey, methods described also includes:
    After receiving to the document print instruction of the electric network data that illegal operation be present, the identity of the document is verified Whether information and type information meet preparatory condition;
    In the case where the identity information and type information of the document meet the preparatory condition, it is allowed to which the document is beaten Print;
    In the case where the identity information and type information of the document do not meet the preparatory condition, do not allow to the document Printing.
  5. 5. according to the method for claim 4, it is characterised in that in the case where allowing to the document print, the side Method also includes:
    Franking is generated according to presupposed information;
    Include the franking as watermark in printed document.
  6. A kind of 6. electric network data monitoring device, it is characterised in that including:
    Acquiring unit, for obtaining electric network data, wherein, the electric network data includes the data of power network Life cycle, described Power network Life cycle includes data generating procedure, data handling procedure, data storage procedure, data transmission procedure and data pin Ruin process;
    First judging unit, multiple mistakes of the Life cycle for judging the electric network data by file fingerprint verification algorithm Whether changed in journey;
    First recording unit, for judge the electric network data the Life cycle it is multiple during changed When, the electric network data changed is recorded sequentially in time.
  7. 7. device according to claim 6, it is characterised in that described device also includes:
    Second judging unit, for after the electric network data is recorded sequentially in time, whether judging the electric network data Illegal operation be present, wherein, the illegal operation is not meet the operation of predetermined registration operation rule;
    Second recording unit, in the case where judging that the electric network data has illegal operation, remembering sequentially in time Record the electric network data and the illegal operation.
  8. 8. device according to claim 7, it is characterised in that described device also includes:
    Monitoring unit, for after the electric network data and the illegal operation is recorded sequentially in time, to the presence The electric network data of illegal operation is monitored;
    Unit is identified, for when receiving the operation to the electric network data that illegal operation be present, being carried out to current operation Authority is identified;
    Processing unit, in the case of passing through in authority identification, it is allowed to the electric network data that illegal operation be present Perform the current operation;In authority identification not in the case of, refuse to the power network number that illegal operation be present According to the execution current operation.
  9. A kind of 9. storage medium, it is characterised in that the storage medium includes the program of storage, wherein, run in described program When control the storage medium where electric network data monitoring method in equipment perform claim requirement 1 to 5 described in any one.
  10. A kind of 10. processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the electric network data monitoring method described in any one in 1 to 5.
CN201710526082.7A 2017-06-30 2017-06-30 Electric network data monitoring method and device Pending CN107392042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710526082.7A CN107392042A (en) 2017-06-30 2017-06-30 Electric network data monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710526082.7A CN107392042A (en) 2017-06-30 2017-06-30 Electric network data monitoring method and device

Publications (1)

Publication Number Publication Date
CN107392042A true CN107392042A (en) 2017-11-24

Family

ID=60333970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710526082.7A Pending CN107392042A (en) 2017-06-30 2017-06-30 Electric network data monitoring method and device

Country Status (1)

Country Link
CN (1) CN107392042A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108717415A (en) * 2018-03-30 2018-10-30 广州供电局有限公司 Production equipment life cycle state data modeling method and system
CN109145618A (en) * 2018-08-09 2019-01-04 山东中孚安全技术有限公司 A method of papery black and white printing sensitive data is hidden based on greyscale transformation
CN110601895A (en) * 2019-09-19 2019-12-20 国家电网有限公司 Data control method and device for power communication system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646222A (en) * 2012-02-17 2012-08-22 中国电力科学研究院 All-data management method of power grid
CN102915337A (en) * 2012-09-18 2013-02-06 中国电力科学研究院 Variation quantity mode-based hierarchical management method for fine multistage power grid model
CN103336923A (en) * 2013-03-06 2013-10-02 西安电子科技大学 Print monitoring system and method for universal printer
CN104778420A (en) * 2015-04-24 2015-07-15 广东电网有限责任公司信息中心 Method for establishing safety management view of full life cycle of unstructured data
CN105117662A (en) * 2015-09-17 2015-12-02 国网北京市电力公司 Power distribution network data exception processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646222A (en) * 2012-02-17 2012-08-22 中国电力科学研究院 All-data management method of power grid
CN102915337A (en) * 2012-09-18 2013-02-06 中国电力科学研究院 Variation quantity mode-based hierarchical management method for fine multistage power grid model
CN103336923A (en) * 2013-03-06 2013-10-02 西安电子科技大学 Print monitoring system and method for universal printer
CN104778420A (en) * 2015-04-24 2015-07-15 广东电网有限责任公司信息中心 Method for establishing safety management view of full life cycle of unstructured data
CN105117662A (en) * 2015-09-17 2015-12-02 国网北京市电力公司 Power distribution network data exception processing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108717415A (en) * 2018-03-30 2018-10-30 广州供电局有限公司 Production equipment life cycle state data modeling method and system
CN108717415B (en) * 2018-03-30 2020-04-14 广州供电局有限公司 Production equipment life cycle state data modeling method and system
CN109145618A (en) * 2018-08-09 2019-01-04 山东中孚安全技术有限公司 A method of papery black and white printing sensitive data is hidden based on greyscale transformation
CN109145618B (en) * 2018-08-09 2022-02-22 山东中孚安全技术有限公司 Method for hiding paper black and white printing sensitive data based on gray level transformation
CN110601895A (en) * 2019-09-19 2019-12-20 国家电网有限公司 Data control method and device for power communication system

Similar Documents

Publication Publication Date Title
US9245137B2 (en) Management of digital information
US9123006B2 (en) Techniques for parallel business intelligence evaluation and management
CN107392042A (en) Electric network data monitoring method and device
CN112417492A (en) Service providing method based on data classification and classification
CN117235810A (en) Log safe storage and efficient query method based on blockchain
CN116910815A (en) Information data management method based on big data
CN109710667A (en) A kind of shared realization method and system of the multisource data fusion based on big data platform
CN116415203A (en) Government information intelligent fusion system and method based on big data
Thuraisingham Building trustworthy semantic webs
CN116541372A (en) Data asset management method and system
CN113886890A (en) Digital resource co-construction sharing method and device
CN115758435A (en) External sharing security processing method for company marketing data and related equipment
US7693185B1 (en) Method and apparatus for creation and management of intelligent packets
US11797705B1 (en) Generative adversarial network for named entity recognition
Alabi et al. Toward a data spillage prevention process in Hadoop using data provenance
Seymour The modern records management program: an overview of electronic records management standards
CN103902627A (en) Data release method and device
CN106326769B (en) A kind of field monitoring information processing unit
Devaki et al. A study on challenges in data security during data transformation
CN109583210A (en) A kind of recognition methods, device and its equipment of horizontal permission loophole
Toapanta et al. Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador
CN117726435B (en) Image data management method and system
Asghari et al. A Comparison Analysis of Mobile Forensic Investigation Framework
CN115114495B (en) Airworthiness data management auxiliary method and system based on deep learning
CN111309683B (en) Method and device for scanning full disk data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124