CN107515810A - A kind of Computer Automatic Monitor method - Google Patents

A kind of Computer Automatic Monitor method Download PDF

Info

Publication number
CN107515810A
CN107515810A CN201710732021.6A CN201710732021A CN107515810A CN 107515810 A CN107515810 A CN 107515810A CN 201710732021 A CN201710732021 A CN 201710732021A CN 107515810 A CN107515810 A CN 107515810A
Authority
CN
China
Prior art keywords
computer
data
key
monitoring terminal
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710732021.6A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Sichuang Yuanbo Electronic Technology Co Ltd
Original Assignee
Suzhou Sichuang Yuanbo Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Sichuang Yuanbo Electronic Technology Co Ltd filed Critical Suzhou Sichuang Yuanbo Electronic Technology Co Ltd
Priority to CN201710732021.6A priority Critical patent/CN107515810A/en
Publication of CN107515810A publication Critical patent/CN107515810A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of Computer Automatic Monitor method, this method is in data acquisition and processing (DAP), using scattered load sharing mode, improves the Intellectualized monitoring of network computer system, ensures stability, the high efficiency of system;The data gathered during the monitoring that this method will obtain yet further still according to preset strategy are converted to numeral, and these numerals are encrypted using predetermined encryption algorithm, to be supplied to server, so that server determines according to the encryption data running situation of network computer to be monitored, the length of monitoring data is greatly shortened, reduce volume of transmitted data, monitoring efficiency is further increased, further, since the numeral after conversion is encrypted, therefore, its security and interference resistance also greatly improve.

Description

A kind of Computer Automatic Monitor method
Technical field
The present invention relates to computer monitoring field, and in particular to a kind of Computer Automatic Monitor method.
Background technology
With the fast development of computer technology, LAN turns into each enterprise and shares internal resource, improves routine work effect The enterprise computer network building mode of rate, in the prior art management of the enterprise to computer are normally based on each client meter Calculation machine, computer is not managed collectively using LAN, not only increases hardware management and maintenance cost, and manage and do not unite One specification, waste of resource, increase cost, computer equipment monitoring can be carried out using existing LAN, be not only convenient for calculating Machine is managed collectively.
With the fast development of Internet technology so that user can access internet at any time, so as to be brought to user Great convenience, but the crisis of sensitive data leakage is also increased simultaneously.In order to understand in time network computer situation, To provide more preferable network service, it is necessary to be monitored to the computer service data of front end.In the prior art, it is generally required that In each computer operation to be monitored, the network computer service data to be monitored performed is acquired respectively, so Afterwards, after the data collected are segmented, assembled respectively, and report server one by one, by server to receiving To assembling after data parsed, to determine specific implementation status, so as to realize treat monitoring network computer data enter The purpose of row monitoring.
The more and more extensive management and monitoring applied to network computer of Intelligence data model, all models of mind are wherein One core is the different pieces of information for wanting Collecting and dealing huge, is calculated numerous and diverse.Current extensive way is in operating system aspect All these processing are carried out, these Network Computers Managements and the data of monitoring can bring very big additional negative to operating system Load.
The content of the invention
The present invention provides a kind of Computer Automatic Monitor method, and this method is in data acquisition and processing (DAP), using scattered point Load mode, the Intellectualized monitoring of network computer system is improved, ensure stability, the high efficiency of system;This method also enters one Walk the data gathered during the monitoring that will be obtained according to preset strategy and be converted to numeral, and using predetermined encryption algorithm to these numerals It is encrypted, to be supplied to server, so that server determines according to the encryption data operation feelings of network computer to be monitored Condition, the length of monitoring data is greatly shortened, reduces volume of transmitted data, further increases monitoring efficiency, further, since to turning Numeral after changing is encrypted, and therefore, its security and interference resistance also greatly improve.
To achieve these goals, the present invention provides a kind of flow chart of Computer Automatic Monitor method.This method is specific Comprise the following steps:
S1. monitoring server determines data acquiring frequency and data structure;
S2. computer monitoring terminal knows the computer service data to be gathered according to the data structure, and knows collection Frequency;
S3. computer monitoring terminal gathers corresponding computer service data according to the frequency acquisition;
S4. enter row format to the computer service data of collection to change and encrypt;
S5. computer monitoring terminal sends the data after encryption to monitoring server;
S6. monitoring server receives encryption data and is decrypted;
S7. monitoring server is analyzed data after decryption, it is determined that the operation conditions of monitored computer.
Preferably, system manager sets the computer system that need to be monitored to join according to need in monitoring server in step sl Number;Then the data structure being directed to required for each systematic parameter is set by monitoring server.
Preferably, calculation of the monitoring server according to required for the systematic parameter that need to be monitored sends it to computer monitoring terminal Method data structure and data acquiring frequency.
Preferably, in step s 4, the form conversion comprises the following steps:
Key message is extracted from the computer service data, the key message is matched with default appointment data, will The numeral corresponding to check information matched is defined as be-encrypted data;
Wherein, the appointment data can include check information with numeral corresponding relation, so, match check information it Afterwards, can be to obtain corresponding numeral, so as to reach the purpose that computer service data is converted to numeral.
Preferably, in the step S4, the service data after being changed in the following way to form is encrypted:
S41. preset characters string and preset group model are obtained;
S42. the preset group model is trained according to the be-encrypted data, obtains target array;
S43. the target array is traveled through, and based on traversing result obtained from the preset characters string corresponding to character, obtain To encryption data.
Preferably, in the step S6, encryption data is decrypted in the following way:
S61. preset characters string is obtained;Wherein, the preset characters string is identical with used preset characters string during encryption, the character The length of string can be configured according to the demand of practical application.
S62. the encryption data is traveled through, to determine to be currently needed for the character of inquiry, obtains current character;
S63. current character positional information in the encryption data is obtained, obtains first position information;
S64. positional information of the current character in the preset characters string is obtained, obtains second place information;
S65. the first position information and second place information are calculated by preset algorithm, obtains decrypted digital.
Preferably, the data transfer of computer monitoring terminal and monitoring server is communicated using instant encryption, instant encryption Before communication, computer monitoring terminal produces session key WK temporarily;The identity that monitoring server obtains computer monitoring terminal is public Key and the basic public key of key agreement, public private key pair is then formed with monitoring server and represents initial key to consult to calculate father's rolling N_CC, detailed process are as follows:
By T_SKA/T_PKA, NB_SKB/NB_PKB, pass through scalar multiplication algorithm on elliptic curve, the key of computing computer monitor terminal Consult Part I Part1;
Computer monitoring terminal computer monitoring terminal key agreement Part I Part1=DPSM2(TSKA, NBPKB);
By NB_SKA/NB_PKA, T_SKB/T_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal it is close Key consults Part II Part2;
Computer monitoring terminal key agreement Part II Part2=DPSM2(NBSKA, TPKB);
By NB_SKA/NB_PKA, NB_SKB/NB_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal calculates hair The key agreement Part III Part3 for the side of sending;
Computer monitoring terminal key agreement Part III Part3=DPSM2(NBSKA, NBPKB);
By computer monitoring terminal key agreement Part I Part1, computer monitoring terminal key agreement Part II Part2, computer monitoring terminal key agreement Part III Part3 connect into computer monitoring terminal key components KM;
Computer monitoring terminal key components KM=Part1 | | Part2 | | Part3);
Computer monitoring terminal key components KM and the first character string is whole into 256bit computer monitoring with SM3 compression algorithms The father at end rolls and represents initial key N_CC;
Initial key N_CC=HSM3(KM | | the first character string)
According to scalar multiplication algorithm on elliptic curve feature, by the calculating process, computer monitoring terminal key and monitoring server are double Side calculates consistent father's rolling and represents initial key N_CC.
The present invention has advantages below and beneficial effect:(1)This method is in data acquisition and processing (DAP), using scattered load sharing Mode, the Intellectualized monitoring of network computer system is improved, ensure stability, the high efficiency of system;(2)This method also enters one Walk the data gathered during the monitoring that will be obtained according to preset strategy and be converted to numeral, and using predetermined encryption algorithm to these numerals It is encrypted, to be supplied to server, so that server determines according to the encryption data operation feelings of network computer to be monitored Condition, the length of monitoring data is greatly shortened, reduces volume of transmitted data, further increases monitoring efficiency, further, since to turning Numeral after changing is encrypted, and therefore, its security and interference resistance also greatly improve.
Brief description of the drawings
Fig. 1 show monitoring method of the present invention based on a kind of Computer Automatic Monitor system block diagram.
Fig. 2 shows a kind of flow chart of Computer Automatic Monitor method of the present invention.
Embodiment
Fig. 1 is the block diagram for showing a kind of Computer Automatic Monitor system of the present invention.The monitoring system includes multiple meters Calculate machine monitoring terminal 1 and monitoring server 2.
Wherein, computer monitoring terminal 1 includes:Data acquisition module 11, for gathering monitored network computer operation Data;Modular converter 12, for the computer service data of the collection to be converted into numeral according to preset strategy, obtain to be added Ciphertext data;Encrypting module 13, for the be-encrypted data to be encrypted according to predetermined encryption algorithm, obtain encryption data; Terminal control module 14, the data acquisition module 11, modular converter 12 and encrypting module 13 are connected, monitored for control computer Terminal modules, and store encryption data;Terminal data transceiver module 15, for sending and receiving phase to monitoring server 2 Answer data.
Monitoring server 2 includes:Server data transceiver module 21, deciphering module 22, parsing determining module 23 and middle control Module 24;The server data transceiver module 21, corresponding data is sent and received to the computer monitoring terminal 2;It is described Deciphering module 22, the encryption data is decrypted according to default decipherment algorithm, obtains decrypted digital;The parsing determines Module 23, the implication of the decrypted digital is parsed according to preset strategy, obtain the service data of monitored network computer, and The operation conditions of monitored network computer is determined according to the service data.
Wherein, monitoring server 2 can send it according to the computer system parameter that need to be monitored to computer monitoring terminal 1 Required algorithm data structure and data acquiring frequency.The terminal control module 14 of computer monitoring terminal 1 is according to receiving Algorithm data structure know required for monitoring computer system parameter, so that it is determined that the computer service data that need to be monitored, And the frequency of output data required for knowing.
Preferably, system manager sets the computer system parameter that need to be monitored in monitoring server 2 according to need, such as interior Deposit, CPU, hard disk praameter etc.;Then the data structure being directed to required for each systematic parameter is set by monitoring server 2, Such as monitored for CPU, generally gather its usage amount, temperature and buffer usage amount.Monitoring server 2 is according to need to monitor Systematic parameter (can be interim, dynamic) send it to computer monitoring terminal 1 required for algorithm data structure and number According to frequency acquisition.Computer monitoring terminal 1 is according to the frequency of required output data, the calculating to being gathered in every band frequency time Machine service data changed, encrypt after form one group of data and send back to monitoring server 2.
Fig. 2 shows a kind of flow chart of Computer Automatic Monitor method using the present invention.This method specifically include as Lower step:
S1. monitoring server determines data acquiring frequency and data structure;
S2. computer monitoring terminal knows the computer service data to be gathered according to the data structure, and knows collection Frequency;
S3. computer monitoring terminal gathers corresponding computer service data according to the frequency acquisition;
S4. enter row format to the computer service data of collection to change and encrypt;
S5. computer monitoring terminal sends the data after encryption to monitoring server;
S6. monitoring server receives encryption data and is decrypted;
S7. monitoring server is analyzed data after decryption, it is determined that the operation conditions of monitored computer.
Preferably, system manager sets the computer system that need to be monitored to join according to need in monitoring server in step sl Number, such as internal memory, CPU, hard disk praameter etc.;Then the number being directed to required for each systematic parameter is set by monitoring server Monitored according to structure, such as CPU, generally gather its usage amount, temperature and buffer usage amount.
Preferably, monitoring server is supervised according to the systematic parameter (can be interim, dynamic) that need to be monitored to computer Control terminal sends the algorithm data structure and data acquiring frequency required for it.
Preferably, in step s 4, the form conversion comprises the following steps:
Key message is extracted from the computer service data, the key message is matched with default appointment data, will The numeral corresponding to check information matched is defined as be-encrypted data.
Wherein, the mode of matching can have a variety of, for example, it may be determined that whether there is and the key message in appointment data Consistent check information, if in the presence of, it is determined that the check information with the key information match be present, and determination is somebody's turn to do and key message Consistent check information is " check information matched ";Otherwise, if being not present, it is determined that in the absence of with the key information match Check information.In another example it can also determine to whether there is the school of " meeting preset relation with the key message " in appointment data Information is tested, such as with the presence or absence of the check information for being more than preset value with the similarity of key message, if in the presence of, it is determined that exist With the check information of the key information match, and determine should " check information for meeting preset relation with key message " be " to match The check information arrived ";Otherwise, if being not present, it is determined that in the absence of check information with the key information match, etc..
Wherein, the appointment data can include check information and the corresponding relation of numeral, so, match check information Afterwards, can be to obtain corresponding numeral, so as to reach the purpose that computer service data is converted to numeral.
Preferably, in the step S4, the service data after being changed in the following way to form is encrypted:
S41. preset characters string and preset group model are obtained.
Wherein, the length of the preset characters string and Array Model can be configured according to the demand of practical application, for example, The length of the character string specifically could be arranged to 2 k power (i.e. 2^k), such as, K can be arranged to 6, will the character string Length be arranged to 64, and for example, can also will be arranged to 7, will the length of the character string be arranged to 128, etc..
The preset group model is trained according to the be-encrypted data, obtains target array.For example, can be as follows:
Rounded after carrying out complementation to the be-encrypted data, obtain the first result of calculation.
For example if in S42, the length of character string is arranged to 64 (i.e. k is 6), then at this point it is possible to this is to be encrypted Data round after being taken the remainder to 6, obtain the first result of calculation, be formulated as:
Math.ceil(N/6)。
Again for example, if in step S41., the length of character string is arranged to 128 (i.e. k is 7), then at this point it is possible to should Be-encrypted data rounds after being taken the remainder to 7, obtains the first result of calculation, be formulated as:
Math.ceil(N/7)。
Wherein, N is be-encrypted data.
Modulo operation is carried out to the be-encrypted data, obtains the second result of calculation.
Subscript using first result of calculation as preset group model, obtains current array, and second calculating is moved to left by 1 As a result, the value as the current array, target array is obtained
For example using the first result of calculation as Math.ceil (N/6), exemplified by the second result of calculation is N%6, then the target array is used Formula is expressed as:
Ary [Math.ceil (N/6)]=1<<N%6.
Wherein, " 1<<N%6 " expressions move to left N%6 by 1, such as, by taking N%6=3 as an example, then now it can move to left 3 by 1 Position, i.e., if being originally " 1 ", then will now be changed into " 1000 ", the like, etc..
S43. the target array is traveled through, and based on traversing result obtained from the preset characters string corresponding to word Symbol, obtains encryption data.
For example, so that the length of the preset characters string is 64 as an example, then at this point it is possible to be traveled through to target array, and Character is as a result, obtain encryption data corresponding to being obtained based on traversing result from 64 character strings.
Preferably, in the step S6, encryption data is decrypted in the following way:
S61. preset characters string is obtained.
Wherein, the preset characters string is identical with used preset characters string during encryption, and the length of the character string can root It is configured according to the demand of practical application, such as, the length of the character string specifically could be arranged to 64, etc..
S62. the encryption data is traveled through, to determine to be currently needed for the character of inquiry, obtains current character.
S63. current character positional information in the encryption data is obtained, obtains first position information.
For example, so that the current character is " a " as an example, then at this point it is possible to obtain " a " positional information in the encryption data, Such as Y, obtain first position information.
S64. positional information of the current character in the preset characters string is obtained, obtains second place information.
S65. the first position information and second place information are calculated by preset algorithm, number after being decrypted Word.
Preferably, the data transfer of computer monitoring terminal and monitoring server is communicated using instant encryption, instant encryption Before communication, computer monitoring terminal produces session key WK temporarily;The identity that monitoring server obtains computer monitoring terminal is public Key and the basic public key of key agreement, public private key pair is then formed with monitoring server and represents initial key to consult to calculate father's rolling N_CC, detailed process are as follows:
By T_SKA/T_PKA, NB_SKB/NB_PKB, pass through scalar multiplication algorithm on elliptic curve, the key of computing computer monitor terminal Consult Part I Part1;
Computer monitoring terminal computer monitoring terminal key agreement Part I Part1=DPSM2(TSKA, NBPKB);
By NB_SKA/NB_PKA, T_SKB/T_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal it is close Key consults Part II Part2;
Computer monitoring terminal key agreement Part II Part2=DPSM2(NBSKA, TPKB);
By NB_SKA/NB_PKA, NB_SKB/NB_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal calculates hair The key agreement Part III Part3 for the side of sending;
Computer monitoring terminal key agreement Part III Part3=DPSM2(NBSKA, NBPKB);
By computer monitoring terminal key agreement Part I Part1, computer monitoring terminal key agreement Part II Part2, computer monitoring terminal key agreement Part III Part3 connect into computer monitoring terminal key components KM;
Computer monitoring terminal key components KM=Part1 | | Part2 | | Part3);
Computer monitoring terminal key components KM and the first character string is whole into 256bit computer monitoring with SM3 compression algorithms The father at end rolls and represents initial key N_CC;
Initial key N_CC=HSM3(KM | | the first character string)
According to scalar multiplication algorithm on elliptic curve feature, by the calculating process, computer monitoring terminal key and monitoring server are double Side calculates consistent father's rolling and represents initial key N_CC.
As described above, although the embodiment and accompanying drawing that are limited according to embodiment are illustrated, to the art Various modification and variation can be carried out for technical staff with general knowledge from above-mentioned record.For example, according to explanation Technology in illustrated method mutually different order carry out, and/or according to the system with explanation, structure, device, circuit etc. The mutually different form of method illustrated by inscape is combined or combined, or is carried out according to other inscapes or equipollent Replace or displacement also may achieve appropriate effect.For general technical staff of the technical field of the invention, do not taking off On the premise of from present inventive concept, some equivalent substitutes or obvious modification are made, and performance or purposes are identical, should all be considered as Belong to protection scope of the present invention.

Claims (7)

  1. A kind of 1. flow chart of Computer Automatic Monitor method:
    This method specifically comprises the following steps:
    S1. monitoring server determines data acquiring frequency and data structure;
    S2. computer monitoring terminal knows the computer service data to be gathered according to the data structure, and knows collection Frequency;
    S3. computer monitoring terminal gathers corresponding computer service data according to the frequency acquisition;
    S4. enter row format to the computer service data of collection to change and encrypt;
    S5. computer monitoring terminal sends the data after encryption to monitoring server;
    S6. monitoring server receives encryption data and is decrypted;
    S7. monitoring server is analyzed data after decryption, it is determined that the operation conditions of monitored computer.
  2. 2. the method as described in claim 1, it is characterised in that in step sl system manager in monitoring server according to need The computer system parameter that need to be monitored is set;Then the number being directed to required for each systematic parameter is set by monitoring server According to structure.
  3. 3. method as claimed in claim 2, it is characterised in that monitoring server is according to the systematic parameter that need to be monitored to computer Monitor terminal sends the algorithm data structure and data acquiring frequency required for it.
  4. 4. the method as described in claim 1-3 is any, it is characterised in that in step s 4, the form conversion includes as follows Step:
    Key message is extracted from the computer service data, the key message is matched with default appointment data, will The numeral corresponding to check information matched is defined as be-encrypted data;
    Wherein, the appointment data can include check information with numeral corresponding relation, so, match check information it Afterwards, can be to obtain corresponding numeral, so as to reach the purpose that computer service data is converted to numeral.
  5. 5. method as claimed in claim 4, it is characterised in that in the step S4, changed in the following way to form Service data afterwards is encrypted:
    S41. preset characters string and preset group model are obtained;
    The preset group model is trained according to the be-encrypted data, obtains target array;
    S43. the target array is traveled through, and based on traversing result obtained from the preset characters string corresponding to character, obtain To encryption data.
  6. 6. method as claimed in claim 5, it is characterised in that in the step S6, enter in the following way to encryption data Row decryption:
    S61. preset characters string is obtained;Wherein, the preset characters string is identical with used preset characters string during encryption, the character The length of string can be configured according to the demand of practical application;
    S62. the encryption data is traveled through, to determine to be currently needed for the character of inquiry, obtains current character;
    S63. current character positional information in the encryption data is obtained, obtains first position information;
    S64. positional information of the current character in the preset characters string is obtained, obtains second place information;
    S65. the first position information and second place information are calculated by preset algorithm, obtains decrypted digital.
  7. 7. the method as described in claim 1-6 is any, it is characterised in that the data of computer monitoring terminal and monitoring server Transmission is communicated using instant encryption, and before instant encryption communication, computer monitoring terminal produces session key WK temporarily;Monitoring service Device obtains the identity public key and the basic public key of key agreement of computer monitoring terminal, then forms public private key pair with monitoring server Initial key N_CC is represented to consult to calculate father's rolling, detailed process is as follows:
    By T_SKA/T_PKA, NB_SKB/NB_PKB, pass through scalar multiplication algorithm on elliptic curve, the key of computing computer monitor terminal Consult Part I Part1;
    Computer monitoring terminal computer monitoring terminal key agreement Part I Part1=DPSM2(TSKA, NBPKB);
    By NB_SKA/NB_PKA, T_SKB/T_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal it is close Key consults Part II Part2;
    Computer monitoring terminal key agreement Part II Part2=DPSM2(NBSKA, TPKB);
    By NB_SKA/NB_PKA, NB_SKB/NB_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal calculates hair The key agreement Part III Part3 for the side of sending;
    Computer monitoring terminal key agreement Part III Part3=DPSM2(NBSKA, NBPKB);
    By computer monitoring terminal key agreement Part I Part1, computer monitoring terminal key agreement Part II Part2, computer monitoring terminal key agreement Part III Part3 connect into computer monitoring terminal key components KM;
    Computer monitoring terminal key components KM=Part1 | | Part2 | | Part3);
    Computer monitoring terminal key components KM and the first character string is whole into 256bit computer monitoring with SM3 compression algorithms The father at end rolls and represents initial key N_CC;
    Initial key N_CC=HSM3(KM | | the first character string)
    According to scalar multiplication algorithm on elliptic curve feature, by the calculating process, computer monitoring terminal key and monitoring server are double Side calculates consistent father's rolling and represents initial key N_CC.
CN201710732021.6A 2017-08-23 2017-08-23 A kind of Computer Automatic Monitor method Pending CN107515810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710732021.6A CN107515810A (en) 2017-08-23 2017-08-23 A kind of Computer Automatic Monitor method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710732021.6A CN107515810A (en) 2017-08-23 2017-08-23 A kind of Computer Automatic Monitor method

Publications (1)

Publication Number Publication Date
CN107515810A true CN107515810A (en) 2017-12-26

Family

ID=60723700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710732021.6A Pending CN107515810A (en) 2017-08-23 2017-08-23 A kind of Computer Automatic Monitor method

Country Status (1)

Country Link
CN (1) CN107515810A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388542A (en) * 2018-10-26 2019-02-26 北京百悟科技有限公司 A kind of monitoring method and device, computer readable storage medium
CN111464344A (en) * 2020-03-23 2020-07-28 青岛黄海学院 Visual computer interconnection system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932345A (en) * 2012-10-26 2013-02-13 山东中创软件商用中间件股份有限公司 Method, device and system for information transmission
CN104407964A (en) * 2014-12-08 2015-03-11 国家电网公司 Centralized monitoring system and method based on data center
CN105306492A (en) * 2015-11-25 2016-02-03 成都三零瑞通移动通信有限公司 Asynchronous key negotiation method and device aiming at secure instant messaging

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932345A (en) * 2012-10-26 2013-02-13 山东中创软件商用中间件股份有限公司 Method, device and system for information transmission
CN104407964A (en) * 2014-12-08 2015-03-11 国家电网公司 Centralized monitoring system and method based on data center
CN105306492A (en) * 2015-11-25 2016-02-03 成都三零瑞通移动通信有限公司 Asynchronous key negotiation method and device aiming at secure instant messaging

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388542A (en) * 2018-10-26 2019-02-26 北京百悟科技有限公司 A kind of monitoring method and device, computer readable storage medium
CN109388542B (en) * 2018-10-26 2022-02-22 北京百悟科技有限公司 Monitoring method and device and computer readable storage medium
CN111464344A (en) * 2020-03-23 2020-07-28 青岛黄海学院 Visual computer interconnection system

Similar Documents

Publication Publication Date Title
Gong et al. A medical healthcare system for privacy protection based on IoT
Liu et al. Boosting privately: Federated extreme gradient boosting for mobile crowdsensing
Liu et al. Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing
US7856100B2 (en) Privacy-preserving data aggregation using homomorphic encryption
WO2018184407A1 (en) K-means clustering method and system having privacy protection
Zhang et al. Dubhe: Towards data unbiasedness with homomorphic encryption in federated learning client selection
Liao et al. Tree-based group key agreement framework for mobile ad-hoc networks
Erkin Private data aggregation with groups for smart grids in a dynamic setting using CRT
Das Sarma et al. Efficient distributed random walks with applications
Zhang et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead
Dang et al. Resource-efficient secure data sharing for information centric e-health system using fog computing
Tang et al. Quantum-secure networked microgrids
CN116523074A (en) Dynamic fairness privacy protection federal deep learning method
Xu et al. Enabling comparable search over encrypted data for IoT with privacy-preserving
CN107515810A (en) A kind of Computer Automatic Monitor method
Mahdikhani et al. Achieving efficient and privacy-preserving range query in fog-enhanced IoT with bloom filter
Mahdikhani et al. Achieving privacy-preserving multi dot-product query in fog computing-enhanced IoT
Jiang et al. Lightweight data security protection method for AMI in power Internet of Things
CN113206870A (en) Method and system for processing based on medical big data
US9400729B2 (en) System and method for determining topology of monitored entities
Wu et al. Kvsagg: Secure aggregation of distributed key-value sets
Song et al. Privacy‐Preserving KNN Classification Algorithm for Smart Grid
Liu et al. A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
Suma et al. Brakerski‐Gentry‐Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow‐worm swarm optimization
Thakur et al. Mobile Sink Based NLEACH Protocol by using Ant Colony Optimization

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171226