CN107515810A - A kind of Computer Automatic Monitor method - Google Patents
A kind of Computer Automatic Monitor method Download PDFInfo
- Publication number
- CN107515810A CN107515810A CN201710732021.6A CN201710732021A CN107515810A CN 107515810 A CN107515810 A CN 107515810A CN 201710732021 A CN201710732021 A CN 201710732021A CN 107515810 A CN107515810 A CN 107515810A
- Authority
- CN
- China
- Prior art keywords
- computer
- data
- key
- monitoring terminal
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Mathematical Physics (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of Computer Automatic Monitor method, this method is in data acquisition and processing (DAP), using scattered load sharing mode, improves the Intellectualized monitoring of network computer system, ensures stability, the high efficiency of system;The data gathered during the monitoring that this method will obtain yet further still according to preset strategy are converted to numeral, and these numerals are encrypted using predetermined encryption algorithm, to be supplied to server, so that server determines according to the encryption data running situation of network computer to be monitored, the length of monitoring data is greatly shortened, reduce volume of transmitted data, monitoring efficiency is further increased, further, since the numeral after conversion is encrypted, therefore, its security and interference resistance also greatly improve.
Description
Technical field
The present invention relates to computer monitoring field, and in particular to a kind of Computer Automatic Monitor method.
Background technology
With the fast development of computer technology, LAN turns into each enterprise and shares internal resource, improves routine work effect
The enterprise computer network building mode of rate, in the prior art management of the enterprise to computer are normally based on each client meter
Calculation machine, computer is not managed collectively using LAN, not only increases hardware management and maintenance cost, and manage and do not unite
One specification, waste of resource, increase cost, computer equipment monitoring can be carried out using existing LAN, be not only convenient for calculating
Machine is managed collectively.
With the fast development of Internet technology so that user can access internet at any time, so as to be brought to user
Great convenience, but the crisis of sensitive data leakage is also increased simultaneously.In order to understand in time network computer situation,
To provide more preferable network service, it is necessary to be monitored to the computer service data of front end.In the prior art, it is generally required that
In each computer operation to be monitored, the network computer service data to be monitored performed is acquired respectively, so
Afterwards, after the data collected are segmented, assembled respectively, and report server one by one, by server to receiving
To assembling after data parsed, to determine specific implementation status, so as to realize treat monitoring network computer data enter
The purpose of row monitoring.
The more and more extensive management and monitoring applied to network computer of Intelligence data model, all models of mind are wherein
One core is the different pieces of information for wanting Collecting and dealing huge, is calculated numerous and diverse.Current extensive way is in operating system aspect
All these processing are carried out, these Network Computers Managements and the data of monitoring can bring very big additional negative to operating system
Load.
The content of the invention
The present invention provides a kind of Computer Automatic Monitor method, and this method is in data acquisition and processing (DAP), using scattered point
Load mode, the Intellectualized monitoring of network computer system is improved, ensure stability, the high efficiency of system;This method also enters one
Walk the data gathered during the monitoring that will be obtained according to preset strategy and be converted to numeral, and using predetermined encryption algorithm to these numerals
It is encrypted, to be supplied to server, so that server determines according to the encryption data operation feelings of network computer to be monitored
Condition, the length of monitoring data is greatly shortened, reduces volume of transmitted data, further increases monitoring efficiency, further, since to turning
Numeral after changing is encrypted, and therefore, its security and interference resistance also greatly improve.
To achieve these goals, the present invention provides a kind of flow chart of Computer Automatic Monitor method.This method is specific
Comprise the following steps:
S1. monitoring server determines data acquiring frequency and data structure;
S2. computer monitoring terminal knows the computer service data to be gathered according to the data structure, and knows collection
Frequency;
S3. computer monitoring terminal gathers corresponding computer service data according to the frequency acquisition;
S4. enter row format to the computer service data of collection to change and encrypt;
S5. computer monitoring terminal sends the data after encryption to monitoring server;
S6. monitoring server receives encryption data and is decrypted;
S7. monitoring server is analyzed data after decryption, it is determined that the operation conditions of monitored computer.
Preferably, system manager sets the computer system that need to be monitored to join according to need in monitoring server in step sl
Number;Then the data structure being directed to required for each systematic parameter is set by monitoring server.
Preferably, calculation of the monitoring server according to required for the systematic parameter that need to be monitored sends it to computer monitoring terminal
Method data structure and data acquiring frequency.
Preferably, in step s 4, the form conversion comprises the following steps:
Key message is extracted from the computer service data, the key message is matched with default appointment data, will
The numeral corresponding to check information matched is defined as be-encrypted data;
Wherein, the appointment data can include check information with numeral corresponding relation, so, match check information it
Afterwards, can be to obtain corresponding numeral, so as to reach the purpose that computer service data is converted to numeral.
Preferably, in the step S4, the service data after being changed in the following way to form is encrypted:
S41. preset characters string and preset group model are obtained;
S42. the preset group model is trained according to the be-encrypted data, obtains target array;
S43. the target array is traveled through, and based on traversing result obtained from the preset characters string corresponding to character, obtain
To encryption data.
Preferably, in the step S6, encryption data is decrypted in the following way:
S61. preset characters string is obtained;Wherein, the preset characters string is identical with used preset characters string during encryption, the character
The length of string can be configured according to the demand of practical application.
S62. the encryption data is traveled through, to determine to be currently needed for the character of inquiry, obtains current character;
S63. current character positional information in the encryption data is obtained, obtains first position information;
S64. positional information of the current character in the preset characters string is obtained, obtains second place information;
S65. the first position information and second place information are calculated by preset algorithm, obtains decrypted digital.
Preferably, the data transfer of computer monitoring terminal and monitoring server is communicated using instant encryption, instant encryption
Before communication, computer monitoring terminal produces session key WK temporarily;The identity that monitoring server obtains computer monitoring terminal is public
Key and the basic public key of key agreement, public private key pair is then formed with monitoring server and represents initial key to consult to calculate father's rolling
N_CC, detailed process are as follows:
By T_SKA/T_PKA, NB_SKB/NB_PKB, pass through scalar multiplication algorithm on elliptic curve, the key of computing computer monitor terminal
Consult Part I Part1;
Computer monitoring terminal computer monitoring terminal key agreement Part I Part1=DPSM2(TSKA, NBPKB);
By NB_SKA/NB_PKA, T_SKB/T_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal it is close
Key consults Part II Part2;
Computer monitoring terminal key agreement Part II Part2=DPSM2(NBSKA, TPKB);
By NB_SKA/NB_PKA, NB_SKB/NB_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal calculates hair
The key agreement Part III Part3 for the side of sending;
Computer monitoring terminal key agreement Part III Part3=DPSM2(NBSKA, NBPKB);
By computer monitoring terminal key agreement Part I Part1, computer monitoring terminal key agreement Part II
Part2, computer monitoring terminal key agreement Part III Part3 connect into computer monitoring terminal key components KM;
Computer monitoring terminal key components KM=Part1 | | Part2 | | Part3);
Computer monitoring terminal key components KM and the first character string is whole into 256bit computer monitoring with SM3 compression algorithms
The father at end rolls and represents initial key N_CC;
Initial key N_CC=HSM3(KM | | the first character string)
According to scalar multiplication algorithm on elliptic curve feature, by the calculating process, computer monitoring terminal key and monitoring server are double
Side calculates consistent father's rolling and represents initial key N_CC.
The present invention has advantages below and beneficial effect:(1)This method is in data acquisition and processing (DAP), using scattered load sharing
Mode, the Intellectualized monitoring of network computer system is improved, ensure stability, the high efficiency of system;(2)This method also enters one
Walk the data gathered during the monitoring that will be obtained according to preset strategy and be converted to numeral, and using predetermined encryption algorithm to these numerals
It is encrypted, to be supplied to server, so that server determines according to the encryption data operation feelings of network computer to be monitored
Condition, the length of monitoring data is greatly shortened, reduces volume of transmitted data, further increases monitoring efficiency, further, since to turning
Numeral after changing is encrypted, and therefore, its security and interference resistance also greatly improve.
Brief description of the drawings
Fig. 1 show monitoring method of the present invention based on a kind of Computer Automatic Monitor system block diagram.
Fig. 2 shows a kind of flow chart of Computer Automatic Monitor method of the present invention.
Embodiment
Fig. 1 is the block diagram for showing a kind of Computer Automatic Monitor system of the present invention.The monitoring system includes multiple meters
Calculate machine monitoring terminal 1 and monitoring server 2.
Wherein, computer monitoring terminal 1 includes:Data acquisition module 11, for gathering monitored network computer operation
Data;Modular converter 12, for the computer service data of the collection to be converted into numeral according to preset strategy, obtain to be added
Ciphertext data;Encrypting module 13, for the be-encrypted data to be encrypted according to predetermined encryption algorithm, obtain encryption data;
Terminal control module 14, the data acquisition module 11, modular converter 12 and encrypting module 13 are connected, monitored for control computer
Terminal modules, and store encryption data;Terminal data transceiver module 15, for sending and receiving phase to monitoring server 2
Answer data.
Monitoring server 2 includes:Server data transceiver module 21, deciphering module 22, parsing determining module 23 and middle control
Module 24;The server data transceiver module 21, corresponding data is sent and received to the computer monitoring terminal 2;It is described
Deciphering module 22, the encryption data is decrypted according to default decipherment algorithm, obtains decrypted digital;The parsing determines
Module 23, the implication of the decrypted digital is parsed according to preset strategy, obtain the service data of monitored network computer, and
The operation conditions of monitored network computer is determined according to the service data.
Wherein, monitoring server 2 can send it according to the computer system parameter that need to be monitored to computer monitoring terminal 1
Required algorithm data structure and data acquiring frequency.The terminal control module 14 of computer monitoring terminal 1 is according to receiving
Algorithm data structure know required for monitoring computer system parameter, so that it is determined that the computer service data that need to be monitored,
And the frequency of output data required for knowing.
Preferably, system manager sets the computer system parameter that need to be monitored in monitoring server 2 according to need, such as interior
Deposit, CPU, hard disk praameter etc.;Then the data structure being directed to required for each systematic parameter is set by monitoring server 2,
Such as monitored for CPU, generally gather its usage amount, temperature and buffer usage amount.Monitoring server 2 is according to need to monitor
Systematic parameter (can be interim, dynamic) send it to computer monitoring terminal 1 required for algorithm data structure and number
According to frequency acquisition.Computer monitoring terminal 1 is according to the frequency of required output data, the calculating to being gathered in every band frequency time
Machine service data changed, encrypt after form one group of data and send back to monitoring server 2.
Fig. 2 shows a kind of flow chart of Computer Automatic Monitor method using the present invention.This method specifically include as
Lower step:
S1. monitoring server determines data acquiring frequency and data structure;
S2. computer monitoring terminal knows the computer service data to be gathered according to the data structure, and knows collection
Frequency;
S3. computer monitoring terminal gathers corresponding computer service data according to the frequency acquisition;
S4. enter row format to the computer service data of collection to change and encrypt;
S5. computer monitoring terminal sends the data after encryption to monitoring server;
S6. monitoring server receives encryption data and is decrypted;
S7. monitoring server is analyzed data after decryption, it is determined that the operation conditions of monitored computer.
Preferably, system manager sets the computer system that need to be monitored to join according to need in monitoring server in step sl
Number, such as internal memory, CPU, hard disk praameter etc.;Then the number being directed to required for each systematic parameter is set by monitoring server
Monitored according to structure, such as CPU, generally gather its usage amount, temperature and buffer usage amount.
Preferably, monitoring server is supervised according to the systematic parameter (can be interim, dynamic) that need to be monitored to computer
Control terminal sends the algorithm data structure and data acquiring frequency required for it.
Preferably, in step s 4, the form conversion comprises the following steps:
Key message is extracted from the computer service data, the key message is matched with default appointment data, will
The numeral corresponding to check information matched is defined as be-encrypted data.
Wherein, the mode of matching can have a variety of, for example, it may be determined that whether there is and the key message in appointment data
Consistent check information, if in the presence of, it is determined that the check information with the key information match be present, and determination is somebody's turn to do and key message
Consistent check information is " check information matched ";Otherwise, if being not present, it is determined that in the absence of with the key information match
Check information.In another example it can also determine to whether there is the school of " meeting preset relation with the key message " in appointment data
Information is tested, such as with the presence or absence of the check information for being more than preset value with the similarity of key message, if in the presence of, it is determined that exist
With the check information of the key information match, and determine should " check information for meeting preset relation with key message " be " to match
The check information arrived ";Otherwise, if being not present, it is determined that in the absence of check information with the key information match, etc..
Wherein, the appointment data can include check information and the corresponding relation of numeral, so, match check information
Afterwards, can be to obtain corresponding numeral, so as to reach the purpose that computer service data is converted to numeral.
Preferably, in the step S4, the service data after being changed in the following way to form is encrypted:
S41. preset characters string and preset group model are obtained.
Wherein, the length of the preset characters string and Array Model can be configured according to the demand of practical application, for example,
The length of the character string specifically could be arranged to 2 k power (i.e. 2^k), such as, K can be arranged to 6, will the character string
Length be arranged to 64, and for example, can also will be arranged to 7, will the length of the character string be arranged to 128, etc..
The preset group model is trained according to the be-encrypted data, obtains target array.For example, can be as follows:
Rounded after carrying out complementation to the be-encrypted data, obtain the first result of calculation.
For example if in S42, the length of character string is arranged to 64 (i.e. k is 6), then at this point it is possible to this is to be encrypted
Data round after being taken the remainder to 6, obtain the first result of calculation, be formulated as:
Math.ceil(N/6)。
Again for example, if in step S41., the length of character string is arranged to 128 (i.e. k is 7), then at this point it is possible to should
Be-encrypted data rounds after being taken the remainder to 7, obtains the first result of calculation, be formulated as:
Math.ceil(N/7)。
Wherein, N is be-encrypted data.
Modulo operation is carried out to the be-encrypted data, obtains the second result of calculation.
Subscript using first result of calculation as preset group model, obtains current array, and second calculating is moved to left by 1
As a result, the value as the current array, target array is obtained
For example using the first result of calculation as Math.ceil (N/6), exemplified by the second result of calculation is N%6, then the target array is used
Formula is expressed as:
Ary [Math.ceil (N/6)]=1<<N%6.
Wherein, " 1<<N%6 " expressions move to left N%6 by 1, such as, by taking N%6=3 as an example, then now it can move to left 3 by 1
Position, i.e., if being originally " 1 ", then will now be changed into " 1000 ", the like, etc..
S43. the target array is traveled through, and based on traversing result obtained from the preset characters string corresponding to word
Symbol, obtains encryption data.
For example, so that the length of the preset characters string is 64 as an example, then at this point it is possible to be traveled through to target array, and
Character is as a result, obtain encryption data corresponding to being obtained based on traversing result from 64 character strings.
Preferably, in the step S6, encryption data is decrypted in the following way:
S61. preset characters string is obtained.
Wherein, the preset characters string is identical with used preset characters string during encryption, and the length of the character string can root
It is configured according to the demand of practical application, such as, the length of the character string specifically could be arranged to 64, etc..
S62. the encryption data is traveled through, to determine to be currently needed for the character of inquiry, obtains current character.
S63. current character positional information in the encryption data is obtained, obtains first position information.
For example, so that the current character is " a " as an example, then at this point it is possible to obtain " a " positional information in the encryption data,
Such as Y, obtain first position information.
S64. positional information of the current character in the preset characters string is obtained, obtains second place information.
S65. the first position information and second place information are calculated by preset algorithm, number after being decrypted
Word.
Preferably, the data transfer of computer monitoring terminal and monitoring server is communicated using instant encryption, instant encryption
Before communication, computer monitoring terminal produces session key WK temporarily;The identity that monitoring server obtains computer monitoring terminal is public
Key and the basic public key of key agreement, public private key pair is then formed with monitoring server and represents initial key to consult to calculate father's rolling
N_CC, detailed process are as follows:
By T_SKA/T_PKA, NB_SKB/NB_PKB, pass through scalar multiplication algorithm on elliptic curve, the key of computing computer monitor terminal
Consult Part I Part1;
Computer monitoring terminal computer monitoring terminal key agreement Part I Part1=DPSM2(TSKA, NBPKB);
By NB_SKA/NB_PKA, T_SKB/T_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal it is close
Key consults Part II Part2;
Computer monitoring terminal key agreement Part II Part2=DPSM2(NBSKA, TPKB);
By NB_SKA/NB_PKA, NB_SKB/NB_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal calculates hair
The key agreement Part III Part3 for the side of sending;
Computer monitoring terminal key agreement Part III Part3=DPSM2(NBSKA, NBPKB);
By computer monitoring terminal key agreement Part I Part1, computer monitoring terminal key agreement Part II
Part2, computer monitoring terminal key agreement Part III Part3 connect into computer monitoring terminal key components KM;
Computer monitoring terminal key components KM=Part1 | | Part2 | | Part3);
Computer monitoring terminal key components KM and the first character string is whole into 256bit computer monitoring with SM3 compression algorithms
The father at end rolls and represents initial key N_CC;
Initial key N_CC=HSM3(KM | | the first character string)
According to scalar multiplication algorithm on elliptic curve feature, by the calculating process, computer monitoring terminal key and monitoring server are double
Side calculates consistent father's rolling and represents initial key N_CC.
As described above, although the embodiment and accompanying drawing that are limited according to embodiment are illustrated, to the art
Various modification and variation can be carried out for technical staff with general knowledge from above-mentioned record.For example, according to explanation
Technology in illustrated method mutually different order carry out, and/or according to the system with explanation, structure, device, circuit etc.
The mutually different form of method illustrated by inscape is combined or combined, or is carried out according to other inscapes or equipollent
Replace or displacement also may achieve appropriate effect.For general technical staff of the technical field of the invention, do not taking off
On the premise of from present inventive concept, some equivalent substitutes or obvious modification are made, and performance or purposes are identical, should all be considered as
Belong to protection scope of the present invention.
Claims (7)
- A kind of 1. flow chart of Computer Automatic Monitor method:This method specifically comprises the following steps:S1. monitoring server determines data acquiring frequency and data structure;S2. computer monitoring terminal knows the computer service data to be gathered according to the data structure, and knows collection Frequency;S3. computer monitoring terminal gathers corresponding computer service data according to the frequency acquisition;S4. enter row format to the computer service data of collection to change and encrypt;S5. computer monitoring terminal sends the data after encryption to monitoring server;S6. monitoring server receives encryption data and is decrypted;S7. monitoring server is analyzed data after decryption, it is determined that the operation conditions of monitored computer.
- 2. the method as described in claim 1, it is characterised in that in step sl system manager in monitoring server according to need The computer system parameter that need to be monitored is set;Then the number being directed to required for each systematic parameter is set by monitoring server According to structure.
- 3. method as claimed in claim 2, it is characterised in that monitoring server is according to the systematic parameter that need to be monitored to computer Monitor terminal sends the algorithm data structure and data acquiring frequency required for it.
- 4. the method as described in claim 1-3 is any, it is characterised in that in step s 4, the form conversion includes as follows Step:Key message is extracted from the computer service data, the key message is matched with default appointment data, will The numeral corresponding to check information matched is defined as be-encrypted data;Wherein, the appointment data can include check information with numeral corresponding relation, so, match check information it Afterwards, can be to obtain corresponding numeral, so as to reach the purpose that computer service data is converted to numeral.
- 5. method as claimed in claim 4, it is characterised in that in the step S4, changed in the following way to form Service data afterwards is encrypted:S41. preset characters string and preset group model are obtained;The preset group model is trained according to the be-encrypted data, obtains target array;S43. the target array is traveled through, and based on traversing result obtained from the preset characters string corresponding to character, obtain To encryption data.
- 6. method as claimed in claim 5, it is characterised in that in the step S6, enter in the following way to encryption data Row decryption:S61. preset characters string is obtained;Wherein, the preset characters string is identical with used preset characters string during encryption, the character The length of string can be configured according to the demand of practical application;S62. the encryption data is traveled through, to determine to be currently needed for the character of inquiry, obtains current character;S63. current character positional information in the encryption data is obtained, obtains first position information;S64. positional information of the current character in the preset characters string is obtained, obtains second place information;S65. the first position information and second place information are calculated by preset algorithm, obtains decrypted digital.
- 7. the method as described in claim 1-6 is any, it is characterised in that the data of computer monitoring terminal and monitoring server Transmission is communicated using instant encryption, and before instant encryption communication, computer monitoring terminal produces session key WK temporarily;Monitoring service Device obtains the identity public key and the basic public key of key agreement of computer monitoring terminal, then forms public private key pair with monitoring server Initial key N_CC is represented to consult to calculate father's rolling, detailed process is as follows:By T_SKA/T_PKA, NB_SKB/NB_PKB, pass through scalar multiplication algorithm on elliptic curve, the key of computing computer monitor terminal Consult Part I Part1;Computer monitoring terminal computer monitoring terminal key agreement Part I Part1=DPSM2(TSKA, NBPKB);By NB_SKA/NB_PKA, T_SKB/T_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal it is close Key consults Part II Part2;Computer monitoring terminal key agreement Part II Part2=DPSM2(NBSKA, TPKB);By NB_SKA/NB_PKA, NB_SKB/NB_PKB, by scalar multiplication algorithm on elliptic curve, computing computer monitor terminal calculates hair The key agreement Part III Part3 for the side of sending;Computer monitoring terminal key agreement Part III Part3=DPSM2(NBSKA, NBPKB);By computer monitoring terminal key agreement Part I Part1, computer monitoring terminal key agreement Part II Part2, computer monitoring terminal key agreement Part III Part3 connect into computer monitoring terminal key components KM;Computer monitoring terminal key components KM=Part1 | | Part2 | | Part3);Computer monitoring terminal key components KM and the first character string is whole into 256bit computer monitoring with SM3 compression algorithms The father at end rolls and represents initial key N_CC;Initial key N_CC=HSM3(KM | | the first character string)According to scalar multiplication algorithm on elliptic curve feature, by the calculating process, computer monitoring terminal key and monitoring server are double Side calculates consistent father's rolling and represents initial key N_CC.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710732021.6A CN107515810A (en) | 2017-08-23 | 2017-08-23 | A kind of Computer Automatic Monitor method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710732021.6A CN107515810A (en) | 2017-08-23 | 2017-08-23 | A kind of Computer Automatic Monitor method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107515810A true CN107515810A (en) | 2017-12-26 |
Family
ID=60723700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710732021.6A Pending CN107515810A (en) | 2017-08-23 | 2017-08-23 | A kind of Computer Automatic Monitor method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107515810A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109388542A (en) * | 2018-10-26 | 2019-02-26 | 北京百悟科技有限公司 | A kind of monitoring method and device, computer readable storage medium |
CN111464344A (en) * | 2020-03-23 | 2020-07-28 | 青岛黄海学院 | Visual computer interconnection system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932345A (en) * | 2012-10-26 | 2013-02-13 | 山东中创软件商用中间件股份有限公司 | Method, device and system for information transmission |
CN104407964A (en) * | 2014-12-08 | 2015-03-11 | 国家电网公司 | Centralized monitoring system and method based on data center |
CN105306492A (en) * | 2015-11-25 | 2016-02-03 | 成都三零瑞通移动通信有限公司 | Asynchronous key negotiation method and device aiming at secure instant messaging |
-
2017
- 2017-08-23 CN CN201710732021.6A patent/CN107515810A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932345A (en) * | 2012-10-26 | 2013-02-13 | 山东中创软件商用中间件股份有限公司 | Method, device and system for information transmission |
CN104407964A (en) * | 2014-12-08 | 2015-03-11 | 国家电网公司 | Centralized monitoring system and method based on data center |
CN105306492A (en) * | 2015-11-25 | 2016-02-03 | 成都三零瑞通移动通信有限公司 | Asynchronous key negotiation method and device aiming at secure instant messaging |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109388542A (en) * | 2018-10-26 | 2019-02-26 | 北京百悟科技有限公司 | A kind of monitoring method and device, computer readable storage medium |
CN109388542B (en) * | 2018-10-26 | 2022-02-22 | 北京百悟科技有限公司 | Monitoring method and device and computer readable storage medium |
CN111464344A (en) * | 2020-03-23 | 2020-07-28 | 青岛黄海学院 | Visual computer interconnection system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gong et al. | A medical healthcare system for privacy protection based on IoT | |
Liu et al. | Boosting privately: Federated extreme gradient boosting for mobile crowdsensing | |
Liu et al. | Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing | |
US7856100B2 (en) | Privacy-preserving data aggregation using homomorphic encryption | |
WO2018184407A1 (en) | K-means clustering method and system having privacy protection | |
Zhang et al. | Dubhe: Towards data unbiasedness with homomorphic encryption in federated learning client selection | |
Liao et al. | Tree-based group key agreement framework for mobile ad-hoc networks | |
Erkin | Private data aggregation with groups for smart grids in a dynamic setting using CRT | |
Das Sarma et al. | Efficient distributed random walks with applications | |
Zhang et al. | Provably secure cloud storage for mobile networks with less computation and smaller overhead | |
Dang et al. | Resource-efficient secure data sharing for information centric e-health system using fog computing | |
Tang et al. | Quantum-secure networked microgrids | |
CN116523074A (en) | Dynamic fairness privacy protection federal deep learning method | |
Xu et al. | Enabling comparable search over encrypted data for IoT with privacy-preserving | |
CN107515810A (en) | A kind of Computer Automatic Monitor method | |
Mahdikhani et al. | Achieving efficient and privacy-preserving range query in fog-enhanced IoT with bloom filter | |
Mahdikhani et al. | Achieving privacy-preserving multi dot-product query in fog computing-enhanced IoT | |
Jiang et al. | Lightweight data security protection method for AMI in power Internet of Things | |
CN113206870A (en) | Method and system for processing based on medical big data | |
US9400729B2 (en) | System and method for determining topology of monitored entities | |
Wu et al. | Kvsagg: Secure aggregation of distributed key-value sets | |
Song et al. | Privacy‐Preserving KNN Classification Algorithm for Smart Grid | |
Liu et al. | A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid | |
Suma et al. | Brakerski‐Gentry‐Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow‐worm swarm optimization | |
Thakur et al. | Mobile Sink Based NLEACH Protocol by using Ant Colony Optimization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171226 |