CN107733739A - Credible strategy and the System and method for of report are managed in visualization concentratedly - Google Patents
Credible strategy and the System and method for of report are managed in visualization concentratedly Download PDFInfo
- Publication number
- CN107733739A CN107733739A CN201710992320.3A CN201710992320A CN107733739A CN 107733739 A CN107733739 A CN 107733739A CN 201710992320 A CN201710992320 A CN 201710992320A CN 107733739 A CN107733739 A CN 107733739A
- Authority
- CN
- China
- Prior art keywords
- agent side
- credible
- centralized management
- report
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
The system that the present invention discloses the credible strategy of visualization centralized management and report, is related to information security technology, its system architecture includes:Manage platform and agent side concentratedly, centralized management platform is built using Java+Spring MVC frameworks, and agent side is deployed in client, and agent side and management platform communication component are MQ;Manage platform concentratedly, general frame is divided into UI layers, interface layer, operation layer, data Layer and communication layers;Whether agent side periodically sends heartbeat message to centralized management platform, online by managing platform monitoring agent side concentratedly;Credible strategy for being deployed in agent side is managed and distributed concentratedly management;The final credible situation for judging agent side.The present invention can monitor online situation, credible situation to the agent side centralized management of batch, and Centralized management of policy can be issued, and greatly improve efficiency;Formula centralized management is interacted to credible strategy, improves Consumer's Experience.
Description
Technical field
The present invention relates to information security technology, specifically the system of the credible strategy of visualization centralized management and report and
Method.
Background technology
Trust computing(Trusted Computing)It is to calculate with communication system, widely using based on hardware security
Credible calculating platform under module support, to improve the overall security of system.At present, agent side be arranged on target machine it
Afterwards, being issued if individually carrying out strategy to each machine, the collection of report, not only efficiency is very low, and ease for use is poor, and
It is also easy to cause the loss of the data such as report.In this context, it is necessary to design a visual centralized management platform, come
Into the on-line monitoring of machine, tactical management, policy distribution and report analysis function.
Similar technology is presently in existence, mainly install and initialize by managing the credible administration agent of completion concentratedly,
Software registration, credible strategy collection, software kit storage, implementation module of Configuration module and trusted terminal etc..But at present
Existing centralized management platform technology is, it is necessary to individually to each monitoring management, for high-volume broker machines monitoring management
Situation, efficiency are low;Also, to credible strategy cannot man-machine interaction manage concentratedly, reduce Consumer's Experience.
The content of the invention
Demand and weak point of the present invention for the development of current technology, there is provided credible strategy is managed in one kind visualization concentratedly
With the System and method for of report.
The credible strategy of visualization centralized management of the present invention and the System and method for of report, solve above-mentioned technical problem and adopt
Technical scheme is as follows:The credible strategy of visualization centralized management and the system of report, its system architecture include:Concentrate tube
Platform and agent side, centralized management platform are built using Java+Spring MVC frameworks, and agent side is deployed in client,
Agent side and management platform communication component are MQ;
Manage platform concentratedly, general frame is divided into five layers:UI layers, interface layer, operation layer, data Layer and communication layers;
UI layers, show for business, user accesses access;
Interface layer, it is business function Restful interfaces, there is provided internal system interface calls for UI layers;
Operation layer, including resource management, tactical management and credible report;Resource management includes on-line monitoring, and agent side is periodically
Heartbeat message is sent to centralized management platform, it is whether online by managing platform monitoring agent side concentratedly;Tactical management, for portion
The credible strategy affixed one's name in agent side is managed and distributed concentratedly management;Credible report, for judging the credible situation of agent side;
Data Layer, for realizing that the management and storage to data, including database and tradition are applied;Using other types data
Storehouse, meet the realization of the present embodiment, also within the scope of the disclosure of the present embodiment.
Communication layers, it is responsible for carrying out message communicating with agent side, including strategy distribution and report upload.
Further, the tactical management includes elementary tactics, Metric policy, white list strategy, high-level policy;
Basic management, including Password Management and authentication certificate being issued and managing;
Metric policy, the software object list to be measured of responsible configuration, configuration complete deployment to agent side, agent side degree of passing through
Metrics logs corresponding to strategy generating are measured, and are uploaded to centralized management platform;
White list strategy, for configuring measure object inside Metric policy, the white list value of user is set;After metrics logs upload
Compared with the white list value, credible report is obtained;
High-level policy, report come the startup at control agent end for credible, if credible report shows that the agent side is insincere, weigh
The startup of the agent side is controlled when opening machine.
Further, the credible report includes metrics logs;
After Metric policy is deployed into agent side, agent side is measured according to Metric policy to main frame where it, and is uploaded
Metrics logs are to managing platform concentratedly;Centralized management platform compares metrics logs with the white list value configured, does not become
It is judged as credible during change, changes, be judged as insincere.
Further, the data Layer uses MySQL database, and/or the communication layers using RabbitMQ technologies come real
It is existing.
Further, the resource management also includes agent side registration:
After agent side starts, the machine hardware information of agent side is uploaded to centralized management platform and is stored in database.
The credible strategy of visualization centralized management proposed by the present invention and the method for report, implementation process include:
Step 1, on-line monitoring;
Agent side periodically to centralized management platform send heartbeat message, by manage concentratedly platform monitoring agent side whether
Line;
Step 2, tactical management;
User customizes credible strategy on visualization interface as needed, is then issued to agent side;Agent side receives credible plan
Slightly, deployment result is returned into centralized management platform;User carries out next step operation according to the deployment result of return;
Step 3, report analysis;
Credible strategy of the agent side according to deployment, collection measurement report, and centralized management platform is uploaded in real time;Concentrate tube pats
Platform shows the measurement received report with white list information comparative analysis.
Further, the step of credible strategy and the method reported are managed in visualization concentratedly, in addition to agent side is registered;
Specifically, after agent side starts, the machine hardware information of agent side is uploaded to centralized management platform and is stored in data
Storehouse;Agent side is after centralized management platform registration, you can by centralized management platform on-line monitoring.
Further, the idiographic flow of tactical management is as follows:
Tactful configuration is carried out first, and the strategy configured is then issued to agency by asynchronous message middleware services end passage
End, agent side return to centralized management platform by this passage again by result is disposed, and finally manage platform concentratedly and receive deployment shape
Strategy is handled accordingly after state.
Further, the idiographic flow of report analysis is as follows:
After Metric policy is deployed into agent side, agent side is measured according to Metric policy to main frame where it, and is uploaded
Metrics logs are to managing platform concentratedly;Then, metrics logs are compared with the white list value configured, judged when not changing
To be credible, changed, be judged as insincere.
The credible strategy of visualization centralized management of the present invention and the System and method for of report, have compared with prior art
Beneficial effect be:The present invention manages monitoring concentratedly by managing platform concentratedly to agent side, and can be visually seen and be administered
The presence of agent side, credible situation;In trust computing, agent side centralized management monitoring that can be to batch is in wire
Condition, credible situation, and Centralized management of policy can be issued, greatly improve efficiency;Formula is interacted to credible strategy simultaneously
Centralized management, realize and credible tactful man-machine interaction is managed concentratedly, improve Consumer's Experience.
Brief description of the drawings
For the clearer explanation embodiment of the present invention or technology contents of the prior art, below to the embodiment of the present invention
Or required accompanying drawing does simple introduction in the prior art.It will be apparent that accompanying drawing disclosed below is only the one of the present invention
Section Example, to those skilled in the art, on the premise of not paying creative work, can also be attached according to these
Figure obtains other accompanying drawings, but within protection scope of the present invention.
Accompanying drawing 1 is the credible strategy of the visualization centralized management of embodiment 2 and the schematic diagram of report;
Accompanying drawing 2 is the flow chart of the agent side of embodiment 3 registration.
Embodiment
For technical scheme, the technical problem solved and technique effect is more clearly understood, below in conjunction with tool
Body embodiment, technical scheme is checked, completely described, it is clear that described embodiment is only this hair
Bright part of the embodiment, rather than whole embodiments.Based on embodiments of the invention, those skilled in the art are not doing
All embodiments obtained on the premise of going out creative work, all within protection scope of the present invention.
Embodiment 1:
The system that the present embodiment proposes the credible strategy of visualization centralized management and report, its system architecture include:Concentrate tube pats
Platform and agent side, centralized management platform are built using Java+Spring MVC frameworks, and agent side is deployed in client, agency
End and management platform communication component are MQ.MQ full name are Message Queue, message queue(MQ)It is a kind of application program pair
The communication means of application program.Spring MVC are a kind of request for realizing Web MVC design patterns drivings based on Java
The lightweight Web frameworks of type.
Manage platform concentratedly, general frame is divided into five layers:UI layers, interface layer, operation layer, data Layer and communication layers;
UI layers, show for business, user accesses access;
Interface layer, it is business function Restful interfaces, there is provided internal system interface calls for UI layers.Restful is a kind of soft
Part framework style, there is provided one group of design principle and constraints, be mainly used in the software of client and server interactive class.
Operation layer, including resource management, tactical management and credible report;
Resource management includes on-line monitoring;Agent side periodically sends heartbeat message to centralized management platform, passes through centralized management
Whether platform monitoring agent side is online;
Tactical management:Credible strategy for being deployed in agent side is managed and distributed concentratedly management;
Credible report, for judging the credible situation of agent side.
Data Layer, for realizing that the management and storage to data, including database and tradition are applied, using MySQL data
Storehouse;Using other types database, meet the realization of the present embodiment, also within the scope of the disclosure of the present embodiment.
Communication layers, it is responsible for carrying out message communicating with agent side, including strategy distribution and report upload, using RabbitMQ skills
Art is realized;Realize technology using other communication layers, meet the realization of the present embodiment, also the present embodiment open scope it
It is interior.
The method that the present embodiment also proposes visualization centralized management platform credible strategy and report, implementation process include:
Step 1, on-line monitoring;
Specifically, agent side is periodically(30S can be spaced)Heartbeat message is sent to centralized management platform, is patted by concentrate tube
Whether platform monitoring agent end is online;Solve the problems, such as whether monitoring agent end is online by managing platform concentratedly.
Step 2, tactical management;
Specifically, user customizes credible strategy on visualization interface as needed, agent side is then issued to;Agent side receives
Credible strategy, deployment result is returned into centralized management platform;User carries out next step operation according to the deployment result of return;Solution
Credible tactful visualization centralized management determined with disposing control problem.
Step 3, report analysis;
Specifically, credible strategy of the agent side according to deployment, collection measurement report, and centralized management platform is uploaded in real time;Collection
Middle management platform shows the measurement received report with white list information comparative analysis;User can intuitively see administered generation
Manage the credible situation at end.
Embodiment 2:
The credible strategy of visualization centralized management and the system of report that the present embodiment proposes, on the basis of embodiment 1, provide collection
A kind of concrete technical scheme of the tactical management of middle management platform operation layer, as shown in Figure 1, tactical management include basic plan
Summary, Metric policy, white list strategy, high-level policy.
Specifically, basic management, including Password Management and authentication certificate being issued and managing;Password is that identity is recognized
The necessary requirement that card certificate, Metric policy, high-level policy are disposed;
Metric policy, the software object list to be measured of responsible configuration, configuration complete deployment to agent side, agent side degree of passing through
Metrics logs corresponding to strategy generating are measured, and are uploaded to centralized management platform;
White list strategy, for configuring measure object inside Metric policy, the white list value of user is set;After metrics logs upload
Compared with the white list value, credible report is obtained;
High-level policy, report come the startup at control agent end for credible, if credible report shows that the agent side is insincere, weigh
The startup of the agent side is controlled when opening machine.
The present embodiment gives a kind of concrete technical scheme of the credible report of centralized management platform services layer, such as accompanying drawing 1
Shown, credible report includes metrics logs.
Specifically, metrics logs, after Metric policy is deployed into agent side, agent side is according to Metric policy to where it
Main frame is measured, and uploads metrics logs to managing platform concentratedly;Platform is managed concentratedly by metrics logs and the white name of configuration
Monodrome compares, and is judged as credible when not changing, changes, is judged as insincere.
The method that the present embodiment also proposes the credible strategy of visualization centralized management and report, visualizes in embodiment 1 and concentrates
On the basis of the method for managing credible strategy and report, for three on-line monitoring, tactical management and report analysis step difference
A kind of concrete technical scheme is given, adds the practicality and feasibility of the technology of the present invention content.
Step 1, the idiographic flow of on-line monitoring are as follows:
Agent side is periodically(30S can be spaced)Send heartbeat message and judge nearest two to centralized management platform, credible management end
The secondary time interval for receiving heartbeat, if heartbeat time interval exceedes a period of time(Such as 60S), then by agent side be judged as from
Line.
Step 2, the idiographic flow of tactical management are as follows:
Tactful configuration is carried out first, then by the strategy configured by asynchronous message middleware services end (RabbitMQ
Server) passage is issued to agent side, and agent side returns to centralized management platform by this passage again by result is disposed, finally collected
Middle management platform is handled strategy accordingly after receiving deployable state.
Specifically, configuring the software object list to be measured first, configuration is completed deployment and passed through to agent side, agent side
Metrics logs corresponding to Metric policy generation, and it is uploaded to centralized management platform;
Then, for configuring measure object inside Metric policy, the white list value of user is set;Metrics logs are white with this after uploading
Name monodrome compares, and finally obtains credible report;
Finally, reported come the startup at control agent end according to credible, if credible report shows that the agent side is insincere, restarted
The startup of the agent side is controlled during machine.
Step 3, the idiographic flow of report analysis are as follows:
After Metric policy is deployed into agent side, agent side is measured according to Metric policy to main frame where it, and is uploaded
Metrics logs are to managing platform concentratedly;Then, metrics logs are compared with the white list value configured, judged when not changing
To be credible, changed, be judged as insincere.
Embodiment 3:
The credible strategy of visualization centralized management and the system of report that the present embodiment proposes, on the basis of embodiment 2, concentrate tube
The resource management of platform operation layer also includes the registration of agent side;
Specifically, after agent side starts, the machine hardware information of agent side is uploaded to centralized management platform and is stored in database.
Agent side is after centralized management platform registration, you can by centralized management platform on-line monitoring.
The method that the present embodiment also proposes the credible strategy of visualization centralized management and report, visualizes in embodiment 2 and concentrates
On the basis of the method for managing credible strategy and report, in addition to the step of agent side registration;
Specifically, after agent side starts, the machine hardware information of agent side is uploaded to centralized management platform and is stored in data
Storehouse;Agent side is after centralized management platform registration, you can by centralized management platform on-line monitoring.
The flow chart of the agent side of accompanying drawing 2 registration, as shown in Figure 2:
First, platform Receiving Agent end log-on message is managed concentratedly(clientid), and judge whether information is correct, if incorrect
Then registration failure information is returned to agent side;
By clientid searching datas storehouse if correct, and judge whether to register, return and register to agent side if registered
Failure information;
If not registering, log-on message is not write into asset table, then returns to registration failure information to agent side;If registration is believed
Breath is written with asset table, then clientid is added in agent side node M ap, and returns to the information that succeeds in registration to agent side.
Use above specific case is elaborated to the principle and embodiment of the present invention, and these embodiments are
It is used to help understand the core technology content of the present invention, the protection domain being not intended to limit the invention, technical side of the invention
Case is not restricted in above-mentioned embodiment.Based on the above-mentioned specific embodiment of the present invention, those skilled in the art
Under the premise without departing from the principles of the invention, to any improvement and modification made by the present invention, the special of the present invention should all be fallen into
Sharp protection domain.
Claims (10)
1. visualization centralized management is credible strategy and the system of report, it is characterised in that its system architecture includes:Centralized management
Platform and agent side, centralized management platform are built using Java+Spring MVC frameworks, and agent side is deployed in client, generation
It is MQ that end, which is managed, with management platform communication component;
Manage platform concentratedly, general frame is divided into:UI layers, interface layer, operation layer, data Layer and communication layers;
UI layers, show for business, user accesses access;
Interface layer, it is business function Restful interfaces, there is provided internal system interface calls for UI layers;
Operation layer, including resource management, tactical management and credible report;Resource management includes on-line monitoring, and agent side is periodically
Heartbeat message is sent to centralized management platform, it is whether online by managing platform monitoring agent side concentratedly;Tactical management, for portion
The credible strategy affixed one's name in agent side is managed and distributed concentratedly management;Credible report, for judging the credible situation of agent side;
Data Layer, for realizing that the management and storage to data, including database and tradition are applied;
Communication layers, it is responsible for carrying out message communicating with agent side, including strategy distribution and report upload.
2. the credible strategy of visualization centralized management and the system of report according to claim 1, it is characterised in that the strategy
Management includes elementary tactics, Metric policy, white list strategy, high-level policy;
Basic management, including Password Management and authentication certificate being issued and managing;
Metric policy, the software object list to be measured of responsible configuration, configuration complete deployment to agent side, agent side degree of passing through
Metrics logs corresponding to strategy generating are measured, and are uploaded to centralized management platform;
White list strategy, for configuring measure object inside Metric policy, the white list value of user is set;After metrics logs upload
Compared with the white list value, credible report is obtained;
High-level policy, report come the startup at control agent end for credible, if the bright agent side of credible account is insincere, restart
The startup of the agent side is controlled during machine.
3. the credible strategy of visualization centralized management and the system of report according to claim 2, it is characterised in that described credible
Report includes metrics logs;
After Metric policy is deployed into agent side, agent side is measured according to Metric policy to main frame where it, and is uploaded
Metrics logs are to managing platform concentratedly;Centralized management platform compares metrics logs with the white list value configured, does not become
It is judged as credible during change, changes, be judged as insincere.
4. the credible strategy of visualization centralized management and the system of report according to claim 3, it is characterised in that the resource
Management also includes agent side and registered:
After agent side starts, the machine hardware information of agent side is uploaded to centralized management platform and is stored in database.
5. according to any credible strategy of visualization centralized management of Claims 1-4 and the system of report, it is characterised in that
The data Layer uses MySQL database, and/or the communication layers to be realized using RabbitMQ technologies.
6. visualization centralized management is credible strategy and the method for report, its special this are that implementation process includes:
Step 1, on-line monitoring;
Agent side periodically to centralized management platform send heartbeat message, by manage concentratedly platform monitoring agent side whether
Line;
Step 2, tactical management;
User customizes credible strategy on visualization interface as needed, is then issued to agent side;Agent side receives credible plan
Slightly, deployment result is returned into centralized management platform;User carries out next step operation according to the deployment result of return;
Step 3, report analysis;
Credible strategy of the agent side according to deployment, collection measurement report, and centralized management platform is uploaded in real time;Concentrate tube pats
Platform shows the measurement received report with white list information comparative analysis.
7. the credible strategy of visualization centralized management and the method for report according to claim 6, it is characterised in that tactical management
Idiographic flow it is as follows:
Tactful configuration is carried out first, and the strategy configured is then issued to agency by asynchronous message middleware services end passage
End, agent side return to centralized management platform by this passage again by result is disposed, and finally manage platform concentratedly and receive deployment shape
Strategy is handled accordingly after state.
8. the credible strategy of visualization centralized management and the method for report according to claim 7, it is characterised in that
The software object list to be measured is configured first, and configuration is completed deployment and given birth to agent side, agent side by Metric policy
Into corresponding metrics logs, and it is uploaded to centralized management platform;
Then, for configuring measure object inside Metric policy, the white list value of user is set;Metrics logs are white with this after uploading
Name monodrome compares, and finally obtains credible report;
Finally, reported come the startup at control agent end according to credible, if credible report shows that the agent side is insincere, restarted
The startup of the agent side is controlled during machine.
9. the credible strategy of visualization centralized management and the method for report, its feature exist according to claim 8, report analysis
Idiographic flow is as follows:
After Metric policy is deployed into agent side, agent side is measured according to Metric policy to main frame where it, and is uploaded
Metrics logs are to managing platform concentratedly;Then, metrics logs are compared with the white list value configured, judged when not changing
To be credible, changed, be judged as insincere.
10. according to any credible strategy of visualization centralized management of claim 6 to 9 and the method for report, it is characterised in that
The step of also including agent side registration;
After agent side starts, the machine hardware information of agent side is uploaded to centralized management platform and is stored in database;Agency
End is after centralized management platform registration, by centralized management platform on-line monitoring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710992320.3A CN107733739A (en) | 2017-10-23 | 2017-10-23 | Credible strategy and the System and method for of report are managed in visualization concentratedly |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710992320.3A CN107733739A (en) | 2017-10-23 | 2017-10-23 | Credible strategy and the System and method for of report are managed in visualization concentratedly |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107733739A true CN107733739A (en) | 2018-02-23 |
Family
ID=61213166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710992320.3A Pending CN107733739A (en) | 2017-10-23 | 2017-10-23 | Credible strategy and the System and method for of report are managed in visualization concentratedly |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107733739A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109327434A (en) * | 2018-09-04 | 2019-02-12 | 郑州云海信息技术有限公司 | A kind of system and method for mixed management security strategy |
CN110768963A (en) * | 2019-09-29 | 2020-02-07 | 北京可信华泰信息技术有限公司 | Trusted security management platform with distributed architecture |
CN111654490A (en) * | 2020-05-28 | 2020-09-11 | 全球能源互联网研究院有限公司 | Power security credible monitoring system and credible dynamic association perception method |
CN111814138A (en) * | 2020-06-30 | 2020-10-23 | 郑州信大先进技术研究院 | Software security management system based on cloud platform |
CN112733148A (en) * | 2021-01-12 | 2021-04-30 | 北京旋极安辰计算科技有限公司 | Java-based trusted policy automatic adaptation method |
CN113220515A (en) * | 2021-05-12 | 2021-08-06 | 武汉中仪物联技术股份有限公司 | Mobile device connection state detection method and device, electronic device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103927489A (en) * | 2014-04-22 | 2014-07-16 | 陈幼雷 | System and method for trusted storage of data |
CN106059777A (en) * | 2016-08-23 | 2016-10-26 | 浪潮电子信息产业股份有限公司 | Trusted middleware design method of cloud platform |
-
2017
- 2017-10-23 CN CN201710992320.3A patent/CN107733739A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103927489A (en) * | 2014-04-22 | 2014-07-16 | 陈幼雷 | System and method for trusted storage of data |
CN106059777A (en) * | 2016-08-23 | 2016-10-26 | 浪潮电子信息产业股份有限公司 | Trusted middleware design method of cloud platform |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109327434A (en) * | 2018-09-04 | 2019-02-12 | 郑州云海信息技术有限公司 | A kind of system and method for mixed management security strategy |
CN109327434B (en) * | 2018-09-04 | 2021-07-30 | 郑州云海信息技术有限公司 | System and method for hybrid management of security policy |
CN110768963A (en) * | 2019-09-29 | 2020-02-07 | 北京可信华泰信息技术有限公司 | Trusted security management platform with distributed architecture |
CN110768963B (en) * | 2019-09-29 | 2021-10-22 | 北京可信华泰信息技术有限公司 | Trusted security management platform with distributed architecture |
CN111654490A (en) * | 2020-05-28 | 2020-09-11 | 全球能源互联网研究院有限公司 | Power security credible monitoring system and credible dynamic association perception method |
CN111654490B (en) * | 2020-05-28 | 2022-08-30 | 全球能源互联网研究院有限公司 | Power security credible monitoring system and credible dynamic association perception method |
CN111814138A (en) * | 2020-06-30 | 2020-10-23 | 郑州信大先进技术研究院 | Software security management system based on cloud platform |
CN112733148A (en) * | 2021-01-12 | 2021-04-30 | 北京旋极安辰计算科技有限公司 | Java-based trusted policy automatic adaptation method |
CN112733148B (en) * | 2021-01-12 | 2021-10-01 | 北京旋极安辰计算科技有限公司 | Java-based trusted policy automatic adaptation method |
CN113220515A (en) * | 2021-05-12 | 2021-08-06 | 武汉中仪物联技术股份有限公司 | Mobile device connection state detection method and device, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107733739A (en) | Credible strategy and the System and method for of report are managed in visualization concentratedly | |
CN105024865B (en) | Cloud joint services | |
EP3698516B1 (en) | Selecting and securing proof delgates for cryptographic functions | |
CN106375101B (en) | A kind of life cycle management method and device | |
CN109413032A (en) | A kind of single-point logging method, computer readable storage medium and gateway | |
CN108810137A (en) | A kind of alliance's block catenary system | |
CN112861190B (en) | Data cross-chain cooperation method, system and device | |
CN111416704A (en) | Data processing method, device and system based on block chain | |
Venticinque et al. | Agents based cloud computing interface for resource provisioning and management | |
EP2706700A1 (en) | Computer account management system and implementation method thereof | |
CN106850260A (en) | A kind of dispositions method and device of virtual resources management platform | |
CN109639413A (en) | A kind of block catenary system based on mobile ad hoc network | |
US20180330077A1 (en) | Enclave pools | |
CN105634778B (en) | Method and system for realizing VNF instantiation, NFVO and VNFM | |
CN110287016A (en) | A kind of distribution flow chart Heterogeneous Computing dispatching method | |
CN109614110A (en) | A kind of method and apparatus that message-oriented middleware concentrates deployment | |
CN103369038B (en) | Platform serves PaaS management platform and method | |
CN112395341B (en) | Federal learning management method and system based on federal cloud cooperation network | |
CN107026738A (en) | Digital certificate updating method, digital signature verification method and digital authentication device | |
CN106375360A (en) | Method, device and system for updating graph data | |
CN108449334A (en) | A kind of real training cloud system and method based on cloud computing | |
CN110163003A (en) | A kind of cipher management method and device | |
Ma et al. | Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain | |
CN106576068B (en) | A kind of software security verification method, equipment and system | |
CN106060048A (en) | Network resource access method and network resource access device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180223 |