CN107832634A - A kind of Dblink monitoring method and monitoring system - Google Patents
A kind of Dblink monitoring method and monitoring system Download PDFInfo
- Publication number
- CN107832634A CN107832634A CN201711225398.9A CN201711225398A CN107832634A CN 107832634 A CN107832634 A CN 107832634A CN 201711225398 A CN201711225398 A CN 201711225398A CN 107832634 A CN107832634 A CN 107832634A
- Authority
- CN
- China
- Prior art keywords
- dblink
- database
- checked
- jdbc
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2471—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Probability & Statistics with Applications (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- Mathematical Physics (AREA)
- Fuzzy Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention discloses a kind of Dblink monitoring method and monitoring system, and monitoring method includes:Driven by JDBC and be connected with Database to be checked, then JDBC interfaces corresponding to calling obtain Dblink information, Dblink white lists based on database to be checked, the Dblink of database to be checked is monitored, judge current Dblink whether in the white list of target database, for not performing alarm, disconnection Dblink linked operations in white list, ensure the safety of target database, simultaneously staff is easily monitored to each data in power system, it is ensured that database data safety.
Description
Technical field
The present invention relates to database technical field, particularly a kind of Dblink monitoring method and monitoring system.
Background technology
Generally include multiple business application systems in power system, in order to preserve data in each business application system, generally
There is a corresponding database, and due to intercrossing complicated between power business, need frequently to consult data between database, and
Consulting the data of other databases needs to use Dblink, but prior art can not understand Dblink service condition and safety
Property, operate very cumbersome, workload is big.
Explanation of nouns
Dblink (Database Link), the link of database.
JDBC (Java DataBase Connectivity), the connection of java databases is a kind of for performing SQL languages
The Java API of sentence, unified access can be provided for a variety of relational databases, it is by one group of class write with Java language and connects
Mouth composition.JDBC provides a kind of benchmark, can build the instrument and interface of higher level accordingly, enable database development personnel
Write database application.
The content of the invention
, can be in the progress between database it is an object of the invention to provide the monitoring method of Dblink a kind of and monitoring system
During access, Dblink service condition is connected to database(That is the interconnection situation of database)It is monitored with security.
The technical scheme that the present invention takes is:A kind of Dblink monitoring method, including:
S1, driven by JDBC and be connected with Database to be checked;
S2, obtain the Dblink white lists of database to be checked;
S3, by calling JDBC database manipulation interface, Dblink information is obtained, the Dblink got is monitored,
Including:
Judge whether Dblink is contained in the Dblink white lists of S2 acquisitions, if then terminating to monitor, if otherwise will be current
Dblink is arranged to doubtful illegal Dblink, closes the access rights of the Dblink, generates warning information;
S4, alarming processing is carried out, including:For Dblink corresponding to warning information, judge its whether because practical application needs and
Allow to access database to be checked, corresponding Dblink is defined as unauthorized access link, outputting alarm information, prison if not allowing
Control terminates, if allowing, corresponding Dblink is defined as into Lawful access link, and authorizes access rights to the Dblink, will
It adds the Dblink white lists of database to be checked, then goes to step S3 and the Dblink got is monitored again,
Until corresponding Dblink is contained in the Dblink white lists of S2 acquisitions, or corresponding Dblink is defined as unauthorized access
Link, terminate monitoring.
In S1, JDBC drivings include:The driving of JDBC-ODBC bridges, the driving of JDBC- locals, JDBC network-drivens and local association
Discuss pure JDBC drivings.Different JDBC drivings can be used for accessing different databases, and specific access mode can use prior art.
The Dblink obtained in S2 of the present invention is the Dblink white lists of corresponding target database to be checked, and its content can be by
The operation maintenance personnel of associated databases is configured.
Preferably, in S3, by the Statement for calling JDBC()Interface, instantiation operation database to be checked, and hold
Row executeQuery()Method, return values of the sql on Dblink is obtained, that is, obtains Dblink information.Statement connects
Mouth is used on the basis of database connection is had built up, and the Simple SQL sentence without parameter to be performed is sent to database.
ExecuteQuery is the method that the one of which that Statement interfaces provide performs SQL sentences, for producing single knot
The sentence of fruit collection, such as SELECT sentences.
Further, S3 also includes:The Dblink blacklists of corresponding different databases to be visited are set, judged doubtful illegal
Whether Dblink is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, if otherwise going to step S4;
In S4, for considering that practical application needs not allow the Dblink for accessing database to be checked still, by corresponding Dblink
Add blacklist.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, Dblink monitoring can be reduced and accused
Data redundancy during alert processing.
Preferably, in S3 and S4, the Dblink of foundation is monitored at predetermined intervals and alarming processing.
In the S4 of the present invention, whether because practical application needs the judgement that accesses database to be checked is allowed to Dblink,
Judged result is provided by database operation maintenance personnel.
Invention additionally discloses a kind of Dblink monitoring system, including:
Database connection establishment module, driven by JDBC and be connected with Database to be checked, obtain Dblink information;
Database connects white list acquisition module, obtains the Dblink white lists of database to be checked;
Dblink monitoring modules, judge whether currently available Dblink is included in Dblink white lists, if then terminating to monitor,
If current Dblink otherwise is arranged into doubtful illegal Dblink, the access rights of the Dblink are closed, generate warning information;
Warning processing module, for Dblink corresponding to warning information, judge whether it allows to access because practical application needs
Database to be checked, corresponding Dblink being defined as unauthorized access link if not allowing, outputting alarm information, monitoring terminates,
If allowing, corresponding Dblink is defined as Lawful access link, and access rights are authorized to the Dblink, is added into and treats
Inquire about the Dblink white lists of database.
Further, the Dblink blacklists of corresponding different databases to be visited are also preset with Dblink monitoring modules;
After current Dblink is judged as doubtful illegal Dblink, whether Dblink monitoring modules also judge the doubtful illegal Dblink
It is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, if otherwise by corresponding doubtful illegal Dblink's
Warning information is transmitted to warning processing module;
Warning processing module will consider that practical application needs not allow the Dblink for accessing database to be checked still, add black name
It is single.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, when can reduce Dblink monitoring and alarming processing
Data redundancy.
Beneficial effect
The present invention is driven by JDBC and is connected with Database to be checked, and then JDBC interfaces corresponding to calling obtain Dblink
Information, the Dblink white lists based on database to be checked, is monitored to the Dblink of database to be checked so that work people
Member easily can be monitored to each data in power system, obtain the service condition linked in each database, ensure
The data safety of target database, meanwhile, the professional ability requirement to operation maintenance personnel substantially reduces, and can also reduce manual operation
Loss caused by error.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description be only the present invention some
Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these
Accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the monitoring method of Dblink shown in an exemplary embodiment of the invention;
Fig. 2 is a kind of schematic flow sheet of the monitoring method of Dblink shown in another exemplary embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
With reference to shown in figure 1 and Fig. 2, Dblink of the invention monitoring method, including:
S1, driven by JDBC and be connected with Database to be checked;
S2, obtain the Dblink white lists of database to be checked;
S3, by calling JDBC database manipulation interface, Dblink information is obtained, the Dblink got is monitored,
Including:
Judge whether Dblink is contained in the Dblink white lists of S2 acquisitions, if then terminating to monitor, if otherwise will be current
Dblink is arranged to doubtful illegal Dblink, closes the access rights of the Dblink, generates warning information;
S4, alarming processing is carried out, including:For Dblink corresponding to warning information, judge its whether because practical application needs and
Allow to access database to be checked, corresponding Dblink is defined as unauthorized access link, outputting alarm information, prison if not allowing
Control terminates, if allowing, corresponding Dblink is defined as into Lawful access link, and authorizes access rights to the Dblink, will
It adds the Dblink white lists of database to be checked, then goes to step S3 and the Dblink got is monitored again,
Until corresponding Dblink is contained in the Dblink white lists of S2 acquisitions, or corresponding Dblink is defined as unauthorized access
Link, terminate monitoring.
Embodiment 1
In S1, JDBC drivings include:Locally driving, JDBC network-drivens and native protocol are pure by the driving of JDBC-ODBC bridges, JDBC-
JDBC drives.Different JDBC drivings can be used for accessing different databases, and specific access mode can use prior art.
The Dblink obtained in S2 of the present invention is the Dblink white lists of corresponding target database to be checked, and its content can be by
The operation maintenance personnel of associated databases is configured.
In S3, by the Statement for calling JDBC()Interface, instantiation operation database to be checked, and perform
executeQuery()Method, return values of the sql on Dblink is obtained, that is, obtains Dblink information.Statement interfaces
For on the basis of database connection is had built up, the Simple SQL sentence without parameter to be performed to be sent to database.
ExecuteQuery is the method that the one of which that Statement interfaces provide performs SQL sentences, for producing single knot
The sentence of fruit collection, such as SELECT sentences.
Preferably, in S3 and S4, the Dblink of foundation is monitored at predetermined intervals and alarming processing.
In the S4 of the present invention, whether because practical application needs the judgement that accesses database to be checked is allowed to Dblink,
Judged result is provided by database operation maintenance personnel.
Embodiment 2
In the Dblink of the present embodiment monitoring method, S3 also includes:Set the Dblink of corresponding different databases to be visited black
List, judges whether doubtful illegal Dblink is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information,
If otherwise go to step S4;
In S4, for considering that practical application needs not allow the Dblink for accessing database to be checked still, by corresponding Dblink
Add blacklist.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, Dblink monitoring can be reduced and accused
Data redundancy during alert processing.
Embodiment 3
A kind of Dblink monitoring system, including:
Database connection establishment module, driven by JDBC and be connected with Database to be checked, obtain Dblink information;
Database connects white list acquisition module, obtains the Dblink white lists of database to be checked;
Dblink monitoring modules, judge whether currently available Dblink is included in Dblink white lists, if then terminating to monitor,
If current Dblink otherwise is arranged into doubtful illegal Dblink, the access rights of the Dblink are closed, generate warning information;
Warning processing module, for Dblink corresponding to warning information, judge whether it allows to access because practical application needs
Database to be checked, corresponding Dblink being defined as unauthorized access link if not allowing, outputting alarm information, monitoring terminates,
If allowing, corresponding Dblink is defined as Lawful access link, and access rights are authorized to the Dblink, is added into and treats
Inquire about the Dblink white lists of database.
Further, the Dblink blacklists of corresponding different databases to be visited are also preset with Dblink monitoring modules;
After current Dblink is judged as doubtful illegal Dblink, whether Dblink monitoring modules also judge the doubtful illegal Dblink
It is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, if otherwise by corresponding doubtful illegal Dblink's
Warning information is transmitted to warning processing module;
Warning processing module will consider that practical application needs not allow the Dblink for accessing database to be checked still, add black name
It is single.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, when can reduce Dblink monitoring and alarming processing
Data redundancy.
The present invention is driven by JDBC and is connected with Database to be checked, and then JDBC interfaces corresponding to calling obtain
Dblink information, the Dblink white lists based on database to be checked, is monitored to the Dblink of database to be checked so that
Staff easily can be monitored to each data in power system, obtain the use feelings linked in each database
Condition, ensure the data safety of target database, meanwhile, the professional ability requirement to operation maintenance personnel substantially reduces, and can also reduce
Loss caused by human operational error.One of ordinary skill in the art will appreciate that it is the unit included by above-described embodiment
Simply divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;
In addition, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Those of ordinary skill in the art are further appreciated that all or part of step realized in above-described embodiment method is can
To instruct the hardware of correlation to complete by program, described program can be stored in a computer read/write memory medium
In, described storage medium, including ROM/RAM, disk, CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.
Claims (8)
1. a kind of Dblink monitoring method, it is characterized in that, including:
S1, driven by JDBC and be connected with Database to be checked;
S2, obtain the Dblink white lists of database to be checked;
S3, by calling JDBC database manipulation interface, Dblink information is obtained, the Dblink got is monitored,
Including:
Judge whether Dblink is contained in the Dblink white lists of S2 acquisitions, if then terminating to monitor, if otherwise will be current
Dblink is arranged to doubtful illegal Dblink, closes the access rights of the Dblink, generates warning information;
S4, alarming processing is carried out, including:For Dblink corresponding to warning information, judge its whether because practical application needs and
Allow to access database to be checked, corresponding Dblink is defined as unauthorized access link, outputting alarm information, prison if not allowing
Control terminates, if allowing, corresponding Dblink is defined as into Lawful access link, and authorizes access rights to the Dblink, will
It adds the Dblink white lists of database to be checked, then goes to step S3 and the Dblink got is monitored again,
Until corresponding Dblink is contained in the Dblink white lists of S2 acquisitions, or corresponding Dblink is defined as unauthorized access
Link, terminate monitoring.
2. Dblink according to claim 1 monitoring method, it is characterized in that, in S1, JDBC drivings include:JDBC-
The driving of ODBC bridges, JDBC- locally driving, JDBC network-drivens and the pure JDBC drivings of native protocol.
3. Dblink according to claim 1 monitoring method, it is characterized in that, in S3, by calling JDBC's
Statement()Interface, instantiation operation database to be checked, and perform executeQuery()Method, obtain sql on
Dblink return value, that is, obtain Dblink information.
4. Dblink according to claim 1 monitoring method, it is characterized in that, S3 also includes:Corresponding difference is set to wait to visit
The Dblink blacklists of database are asked, judge whether doubtful illegal Dblink is contained in Dblink blacklists, if then terminating
Monitoring, outputting alarm information, if otherwise going to step S4;
In S4, for considering that practical application needs not allow the Dblink for accessing database to be checked still, by corresponding Dblink
Add blacklist.
5. Dblink according to claim 1 monitoring method, it is characterized in that, in S3 and S4, at predetermined intervals
The Dblink of foundation is monitored and alarming processing.
6. Dblink according to claim 1 monitoring method, it is characterized in that, in S4, to Dblink whether because actually should
Allow the judgement for accessing database to be checked with needs, judged result is provided by database operation maintenance personnel.
7. a kind of Dblink monitoring system, it is characterized in that, including:
Database connection establishment module, driven by JDBC and be connected with Database to be checked, obtain Dblink information;
Database connects white list acquisition module, obtains the Dblink white lists of database to be checked;
Dblink monitoring modules, judge whether currently available Dblink is included in Dblink white lists, if then terminating to monitor,
If current Dblink otherwise is arranged into doubtful illegal Dblink, the access rights of the Dblink are closed, generate warning information;
Warning processing module, for Dblink corresponding to warning information, judge whether it allows to access because practical application needs
Database to be checked, corresponding Dblink being defined as unauthorized access link if not allowing, outputting alarm information, monitoring terminates,
If allowing, corresponding Dblink is defined as Lawful access link, and access rights are authorized to the Dblink, is added into and treats
Inquire about the Dblink white lists of database.
8. Dblink according to claim 7 monitoring system, it is characterized in that, also it is preset with Dblink monitoring modules pair
Answer the Dblink blacklists of different databases to be visited;After current Dblink is judged as doubtful illegal Dblink, Dblink
Monitoring module also judges whether the doubtful illegal Dblink is contained in Dblink blacklists, if then terminating to monitor, output is accused
Alert information, if otherwise transmitting corresponding doubtful illegal Dblink warning information to warning processing module;
Warning processing module will consider that practical application needs not allow the Dblink for accessing database to be checked still, add black name
It is single.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711225398.9A CN107832634A (en) | 2017-11-29 | 2017-11-29 | A kind of Dblink monitoring method and monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711225398.9A CN107832634A (en) | 2017-11-29 | 2017-11-29 | A kind of Dblink monitoring method and monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107832634A true CN107832634A (en) | 2018-03-23 |
Family
ID=61646388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711225398.9A Pending CN107832634A (en) | 2017-11-29 | 2017-11-29 | A kind of Dblink monitoring method and monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107832634A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109543764A (en) * | 2018-11-28 | 2019-03-29 | 安徽省公共气象服务中心 | A kind of warning information legitimacy detection method and detection system based on intelligent semantic perception |
CN110913179A (en) * | 2019-12-02 | 2020-03-24 | 北京志成合创信息技术有限公司 | Intelligent management and control method, device, equipment and storage medium for video monitoring equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101226497A (en) * | 2007-12-10 | 2008-07-23 | 金蝶软件(中国)有限公司 | Application program monitoring system and monitoring method |
CN103034679A (en) * | 2012-11-14 | 2013-04-10 | 上海百事通信息技术有限公司 | Monitoring system for java operational database |
CN104063473A (en) * | 2014-06-30 | 2014-09-24 | 江苏华大天益电力科技有限公司 | Database auditing monitoring system and database auditing monitoring method |
CN104699735A (en) * | 2014-11-20 | 2015-06-10 | 国家电网公司 | Data processing method and device for enterprise data center |
CN105468619A (en) * | 2014-09-03 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Resource distribution method and device used for database connection pool |
-
2017
- 2017-11-29 CN CN201711225398.9A patent/CN107832634A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101226497A (en) * | 2007-12-10 | 2008-07-23 | 金蝶软件(中国)有限公司 | Application program monitoring system and monitoring method |
CN103034679A (en) * | 2012-11-14 | 2013-04-10 | 上海百事通信息技术有限公司 | Monitoring system for java operational database |
CN104063473A (en) * | 2014-06-30 | 2014-09-24 | 江苏华大天益电力科技有限公司 | Database auditing monitoring system and database auditing monitoring method |
CN105468619A (en) * | 2014-09-03 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Resource distribution method and device used for database connection pool |
CN104699735A (en) * | 2014-11-20 | 2015-06-10 | 国家电网公司 | Data processing method and device for enterprise data center |
Non-Patent Citations (1)
Title |
---|
李波: "《计算机应用基础》", 31 July 2012, 航空工业出版社 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109543764A (en) * | 2018-11-28 | 2019-03-29 | 安徽省公共气象服务中心 | A kind of warning information legitimacy detection method and detection system based on intelligent semantic perception |
CN110913179A (en) * | 2019-12-02 | 2020-03-24 | 北京志成合创信息技术有限公司 | Intelligent management and control method, device, equipment and storage medium for video monitoring equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3111433B1 (en) | Wireless sensor network | |
CN106295355B (en) | A kind of active safety support method towards Linux server | |
CN106101130A (en) | A kind of network malicious data detection method, Apparatus and system | |
CN108039016A (en) | A kind of subway underground operation space safety monitoring and early warning system | |
CN106330852A (en) | Abnormality prediction method, abnormality prediction system, and abnormality prediction device | |
CN107832634A (en) | A kind of Dblink monitoring method and monitoring system | |
CN112419130B (en) | Emergency response system and method based on network security monitoring and data analysis | |
CN109411073A (en) | Medical data integrated system | |
CN101458667B (en) | Electronic apparatus with electronic security level identification, information exchange flow control system based on electronic security level identification, method and mobile memory | |
Tasali et al. | A flexible authorization architecture for systems of interoperable medical devices | |
US7805734B2 (en) | Platform management of high-availability computer systems | |
CN108390778A (en) | A kind of computer network security prior-warning device | |
CN109753819A (en) | A kind for the treatment of method and apparatus of access control policy | |
CN108270798A (en) | A kind of mobile terminal device safety management system | |
CN107612755A (en) | The management method and its device of a kind of cloud resource | |
CN112910657B (en) | Cloud security token early warning system | |
CN109753803A (en) | A kind of secure virtual machine management system | |
Patel et al. | 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework | |
Jiang et al. | Dependable integrated clinical system architecture with runtime verification | |
CN106230614A (en) | Log in fault and automatically monitor restorative procedure, system and information system for power enterprise | |
CN110519213A (en) | Filter method, device, equipment and the computer readable storage medium of interior message | |
Akaichi | Semantic Technology based Usage Control for Decentralized Systems | |
CN207083113U (en) | A kind of security monitoring device of medical network | |
Briland | Addressing false data injection attacks in iot systems with a domain specific language within an industrial context | |
CN107124328A (en) | Start the method and apparatus of arbitration machine in a kind of Net Strobe System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180323 |