CN108536520A - A kind of application program management-control method based on alarm prompt - Google Patents
A kind of application program management-control method based on alarm prompt Download PDFInfo
- Publication number
- CN108536520A CN108536520A CN201810280281.9A CN201810280281A CN108536520A CN 108536520 A CN108536520 A CN 108536520A CN 201810280281 A CN201810280281 A CN 201810280281A CN 108536520 A CN108536520 A CN 108536520A
- Authority
- CN
- China
- Prior art keywords
- alarm prompt
- prompt
- violation
- value
- daily record
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
Abstract
The embodiment of the invention discloses a kind of application program management-control method based on alarm prompt, includes the following steps:Program management and control violation daily record is obtained, daily record is parsed and the information in daily record is formed into key-value pair;It is that foundation is counted, and is counted to count value with the SHA1 values of application program;In the first setting time, the larger top n violation main body of count value is obtained, Level 1Alarming prompt is sent out to the top n violation main body, the present invention constitutes alarm function together by threshold alarm and the combination of auto-alarming two ways.Realize that the alarm prompt for giving client and application program, administrator need not manually check the record of program management and control violation daily record respectively, you can the violation situation for knowing application program saves time and manpower, while having ensured the safety of operating system.
Description
Technical field
The present invention relates to operating system security technical field, specifically a kind of application program pipe based on alarm prompt
Prosecutor method.
Background technology
In face of the network environment to become increasingly complex, it is ensured that the safe operation of operating system needs (empty to the whole network client computer
Quasi- machine or physical machine) application program be managed collectively.If being managed collectively the whole network client computer, need to obtain in real time complete
Application information in net client computer.
But a large amount of clients are faced, management and control mainly is carried out to the operation of client application by managing platform concentratedly,
And there is the management and control violation log recording to application program in each client.In the prior art, to management and control violation log recording
Use be only limited to periodically check the record of violation daily record, and take corresponding reply operation, lack automatically to violation day
Will carries out the process of parsing and alarm prompt, records and is not checked manually in time in violation of rules and regulations if there is serious management and control, can be right
Operating system security causes prodigious hidden danger.
Invention content
A kind of application program management-control method based on alarm prompt is provided in the embodiment of the present invention, to solve the prior art
It is middle shortage automatically to violation daily record carry out parsing and alarm prompt process the problem of.
In order to solve the above-mentioned technical problem, the embodiment of the invention discloses following technical solutions:
First aspect present invention provides a kind of application program management-control method based on alarm prompt, includes the following steps:
Program management and control violation daily record is obtained, daily record is parsed and the information in daily record is formed into key-value pair;
It is that foundation is counted, and is counted to count value with the SHA1 values of application program;
In the first setting time, the larger top n violation main body of count value is obtained, the top n violation main body is sent out
Go out Level 1Alarming prompt.
With reference to first aspect, in first aspect in the first possible realization method, the key-value pair is KEY with SHA1,
Value values include title, SHA1 and the daily record ID of application program.
With reference to first aspect, in first aspect in the first possible realization method, the SHA1 values with application program
It is counted for foundation, and the detailed process counted to count value is:
Check under current SHA1 whether there is count value,
If so, count value adds one, if it is not, creating the count value under current SHA1 in memory, and the count value is added
Enter in Value;
It is created in the buffer with SHA1 as KEY, is the key-value pair of Value, the key assignments in previous caching with count value
When to sending change in count, it is compared with the Value values in current record, if there is the value more than current Value, use is previous
Record in a caching replaces current record.
With reference to first aspect, in second of possible realization method of first aspect, the method is sending out Level 1Alarming
After prompt, further include
Violation main body to sending out Level 1Alarming prompt counts, in the second set period of time, to sending out M level-one
The violation main body of alarm prompt carries out two level alarm prompt.
With reference to first aspect, in second of possible realization method of first aspect, described pair sends out Level 1Alarming prompt
Violation main body counted, in the second set period of time, the violation main body to sending out the prompt of M Level 1Alarming carries out two level
The detailed process of alarm prompt is:
After sending out Level 1Alarming prompt, it with alarm time is KEY to create one in memory, with one comprising SHA1,
Daily record ID and the key-value pair that program name is Value;
The Value for taking out the key-value pair, using SHA1 as foundation, there is the number of current SHA1 in statistics, when occurring SHA1's
When number is more than M, two level alarm prompt is sent out to the corresponding violation main bodys of SHA1.
With reference to first aspect, in first aspect in the third possible realization method, the method is sending out two level alarm
After prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, is carried to K two level alarm occurs
The violation main body shown sends out three-level alarm prompt.
With reference to first aspect, described to send out two level alarm prompt in first aspect in the third possible realization method
Afterwards, in third set period of time, there is the violation main body of two level alarm prompt in statistics, to K two level alarm prompt of generation
The detailed process that violation main body sends out three-level alarm prompt is:
When sending out two level alarm prompt, check whether that there are the records of the buffer queue of current violation main body;
If in the presence of a data is increased into the buffer queue;
If being not present, the buffer queue of current violation main body is created, which is KEY with SHA1, to include daily record
ID and program name are Value values, and a data is added in the buffer queue;
In third set period of time, the number of data of the corresponding buffer queue of statistics violation main body, to the data strip
Violation main body of the number more than K times carries out three pole alarm prompts.
With reference to first aspect, in the 4th kind of possible realization method of first aspect, the method further includes the key assignments
To being KEY with daily record ID, the time and quantity generated with violation daily record count the key that each client generates for Value values
The quantity of value pair sends out client-based Threshold Alerts prompt within the setting time.
With reference to first aspect, in the 4th kind of possible realization method of first aspect, the setting time sets including first
It sets time, the second setting time and third setting time, corresponding Threshold Alerts prompt for lower priority alarm prompt, middle rank alarm carries
Show and is prompted with advanced alarm.
With reference to first aspect, in the 4th kind of possible realization method of first aspect, each client of statistics generates
The key-value pair quantity, the detailed process that the prompt of client-based Threshold Alerts is sent out within the setting time is:
When program management and control violation daily record occurs in client, which is recorded, and in current record in visitor
3 buffer queues are formed on the end of family;
Using daily record ID as foundation, counts in client and the number of program management and control violation daily record occur;
Active client is judged, within the third setting time, if the condition for meeting advanced alarm prompt, if so, to working as
Preceding client sends out advanced alarm prompt,
If it is not, judging active client within the second setting time, if meet the condition of intermediate alarm prompt, if so,
Intermediate alarm prompt is sent out to active client;
If it is not, judging active client within the first setting time, if meet the condition of lower priority alarm prompt, if so,
Lower priority alarm prompt is sent out to active client, if it is not, active client does not send out alarm prompt.
The effect provided in invention content is only the effect of embodiment, rather than invents all whole effects, above-mentioned
A technical solution in technical solution has the following advantages that or advantageous effect:
1, the program management and control violation daily record for currently managing client used in platform concentratedly is parsed, from application program
Angle, the application program in setting time, meeting alarm conditions carry out the alarm prompt of different stage, and administrator need not people
Work checks the record of program management and control violation daily record, you can the violation situation for knowing application program is saved time and manpower, protected simultaneously
The safety of operating system is hindered.
2, it by threshold alarm, is realized from client angle to the quantitative alarm in violation of rules and regulations of each client, by certainly
Dynamic alarm and threshold alarm are realized be combineding with each other from client and application program visual angle, are realized to the whole network application information
Control.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without creative efforts, other drawings may also be obtained based on these drawings.
Fig. 1 is the flow diagram of the embodiment of the present invention 1;
Fig. 2 is the flow diagram that auto-alarming prompt is carried out in the embodiment of the present invention 1;
Fig. 3 is the flow diagram of the embodiment of the present invention 2;
Fig. 4 is the flow diagram that threshold alarm prompt is carried out in the embodiment of the present invention 2.
Specific implementation mode
In order to clarify the technical characteristics of the invention, below by specific implementation mode, and its attached drawing is combined, to this hair
It is bright to be described in detail.Following disclosure provides many different embodiments or example is used for realizing the different knots of the present invention
Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with
Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated
Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings
It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
Embodiment 1
As shown in Figure 1, the application program management-control method based on alarm prompt in the present embodiment, i.e. auto-alarming prompt, packet
Include following steps:
S1 obtains program management and control violation daily record, parses daily record and the information in daily record is formed key-value pair;
S2 is that foundation is counted, and is counted to count value with the SHA1 values of application program;
S3 obtains the larger top n violation main body of count value, to the top n violation main body in the first setting time
Send out Level 1Alarming prompt.
In step S1, program management and control violation daily record is to manage the client of platform concentratedly to current under operating system
The interior application program of operating system carries out management and control, for there are the application program of violation operation, logging program management and control violation days
Will.Specifically identification process is:Client-side program management and control daily record is obtained, the rule of program management and control daily record is thoroughly done away with, the same day stops result and is
Failure in the case of, by this log recording be program management and control violation daily record, saved in program management and control violation daily record daily record ID,
The information such as title, time, SHA1 (Secure Hash Algorithm, Secure Hash Algorithm) value of application program.Wherein daily record
ID realizes that the positioning to application information is realized in the positioning to client, SHA1 values.
As shown in Fig. 2, in step S2, S3, according to the alarm regulation of setting, the process for carrying out Level 1Alarming prompt is:
In the first setting time, the violation main body of the whole network client-side program management and control violation daily record is counted (in violation of rules and regulations
Main body is to generate the application program of violation daily record), the top n in the violation main body of most violation daily records occurs for statistics.It is N number of to this
The application program of violation sends out Level 1Alarming prompt.To choose the first setting time for 1 day, for the value 3 of N.Mistake when statistics
Filter fly sequence management and control violation daily record, the application name and SHA1 values in acquisition daily record and daily record ID, and count.It is first when counting
By SHA1 inquiries whether existing counting, have and then count plus one, it with SHA1 is the key assignments of KEY then to generate one in memory
It is right, Value be one comprising application name, SHA1, daily record ID, counting object.In addition there are one key assignments in the buffer
To be one with SHA1 for KEY, be counted as the key-value pair of VALUE, the key-value pair value preserve 3 data.Each previous caching
In key-value pair send change in count when, all compared with the VALUE values in current record, if there is the value more than VALUE, then
It is substituted into this record.Daily 12 noon sends out Level 1Alarming prompt according to the data in this caching.
After Level 1Alarming prompt, it is KEY to create one in memory with alarm time, includes SHA1, daily record with one
ID and the key-value pair that program name is Value;The Value for taking out the key-value pair, using SHA1 as foundation, there is current SHA1 in statistics
Number, when the number for SHA1 occur be more than M when, two level alarm prompt is sent out to the corresponding violation main bodys of SHA1.It is set with second
It fixes time one week, for M values 4, if the application program for sending out Level 1Alarming prompt in continuous one week data if 4 days or more
Send out two level alarm prompt.After Level 1Alarming prompt generates, two data cached to be eliminated.But it will produce before removing new to one
Memory queue logging data.This new memory queue be one with the date for KEY, with one include SHA1, daily record ID,
Program name information object is the key-value pair of VALUE.The queue can be emptied on every Mondays, and all VALUE can be first taken out when emptying, it will
Data in VALUE are counted, and the number that SHA1 occurs is counted, and 4 times or more the corresponding VALUES values of SHA1 occur.
These VALUE values form two level alarm prompt.
After two level alarm prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, right
The violation main body that K two level alarm prompt occurs sends out three-level alarm prompt, detailed process for when sending out two level alarm prompt,
Check whether that there are the records of the buffer queue of current violation main body;If in the presence of a data is increased into the buffer queue;If
It is not present, creates the buffer queue of current violation main body, which is KEY with SHA1, to include daily record ID and program name
Referred to as Value values, and a data is added in the buffer queue;In third set period of time, statistics violation main body corresponds to
Buffer queue number of data, to the number of data be more than K times violation main body carry out three pole alarm prompts.Normal conditions
It is 2 that third setting time, which takes the time of surrounding, i.e. one month time data, K values,.
Application program for sending out Level 1Alarming prompt cancels its Level 1Alarming if not generating alarm again in one week
Information;Application program for sending out two level alarm prompt cancels its two level alarm prompt if not generating alarm in one month
Information;Application program for sending out three-level alarm prompt cancels its three-level alarm prompt letter if not producing alarm if three months
Breath.It makes marks in log information when cancelling alarm in the database, whether cancels there are one field identification in log information, write from memory
It is false to recognize, and when programming indicia is true, this daily record is not reresented.
The log information and client-side information for generating this alarm can be related to query by auto-alarming.One automatic
Alarm can have a plurality of violation daily record of more clients to generate.It is that original log is found by daily record id information when inquiry
Information.Client id, IP, violation operation type, violation content, application program, the program in original log information can be found
Routing information.These information can be shown by client id to carry out classification.
The severity of above-mentioned alarm is risen successively with yellow alarm, red alarm, superfine alarm, i.e., corresponds to level-one respectively
Alarm, two level alarm and three-level alarm.
Can be by the manual cleared alarm of administrator, for example remove a Level 1Alarming prompt message, then the Level 1Alarming carries
Show that information will not accumulate the trigger condition as two level alarm prompt.Only auto-alarming administrator, which has permission, does this operation,
When making the operation, the reason of needing record problem and settling mode.These information can be used as log recording.When removing, and
Data in 2 buffer queues of this grade of alarm are disposed, using SHA1 as condition query.But higher level alert queue in data not by
It removes.It realizes flexibly to the violation management and control of application program.
Administrator has virtual role:Auto-alarming administrator can cooperate, but the same time can only there are one pipe
Reason person is used as auto-alarming administrator.There is the administrator of first establishment of acquiescence the role, the transfer of the role must have angle
Color holder initiates.The holder of the role must register the necessary identity identification information such as cellphone information, ensure management and control flow
Trackability.
When sending out Level 1Alarming prompt, a short massage notice can be sent out to auto-alarming administrator;It is accused when sending out two level
When alert prompt, understand each hour sends out a short massage notice to administrator;It, can be per half an hour when sending out three-level alarm prompt
A short massage notice is sent out to administrator.When administrator's login system, when having read alarm details, short massage notice stops.
Embodiment 2
As shown in figure 3, the application program management-control method based on alarm prompt in the present embodiment, i.e. threshold alarm prompt, packet
Include following steps:
S1 obtains program management and control violation daily record, parses daily record and the information in daily record is formed key-value pair;
S2 is that foundation is counted, and is counted to count value with the SHA1 values of application program;
S3 obtains the larger top n violation main body of count value, to the top n violation main body in the first setting time
Send out Level 1Alarming prompt;
S4, statistics each cry shield a shortcoming or fault generation with daily record ID for KEY, be with the time and quantity that violation daily record is long-living
The quantity of the key-value pair of value values sends out client-based Threshold Alerts prompt within the setting time.
The sequence of step S2 in the present embodiment, S3 can or step S2, S3 reverse with step S4 and step S4 simultaneously into
Row.
In step S4, key-value pair that corresponding step S1 is generated is KEY with daily record ID, the time sum number generated with violation daily record
Amount is Value values, and the setting time includes that time, corresponding threshold value report is arranged in the first setting time, the second setting time and third
It is alert to prompt for lower priority alarm prompt, intermediate alarm prompt and advanced alarm prompt.
As shown in figure 4, the process of threshold alarm is:When program management and control violation daily record occurs in client, to the violation day
Will is recorded, and forms 3 buffer queues on the client in current record;Using daily record ID as foundation, count in client
There is the number of program management and control violation daily record;Active client is judged, within the third setting time, if meet advanced alarm and carry
The condition shown, if so, advanced alarm prompt is sent out to active client, if it is not, judging that the time is arranged second in active client
It is interior, if to meet the condition of intermediate alarm prompt, if so, sending out intermediate alarm prompt to active client;If it is not, judging current
Client is within the first setting time, if the condition for meeting lower priority alarm prompt, if so, sending out rudimentary announcement to active client
Alert prompt, if it is not, active client does not send out alarm prompt.
The program management and control warning strategies of threshold alarm are divided into high, normal, basic 3 kinds.Each alarm all with " if 1 hour (30 points
Clock) in, program management and control violation daily record reaches 100 " (example) be used as condition.Wherein hour and minute are that the optional time is single
Position, time quantity can select between 1-100, and it is daily record quantity up to standard that the last one, which can match project,.It is then as follows to give tacit consent to,
High-level policy:If in 1 hour, program management and control violation daily record reaches 100;Intermediate strategy:If in 30 minute, program management and control
Violation daily record reaches 50;Low-level policy:If in 1 minute, program management and control violation daily record reaches 10.It is 3 wherein high, normal, basic
The rule of rank can random final election.It can select, can not select entirely entirely.Additionally there are one program management and control alarm master switch can be with
Whether start program management and control alerts for configuration.
When carrying out threshold alarm judgement, first find that there are the clients of program management and control cache information.In inquiring client terminal
Whether program management and control alarm master switch is opened.If opened, continue to judge.According to high, medium and low sequence successively according to plan
Slightly continue alarm to judge.Do not continue to judge still further below if triggering alarm when judgement.When judgement if trigger alarm if to
Under empty the cache queue, advanced alarm empties high, normal, basic 3 buffer queues, and low 2 buffer queues during middle rank alarm empties are rudimentary
Alarm only empties rudimentary buffer queue.When judgement, according in rule time conditions and current time calculate a time model
Enclose, take out the data of this time range from buffer queue, statistics violation daily record quantity and, by daily record in this number and rule
Threshold value is compared, and threshold value then successful alarm is more than.
The side of daily record alarm, mail alarm and short message alarm can be selected in the prompting mode of threshold alarm and auto-alarming
The alarm of formula, wherein daily record is required alarm mode.
The above is the preferred embodiment of the present invention, for those skilled in the art,
Without departing from the principles of the invention, several improvements and modifications can also be made, these improvements and modifications are also regarded as this hair
Bright protection domain.
Claims (10)
1. a kind of application program management-control method based on alarm prompt, it is characterized in that:Include the following steps:
Program management and control violation daily record is obtained, daily record is parsed and the information in daily record is formed into key-value pair;
It is that foundation is counted, and is counted to count value with the SHA1 values of application program;
In the first setting time, the larger top n violation main body of count value is obtained, one is sent out to the top n violation main body
Grade alarm prompt.
2. a kind of application program management-control method based on alarm prompt according to claim 1, it is characterized in that:The key assignments
To being KEY with SHA1, Value values include title, SHA1 and the daily record ID of application program.
3. a kind of application program management-control method based on alarm prompt according to claim 2, it is characterized in that:It is described to answer
It is that foundation is counted, and the detailed process counted to count value is with the SHA1 values of program:
Check under current SHA1 whether there is count value,
If so, count value adds one, if it is not, creating the count value under current SHA1 in memory, and the count value is added
In Value;
It is created in the buffer with SHA1 as KEY, is the key-value pair of Value with count value, the key-value pair hair in previous caching
It when sending change in count, is compared with the Value values in current record, if there is the value more than current Value, is delayed with previous
Record in depositing replaces current record.
4. a kind of application program management-control method based on alarm prompt according to any one of claim 1 or 3, feature
It is:The method send out Level 1Alarming prompt after, further include
Violation main body to sending out Level 1Alarming prompt counts, in the second set period of time, to sending out M Level 1Alarming
The violation main body of prompt carries out two level alarm prompt.
5. a kind of application program management-control method based on alarm prompt according to claim 4, it is characterized in that:Described pair of hair
The violation main body for going out Level 1Alarming prompt is counted, and in the second set period of time, is disobeyed to sending out M Level 1Alarming prompt
Rule main body carry out two level alarm prompt detailed process be:
After sending out Level 1Alarming prompt, it is KEY to create one in memory with alarm time, includes SHA1, daily record with one
ID and the key-value pair that program name is Value;
The Value for taking out the key-value pair, using SHA1 as foundation, there is the number of current SHA1 in statistics, when there is the number of SHA1
When more than M, two level alarm prompt is sent out to the corresponding violation main bodys of SHA1.
6. a kind of application program management-control method based on alarm prompt according to claim 4, it is characterized in that:The method
After sending out two level alarm prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, to occurring
The violation main body of K two level alarm prompt sends out three-level alarm prompt.
7. a kind of application program management-control method based on alarm prompt according to claim 6, it is characterized in that:It is described to send out
After going out two level alarm prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, to occurring K times
The detailed process that the violation main body of two level alarm prompt sends out three-level alarm prompt is:
When sending out two level alarm prompt, check whether that there are the records of the buffer queue of current violation main body;
If in the presence of a data is increased into the buffer queue;
If being not present, create the buffer queue of current violation main body, which is KEY with SHA1, with comprising daily record ID and
Program name is Value values, and a data is added in the buffer queue;
In third set period of time, the number of data of the corresponding buffer queue of statistics violation main body is super to the number of data
It crosses K violation main body and carries out three pole alarm prompts.
8. a kind of application program management-control method based on alarm prompt according to claim 1, it is characterized in that:The method
Further include the key-value pair with daily record ID for KEY, the time and quantity generated with violation daily record count each visitor for Value values
The quantity for the key-value pair that family end generates sends out client-based Threshold Alerts prompt within the setting time.
9. a kind of application program management-control method based on alarm prompt according to claim 8, it is characterized in that:The setting
Time includes that the time is arranged in the first setting time, the second setting time and third, and corresponding Threshold Alerts prompt for lower priority alarm
Prompt, intermediate alarm prompt and advanced alarm prompt.
10. a kind of application program management-control method based on alarm prompt according to claim 9, it is characterized in that:The system
The quantity for counting the key-value pair that each client generates sends out the tool of client-based Threshold Alerts prompt within the setting time
Body process is:
When program management and control violation daily record occurs in client, which is recorded, and in current record in client
3 buffer queues of upper formation;
Using daily record ID as foundation, counts in client and the number of program management and control violation daily record occur;
Active client is judged, within the third setting time, if meet the condition of advanced alarm prompt, if so, to current visitor
Family end sends out advanced alarm prompt,
If it is not, judging active client within the second setting time, if meet the condition of intermediate alarm prompt, if so, to working as
Preceding client sends out intermediate alarm prompt;
If it is not, judging active client within the first setting time, if the condition for meeting lower priority alarm prompt, if so, to working as
Preceding client sends out lower priority alarm prompt, if it is not, active client does not send out alarm prompt.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810280281.9A CN108536520A (en) | 2018-04-02 | 2018-04-02 | A kind of application program management-control method based on alarm prompt |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810280281.9A CN108536520A (en) | 2018-04-02 | 2018-04-02 | A kind of application program management-control method based on alarm prompt |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108536520A true CN108536520A (en) | 2018-09-14 |
Family
ID=63482131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810280281.9A Pending CN108536520A (en) | 2018-04-02 | 2018-04-02 | A kind of application program management-control method based on alarm prompt |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108536520A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109361546A (en) * | 2018-11-05 | 2019-02-19 | 视联动力信息技术股份有限公司 | A kind of program method for early warning and device based on view networking |
CN110166421A (en) * | 2019-04-01 | 2019-08-23 | 平安科技(深圳)有限公司 | Invasion control method, device and terminal device based on log monitoring |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981943A (en) * | 2012-10-29 | 2013-03-20 | 新浪技术(中国)有限公司 | Method and system for monitoring application logs |
US20150121141A1 (en) * | 2013-10-31 | 2015-04-30 | Hon Hai Precision Industry Co., Ltd. | Host device and method for testing booting of servers |
US20160005298A1 (en) * | 2014-07-01 | 2016-01-07 | Fujitsu Limited | Abnormality detection system, display device, abnormality detection method, and recording medium |
CN106817253A (en) * | 2017-01-04 | 2017-06-09 | 郑州云海信息技术有限公司 | The monitor in real time of journal file and the method and system of alarm |
CN106897614A (en) * | 2017-02-27 | 2017-06-27 | 郑州云海信息技术有限公司 | Initiative Defense daily record alarm method on a kind of SSR |
CN107094100A (en) * | 2017-05-19 | 2017-08-25 | 郑州云海信息技术有限公司 | Client secure configuration warning system and method on a kind of SSR |
CN107483268A (en) * | 2017-09-20 | 2017-12-15 | 深圳市中润四方信息技术有限公司 | A kind of alert processing method and system |
CN107704522A (en) * | 2017-09-11 | 2018-02-16 | 郑州云海信息技术有限公司 | A kind of violation log-rank management method and system |
-
2018
- 2018-04-02 CN CN201810280281.9A patent/CN108536520A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981943A (en) * | 2012-10-29 | 2013-03-20 | 新浪技术(中国)有限公司 | Method and system for monitoring application logs |
US20150121141A1 (en) * | 2013-10-31 | 2015-04-30 | Hon Hai Precision Industry Co., Ltd. | Host device and method for testing booting of servers |
US20160005298A1 (en) * | 2014-07-01 | 2016-01-07 | Fujitsu Limited | Abnormality detection system, display device, abnormality detection method, and recording medium |
CN106817253A (en) * | 2017-01-04 | 2017-06-09 | 郑州云海信息技术有限公司 | The monitor in real time of journal file and the method and system of alarm |
CN106897614A (en) * | 2017-02-27 | 2017-06-27 | 郑州云海信息技术有限公司 | Initiative Defense daily record alarm method on a kind of SSR |
CN107094100A (en) * | 2017-05-19 | 2017-08-25 | 郑州云海信息技术有限公司 | Client secure configuration warning system and method on a kind of SSR |
CN107704522A (en) * | 2017-09-11 | 2018-02-16 | 郑州云海信息技术有限公司 | A kind of violation log-rank management method and system |
CN107483268A (en) * | 2017-09-20 | 2017-12-15 | 深圳市中润四方信息技术有限公司 | A kind of alert processing method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109361546A (en) * | 2018-11-05 | 2019-02-19 | 视联动力信息技术股份有限公司 | A kind of program method for early warning and device based on view networking |
CN109361546B (en) * | 2018-11-05 | 2022-03-29 | 视联动力信息技术股份有限公司 | Program early warning method and device based on video network |
CN110166421A (en) * | 2019-04-01 | 2019-08-23 | 平安科技(深圳)有限公司 | Invasion control method, device and terminal device based on log monitoring |
CN110166421B (en) * | 2019-04-01 | 2022-10-14 | 平安科技(深圳)有限公司 | Intrusion control method and device based on log monitoring and terminal equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130080552A1 (en) | Federated Challenge Credit System | |
US9032038B2 (en) | Recipient control system for ensuring non-conflicting and comprehensive distribution of digital information and method thereof | |
CN105049232B (en) | Network information Log Audit System | |
CN109242481A (en) | Information approach, device and computer equipment are pledged based on block chain query | |
CN108536520A (en) | A kind of application program management-control method based on alarm prompt | |
CN109639742B (en) | Information security monitoring system | |
US20210168238A1 (en) | Methods and Systems for Detecting Disinformation and Blocking Robotic Calls | |
CN107786551A (en) | Access the method for intranet server and control accesses the device of intranet server | |
CN113792308A (en) | Government affair sensitive data oriented security behavior risk analysis method | |
CN108696831A (en) | A kind of note transmission method and device | |
Freiwald | At the Privacy Vanguard: California’s Electronic Communications Privacy Act (CalECPA) | |
CN107742085A (en) | A kind of data security system | |
CN107872446A (en) | A kind of management method, device and the server of the account number that communicates | |
CN110061981A (en) | A kind of attack detection method and device | |
CN109166315A (en) | A kind of traffic accident information Real-Time Sharing method based on block chain technology | |
CN106713594A (en) | Method and apparatus for intercepting unwanted call or text message in wearable device | |
CN106936832A (en) | The network admittance method and system of enterprise-level | |
DE102012208290B4 (en) | NETWORKING COMPONENT WITH INQUIRY / RESPONSE ALLOCATION AND MONITORING | |
Ezell | Risks of cyber attack to supervisory control and data acquisition for water supply | |
CN109729089A (en) | A kind of intelligent network security function management method and system based on container | |
Jennings | Carnivore: US Government Surveillance of Internet Transmissions | |
CN112995342B (en) | Report monitoring method and system based on public security intranet and intranet transmission | |
CN114626849A (en) | Data protection method and protection device based on block chain | |
CN113824738A (en) | Method and system for node communication management in block chain | |
Gilman | Carnivore: The uneasy relationship between the Fourth Amendment and electronic surveillance of internet communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180914 |
|
RJ01 | Rejection of invention patent application after publication |