CN108536520A - A kind of application program management-control method based on alarm prompt - Google Patents

A kind of application program management-control method based on alarm prompt Download PDF

Info

Publication number
CN108536520A
CN108536520A CN201810280281.9A CN201810280281A CN108536520A CN 108536520 A CN108536520 A CN 108536520A CN 201810280281 A CN201810280281 A CN 201810280281A CN 108536520 A CN108536520 A CN 108536520A
Authority
CN
China
Prior art keywords
alarm prompt
prompt
violation
value
daily record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810280281.9A
Other languages
Chinese (zh)
Inventor
张彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810280281.9A priority Critical patent/CN108536520A/en
Publication of CN108536520A publication Critical patent/CN108536520A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors

Abstract

The embodiment of the invention discloses a kind of application program management-control method based on alarm prompt, includes the following steps:Program management and control violation daily record is obtained, daily record is parsed and the information in daily record is formed into key-value pair;It is that foundation is counted, and is counted to count value with the SHA1 values of application program;In the first setting time, the larger top n violation main body of count value is obtained, Level 1Alarming prompt is sent out to the top n violation main body, the present invention constitutes alarm function together by threshold alarm and the combination of auto-alarming two ways.Realize that the alarm prompt for giving client and application program, administrator need not manually check the record of program management and control violation daily record respectively, you can the violation situation for knowing application program saves time and manpower, while having ensured the safety of operating system.

Description

A kind of application program management-control method based on alarm prompt
Technical field
The present invention relates to operating system security technical field, specifically a kind of application program pipe based on alarm prompt Prosecutor method.
Background technology
In face of the network environment to become increasingly complex, it is ensured that the safe operation of operating system needs (empty to the whole network client computer Quasi- machine or physical machine) application program be managed collectively.If being managed collectively the whole network client computer, need to obtain in real time complete Application information in net client computer.
But a large amount of clients are faced, management and control mainly is carried out to the operation of client application by managing platform concentratedly, And there is the management and control violation log recording to application program in each client.In the prior art, to management and control violation log recording Use be only limited to periodically check the record of violation daily record, and take corresponding reply operation, lack automatically to violation day Will carries out the process of parsing and alarm prompt, records and is not checked manually in time in violation of rules and regulations if there is serious management and control, can be right Operating system security causes prodigious hidden danger.
Invention content
A kind of application program management-control method based on alarm prompt is provided in the embodiment of the present invention, to solve the prior art It is middle shortage automatically to violation daily record carry out parsing and alarm prompt process the problem of.
In order to solve the above-mentioned technical problem, the embodiment of the invention discloses following technical solutions:
First aspect present invention provides a kind of application program management-control method based on alarm prompt, includes the following steps:
Program management and control violation daily record is obtained, daily record is parsed and the information in daily record is formed into key-value pair;
It is that foundation is counted, and is counted to count value with the SHA1 values of application program;
In the first setting time, the larger top n violation main body of count value is obtained, the top n violation main body is sent out Go out Level 1Alarming prompt.
With reference to first aspect, in first aspect in the first possible realization method, the key-value pair is KEY with SHA1, Value values include title, SHA1 and the daily record ID of application program.
With reference to first aspect, in first aspect in the first possible realization method, the SHA1 values with application program It is counted for foundation, and the detailed process counted to count value is:
Check under current SHA1 whether there is count value,
If so, count value adds one, if it is not, creating the count value under current SHA1 in memory, and the count value is added Enter in Value;
It is created in the buffer with SHA1 as KEY, is the key-value pair of Value, the key assignments in previous caching with count value When to sending change in count, it is compared with the Value values in current record, if there is the value more than current Value, use is previous Record in a caching replaces current record.
With reference to first aspect, in second of possible realization method of first aspect, the method is sending out Level 1Alarming After prompt, further include
Violation main body to sending out Level 1Alarming prompt counts, in the second set period of time, to sending out M level-one The violation main body of alarm prompt carries out two level alarm prompt.
With reference to first aspect, in second of possible realization method of first aspect, described pair sends out Level 1Alarming prompt Violation main body counted, in the second set period of time, the violation main body to sending out the prompt of M Level 1Alarming carries out two level The detailed process of alarm prompt is:
After sending out Level 1Alarming prompt, it with alarm time is KEY to create one in memory, with one comprising SHA1, Daily record ID and the key-value pair that program name is Value;
The Value for taking out the key-value pair, using SHA1 as foundation, there is the number of current SHA1 in statistics, when occurring SHA1's When number is more than M, two level alarm prompt is sent out to the corresponding violation main bodys of SHA1.
With reference to first aspect, in first aspect in the third possible realization method, the method is sending out two level alarm After prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, is carried to K two level alarm occurs The violation main body shown sends out three-level alarm prompt.
With reference to first aspect, described to send out two level alarm prompt in first aspect in the third possible realization method Afterwards, in third set period of time, there is the violation main body of two level alarm prompt in statistics, to K two level alarm prompt of generation The detailed process that violation main body sends out three-level alarm prompt is:
When sending out two level alarm prompt, check whether that there are the records of the buffer queue of current violation main body;
If in the presence of a data is increased into the buffer queue;
If being not present, the buffer queue of current violation main body is created, which is KEY with SHA1, to include daily record ID and program name are Value values, and a data is added in the buffer queue;
In third set period of time, the number of data of the corresponding buffer queue of statistics violation main body, to the data strip Violation main body of the number more than K times carries out three pole alarm prompts.
With reference to first aspect, in the 4th kind of possible realization method of first aspect, the method further includes the key assignments To being KEY with daily record ID, the time and quantity generated with violation daily record count the key that each client generates for Value values The quantity of value pair sends out client-based Threshold Alerts prompt within the setting time.
With reference to first aspect, in the 4th kind of possible realization method of first aspect, the setting time sets including first It sets time, the second setting time and third setting time, corresponding Threshold Alerts prompt for lower priority alarm prompt, middle rank alarm carries Show and is prompted with advanced alarm.
With reference to first aspect, in the 4th kind of possible realization method of first aspect, each client of statistics generates The key-value pair quantity, the detailed process that the prompt of client-based Threshold Alerts is sent out within the setting time is:
When program management and control violation daily record occurs in client, which is recorded, and in current record in visitor 3 buffer queues are formed on the end of family;
Using daily record ID as foundation, counts in client and the number of program management and control violation daily record occur;
Active client is judged, within the third setting time, if the condition for meeting advanced alarm prompt, if so, to working as Preceding client sends out advanced alarm prompt,
If it is not, judging active client within the second setting time, if meet the condition of intermediate alarm prompt, if so, Intermediate alarm prompt is sent out to active client;
If it is not, judging active client within the first setting time, if meet the condition of lower priority alarm prompt, if so, Lower priority alarm prompt is sent out to active client, if it is not, active client does not send out alarm prompt.
The effect provided in invention content is only the effect of embodiment, rather than invents all whole effects, above-mentioned A technical solution in technical solution has the following advantages that or advantageous effect:
1, the program management and control violation daily record for currently managing client used in platform concentratedly is parsed, from application program Angle, the application program in setting time, meeting alarm conditions carry out the alarm prompt of different stage, and administrator need not people Work checks the record of program management and control violation daily record, you can the violation situation for knowing application program is saved time and manpower, protected simultaneously The safety of operating system is hindered.
2, it by threshold alarm, is realized from client angle to the quantitative alarm in violation of rules and regulations of each client, by certainly Dynamic alarm and threshold alarm are realized be combineding with each other from client and application program visual angle, are realized to the whole network application information Control.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without creative efforts, other drawings may also be obtained based on these drawings.
Fig. 1 is the flow diagram of the embodiment of the present invention 1;
Fig. 2 is the flow diagram that auto-alarming prompt is carried out in the embodiment of the present invention 1;
Fig. 3 is the flow diagram of the embodiment of the present invention 2;
Fig. 4 is the flow diagram that threshold alarm prompt is carried out in the embodiment of the present invention 2.
Specific implementation mode
In order to clarify the technical characteristics of the invention, below by specific implementation mode, and its attached drawing is combined, to this hair It is bright to be described in detail.Following disclosure provides many different embodiments or example is used for realizing the different knots of the present invention Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
Embodiment 1
As shown in Figure 1, the application program management-control method based on alarm prompt in the present embodiment, i.e. auto-alarming prompt, packet Include following steps:
S1 obtains program management and control violation daily record, parses daily record and the information in daily record is formed key-value pair;
S2 is that foundation is counted, and is counted to count value with the SHA1 values of application program;
S3 obtains the larger top n violation main body of count value, to the top n violation main body in the first setting time Send out Level 1Alarming prompt.
In step S1, program management and control violation daily record is to manage the client of platform concentratedly to current under operating system The interior application program of operating system carries out management and control, for there are the application program of violation operation, logging program management and control violation days Will.Specifically identification process is:Client-side program management and control daily record is obtained, the rule of program management and control daily record is thoroughly done away with, the same day stops result and is Failure in the case of, by this log recording be program management and control violation daily record, saved in program management and control violation daily record daily record ID, The information such as title, time, SHA1 (Secure Hash Algorithm, Secure Hash Algorithm) value of application program.Wherein daily record ID realizes that the positioning to application information is realized in the positioning to client, SHA1 values.
As shown in Fig. 2, in step S2, S3, according to the alarm regulation of setting, the process for carrying out Level 1Alarming prompt is:
In the first setting time, the violation main body of the whole network client-side program management and control violation daily record is counted (in violation of rules and regulations Main body is to generate the application program of violation daily record), the top n in the violation main body of most violation daily records occurs for statistics.It is N number of to this The application program of violation sends out Level 1Alarming prompt.To choose the first setting time for 1 day, for the value 3 of N.Mistake when statistics Filter fly sequence management and control violation daily record, the application name and SHA1 values in acquisition daily record and daily record ID, and count.It is first when counting By SHA1 inquiries whether existing counting, have and then count plus one, it with SHA1 is the key assignments of KEY then to generate one in memory It is right, Value be one comprising application name, SHA1, daily record ID, counting object.In addition there are one key assignments in the buffer To be one with SHA1 for KEY, be counted as the key-value pair of VALUE, the key-value pair value preserve 3 data.Each previous caching In key-value pair send change in count when, all compared with the VALUE values in current record, if there is the value more than VALUE, then It is substituted into this record.Daily 12 noon sends out Level 1Alarming prompt according to the data in this caching.
After Level 1Alarming prompt, it is KEY to create one in memory with alarm time, includes SHA1, daily record with one ID and the key-value pair that program name is Value;The Value for taking out the key-value pair, using SHA1 as foundation, there is current SHA1 in statistics Number, when the number for SHA1 occur be more than M when, two level alarm prompt is sent out to the corresponding violation main bodys of SHA1.It is set with second It fixes time one week, for M values 4, if the application program for sending out Level 1Alarming prompt in continuous one week data if 4 days or more Send out two level alarm prompt.After Level 1Alarming prompt generates, two data cached to be eliminated.But it will produce before removing new to one Memory queue logging data.This new memory queue be one with the date for KEY, with one include SHA1, daily record ID, Program name information object is the key-value pair of VALUE.The queue can be emptied on every Mondays, and all VALUE can be first taken out when emptying, it will Data in VALUE are counted, and the number that SHA1 occurs is counted, and 4 times or more the corresponding VALUES values of SHA1 occur. These VALUE values form two level alarm prompt.
After two level alarm prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, right The violation main body that K two level alarm prompt occurs sends out three-level alarm prompt, detailed process for when sending out two level alarm prompt, Check whether that there are the records of the buffer queue of current violation main body;If in the presence of a data is increased into the buffer queue;If It is not present, creates the buffer queue of current violation main body, which is KEY with SHA1, to include daily record ID and program name Referred to as Value values, and a data is added in the buffer queue;In third set period of time, statistics violation main body corresponds to Buffer queue number of data, to the number of data be more than K times violation main body carry out three pole alarm prompts.Normal conditions It is 2 that third setting time, which takes the time of surrounding, i.e. one month time data, K values,.
Application program for sending out Level 1Alarming prompt cancels its Level 1Alarming if not generating alarm again in one week Information;Application program for sending out two level alarm prompt cancels its two level alarm prompt if not generating alarm in one month Information;Application program for sending out three-level alarm prompt cancels its three-level alarm prompt letter if not producing alarm if three months Breath.It makes marks in log information when cancelling alarm in the database, whether cancels there are one field identification in log information, write from memory It is false to recognize, and when programming indicia is true, this daily record is not reresented.
The log information and client-side information for generating this alarm can be related to query by auto-alarming.One automatic Alarm can have a plurality of violation daily record of more clients to generate.It is that original log is found by daily record id information when inquiry Information.Client id, IP, violation operation type, violation content, application program, the program in original log information can be found Routing information.These information can be shown by client id to carry out classification.
The severity of above-mentioned alarm is risen successively with yellow alarm, red alarm, superfine alarm, i.e., corresponds to level-one respectively Alarm, two level alarm and three-level alarm.
Can be by the manual cleared alarm of administrator, for example remove a Level 1Alarming prompt message, then the Level 1Alarming carries Show that information will not accumulate the trigger condition as two level alarm prompt.Only auto-alarming administrator, which has permission, does this operation, When making the operation, the reason of needing record problem and settling mode.These information can be used as log recording.When removing, and Data in 2 buffer queues of this grade of alarm are disposed, using SHA1 as condition query.But higher level alert queue in data not by It removes.It realizes flexibly to the violation management and control of application program.
Administrator has virtual role:Auto-alarming administrator can cooperate, but the same time can only there are one pipe Reason person is used as auto-alarming administrator.There is the administrator of first establishment of acquiescence the role, the transfer of the role must have angle Color holder initiates.The holder of the role must register the necessary identity identification information such as cellphone information, ensure management and control flow Trackability.
When sending out Level 1Alarming prompt, a short massage notice can be sent out to auto-alarming administrator;It is accused when sending out two level When alert prompt, understand each hour sends out a short massage notice to administrator;It, can be per half an hour when sending out three-level alarm prompt A short massage notice is sent out to administrator.When administrator's login system, when having read alarm details, short massage notice stops.
Embodiment 2
As shown in figure 3, the application program management-control method based on alarm prompt in the present embodiment, i.e. threshold alarm prompt, packet Include following steps:
S1 obtains program management and control violation daily record, parses daily record and the information in daily record is formed key-value pair;
S2 is that foundation is counted, and is counted to count value with the SHA1 values of application program;
S3 obtains the larger top n violation main body of count value, to the top n violation main body in the first setting time Send out Level 1Alarming prompt;
S4, statistics each cry shield a shortcoming or fault generation with daily record ID for KEY, be with the time and quantity that violation daily record is long-living The quantity of the key-value pair of value values sends out client-based Threshold Alerts prompt within the setting time.
The sequence of step S2 in the present embodiment, S3 can or step S2, S3 reverse with step S4 and step S4 simultaneously into Row.
In step S4, key-value pair that corresponding step S1 is generated is KEY with daily record ID, the time sum number generated with violation daily record Amount is Value values, and the setting time includes that time, corresponding threshold value report is arranged in the first setting time, the second setting time and third It is alert to prompt for lower priority alarm prompt, intermediate alarm prompt and advanced alarm prompt.
As shown in figure 4, the process of threshold alarm is:When program management and control violation daily record occurs in client, to the violation day Will is recorded, and forms 3 buffer queues on the client in current record;Using daily record ID as foundation, count in client There is the number of program management and control violation daily record;Active client is judged, within the third setting time, if meet advanced alarm and carry The condition shown, if so, advanced alarm prompt is sent out to active client, if it is not, judging that the time is arranged second in active client It is interior, if to meet the condition of intermediate alarm prompt, if so, sending out intermediate alarm prompt to active client;If it is not, judging current Client is within the first setting time, if the condition for meeting lower priority alarm prompt, if so, sending out rudimentary announcement to active client Alert prompt, if it is not, active client does not send out alarm prompt.
The program management and control warning strategies of threshold alarm are divided into high, normal, basic 3 kinds.Each alarm all with " if 1 hour (30 points Clock) in, program management and control violation daily record reaches 100 " (example) be used as condition.Wherein hour and minute are that the optional time is single Position, time quantity can select between 1-100, and it is daily record quantity up to standard that the last one, which can match project,.It is then as follows to give tacit consent to, High-level policy:If in 1 hour, program management and control violation daily record reaches 100;Intermediate strategy:If in 30 minute, program management and control Violation daily record reaches 50;Low-level policy:If in 1 minute, program management and control violation daily record reaches 10.It is 3 wherein high, normal, basic The rule of rank can random final election.It can select, can not select entirely entirely.Additionally there are one program management and control alarm master switch can be with Whether start program management and control alerts for configuration.
When carrying out threshold alarm judgement, first find that there are the clients of program management and control cache information.In inquiring client terminal Whether program management and control alarm master switch is opened.If opened, continue to judge.According to high, medium and low sequence successively according to plan Slightly continue alarm to judge.Do not continue to judge still further below if triggering alarm when judgement.When judgement if trigger alarm if to Under empty the cache queue, advanced alarm empties high, normal, basic 3 buffer queues, and low 2 buffer queues during middle rank alarm empties are rudimentary Alarm only empties rudimentary buffer queue.When judgement, according in rule time conditions and current time calculate a time model Enclose, take out the data of this time range from buffer queue, statistics violation daily record quantity and, by daily record in this number and rule Threshold value is compared, and threshold value then successful alarm is more than.
The side of daily record alarm, mail alarm and short message alarm can be selected in the prompting mode of threshold alarm and auto-alarming The alarm of formula, wherein daily record is required alarm mode.
The above is the preferred embodiment of the present invention, for those skilled in the art, Without departing from the principles of the invention, several improvements and modifications can also be made, these improvements and modifications are also regarded as this hair Bright protection domain.

Claims (10)

1. a kind of application program management-control method based on alarm prompt, it is characterized in that:Include the following steps:
Program management and control violation daily record is obtained, daily record is parsed and the information in daily record is formed into key-value pair;
It is that foundation is counted, and is counted to count value with the SHA1 values of application program;
In the first setting time, the larger top n violation main body of count value is obtained, one is sent out to the top n violation main body Grade alarm prompt.
2. a kind of application program management-control method based on alarm prompt according to claim 1, it is characterized in that:The key assignments To being KEY with SHA1, Value values include title, SHA1 and the daily record ID of application program.
3. a kind of application program management-control method based on alarm prompt according to claim 2, it is characterized in that:It is described to answer It is that foundation is counted, and the detailed process counted to count value is with the SHA1 values of program:
Check under current SHA1 whether there is count value,
If so, count value adds one, if it is not, creating the count value under current SHA1 in memory, and the count value is added In Value;
It is created in the buffer with SHA1 as KEY, is the key-value pair of Value with count value, the key-value pair hair in previous caching It when sending change in count, is compared with the Value values in current record, if there is the value more than current Value, is delayed with previous Record in depositing replaces current record.
4. a kind of application program management-control method based on alarm prompt according to any one of claim 1 or 3, feature It is:The method send out Level 1Alarming prompt after, further include
Violation main body to sending out Level 1Alarming prompt counts, in the second set period of time, to sending out M Level 1Alarming The violation main body of prompt carries out two level alarm prompt.
5. a kind of application program management-control method based on alarm prompt according to claim 4, it is characterized in that:Described pair of hair The violation main body for going out Level 1Alarming prompt is counted, and in the second set period of time, is disobeyed to sending out M Level 1Alarming prompt Rule main body carry out two level alarm prompt detailed process be:
After sending out Level 1Alarming prompt, it is KEY to create one in memory with alarm time, includes SHA1, daily record with one ID and the key-value pair that program name is Value;
The Value for taking out the key-value pair, using SHA1 as foundation, there is the number of current SHA1 in statistics, when there is the number of SHA1 When more than M, two level alarm prompt is sent out to the corresponding violation main bodys of SHA1.
6. a kind of application program management-control method based on alarm prompt according to claim 4, it is characterized in that:The method After sending out two level alarm prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, to occurring The violation main body of K two level alarm prompt sends out three-level alarm prompt.
7. a kind of application program management-control method based on alarm prompt according to claim 6, it is characterized in that:It is described to send out After going out two level alarm prompt, in third set period of time, there is the violation main body of two level alarm prompt in statistics, to occurring K times The detailed process that the violation main body of two level alarm prompt sends out three-level alarm prompt is:
When sending out two level alarm prompt, check whether that there are the records of the buffer queue of current violation main body;
If in the presence of a data is increased into the buffer queue;
If being not present, create the buffer queue of current violation main body, which is KEY with SHA1, with comprising daily record ID and Program name is Value values, and a data is added in the buffer queue;
In third set period of time, the number of data of the corresponding buffer queue of statistics violation main body is super to the number of data It crosses K violation main body and carries out three pole alarm prompts.
8. a kind of application program management-control method based on alarm prompt according to claim 1, it is characterized in that:The method Further include the key-value pair with daily record ID for KEY, the time and quantity generated with violation daily record count each visitor for Value values The quantity for the key-value pair that family end generates sends out client-based Threshold Alerts prompt within the setting time.
9. a kind of application program management-control method based on alarm prompt according to claim 8, it is characterized in that:The setting Time includes that the time is arranged in the first setting time, the second setting time and third, and corresponding Threshold Alerts prompt for lower priority alarm Prompt, intermediate alarm prompt and advanced alarm prompt.
10. a kind of application program management-control method based on alarm prompt according to claim 9, it is characterized in that:The system The quantity for counting the key-value pair that each client generates sends out the tool of client-based Threshold Alerts prompt within the setting time Body process is:
When program management and control violation daily record occurs in client, which is recorded, and in current record in client 3 buffer queues of upper formation;
Using daily record ID as foundation, counts in client and the number of program management and control violation daily record occur;
Active client is judged, within the third setting time, if meet the condition of advanced alarm prompt, if so, to current visitor Family end sends out advanced alarm prompt,
If it is not, judging active client within the second setting time, if meet the condition of intermediate alarm prompt, if so, to working as Preceding client sends out intermediate alarm prompt;
If it is not, judging active client within the first setting time, if the condition for meeting lower priority alarm prompt, if so, to working as Preceding client sends out lower priority alarm prompt, if it is not, active client does not send out alarm prompt.
CN201810280281.9A 2018-04-02 2018-04-02 A kind of application program management-control method based on alarm prompt Pending CN108536520A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810280281.9A CN108536520A (en) 2018-04-02 2018-04-02 A kind of application program management-control method based on alarm prompt

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810280281.9A CN108536520A (en) 2018-04-02 2018-04-02 A kind of application program management-control method based on alarm prompt

Publications (1)

Publication Number Publication Date
CN108536520A true CN108536520A (en) 2018-09-14

Family

ID=63482131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810280281.9A Pending CN108536520A (en) 2018-04-02 2018-04-02 A kind of application program management-control method based on alarm prompt

Country Status (1)

Country Link
CN (1) CN108536520A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361546A (en) * 2018-11-05 2019-02-19 视联动力信息技术股份有限公司 A kind of program method for early warning and device based on view networking
CN110166421A (en) * 2019-04-01 2019-08-23 平安科技(深圳)有限公司 Invasion control method, device and terminal device based on log monitoring

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981943A (en) * 2012-10-29 2013-03-20 新浪技术(中国)有限公司 Method and system for monitoring application logs
US20150121141A1 (en) * 2013-10-31 2015-04-30 Hon Hai Precision Industry Co., Ltd. Host device and method for testing booting of servers
US20160005298A1 (en) * 2014-07-01 2016-01-07 Fujitsu Limited Abnormality detection system, display device, abnormality detection method, and recording medium
CN106817253A (en) * 2017-01-04 2017-06-09 郑州云海信息技术有限公司 The monitor in real time of journal file and the method and system of alarm
CN106897614A (en) * 2017-02-27 2017-06-27 郑州云海信息技术有限公司 Initiative Defense daily record alarm method on a kind of SSR
CN107094100A (en) * 2017-05-19 2017-08-25 郑州云海信息技术有限公司 Client secure configuration warning system and method on a kind of SSR
CN107483268A (en) * 2017-09-20 2017-12-15 深圳市中润四方信息技术有限公司 A kind of alert processing method and system
CN107704522A (en) * 2017-09-11 2018-02-16 郑州云海信息技术有限公司 A kind of violation log-rank management method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981943A (en) * 2012-10-29 2013-03-20 新浪技术(中国)有限公司 Method and system for monitoring application logs
US20150121141A1 (en) * 2013-10-31 2015-04-30 Hon Hai Precision Industry Co., Ltd. Host device and method for testing booting of servers
US20160005298A1 (en) * 2014-07-01 2016-01-07 Fujitsu Limited Abnormality detection system, display device, abnormality detection method, and recording medium
CN106817253A (en) * 2017-01-04 2017-06-09 郑州云海信息技术有限公司 The monitor in real time of journal file and the method and system of alarm
CN106897614A (en) * 2017-02-27 2017-06-27 郑州云海信息技术有限公司 Initiative Defense daily record alarm method on a kind of SSR
CN107094100A (en) * 2017-05-19 2017-08-25 郑州云海信息技术有限公司 Client secure configuration warning system and method on a kind of SSR
CN107704522A (en) * 2017-09-11 2018-02-16 郑州云海信息技术有限公司 A kind of violation log-rank management method and system
CN107483268A (en) * 2017-09-20 2017-12-15 深圳市中润四方信息技术有限公司 A kind of alert processing method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361546A (en) * 2018-11-05 2019-02-19 视联动力信息技术股份有限公司 A kind of program method for early warning and device based on view networking
CN109361546B (en) * 2018-11-05 2022-03-29 视联动力信息技术股份有限公司 Program early warning method and device based on video network
CN110166421A (en) * 2019-04-01 2019-08-23 平安科技(深圳)有限公司 Invasion control method, device and terminal device based on log monitoring
CN110166421B (en) * 2019-04-01 2022-10-14 平安科技(深圳)有限公司 Intrusion control method and device based on log monitoring and terminal equipment

Similar Documents

Publication Publication Date Title
US20130080552A1 (en) Federated Challenge Credit System
US9032038B2 (en) Recipient control system for ensuring non-conflicting and comprehensive distribution of digital information and method thereof
CN105049232B (en) Network information Log Audit System
CN109242481A (en) Information approach, device and computer equipment are pledged based on block chain query
CN108536520A (en) A kind of application program management-control method based on alarm prompt
CN109639742B (en) Information security monitoring system
US20210168238A1 (en) Methods and Systems for Detecting Disinformation and Blocking Robotic Calls
CN107786551A (en) Access the method for intranet server and control accesses the device of intranet server
CN113792308A (en) Government affair sensitive data oriented security behavior risk analysis method
CN108696831A (en) A kind of note transmission method and device
Freiwald At the Privacy Vanguard: California’s Electronic Communications Privacy Act (CalECPA)
CN107742085A (en) A kind of data security system
CN107872446A (en) A kind of management method, device and the server of the account number that communicates
CN110061981A (en) A kind of attack detection method and device
CN109166315A (en) A kind of traffic accident information Real-Time Sharing method based on block chain technology
CN106713594A (en) Method and apparatus for intercepting unwanted call or text message in wearable device
CN106936832A (en) The network admittance method and system of enterprise-level
DE102012208290B4 (en) NETWORKING COMPONENT WITH INQUIRY / RESPONSE ALLOCATION AND MONITORING
Ezell Risks of cyber attack to supervisory control and data acquisition for water supply
CN109729089A (en) A kind of intelligent network security function management method and system based on container
Jennings Carnivore: US Government Surveillance of Internet Transmissions
CN112995342B (en) Report monitoring method and system based on public security intranet and intranet transmission
CN114626849A (en) Data protection method and protection device based on block chain
CN113824738A (en) Method and system for node communication management in block chain
Gilman Carnivore: The uneasy relationship between the Fourth Amendment and electronic surveillance of internet communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180914

RJ01 Rejection of invention patent application after publication