CN108616383A - A kind of network and the security process of information manage system - Google Patents

A kind of network and the security process of information manage system Download PDF

Info

Publication number
CN108616383A
CN108616383A CN201810250172.2A CN201810250172A CN108616383A CN 108616383 A CN108616383 A CN 108616383A CN 201810250172 A CN201810250172 A CN 201810250172A CN 108616383 A CN108616383 A CN 108616383A
Authority
CN
China
Prior art keywords
equipment
information
management module
patch
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810250172.2A
Other languages
Chinese (zh)
Inventor
叶磊
文涛
刘立亮
张科健
孙露露
祝莹
王健
倪高卫
刘丽萍
杜成斌
余婷婷
李夏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Xuancheng Power Supply Co of State Grid Anhui Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Xuancheng Power Supply Co of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Xuancheng Power Supply Co of State Grid Anhui Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810250172.2A priority Critical patent/CN108616383A/en
Publication of CN108616383A publication Critical patent/CN108616383A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of networks and the security process of information to manage system, is related to information monitoring technical field, including:Plant asset management module, device software management module, patch/vulnerability information management module, device port management module, network device services management module, security audit rules administration module, equipment safety analysis management module, patch distribution module and statement management module realize effective management of network and information system security.The advantage of the invention is that realizing that the equipment for managing system to network and information system security carries out comprehensive, monitoring in real time, it can accurately be quickly found out offending device simultaneously and be rectified and improved in time, overall monitor is had reached, timely feedbacks, quickly rectify and improve, and a whole set of offending device rectification flow is provided, to ensure equipment energy safe operation.

Description

A kind of network and the security process of information manage system
Technical field
The present invention relates to information monitoring technical field, it is more particularly to the security process management system of a kind of network and information System.
Background technology
With the continuous promotion that the fast development that company information communicates, protecting information safety require, at this stage, network and letter Breath system security precautions technology is also increasingly sophisticated, it has also become and grid company safeguards the basic guarantee of the network information and equipment safety, In network and the maintenance work of information system security expansion, discovering device loophole, abnormal and accurately find separated Rule device efficiency be conveniently significantly improved, while Logistics networks information security and equipment operation in play it is vital Effect.
Due to being continuously increased for information network scale, the safety problem that faces also getting worse.At present terminal, network, The equipment such as host have applied to every field, become people work, life inalienable part, equipment it is reliable and steady The basic guarantee of fixed operation and corporate security production and management.But since range is wide, is related to that user is more, environment is complicated The problems such as, equipment safety operation situation can not be grasped in time, while equipment patch is installed, leak repairing is more complicated.
At this stage, Guo Wang companies issue loophole and patch and are realized by following two aspect, on the one hand, due to complicated craft Patch installation cannot be adapted to current large-scale network environment, therefore the mode that patch installation is carried out to terminal is still and passes through Third party system carries out patch to issue installation, and when installing patch to terminal, different operating system need to push different patches, more Secondary patch installation, it is also desirable to repeat push patch.On the other hand, operation maintenance personnel is according to the loophole and patch issued, go by hand by The patch installation situation of one investigation terminal device, the loophole situation of software, to manually be installed, meanwhile, O&M people The service of the open-ended of terminal device, the network equipment opens information such as (TELNET, SSH, HTTP) and grasps in information network It is more fuzzy, a large amount of human cost had not only been expended by artificial acquisition and recording, but also be difficult to it is accurate, comprehensively pinpoint the problems.Therefore, The effective help desk personnel's overall monitor terminal security situation of energy, accurately finds offending device and is rectified and improved in time, be current Network and information system security take precautions against the most important thing of maintenance work.
To sum up, to deficiency present on the equipment safety operations monitoring management such as host, network, terminal in network and information Place.
Invention content
Technical problem to be solved by the present invention lies in be unable to overall monitor to the equipment safety operation in network and information Management so that cannot accurately find problem insufficient present on offending device.
The present invention is that solution above-mentioned technical problem, specific technical solution are as follows by the following technical programs:
A kind of network and the security process of information manage system, including:Plant asset management module, device software manage mould Block, patch/vulnerability information management module, device port management module, network device services management module, security audit rule pipe Module, equipment safety analysis management module, patch distribution module and statement management module are managed, realizes network and information system security Effective management;
The plant asset management module is used for the monitoring to safe operation in information network surroundings and detects the base of object This information is managed, and the monitoring and detection object include for host equipment, terminal device, the network equipment, wherein the master Machine equipment includes server, and the terminal device includes desktop computer and notebook, the network equipment include interchanger;
The device software management module is used to carry out pipe to all application informations for monitoring and detecting object installation Reason;
The patch/vulnerability information management module be used for monitor and detect object installation it is all make up application program or The program information of operating system defect is managed;
The device port management module to monitoring and detecting object for having turned on port information management;
The network device services management module is TELNET, SSH and HTTP service for the interchanger of the network equipment Information is managed;
The security audit rules administration module is according to the difference for monitoring and detecting object, and self-defined formulation is corresponding Security audit rule, security audit rule have terminal, host equipment security audit rule;
The equipment safety analysis management module be responsible for software security analysis management, patch/loophole safety analysis management and TCP port safety analysis management;
The patch distribution module is to carry out patch automation distribution peace according to the detection uninstalled patch information of object Dress;
The statement management module is to asset of equipments information, device software information, patch/vulnerability information, software security Analysis report, patch/loophole Security Analysis Report and TCP port Security Analysis Report carry out collect statistics in the form of EXCEL.
More specifically, the plant asset management module includes client, and the plant asset management module carries out equipment The process of asset management uses C/S model, wherein the terminal device and host equipment are by way of client automatic collection Device name, IP address of equipment, device mac address, operating system version, OS Type information are searched for, while supporting hand The user of dynamic maintained equipment, affiliated function, position information;The network equipment is by manually mode maintained equipment Title, IP address of equipment, equipment position, equipment user and equipment affiliated department information, and the information of equipment is carried out Summarize management.
More specifically, the device software management module carries out the process of device software management by the way of client, By way of client search terminal equipment and host equipment installation all application informations, and with the asset of equipments Management module is associated, wherein the application information includes dbase, software version number, set-up time, and will be described Application information carries out summarizing management.
More specifically, the patch/vulnerability information management module carries out the process of patch/vulnerability information management using client The mode at end, automatic search terminal equipment and all of host equipment installation make up application program or behaviour by way of client Make the program information of system defect, and associated with the plant asset management module, wherein described program information includes patch Title, and described program information carried out to summarize management.
More specifically, the device port management module is managed TCP port information, and the process being managed uses NMAP command modes search for the TCP port opening imformation of host equipment and terminal device in network, and setting according to search automatically Standby IP address is associated with the plant asset management module, and the open-ended information includes port type, port numbers, port State.
More specifically, the NMAP orders refer to a kind of network sweep and sniff kit in a network environment, are used for Scan execution order corresponding when the information of existing equipment in a network.
More specifically, the network device services management module carries out the process of device service information management using NMAP lives Mode is enabled, searches for the opening imformation of TELNET, SSH and HTTP of the network equipment automatically by NMAP command modes, and according to searching The IP address of equipment of rope is associated with the plant asset management module, and the opening imformation includes service name, port numbers, clothes Business state.
More specifically, the process that the security audit rules administration module carries out audit regulation management is according to device type Difference, formulate device type corresponding to security audit rule;
Terminal device, host equipment security audit rule include port security rule, software installation rule and patch/loophole Installation rule, the port security rule be terminal device and host equipment TCP port whether shut-off rule, the software peace Dress rule be terminal device and host equipment software whether installation rule, the patch/loophole installation rule is terminal device With the patch of host equipment whether installation rule.
More specifically, the process that the equipment safety analysis management module carries out software security analysis management is according to Software installation rule, all softwares mounted to terminal device and host equipment are analyzed, and software security analysis report is obtained It accuses, and carries out gathering tube reason;
The process that the equipment safety analysis management module carries out patch/loophole safety analysis management is according to the benefit Fourth/loophole installation rule all patch/loopholes mounted to terminal device and host equipment are analyzed, and obtain patch/leakage Hole Security Analysis Report, and carry out gathering tube reason.
The process that the equipment safety analysis management module carries out TCP port safety analysis management is pacified according to the port Full rule analyzes all of the port opening status of terminal device and host equipment, obtains TCP port Security Analysis Report, And carry out gathering tube reason.
More specifically, the process that the patch distribution module carries out patch distribution is divided safely according to the patch/loophole Analysis report is distributed uninstalled patch/vulnerability information in terminal device and host equipment, is set by patch server pair It is standby to carry out patch automation distribution and installation.
The present invention has the following advantages compared with prior art:
1, the present invention is to manage mould by plant asset management module, device software management module, patch/vulnerability information Block, device port management module, network device services management module, security audit rules administration module, equipment safety analyzer tube Manage module, patch distribution and statement management module, realize the equipment that system is managed to network and information system security carry out comprehensively, Monitoring in real time, while can accurately be quickly found out offending device and be rectified and improved in time, have reached overall monitor, timely feedback, Quickly rectification, and a whole set of offending device rectification flow is provided, to ensure equipment energy safe operation.
2, the present invention is established by basic data management library, the unified management of optimized integration data, while again can be each It shares and uses in system.
Description of the drawings
Fig. 1 is the structural schematic diagram that a kind of network of the embodiment of the present invention and the security process of information manage system.
Specific implementation mode
It elaborates below to the embodiment of the present invention, the present embodiment is carried out lower based on the technical solution of the present invention Implement, gives detailed embodiment and specific operating process, but protection scope of the present invention is not limited to following implementation Example.
As shown in Figure 1, network and information system security course management system, including:Plant asset management module, equipment are soft Part management module, patch/vulnerability information management module, device port management module, network device services management module, safety are examined Rules administration module, equipment safety analysis management module, patch distribution module and statement management module are counted, realizes network and information Effective management of system safety;
Plant asset management module is used for the monitoring to safe operation in information network surroundings and detects the basic letter of object Breath is managed, and it includes for host equipment, terminal device, the network equipment to monitor and detect object, wherein host equipment includes clothes Business device, terminal device includes desktop computer and notebook, the network equipment include interchanger;
Device software management module is used to be managed all application informations for monitoring and detecting object installation, In, including TCP port information management;
Patch/vulnerability information management module is used to make up application program or operation to monitoring and detecting all of object installation The program information of system defect is managed;
Device port management module to monitoring and detecting object for having turned on port information management;
Network device services management module is TELNET, SSH and HTTP service information for the interchanger of the network equipment It is managed;
Security audit rules administration module is according to the difference for monitoring and detecting object, the self-defined corresponding safety of formulation Audit regulation, security audit rule have terminal, host equipment security audit rule;
Equipment safety analysis management module is responsible for software security analysis management, patch/loophole safety analysis management and the ends TCP Mouth safety analysis management;
Patch distribution module is to carry out patch automation distribution and installation according to the detection uninstalled patch information of object;
Statement management module is to asset of equipments information, device software information, patch/vulnerability information, software security analysis Report, patch/loophole Security Analysis Report and TCP port Security Analysis Report carry out collect statistics in the form of EXCEL.
Specifically, plant asset management module includes client, plant asset management module carries out plant asset management Process uses C/S model, wherein terminal device and host equipment searched for by way of client automatic collection device name, IP address of equipment, device mac address, operating system version, OS Type information, while supporting making for manual maintenance equipment Employment, affiliated function, position information;The network equipment is by manually mode maintained equipment title, IP address of equipment, sets Standby position, equipment user and equipment affiliated department information, and the information of equipment carried out to summarize management.
Specifically, device software management module carries out the process of device software management by the way of client, pass through visitor Family end mode search terminal equipment and host equipment installation all application informations, and with plant asset management module phase Association, wherein application information includes dbase, software version number, set-up time, and application information is converged Total management.
Specifically, patch/vulnerability information management module carries out the process of patch/vulnerability information management using the side of client Formula, automatic search terminal equipment and all of host equipment installation make up application program or operating system by way of client The program information of defect, and associated with plant asset management module, wherein program information includes patch title, and by program Information carries out summarizing management.
Specifically, device port management module is managed TCP port information, the process being managed is ordered using NMAP Mode is enabled to search for the TCP port opening imformation of host equipment and terminal device in network automatically, and according to the device IP of search Location is associated with plant asset management module, and open-ended information includes port type, port numbers, port status.
Specifically, NMAP orders refer to a kind of network sweep and sniff kit in a network environment, for scanning Execution order corresponding when the information of existing equipment in network.
Specifically, the process that network device services management module carries out device service information management uses the order sides NMAP Formula searches for the opening imformation of TELNET, SSH and HTTP of the network equipment by NMAP command modes automatically, and according to search IP address of equipment is associated with plant asset management module, and opening imformation includes service name, port numbers, service state.
Specifically, security audit rules administration module carry out audit regulation management process be according to device type not Together, the security audit rule corresponding to device type is formulated;
Terminal device, host equipment security audit rule include port security rule, software installation rule and patch/loophole Installation rule, port security rule be terminal device and host equipment TCP port whether shut-off rule, software installation rule is The software of terminal device and host equipment whether installation rule, patch/loophole installation rule is terminal device and host equipment Patch whether installation rule.
Specifically, the process that equipment safety analysis management module carries out software security analysis management is advised according to software installation Then, all softwares mounted to terminal device and host equipment are analyzed, and obtain software security analysis report, and converged Total management;
The process that equipment safety analysis management module carries out patch/loophole safety analysis management is according to patch/loophole peace Dress rule all patch/loopholes mounted to terminal device and host equipment are analyzed, and obtain patch/loophole safety analysis Report, and carry out gathering tube reason.
The process that equipment safety analysis management module carries out TCP port safety analysis management is right according to port security rule The all of the port opening status of terminal device and host equipment is analyzed, and obtains TCP port Security Analysis Report, and converged Total management.
Specifically, the process that patch distribution module carries out patch distribution is according to patch/loophole Security Analysis Report to end Uninstalled patch/vulnerability information is distributed in end equipment and host equipment, and patch is carried out to equipment by patch server Automate distribution and installation.
To sum up, the present invention is by plant asset management module, device software management module, patch/vulnerability information management Module, device port management module, network device services management module, security audit rules administration module, equipment safety analysis Management module, patch distribution and statement management module, realize the monitoring and detection for managing network and information system security system The equipment of object monitor comprehensively, in real time, while can accurately be quickly found out offending device and be rectified and improved in time, has reached Overall monitor is timely feedbacked, is quickly rectified and improved, and provides a whole set of offending device rectification flow, to ensure that equipment can transport safely Row.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (10)

1. a kind of network and the security process of information manage system, which is characterized in that including:Plant asset management module, equipment Software management module, patch/vulnerability information management module, device port management module, network device services management module, safety Audit regulation management module, equipment safety analysis management module, patch distribution module and statement management module realize network and letter Effective management of breath system safety;
The plant asset management module is used for the monitoring to safe operation in information network surroundings and detects the basic letter of object Breath is managed, and the monitoring and detection object include for host equipment, terminal device, the network equipment, wherein the host is set Standby includes server, and the terminal device includes desktop computer and notebook, the network equipment include interchanger;
The device software management module is used to be managed all application informations for monitoring and detecting object installation;
The patch/vulnerability information management module is used to make up application program or operation to monitoring and detecting all of object installation The program information of system defect is managed;
The device port management module to monitoring and detecting object for having turned on port information management;
The network device services management module is TELNET, SSH and HTTP service information for the interchanger of the network equipment It is managed;
The security audit rules administration module is according to the difference for monitoring and detecting object, the self-defined corresponding safety of formulation Audit regulation, security audit rule have terminal, host equipment security audit rule;
The equipment safety analysis management module is responsible for software security analysis management, patch/loophole safety analysis management and the ends TCP Mouth safety analysis management;
The patch distribution module is to carry out patch automation distribution and installation according to the detection uninstalled patch information of object;
The statement management module is to asset of equipments information, device software information, patch/vulnerability information, software security analysis Report, patch/loophole Security Analysis Report and TCP port Security Analysis Report carry out collect statistics in the form of EXCEL.
2. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment Assets management module includes client, and the process that the plant asset management module carries out plant asset management uses C/S model, Wherein, the terminal device and host equipment are searched for device name by way of client automatic collection, IP address of equipment, set Standby MAC Address, operating system version, OS Type information, while supporting the user of manual maintenance equipment, affiliated portion Door, position information;The network equipment is by where manually mode maintained equipment title, IP address of equipment, equipment Position, equipment user and equipment affiliated department information, and the information of equipment carried out to summarize management.
3. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment Software management module carries out the process of device software management by the way of client, and search terminal is set by way of client All application informations of standby and host equipment installation, and it is associated with the plant asset management module, wherein it is described to answer Include dbase, software version number, set-up time with program information, and the application information carried out to summarize management.
4. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the benefit Fourth/vulnerability information management module carries out the process of patch/vulnerability information management by the way of client, passes through the side of client All program informations for making up application program or operating system defect of the automatic search terminal equipment of formula and host equipment installation, and It is associated with the plant asset management module, wherein described program information includes patch title, and by described program information into Row summarizes management.
5. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment Port Management module is managed TCP port information, and the process being managed searches for network automatically using NMAP command modes The TCP port opening imformation of middle host equipment and terminal device, and according to the IP address of equipment of search and the asset of equipments pipe It is associated to manage module, the open-ended information includes port type, port numbers, port status.
6. a kind of network according to claim 5 and the security process of information manage system, which is characterized in that the NMAP Order refers to a kind of network sweep and sniff kit in a network environment, for scanning the letter of existing equipment in a network Corresponding execution order when breath.
7. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the network The process that device service management module carries out device service information management uses NMAP command modes, certainly by NMAP command modes The opening imformation of TELNET, SSH and HTTP of the dynamic search network equipment, and provided according to the IP address of equipment of search and the equipment It is associated to produce management module, the opening imformation includes service name, port numbers, service state.
8. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the safety The process that audit regulation management module carries out audit regulation management is the difference according to device type, is formulated corresponding to device type Security audit rule;
Terminal device, host equipment security audit rule include port security rule, software installation rule and patch/loophole installation Rule, the port security rule be terminal device and host equipment TCP port whether shut-off rule, the software installation rule Be then terminal device and host equipment software whether installation rule, the patch/loophole installation rule is terminal device and master The patch of machine equipment whether installation rule.
9. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment The process that safety analysis management module carries out software security analysis management be according to software installation rule, to terminal device and The mounted all softwares of host equipment are analyzed, and obtain software security analysis report, and carry out gathering tube reason;
The process that the equipment safety analysis management module carries out patch/loophole safety analysis management is according to the patch/leakage Installation rule all patch/loopholes mounted to terminal device and host equipment in hole are analyzed, and obtain patch/loophole safety Analysis report, and carry out gathering tube reason.
The process that the equipment safety analysis management module carries out TCP port safety analysis management is advised according to the port security Then all of the port opening status of terminal device and host equipment is analyzed, TCP port Security Analysis Report is obtained, goes forward side by side Row summarizes management.
10. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the benefit The process that fourth distribution module carries out patch distribution is set to terminal device and host according to the patch/loophole Security Analysis Report Uninstalled patch/vulnerability information is distributed in standby, and patch automation distribution and installation are carried out to equipment by patch server.
CN201810250172.2A 2018-03-26 2018-03-26 A kind of network and the security process of information manage system Pending CN108616383A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810250172.2A CN108616383A (en) 2018-03-26 2018-03-26 A kind of network and the security process of information manage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810250172.2A CN108616383A (en) 2018-03-26 2018-03-26 A kind of network and the security process of information manage system

Publications (1)

Publication Number Publication Date
CN108616383A true CN108616383A (en) 2018-10-02

Family

ID=63658973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810250172.2A Pending CN108616383A (en) 2018-03-26 2018-03-26 A kind of network and the security process of information manage system

Country Status (1)

Country Link
CN (1) CN108616383A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110099041A (en) * 2018-12-13 2019-08-06 成都亚信网络安全产业技术研究院有限公司 A kind of Internet of Things means of defence and equipment, system
CN113992337A (en) * 2020-07-09 2022-01-28 台众计算机股份有限公司 Information security management system of multi-information security software

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000030669A (en) * 2000-03-10 2000-06-05 김성우 Method and system for sports events service communications network
CN105119750A (en) * 2015-09-08 2015-12-02 南京联成科技发展有限公司 Distributed information security operation and maintenance management platform based on massive data
CN105138920A (en) * 2015-07-30 2015-12-09 浪潮电子信息产业股份有限公司 Method for realizing safety management of intranet terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000030669A (en) * 2000-03-10 2000-06-05 김성우 Method and system for sports events service communications network
CN105138920A (en) * 2015-07-30 2015-12-09 浪潮电子信息产业股份有限公司 Method for realizing safety management of intranet terminal
CN105119750A (en) * 2015-09-08 2015-12-02 南京联成科技发展有限公司 Distributed information security operation and maintenance management platform based on massive data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
叶磊等: "基于Python的网络及信息系统安全过程管理工具", 《数字技术与应用》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110099041A (en) * 2018-12-13 2019-08-06 成都亚信网络安全产业技术研究院有限公司 A kind of Internet of Things means of defence and equipment, system
CN113992337A (en) * 2020-07-09 2022-01-28 台众计算机股份有限公司 Information security management system of multi-information security software
CN113992337B (en) * 2020-07-09 2024-01-26 台众计算机股份有限公司 Information security management system of multi-information security software

Similar Documents

Publication Publication Date Title
CN106888194A (en) Intelligent grid IT assets security monitoring systems based on distributed scheduling
CN108196492A (en) A kind of operation power data monitoring communications analysis system
CN108667666A (en) A kind of intelligent O&M method and its system based on visualization technique
JP2002330177A (en) Security management server and host sever operating in linkage with the security management server
CN108960456A (en) Private clound secure, integral operation platform
CN102684927B (en) A kind of method and apparatus of patrolling and examining the network equipment
CN108492034B (en) Oil field oil recovery production management system
CN103927631A (en) Safety comprehensive management platform based on power system quality system, risk assessment and safety evaluation
CN105119757A (en) Method and system for operation and maintenance automation of enterprise servers
CN115150589A (en) Video monitoring operation and maintenance management system for coal mine enterprise
CN110398927A (en) A kind of integrated data information monitoring platform and monitoring system
CN109787844A (en) A kind of distribution master station communication fault fast positioning system
CN105553733A (en) Resource monitoring and management system
CN108616383A (en) A kind of network and the security process of information manage system
CN207148927U (en) A kind of electric power equipment inspection system based on mobile interchange technology
CN104504768A (en) Real-time monitoring system for mobile operation of high-voltage transmission line and monitoring method of real-time monitoring system
CN116030943A (en) Big data intelligent operation and maintenance control system and method
CN107360271A (en) Network equipment information obtains and IP address automatic division method, system and equipment
CN103854230A (en) Electric power security risk management and control system and method
CN104883275B (en) A kind of log buffer method and system of communication equipment
CN106100875A (en) NMS based on GIS-Geographic Information System and network management
CN113592210A (en) Internet of things integrated management platform for water supply non-negative-pressure secondary water supply facility
CN110430085B (en) Intelligent detection device for centralized meter reading communication faults
Liao et al. Managing networks through context: Graph visualization and exploration
CN110955900A (en) Vulnerability detection method for big data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181002

RJ01 Rejection of invention patent application after publication