CN108616383A - A kind of network and the security process of information manage system - Google Patents
A kind of network and the security process of information manage system Download PDFInfo
- Publication number
- CN108616383A CN108616383A CN201810250172.2A CN201810250172A CN108616383A CN 108616383 A CN108616383 A CN 108616383A CN 201810250172 A CN201810250172 A CN 201810250172A CN 108616383 A CN108616383 A CN 108616383A
- Authority
- CN
- China
- Prior art keywords
- equipment
- information
- management module
- patch
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of networks and the security process of information to manage system, is related to information monitoring technical field, including:Plant asset management module, device software management module, patch/vulnerability information management module, device port management module, network device services management module, security audit rules administration module, equipment safety analysis management module, patch distribution module and statement management module realize effective management of network and information system security.The advantage of the invention is that realizing that the equipment for managing system to network and information system security carries out comprehensive, monitoring in real time, it can accurately be quickly found out offending device simultaneously and be rectified and improved in time, overall monitor is had reached, timely feedbacks, quickly rectify and improve, and a whole set of offending device rectification flow is provided, to ensure equipment energy safe operation.
Description
Technical field
The present invention relates to information monitoring technical field, it is more particularly to the security process management system of a kind of network and information
System.
Background technology
With the continuous promotion that the fast development that company information communicates, protecting information safety require, at this stage, network and letter
Breath system security precautions technology is also increasingly sophisticated, it has also become and grid company safeguards the basic guarantee of the network information and equipment safety,
In network and the maintenance work of information system security expansion, discovering device loophole, abnormal and accurately find separated
Rule device efficiency be conveniently significantly improved, while Logistics networks information security and equipment operation in play it is vital
Effect.
Due to being continuously increased for information network scale, the safety problem that faces also getting worse.At present terminal, network,
The equipment such as host have applied to every field, become people work, life inalienable part, equipment it is reliable and steady
The basic guarantee of fixed operation and corporate security production and management.But since range is wide, is related to that user is more, environment is complicated
The problems such as, equipment safety operation situation can not be grasped in time, while equipment patch is installed, leak repairing is more complicated.
At this stage, Guo Wang companies issue loophole and patch and are realized by following two aspect, on the one hand, due to complicated craft
Patch installation cannot be adapted to current large-scale network environment, therefore the mode that patch installation is carried out to terminal is still and passes through
Third party system carries out patch to issue installation, and when installing patch to terminal, different operating system need to push different patches, more
Secondary patch installation, it is also desirable to repeat push patch.On the other hand, operation maintenance personnel is according to the loophole and patch issued, go by hand by
The patch installation situation of one investigation terminal device, the loophole situation of software, to manually be installed, meanwhile, O&M people
The service of the open-ended of terminal device, the network equipment opens information such as (TELNET, SSH, HTTP) and grasps in information network
It is more fuzzy, a large amount of human cost had not only been expended by artificial acquisition and recording, but also be difficult to it is accurate, comprehensively pinpoint the problems.Therefore,
The effective help desk personnel's overall monitor terminal security situation of energy, accurately finds offending device and is rectified and improved in time, be current
Network and information system security take precautions against the most important thing of maintenance work.
To sum up, to deficiency present on the equipment safety operations monitoring management such as host, network, terminal in network and information
Place.
Invention content
Technical problem to be solved by the present invention lies in be unable to overall monitor to the equipment safety operation in network and information
Management so that cannot accurately find problem insufficient present on offending device.
The present invention is that solution above-mentioned technical problem, specific technical solution are as follows by the following technical programs:
A kind of network and the security process of information manage system, including:Plant asset management module, device software manage mould
Block, patch/vulnerability information management module, device port management module, network device services management module, security audit rule pipe
Module, equipment safety analysis management module, patch distribution module and statement management module are managed, realizes network and information system security
Effective management;
The plant asset management module is used for the monitoring to safe operation in information network surroundings and detects the base of object
This information is managed, and the monitoring and detection object include for host equipment, terminal device, the network equipment, wherein the master
Machine equipment includes server, and the terminal device includes desktop computer and notebook, the network equipment include interchanger;
The device software management module is used to carry out pipe to all application informations for monitoring and detecting object installation
Reason;
The patch/vulnerability information management module be used for monitor and detect object installation it is all make up application program or
The program information of operating system defect is managed;
The device port management module to monitoring and detecting object for having turned on port information management;
The network device services management module is TELNET, SSH and HTTP service for the interchanger of the network equipment
Information is managed;
The security audit rules administration module is according to the difference for monitoring and detecting object, and self-defined formulation is corresponding
Security audit rule, security audit rule have terminal, host equipment security audit rule;
The equipment safety analysis management module be responsible for software security analysis management, patch/loophole safety analysis management and
TCP port safety analysis management;
The patch distribution module is to carry out patch automation distribution peace according to the detection uninstalled patch information of object
Dress;
The statement management module is to asset of equipments information, device software information, patch/vulnerability information, software security
Analysis report, patch/loophole Security Analysis Report and TCP port Security Analysis Report carry out collect statistics in the form of EXCEL.
More specifically, the plant asset management module includes client, and the plant asset management module carries out equipment
The process of asset management uses C/S model, wherein the terminal device and host equipment are by way of client automatic collection
Device name, IP address of equipment, device mac address, operating system version, OS Type information are searched for, while supporting hand
The user of dynamic maintained equipment, affiliated function, position information;The network equipment is by manually mode maintained equipment
Title, IP address of equipment, equipment position, equipment user and equipment affiliated department information, and the information of equipment is carried out
Summarize management.
More specifically, the device software management module carries out the process of device software management by the way of client,
By way of client search terminal equipment and host equipment installation all application informations, and with the asset of equipments
Management module is associated, wherein the application information includes dbase, software version number, set-up time, and will be described
Application information carries out summarizing management.
More specifically, the patch/vulnerability information management module carries out the process of patch/vulnerability information management using client
The mode at end, automatic search terminal equipment and all of host equipment installation make up application program or behaviour by way of client
Make the program information of system defect, and associated with the plant asset management module, wherein described program information includes patch
Title, and described program information carried out to summarize management.
More specifically, the device port management module is managed TCP port information, and the process being managed uses
NMAP command modes search for the TCP port opening imformation of host equipment and terminal device in network, and setting according to search automatically
Standby IP address is associated with the plant asset management module, and the open-ended information includes port type, port numbers, port
State.
More specifically, the NMAP orders refer to a kind of network sweep and sniff kit in a network environment, are used for
Scan execution order corresponding when the information of existing equipment in a network.
More specifically, the network device services management module carries out the process of device service information management using NMAP lives
Mode is enabled, searches for the opening imformation of TELNET, SSH and HTTP of the network equipment automatically by NMAP command modes, and according to searching
The IP address of equipment of rope is associated with the plant asset management module, and the opening imformation includes service name, port numbers, clothes
Business state.
More specifically, the process that the security audit rules administration module carries out audit regulation management is according to device type
Difference, formulate device type corresponding to security audit rule;
Terminal device, host equipment security audit rule include port security rule, software installation rule and patch/loophole
Installation rule, the port security rule be terminal device and host equipment TCP port whether shut-off rule, the software peace
Dress rule be terminal device and host equipment software whether installation rule, the patch/loophole installation rule is terminal device
With the patch of host equipment whether installation rule.
More specifically, the process that the equipment safety analysis management module carries out software security analysis management is according to
Software installation rule, all softwares mounted to terminal device and host equipment are analyzed, and software security analysis report is obtained
It accuses, and carries out gathering tube reason;
The process that the equipment safety analysis management module carries out patch/loophole safety analysis management is according to the benefit
Fourth/loophole installation rule all patch/loopholes mounted to terminal device and host equipment are analyzed, and obtain patch/leakage
Hole Security Analysis Report, and carry out gathering tube reason.
The process that the equipment safety analysis management module carries out TCP port safety analysis management is pacified according to the port
Full rule analyzes all of the port opening status of terminal device and host equipment, obtains TCP port Security Analysis Report,
And carry out gathering tube reason.
More specifically, the process that the patch distribution module carries out patch distribution is divided safely according to the patch/loophole
Analysis report is distributed uninstalled patch/vulnerability information in terminal device and host equipment, is set by patch server pair
It is standby to carry out patch automation distribution and installation.
The present invention has the following advantages compared with prior art:
1, the present invention is to manage mould by plant asset management module, device software management module, patch/vulnerability information
Block, device port management module, network device services management module, security audit rules administration module, equipment safety analyzer tube
Manage module, patch distribution and statement management module, realize the equipment that system is managed to network and information system security carry out comprehensively,
Monitoring in real time, while can accurately be quickly found out offending device and be rectified and improved in time, have reached overall monitor, timely feedback,
Quickly rectification, and a whole set of offending device rectification flow is provided, to ensure equipment energy safe operation.
2, the present invention is established by basic data management library, the unified management of optimized integration data, while again can be each
It shares and uses in system.
Description of the drawings
Fig. 1 is the structural schematic diagram that a kind of network of the embodiment of the present invention and the security process of information manage system.
Specific implementation mode
It elaborates below to the embodiment of the present invention, the present embodiment is carried out lower based on the technical solution of the present invention
Implement, gives detailed embodiment and specific operating process, but protection scope of the present invention is not limited to following implementation
Example.
As shown in Figure 1, network and information system security course management system, including:Plant asset management module, equipment are soft
Part management module, patch/vulnerability information management module, device port management module, network device services management module, safety are examined
Rules administration module, equipment safety analysis management module, patch distribution module and statement management module are counted, realizes network and information
Effective management of system safety;
Plant asset management module is used for the monitoring to safe operation in information network surroundings and detects the basic letter of object
Breath is managed, and it includes for host equipment, terminal device, the network equipment to monitor and detect object, wherein host equipment includes clothes
Business device, terminal device includes desktop computer and notebook, the network equipment include interchanger;
Device software management module is used to be managed all application informations for monitoring and detecting object installation,
In, including TCP port information management;
Patch/vulnerability information management module is used to make up application program or operation to monitoring and detecting all of object installation
The program information of system defect is managed;
Device port management module to monitoring and detecting object for having turned on port information management;
Network device services management module is TELNET, SSH and HTTP service information for the interchanger of the network equipment
It is managed;
Security audit rules administration module is according to the difference for monitoring and detecting object, the self-defined corresponding safety of formulation
Audit regulation, security audit rule have terminal, host equipment security audit rule;
Equipment safety analysis management module is responsible for software security analysis management, patch/loophole safety analysis management and the ends TCP
Mouth safety analysis management;
Patch distribution module is to carry out patch automation distribution and installation according to the detection uninstalled patch information of object;
Statement management module is to asset of equipments information, device software information, patch/vulnerability information, software security analysis
Report, patch/loophole Security Analysis Report and TCP port Security Analysis Report carry out collect statistics in the form of EXCEL.
Specifically, plant asset management module includes client, plant asset management module carries out plant asset management
Process uses C/S model, wherein terminal device and host equipment searched for by way of client automatic collection device name,
IP address of equipment, device mac address, operating system version, OS Type information, while supporting making for manual maintenance equipment
Employment, affiliated function, position information;The network equipment is by manually mode maintained equipment title, IP address of equipment, sets
Standby position, equipment user and equipment affiliated department information, and the information of equipment carried out to summarize management.
Specifically, device software management module carries out the process of device software management by the way of client, pass through visitor
Family end mode search terminal equipment and host equipment installation all application informations, and with plant asset management module phase
Association, wherein application information includes dbase, software version number, set-up time, and application information is converged
Total management.
Specifically, patch/vulnerability information management module carries out the process of patch/vulnerability information management using the side of client
Formula, automatic search terminal equipment and all of host equipment installation make up application program or operating system by way of client
The program information of defect, and associated with plant asset management module, wherein program information includes patch title, and by program
Information carries out summarizing management.
Specifically, device port management module is managed TCP port information, the process being managed is ordered using NMAP
Mode is enabled to search for the TCP port opening imformation of host equipment and terminal device in network automatically, and according to the device IP of search
Location is associated with plant asset management module, and open-ended information includes port type, port numbers, port status.
Specifically, NMAP orders refer to a kind of network sweep and sniff kit in a network environment, for scanning
Execution order corresponding when the information of existing equipment in network.
Specifically, the process that network device services management module carries out device service information management uses the order sides NMAP
Formula searches for the opening imformation of TELNET, SSH and HTTP of the network equipment by NMAP command modes automatically, and according to search
IP address of equipment is associated with plant asset management module, and opening imformation includes service name, port numbers, service state.
Specifically, security audit rules administration module carry out audit regulation management process be according to device type not
Together, the security audit rule corresponding to device type is formulated;
Terminal device, host equipment security audit rule include port security rule, software installation rule and patch/loophole
Installation rule, port security rule be terminal device and host equipment TCP port whether shut-off rule, software installation rule is
The software of terminal device and host equipment whether installation rule, patch/loophole installation rule is terminal device and host equipment
Patch whether installation rule.
Specifically, the process that equipment safety analysis management module carries out software security analysis management is advised according to software installation
Then, all softwares mounted to terminal device and host equipment are analyzed, and obtain software security analysis report, and converged
Total management;
The process that equipment safety analysis management module carries out patch/loophole safety analysis management is according to patch/loophole peace
Dress rule all patch/loopholes mounted to terminal device and host equipment are analyzed, and obtain patch/loophole safety analysis
Report, and carry out gathering tube reason.
The process that equipment safety analysis management module carries out TCP port safety analysis management is right according to port security rule
The all of the port opening status of terminal device and host equipment is analyzed, and obtains TCP port Security Analysis Report, and converged
Total management.
Specifically, the process that patch distribution module carries out patch distribution is according to patch/loophole Security Analysis Report to end
Uninstalled patch/vulnerability information is distributed in end equipment and host equipment, and patch is carried out to equipment by patch server
Automate distribution and installation.
To sum up, the present invention is by plant asset management module, device software management module, patch/vulnerability information management
Module, device port management module, network device services management module, security audit rules administration module, equipment safety analysis
Management module, patch distribution and statement management module, realize the monitoring and detection for managing network and information system security system
The equipment of object monitor comprehensively, in real time, while can accurately be quickly found out offending device and be rectified and improved in time, has reached
Overall monitor is timely feedbacked, is quickly rectified and improved, and provides a whole set of offending device rectification flow, to ensure that equipment can transport safely
Row.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (10)
1. a kind of network and the security process of information manage system, which is characterized in that including:Plant asset management module, equipment
Software management module, patch/vulnerability information management module, device port management module, network device services management module, safety
Audit regulation management module, equipment safety analysis management module, patch distribution module and statement management module realize network and letter
Effective management of breath system safety;
The plant asset management module is used for the monitoring to safe operation in information network surroundings and detects the basic letter of object
Breath is managed, and the monitoring and detection object include for host equipment, terminal device, the network equipment, wherein the host is set
Standby includes server, and the terminal device includes desktop computer and notebook, the network equipment include interchanger;
The device software management module is used to be managed all application informations for monitoring and detecting object installation;
The patch/vulnerability information management module is used to make up application program or operation to monitoring and detecting all of object installation
The program information of system defect is managed;
The device port management module to monitoring and detecting object for having turned on port information management;
The network device services management module is TELNET, SSH and HTTP service information for the interchanger of the network equipment
It is managed;
The security audit rules administration module is according to the difference for monitoring and detecting object, the self-defined corresponding safety of formulation
Audit regulation, security audit rule have terminal, host equipment security audit rule;
The equipment safety analysis management module is responsible for software security analysis management, patch/loophole safety analysis management and the ends TCP
Mouth safety analysis management;
The patch distribution module is to carry out patch automation distribution and installation according to the detection uninstalled patch information of object;
The statement management module is to asset of equipments information, device software information, patch/vulnerability information, software security analysis
Report, patch/loophole Security Analysis Report and TCP port Security Analysis Report carry out collect statistics in the form of EXCEL.
2. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment
Assets management module includes client, and the process that the plant asset management module carries out plant asset management uses C/S model,
Wherein, the terminal device and host equipment are searched for device name by way of client automatic collection, IP address of equipment, set
Standby MAC Address, operating system version, OS Type information, while supporting the user of manual maintenance equipment, affiliated portion
Door, position information;The network equipment is by where manually mode maintained equipment title, IP address of equipment, equipment
Position, equipment user and equipment affiliated department information, and the information of equipment carried out to summarize management.
3. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment
Software management module carries out the process of device software management by the way of client, and search terminal is set by way of client
All application informations of standby and host equipment installation, and it is associated with the plant asset management module, wherein it is described to answer
Include dbase, software version number, set-up time with program information, and the application information carried out to summarize management.
4. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the benefit
Fourth/vulnerability information management module carries out the process of patch/vulnerability information management by the way of client, passes through the side of client
All program informations for making up application program or operating system defect of the automatic search terminal equipment of formula and host equipment installation, and
It is associated with the plant asset management module, wherein described program information includes patch title, and by described program information into
Row summarizes management.
5. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment
Port Management module is managed TCP port information, and the process being managed searches for network automatically using NMAP command modes
The TCP port opening imformation of middle host equipment and terminal device, and according to the IP address of equipment of search and the asset of equipments pipe
It is associated to manage module, the open-ended information includes port type, port numbers, port status.
6. a kind of network according to claim 5 and the security process of information manage system, which is characterized in that the NMAP
Order refers to a kind of network sweep and sniff kit in a network environment, for scanning the letter of existing equipment in a network
Corresponding execution order when breath.
7. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the network
The process that device service management module carries out device service information management uses NMAP command modes, certainly by NMAP command modes
The opening imformation of TELNET, SSH and HTTP of the dynamic search network equipment, and provided according to the IP address of equipment of search and the equipment
It is associated to produce management module, the opening imformation includes service name, port numbers, service state.
8. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the safety
The process that audit regulation management module carries out audit regulation management is the difference according to device type, is formulated corresponding to device type
Security audit rule;
Terminal device, host equipment security audit rule include port security rule, software installation rule and patch/loophole installation
Rule, the port security rule be terminal device and host equipment TCP port whether shut-off rule, the software installation rule
Be then terminal device and host equipment software whether installation rule, the patch/loophole installation rule is terminal device and master
The patch of machine equipment whether installation rule.
9. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the equipment
The process that safety analysis management module carries out software security analysis management be according to software installation rule, to terminal device and
The mounted all softwares of host equipment are analyzed, and obtain software security analysis report, and carry out gathering tube reason;
The process that the equipment safety analysis management module carries out patch/loophole safety analysis management is according to the patch/leakage
Installation rule all patch/loopholes mounted to terminal device and host equipment in hole are analyzed, and obtain patch/loophole safety
Analysis report, and carry out gathering tube reason.
The process that the equipment safety analysis management module carries out TCP port safety analysis management is advised according to the port security
Then all of the port opening status of terminal device and host equipment is analyzed, TCP port Security Analysis Report is obtained, goes forward side by side
Row summarizes management.
10. a kind of network according to claim 1 and the security process of information manage system, which is characterized in that the benefit
The process that fourth distribution module carries out patch distribution is set to terminal device and host according to the patch/loophole Security Analysis Report
Uninstalled patch/vulnerability information is distributed in standby, and patch automation distribution and installation are carried out to equipment by patch server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810250172.2A CN108616383A (en) | 2018-03-26 | 2018-03-26 | A kind of network and the security process of information manage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810250172.2A CN108616383A (en) | 2018-03-26 | 2018-03-26 | A kind of network and the security process of information manage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108616383A true CN108616383A (en) | 2018-10-02 |
Family
ID=63658973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810250172.2A Pending CN108616383A (en) | 2018-03-26 | 2018-03-26 | A kind of network and the security process of information manage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108616383A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110099041A (en) * | 2018-12-13 | 2019-08-06 | 成都亚信网络安全产业技术研究院有限公司 | A kind of Internet of Things means of defence and equipment, system |
CN113992337A (en) * | 2020-07-09 | 2022-01-28 | 台众计算机股份有限公司 | Information security management system of multi-information security software |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000030669A (en) * | 2000-03-10 | 2000-06-05 | 김성우 | Method and system for sports events service communications network |
CN105119750A (en) * | 2015-09-08 | 2015-12-02 | 南京联成科技发展有限公司 | Distributed information security operation and maintenance management platform based on massive data |
CN105138920A (en) * | 2015-07-30 | 2015-12-09 | 浪潮电子信息产业股份有限公司 | Method for realizing safety management of intranet terminal |
-
2018
- 2018-03-26 CN CN201810250172.2A patent/CN108616383A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000030669A (en) * | 2000-03-10 | 2000-06-05 | 김성우 | Method and system for sports events service communications network |
CN105138920A (en) * | 2015-07-30 | 2015-12-09 | 浪潮电子信息产业股份有限公司 | Method for realizing safety management of intranet terminal |
CN105119750A (en) * | 2015-09-08 | 2015-12-02 | 南京联成科技发展有限公司 | Distributed information security operation and maintenance management platform based on massive data |
Non-Patent Citations (1)
Title |
---|
叶磊等: "基于Python的网络及信息系统安全过程管理工具", 《数字技术与应用》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110099041A (en) * | 2018-12-13 | 2019-08-06 | 成都亚信网络安全产业技术研究院有限公司 | A kind of Internet of Things means of defence and equipment, system |
CN113992337A (en) * | 2020-07-09 | 2022-01-28 | 台众计算机股份有限公司 | Information security management system of multi-information security software |
CN113992337B (en) * | 2020-07-09 | 2024-01-26 | 台众计算机股份有限公司 | Information security management system of multi-information security software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106888194A (en) | Intelligent grid IT assets security monitoring systems based on distributed scheduling | |
CN108196492A (en) | A kind of operation power data monitoring communications analysis system | |
CN108667666A (en) | A kind of intelligent O&M method and its system based on visualization technique | |
JP2002330177A (en) | Security management server and host sever operating in linkage with the security management server | |
CN108960456A (en) | Private clound secure, integral operation platform | |
CN102684927B (en) | A kind of method and apparatus of patrolling and examining the network equipment | |
CN108492034B (en) | Oil field oil recovery production management system | |
CN103927631A (en) | Safety comprehensive management platform based on power system quality system, risk assessment and safety evaluation | |
CN105119757A (en) | Method and system for operation and maintenance automation of enterprise servers | |
CN115150589A (en) | Video monitoring operation and maintenance management system for coal mine enterprise | |
CN110398927A (en) | A kind of integrated data information monitoring platform and monitoring system | |
CN109787844A (en) | A kind of distribution master station communication fault fast positioning system | |
CN105553733A (en) | Resource monitoring and management system | |
CN108616383A (en) | A kind of network and the security process of information manage system | |
CN207148927U (en) | A kind of electric power equipment inspection system based on mobile interchange technology | |
CN104504768A (en) | Real-time monitoring system for mobile operation of high-voltage transmission line and monitoring method of real-time monitoring system | |
CN116030943A (en) | Big data intelligent operation and maintenance control system and method | |
CN107360271A (en) | Network equipment information obtains and IP address automatic division method, system and equipment | |
CN103854230A (en) | Electric power security risk management and control system and method | |
CN104883275B (en) | A kind of log buffer method and system of communication equipment | |
CN106100875A (en) | NMS based on GIS-Geographic Information System and network management | |
CN113592210A (en) | Internet of things integrated management platform for water supply non-negative-pressure secondary water supply facility | |
CN110430085B (en) | Intelligent detection device for centralized meter reading communication faults | |
Liao et al. | Managing networks through context: Graph visualization and exploration | |
CN110955900A (en) | Vulnerability detection method for big data platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181002 |
|
RJ01 | Rejection of invention patent application after publication |