CN108769250A - One kind is based on WEB visualization data safety managements and its troubleshooting implementation method - Google Patents
One kind is based on WEB visualization data safety managements and its troubleshooting implementation method Download PDFInfo
- Publication number
- CN108769250A CN108769250A CN201810634311.1A CN201810634311A CN108769250A CN 108769250 A CN108769250 A CN 108769250A CN 201810634311 A CN201810634311 A CN 201810634311A CN 108769250 A CN108769250 A CN 108769250A
- Authority
- CN
- China
- Prior art keywords
- troubleshooting
- file
- implementation method
- web
- investigation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0677—Localisation of faults
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
Abstract
The present invention is more particularly directed to one kind based on WEB visualization data safety managements and its troubleshooting implementation method.Its respective operations demand should be sent to the backstage ends Server in a manner of Rest Full Api requests first and request is parsed based on WEB visualization data safety managements and its troubleshooting implementation method, when operation maintenance personnel operates WEB interface;Then the request received is sent to corresponding physical server by the ends backstage Server according to analysis result in a manner of RPC;It is called finally by system, data encryption mode and security rule is set.It should be based on WEB visualization data safety managements and its troubleshooting implementation method, user can be by operating WEB interface, whether setting data encrypt when storing, Encryption Algorithm is set, and setting secure access rule investigates data unauthorized access, facilitate operation management person's quick positioning question place, it is investigated without going computer room to log in each server in person, has not only saved cost, but also improve efficiency.
Description
Technical field
The present invention relates to data encryption, safety regulations, and technical field is arranged, more particularly to a kind of to visualize data based on WEB
Safety management and its troubleshooting implementation method.
Background technology
As cloud computing, big data business are taken cities and seized territory the development of formula, the thousands of physical services of each large data center
The operation management of device has been brought into schedule.The server of management service data flood tide in a manner of traditional O&M, not only O&M cost
Height, O&M efficiency are also very low.
Based on the above situation, the present invention devises a kind of based on WEB visualization data safety managements and its troubleshooting realization side
Method.It is intended to by a kind of hommization of offer, easy-operating administration interface, setting data encryption mode, the safety of convenience and high-efficiency
Prevention and control rule and data safety troubleshooting.
Invention content
In order to compensate for the shortcomings of the prior art, the present invention provides it is a kind of be simple and efficient based on WEB visualization data peace
Full management and its troubleshooting implementation method.
The present invention is achieved through the following technical solutions:
One kind is based on WEB visualization data safety managements and its troubleshooting implementation method, which is characterized in that includes the following steps:
(1)When operation maintenance personnel operates WEB interface, first by its respective operations demand in a manner of Rest Full Api requests
It is sent to the backstage ends Server and request is parsed;
(2)The backstage ends Server are according to analysis result by the request received with RPC(Remote Procedure Call
Protocol, remote procedure call protocol)Mode is sent to corresponding physical server;
(3)It is called by system, data encryption mode and security rule is set.
The WEB interface provides hierarchical troubleshooting view, when unauthorized access occurs for data or malice is distorted, in WEB circle
Face inputs corresponding filename, and request investigates file after being sent to corresponding physical server, and will investigate conclusion exhibition
Show in WEB interface.So as to where operation management person's quick positioning question.
It includes following three parts to carry out investigation to file after the physical server:
(1)Whether investigation file is arranged encryption and its setting time first;
(2)Secondly the number that investigation cipher mode and file are accessed and attack, and result is returned;
(3)Then the secure access rule of investigation file, and result is returned.
If being not provided with encryption by investigation file or the encryption setting time being later than what file was distorted by unauthorized access or malice
Time then investigates flow and terminates, it is concluded that conclusion is to be not provided with encryption file is caused to be distorted by unauthorized access or malice.
The beneficial effects of the invention are as follows:It should be based on WEB visualization data safety managements and its troubleshooting implementation method, Yong Huke
By operating WEB interface, whether setting data encrypt when storing, and Encryption Algorithm is arranged, and setting secure access rule investigates data
Unauthorized access where facilitating operation management person's quick positioning question, is arranged without going computer room to log in each server in person
It looks into, has not only saved cost, but also improve efficiency.
Description of the drawings
Attached drawing 1 is that the present invention is based on WEB to visualize data safety management and its troubleshooting implementation method schematic diagram.
Specific implementation mode
In order to make technical problems, technical solutions and advantages to be solved be more clearly understood, tie below
Drawings and examples are closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only used
To explain the present invention, it is not intended to limit the present invention.
It should be included the following steps based on WEB visualization data safety managements and its troubleshooting implementation method:
(1)When operation maintenance personnel operates WEB interface, first by its respective operations demand in a manner of Rest Full Api requests
It is sent to the backstage ends Server and request is parsed;
(2)The backstage ends Server are according to analysis result by the request received with RPC(Remote Procedure Call
Protocol, remote procedure call protocol)Mode is sent to corresponding physical server;
(3)It is called by system, data encryption mode and security rule is set.Specific data encryption mode and safety are anti-
Regulatory control then according to different systems be accordingly arranged.Due to specific data encryption mode and security rule category
In the prior art, therefore details are not described herein again.
The WEB interface provides hierarchical troubleshooting view, when unauthorized access occurs for data or malice is distorted, in WEB circle
Face inputs corresponding filename, and request investigates file after being sent to corresponding physical server, and will investigate conclusion exhibition
Show in WEB interface.So as to where operation management person's quick positioning question.
It includes following three parts to carry out investigation to file after the physical server:
(1)Whether investigation file is arranged encryption and its setting time first;
(2)Secondly the number that investigation cipher mode and file are accessed and attack, and result is returned;
(3)Then the secure access rule of investigation file, and result is returned.
If being not provided with encryption by investigation file or the encryption setting time being later than what file was distorted by unauthorized access or malice
Time then investigates flow and terminates, it is concluded that conclusion is to be not provided with encryption file is caused to be distorted by unauthorized access or malice.
Claims (4)
1. one kind is based on WEB visualization data safety managements and its troubleshooting implementation method, which is characterized in that include the following steps:
When operation maintenance personnel operates WEB interface, its respective operations demand is sent in a manner of Rest Full Api requests first
It is parsed to the backstage ends Server and to request;
The request received is sent to corresponding physical server by the backstage ends Server according to analysis result in a manner of RPC;
It is called by system, data encryption mode and security rule is set.
2. according to claim 1 existed based on WEB visualization data safety managements and its troubleshooting implementation method, feature
In:The WEB interface provides hierarchical troubleshooting view, when unauthorized access occurs for data or malice is distorted, is inputted in WEB interface
Corresponding filename, request investigate file after being sent to corresponding physical server, and investigation conclusion is illustrated in WEB
Interface, so as to where operation management person's quick positioning question.
3. according to claim 2 existed based on WEB visualization data safety managements and its troubleshooting implementation method, feature
In:It includes following three parts to carry out investigation to file after the physical server:
Whether investigation file is arranged encryption and its setting time first;
Secondly the number that investigation cipher mode and file are accessed and attack, and result is returned;
Then the secure access rule of investigation file, and result is returned.
4. according to claim 3 existed based on WEB visualization data safety managements and its troubleshooting implementation method, feature
In:If being not provided with encryption by investigation file or the encryption setting time is later than file by unauthorized access or if time for distorting of malice
Investigation flow terminates, it is concluded that conclusion is to be not provided with encryption file is caused to be distorted by unauthorized access or malice.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810634311.1A CN108769250A (en) | 2018-06-20 | 2018-06-20 | One kind is based on WEB visualization data safety managements and its troubleshooting implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810634311.1A CN108769250A (en) | 2018-06-20 | 2018-06-20 | One kind is based on WEB visualization data safety managements and its troubleshooting implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108769250A true CN108769250A (en) | 2018-11-06 |
Family
ID=63979353
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810634311.1A Pending CN108769250A (en) | 2018-06-20 | 2018-06-20 | One kind is based on WEB visualization data safety managements and its troubleshooting implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108769250A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11356383B2 (en) | 2020-06-19 | 2022-06-07 | Hewlett Packard Enterprise Development Lp | Cloud translation mechanism |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632198A (en) * | 2013-11-04 | 2014-03-12 | 国家电网公司 | Visualized and full-life measurement asset management system based on intelligent mobile terminal |
CN103973815A (en) * | 2014-05-27 | 2014-08-06 | 浪潮电子信息产业股份有限公司 | Method for unified monitoring of storage environment across data centers |
US9003023B2 (en) * | 2012-06-13 | 2015-04-07 | Zscaler, Inc. | Systems and methods for interactive analytics of internet traffic |
CN104796290A (en) * | 2015-04-24 | 2015-07-22 | 广东电网有限责任公司信息中心 | Data security control method and data security control platform |
-
2018
- 2018-06-20 CN CN201810634311.1A patent/CN108769250A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9003023B2 (en) * | 2012-06-13 | 2015-04-07 | Zscaler, Inc. | Systems and methods for interactive analytics of internet traffic |
CN103632198A (en) * | 2013-11-04 | 2014-03-12 | 国家电网公司 | Visualized and full-life measurement asset management system based on intelligent mobile terminal |
CN103973815A (en) * | 2014-05-27 | 2014-08-06 | 浪潮电子信息产业股份有限公司 | Method for unified monitoring of storage environment across data centers |
CN104796290A (en) * | 2015-04-24 | 2015-07-22 | 广东电网有限责任公司信息中心 | Data security control method and data security control platform |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11356383B2 (en) | 2020-06-19 | 2022-06-07 | Hewlett Packard Enterprise Development Lp | Cloud translation mechanism |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021203733A1 (en) | Power edge gateway device and device-based sensor data uplink storage method | |
CN109361517A (en) | A kind of virtualization cloud cipher machine system and its implementation based on cloud computing | |
CN104811433B (en) | The distributed Internet of things system and implementation method of a kind of C/S frameworks | |
CN107947357B (en) | Power distribution automation data acquisition device and method based on safety access area | |
CN110233868A (en) | A kind of edge calculations data safety and method for secret protection based on Fabric | |
CN103618652B (en) | A kind of audit of business datum and depth analysis system and method | |
Tang et al. | Extraction of energy information from analog meters using image processing | |
CN110069918A (en) | A kind of efficient double factor cross-domain authentication method based on block chain technology | |
CN110324180A (en) | Automation of transformation substations equipment wide area O&M Security Design Methods | |
CN109302404A (en) | A kind of remote maintenance authenticating operation method of wide area operational system | |
EP2165507A2 (en) | Method and architecture for securing real-time data | |
CN104767741A (en) | Calculation service separating and safety protecting system based on light virtual machine | |
CN103944763A (en) | Network-assistant management system and method of electrical power system | |
CN109698821A (en) | Transregional vulnerability database is shared and cooperative disposal system and method | |
CN108769250A (en) | One kind is based on WEB visualization data safety managements and its troubleshooting implementation method | |
CN101118639A (en) | Safety electric national census system | |
CN108347426B (en) | Teaching system information security management system based on big data and access method | |
CN109413111A (en) | A kind of security access system and method based on wisdom data center | |
CN102487502A (en) | Cluster communication safety method | |
CN107465688A (en) | A kind of identification method of status monitoring evaluation system network application authority | |
CN110460562A (en) | A kind of long-range Activiation method of POS terminal and system | |
CN104580997A (en) | Video monitoring management system | |
CN107819780A (en) | A kind of method for network authorization based on 802.1x | |
CN103198376A (en) | Police information network border accessing platform service improvement system where inner network acts as agent of outer network | |
Zhang et al. | Design and Implementation of IEC61850 Communication Security Protection Scheme for Smart Substation based on Bilinear Function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |
|
RJ01 | Rejection of invention patent application after publication |