CN108809678B - Information pushing method and server - Google Patents

Information pushing method and server Download PDF

Info

Publication number
CN108809678B
CN108809678B CN201710304243.8A CN201710304243A CN108809678B CN 108809678 B CN108809678 B CN 108809678B CN 201710304243 A CN201710304243 A CN 201710304243A CN 108809678 B CN108809678 B CN 108809678B
Authority
CN
China
Prior art keywords
alarm information
information set
pushed
server
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710304243.8A
Other languages
Chinese (zh)
Other versions
CN108809678A (en
Inventor
冯松佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710304243.8A priority Critical patent/CN108809678B/en
Publication of CN108809678A publication Critical patent/CN108809678A/en
Application granted granted Critical
Publication of CN108809678B publication Critical patent/CN108809678B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Abstract

The embodiment of the invention discloses an information pushing method, which comprises the following steps: acquiring alarm information to be pushed; dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information; generating a corresponding target address according to a target alarm information set, wherein the target alarm information set is one of the at least one alarm information set; pushing the target address to a first client, wherein the target address is used for the first client to inquire the target alarm information set. The invention also provides a server. The invention ensures that the user can only obtain the corresponding alarm information set according to the specific address, but can not obtain all the alarm information in the database at one time, thereby having certain confidentiality to the sensitive content in the alarm information and improving the safety of the scheme.

Description

Information pushing method and server
Technical Field
The invention relates to the technical field of internet, in particular to an information pushing method and a server.
Background
In order to maintain the normal operation of the server, maintenance personnel need to monitor the data stored in the database in the server. Under normal conditions, an alarm monitoring system can be adopted to monitor the database, and once an abnormal condition is monitored, a corresponding alarm can be sent out, so that maintenance personnel can timely handle the abnormal condition according to the content of the alarm.
Currently, an alarm monitoring system provides a fixed Uniform Resource Locator (URL) to provide self-service services for users. The user can log in the alarm monitoring system firstly, then select the screening condition by himself, and finally the alarm monitoring system can return the corresponding alarm information in the database according to the screening condition.
In general, all the alarm information in the database can be seen after logging in the alarm monitoring system, however, in some security system operations, the content of the alarm information is extremely sensitive, and if the sensitive alarm information is maliciously stolen, it is not beneficial to ensure the security of the information.
Disclosure of Invention
The embodiment of the invention provides an information pushing method and a server, so that a user can only obtain a corresponding alarm information set according to a specific address, and cannot obtain all alarm information in a database at one time, and therefore certain confidentiality is provided for sensitive contents in the alarm information, and the safety of a scheme is improved.
In view of the above, a first aspect of the present invention provides an information pushing method, including:
acquiring alarm information to be pushed;
dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information;
generating a corresponding target address according to a target alarm information set, wherein the target alarm information set is one of the at least one alarm information set;
pushing the target address to a first client, wherein the target address is used for the first client to inquire the target alarm information set.
A second aspect of the present invention provides a server, comprising:
the acquisition module is used for acquiring alarm information to be pushed;
the dividing module is used for dividing the alarm information to be pushed, which is acquired by the acquiring module, into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information;
a generating module, configured to generate a corresponding target address according to a target alarm information set, where the target alarm information set is one of the at least one alarm information set obtained by the dividing module;
and the pushing module is used for pushing the target address generated by the generating module to a first client, wherein the target address is used for the first client to inquire the target alarm information set.
According to the technical scheme, the embodiment of the invention has the following advantages:
the embodiment of the invention provides an information pushing method, which comprises the steps of firstly obtaining alarm information to be pushed by a server, then dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information, generating a corresponding target address according to the target alarm information set by the server, the target alarm information set is one of the at least one alarm information set, and finally pushing the target address to a first client, wherein the target address is used for the first client to inquire the target alarm information set. Through the method, the server can firstly group all the acquired alarm information to obtain at least one alarm information set, and then respectively generate different addresses for each alarm information set, so that a user can only acquire the corresponding alarm information set according to a specific address, and cannot acquire all the alarm information in the database at one time, and therefore certain confidentiality is achieved on sensitive contents in the alarm information, and the safety of the scheme is improved.
Drawings
FIG. 1 is a diagram of a system architecture for implementing information push in an embodiment of the present invention;
FIG. 2 is a schematic diagram of an interactive embodiment of a method for pushing information according to an embodiment of the present invention;
FIG. 3 is a diagram of an embodiment of a method for pushing information according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a display interface of a first client according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a display interface of a second client according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method for pushing information in an application scenario according to the present invention;
FIG. 7 is a diagram of one embodiment of a server in an embodiment of the invention;
FIG. 8 is a diagram of another embodiment of a server in an embodiment of the present invention;
FIG. 9 is a diagram of another embodiment of a server in an embodiment of the present invention;
FIG. 10 is a diagram of another embodiment of a server in an embodiment of the present invention;
FIG. 11 is a diagram of another embodiment of a server in an embodiment of the present invention;
FIG. 12 is a diagram of another embodiment of a server in an embodiment of the present invention;
FIG. 13 is a diagram of another embodiment of a server in an embodiment of the present invention;
FIG. 14 is a diagram of another embodiment of a server in an embodiment of the present invention;
fig. 15 is a schematic structural diagram of a server in an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an information pushing method and a server, so that a user can only obtain a corresponding alarm information set according to a specific address, and cannot obtain all alarm information in a database at one time, and therefore certain confidentiality is provided for sensitive contents in the alarm information, and the safety of a scheme is improved.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, the present invention is applied to a system for pushing information, please refer to fig. 1, and fig. 1 is a system architecture diagram for implementing information pushing in an embodiment of the present invention, as shown in the figure, one first client and one second client are only illustrated in the figure, and in an actual application, a server may also establish a communication connection with a plurality of first clients and a plurality of second clients. The server in fig. 1 adopts a set of regularized Best-Effort (Best-Effort) mechanism capable of receiving a large amount of alarm information, and can perform convergence and archive processing on the large amount of alarm information within a short time (e.g. 5 minutes). The processed alarm information is sent to a first client, where the first client may specifically be a Real Time Exchange (RTX), a short message, a voice, a Wechat, and the like installed on a User Equipment (UE), and the User obtains an alarm notification and specific alarm information through the first client.
In addition, the second client side at the front end of the server is used for setting alarm means, data source identification, data content, alarm receivers, data source occurrence time and the like, so that a normalized alarm format is determined.
It should be understood that the server employed in the present invention may be a 4-core Central Processing Unit (CPU) and 8 Gigabytes (GB) hardware device, and the client binary is compatible with 32 or 64-bit Linux operating system, providing configurable options. The first client and the second client are both connected to the background server by a Transmission Control Protocol (TCP), and the second client performs standardized transcoding in a Unified Transform Format (UTF) 8 to adapt to various character code inputs of the user.
The information pushing system related by the invention adopts different alarm notification means, provides a customizable alarm information filing and inquiring page by taking minutes as granularity, and sends the alarm information by taking minutes as granularity to an alarm receiver. In general, the first client stores the total alarm information in one week for offline aggregate analysis, and in practical applications, the first client may also store alarm information in other time periods.
For easy understanding, please refer to fig. 2, where fig. 2 is a schematic diagram of an interactive embodiment of a method for pushing information according to an embodiment of the present invention, and as shown in the diagram, the server, the first client, and the second client perform the following steps:
in step 101, the second client is a front-end client of the server, and the second client inputs the alert format standard to the server. The first client side adopts a binary file and has an alarm format standard, so that a user needs to input the alarm format standard into the server through the second client side, wherein the alarm format standard comprises but is not limited to a client side name, an alarm notification means, an alarm receiver, alarm content, an alarm sending source and an alarm title;
in step 102, the server obtains the alarm information to be pushed in the database through detection and analysis, wherein the alarm information to be pushed may be many, even thousands of alarm information;
in step 103, before sending the alarm information, the server first groups the obtained alarm information to be pushed, wherein the grouping basis is more, the alarm information can be divided according to a time period or according to the number of information, and a plurality of alarm information sets are obtained after the division;
in step 104, the server respectively generates corresponding URL addresses according to each alarm information set;
in step 105, each URL address is pushed to the first client in sequence, and the user can see different URL addresses through the first client, and can see different sets of alarm information by clicking different URL addresses.
Referring to fig. 3, a method for pushing information according to the present invention is described below from the perspective of a server, where an embodiment of the method for pushing information according to the present invention includes:
201. acquiring alarm information to be pushed;
in this embodiment, the server first obtains the alarm information to be pushed in its own database. The warning information to be pushed includes, but is not limited to, a fault message, a warning message, and a system message.
A failure message is received when service is interrupted due to a serious failure caused by a problem with the web site or the server itself. For example, a website cannot be opened, the Packet loss rate of an Internet Packet explorer (Packet Internet Groper, PING) of the server is 100%, and the server connection is overtime.
After the self-defined warning line is set, once triggered, a warning message is received, for example, the utilization rate of a server CPU exceeds 90%, and the network card flow of the server exceeds 5 megabits per second (Mbps).
For Simple Network Management Protocol (SNMP) performance monitoring, service performance monitoring and custom monitoring of a server, when a collector cannot acquire performance data, system information is recorded, and corresponding check needs to be performed at this time, for example, whether an SNMP service is normal or not.
202. Dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information;
in this embodiment, according to a preset grouping rule, the server may divide the alarm information to be pushed into at least one alarm information set, for example, 1000 pieces of alarm information to be pushed, and may divide the alarm information into a plurality of alarm information sets, where each alarm information set includes an equal number or an unequal number of alarm information, but in any case, the alarm information set includes at least one piece of alarm information.
203. Generating a corresponding target address according to a target alarm information set, wherein the target alarm information set is one of at least one alarm information set;
in this embodiment, the server generates a corresponding URL address according to each alarm information set, specifically, please refer to table 1, where table 1 is an alarm information query list generated by the server according to the alarm information sets in different time periods.
TABLE 1
Time period URL address Alarm information collection
10:05-10:10 http://www.items.com/domain/151643 A
10:10-10:15 http://www.items.com/domain/159533 B
10:15-10:20 http://www.items.com/domain/198343 C
10:20-10:25 http://www.items.com/domain/184303 D
If the target alarm information set may be any one of the alarm information sets, for example, if the alarm information set is the alarm information set a, then table 1 shows that the corresponding target address is "http:// www.items.com/domain/151643".
204. And pushing a target address to the first client, wherein the target address is used for the first client to inquire a target alarm information set.
In this embodiment, the server pushes URL addresses corresponding to each time period to the first client, for convenience of introduction, please refer to fig. 4, where fig. 4 is a schematic view of a display interface of the first client in the embodiment of the present invention, as shown in the figure, an alert information query list is displayed on the display interface of the first client, where the list includes a target address "http:// www.items.com/domain/151643", and assuming that a user clicks the target address, the content of the alert information set a may be queried according to the content shown in table 1. In practical application, the user can also select other URL addresses, so as to obtain a corresponding alarm information set.
The embodiment of the invention provides an information pushing method, which comprises the steps of firstly obtaining alarm information to be pushed by a server, then dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information, generating a corresponding target address according to the target alarm information set by the server, the target alarm information set is one of the at least one alarm information set, and finally pushing the target address to a first client, wherein the target address is used for the first client to inquire the target alarm information set. Through the method, the server can firstly group all the acquired alarm information to obtain at least one alarm information set, and then respectively generate different addresses for each alarm information set, so that a user can only acquire the corresponding alarm information set according to a specific address, and cannot acquire all the alarm information in the database at one time, and therefore certain confidentiality is achieved on sensitive contents in the alarm information, and the safety of the scheme is improved.
Optionally, on the basis of the embodiment corresponding to fig. 3, in a first optional embodiment of the information pushing method provided in the embodiment of the present invention, according to a preset grouping rule, dividing the alarm information to be pushed into at least one alarm information set, which may include:
acquiring a first alarm information set from alarm information to be pushed according to a first preset grouping time period;
and acquiring a second alarm information set from the alarm information to be pushed according to a second preset grouping time period.
In this embodiment, a method for grouping alarm information according to a time period is provided, that is, a preset grouping rule is a time period grouping method.
Specifically, assuming that the first preset grouping time period is 5 minutes, the server may obtain all the to-be-pushed alarm information within 5 minutes, and use the to-be-pushed alarm information obtained within the 5 minutes as the first alarm information set. Similarly, the server obtains a second alarm information set, a third alarm information set, a second alarm information set, and the like corresponding to each time period according to the second preset grouping time period, the third preset grouping time period, the fourth preset grouping time period, and the like, which is not described herein again.
It should be noted that, in a general case, the first preset grouping time period and the second preset grouping time period are equal, but different from the above, the first preset grouping time period and the second preset grouping time period have a certain time sequence relationship, and the first preset grouping time period may pass through first, the second preset grouping time period, and the first preset grouping time period, which is not limited herein.
It is understood that, in practical applications, the first preset grouping time period and the second preset grouping time period may not be equal, for example, the first preset grouping time period is 5 minutes, and after two days, the user adjusts the rule so that the second preset grouping time period is 3 minutes.
Secondly, in the embodiment of the present invention, when the server divides the alarm information to be pushed, one way is to obtain a first alarm information set from the alarm information to be pushed according to a first preset grouping time period, and obtain a second alarm information set from the alarm information to be pushed according to a second preset grouping time period, that is, to group the alarm information to be pushed according to the time periods. By the method, the plurality of alarm information sets can be effectively acquired, so that the corresponding URL addresses are respectively generated for the alarm information sets in the following process, and the practicability and feasibility of the scheme are improved.
Optionally, on the basis of the embodiment corresponding to fig. 3, in a second optional embodiment of the information pushing method provided in the embodiment of the present invention, according to a preset grouping rule, dividing the alarm information to be pushed into at least one alarm information set, which may include:
acquiring a first alarm information set from alarm information to be pushed according to a preset alarm information quantity threshold;
and acquiring a second alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold value.
In this embodiment, a method for grouping alarm information according to the information quantity is provided, that is, a preset grouping rule is a quantity grouping method.
Specifically, assuming that the preset alarm information quantity threshold is 100, the server may use every 100 pieces of alarm information as one alarm information set, for example, 1 st to 100 th pieces of alarm information as a first alarm information set, then 101 th to 200 th pieces of alarm information as a second alarm information set, and so on, if there are 864 pieces of alarm information to be currently pushed, the last alarm information set may be 801 to 864 pieces of alarm information.
It is understood that the threshold of the amount of alarm information may be adjusted according to actual situations, and is not limited herein.
Secondly, in the embodiment of the present invention, when the server divides the alarm information to be pushed, one way is to obtain a first alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold, and similarly, obtain a second alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold, that is, group the alarm information to be pushed according to an upper limit of the quantity of the alarm information. By the method, the plurality of alarm information sets can be effectively acquired, so that the corresponding URL addresses are respectively generated for the alarm information sets in the following process, and the practicability and feasibility of the scheme are improved.
Optionally, on the basis of the first or second embodiment corresponding to fig. 3, in a third optional embodiment of the information pushing method provided in the embodiment of the present invention, after acquiring the first alarm information set from the alarm information to be pushed, the method may further include:
generating a corresponding first address according to the first alarm information set;
after acquiring the second alarm information set from the alarm information to be pushed according to the second preset grouping time period, the method may further include:
and generating a corresponding second address according to the second alarm information set.
In this embodiment, after obtaining the first warning information set, the server may generate a corresponding first address for the first warning information set, and similarly, after obtaining the second warning information set, the server may also generate a corresponding second address.
The first address and the second address may specifically be URL addresses, where the URL is a compact representation of a location and an access method of a resource obtained from the internet, and is an address of a standard resource on the internet. Each file on the internet has a unique URL that contains information indicating the location of the file and how the browser should handle it.
It should be noted that the URL address in this embodiment may be an absolute URL address or a relative URL address, which is not limited herein. An absolute URL address is a complete path of a display file, which means that the absolute URL itself is located at a position independent of the position of the actual file being referenced. The position of the target folder is described with reference to the URL address, using the position of the folder containing the URL itself as a reference point. If the target file is in the same directory as the current page, then the relative URL of this file is simply the filename and extension, and if the target file is in a subdirectory of the current directory, then its relative URL is the subdirectory name, followed by the slash, and then the filename and extension of the target file.
In the embodiment of the present invention, after obtaining the first set of alarm information, the server generates a first address corresponding to the first set of alarm information, and after obtaining the second set of alarm information, generates a second address corresponding to the second set of alarm information. By the method, the anti-address is fixed, and the dynamic address is adopted to inquire the alarm information in the database, so that the condition of maliciously stealing the alarm information can be effectively reduced, and the safety of the scheme is improved.
Optionally, on the basis of the first embodiment corresponding to fig. 3, in a fourth optional embodiment of the information pushing method provided in the embodiment of the present invention, before dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, the method may further include:
receiving a frequency limit configuration instruction sent by a second client;
and determining a quantity threshold of the alarm information according to the frequency limit configuration instruction, wherein the quantity threshold of the alarm information is used for determining the upper limit of the quantity of the alarm information sent in the first preset grouping time period and the second preset grouping time period.
In this embodiment, in order to enable the server to work better, the user may further configure the server through the second client, that is, issue a frequency limit configuration instruction through the second client, and the server may determine, according to the frequency limit configuration instruction, an upper limit of the number of the alarm information sent within the preset grouping time period.
Specifically, in the display interface of the second client, configuration may be performed according to requirements, please refer to fig. 5, where fig. 5 is a schematic view of a display interface of the second client in the embodiment of the present invention, and a user may perform offline aggregate query or analysis on the total alarm information through the interface of the second client to infer the health condition of the current operating system, and may also perform setting on content related to the alarm information. The configurable content may include, but is not limited to, a center name, a service system, an alarm source Internet Protocol (IP) number, an alarm source, an alarm type, an alarm receiver, and a service module. And the display interface of the second client can also display the full alarm information, and the display modes include but are not limited to a line graph, a curve graph, a bar graph, a stacked bar graph, a pie graph, a multiaxis graph and a stacked bar graph. Fig. 5 shows the full alarm information in the form of a pie chart.
It should be noted that, in addition to setting the threshold of the number of alarm information, the frequency limit configuration instruction may also set other contents, such as the total number of alarms that are sent by the alarm sender at most in the preset grouping time period, the total number of alarms that are received by the alarm receiver at most in the preset grouping time period, and the total number of alarms that are received by the same alarm content information at most in the preset grouping time period.
In the embodiment of the invention, the user can adjust the mode of dividing the alarm information set by the server through the second client, and the server determines the upper limit of the quantity of the alarm information in the preset grouping time according to the frequency limit configuration instruction sent by the second client. By the method, the frequency limit configuration of the alarm information can be carried out according to the working capacity of the server, so that the normal operation of the server is maintained, and the feasibility of the scheme is favorably improved.
Optionally, on the basis of the embodiment corresponding to fig. 3, in a fifth optional embodiment of the information pushing method provided in the embodiment of the present invention, the method may further include:
detecting the current load capacity of a server;
and if the load is greater than or equal to the preset load threshold, sending an excessive load message to the second client, wherein the excessive load message is used for indicating whether the second client triggers an alarm information retransmission request.
In this embodiment, the server needs to detect its own load condition and obtain a load amount, which may also be represented by a load rate. And if the server is in a high load state, sending an overload message to the second client so as to improve the working state of the current server. The user can decide whether to trigger the alarm information retransmission request according to the overload message displayed by the second client, namely whether to send the alarm information to the first client again.
Specifically, assuming that the preset load threshold is 80%, if the current load of the server is greater than 80%, an overload message is sent to the second client, when the second client triggers an alarm information retransmission request, the server accumulates the number of alarm information according to a user-defined alarm information number threshold, and if the number of alarm information obtained by accumulation exceeds the alarm information number threshold, merging or discarding the alarm information can be selected. If the alarm information quantity obtained by accumulation does not exceed the alarm information quantity threshold value, the server can issue the alarm information to the first client side and record the alarm information to the database for periodic storage.
Secondly, in the embodiment of the invention, the server can also detect the load condition of the server in real time, and once the load is detected to be greater than or equal to the preset load threshold, the server can send the overload message to the second client, so that the second client can judge whether the alarm information needs to be retransmitted or not according to the overload message. Through the method, on one hand, the load condition of the server can be monitored in real time, and the condition that the server is crashed due to overlarge load is reduced, on the other hand, if the server is overloaded, the transmission of the alarm information can be failed, and then the second server can further select whether the alarm information needs to be retransmitted or not, so that the feasibility and the operability of the scheme are improved.
Optionally, on the basis of the embodiment corresponding to fig. 3, in a sixth optional embodiment of the information pushing method provided in the embodiment of the present invention, generating a corresponding target address according to the target alarm information set may include:
acquiring a target timestamp corresponding to a target alarm information set;
and encrypting the target alarm information set by adopting the target timestamp and generating a target address.
In this embodiment, the server obtains a target timestamp corresponding to a target alarm information set, where each alarm information set may correspond to a timestamp, and for example, the timestamp corresponding to the alarm information set a is 2017/3/29/10:00: 00. It is understood that different sets of alarm information also correspond to different timestamps, and thus the timestamps themselves have uniqueness.
Next, the server needs to encrypt the target address by using an encryption Algorithm and a target timestamp, for example, writing the alarm information set a into Extensible Markup Language (XML), where the XML file name may be named as a value of a fifth version Message Digest Algorithm (MD 5) of the user name plus the latest timestamp, and is queried as a static resource, and the server also generates a URL address, where the URL address may also be named as a value of MD5 of the user name plus the latest timestamp.
It should be noted that, in practical applications, besides the MD5 value, other Encryption means may be adopted, for example, Advanced Encryption Standard (AES) Encryption or public key Encryption algorithm is adopted for Encryption, which is not limited herein.
Secondly, in the embodiment of the present invention, the server may further perform encryption processing on the target address by using the target timestamp in the process of generating the target address. By the method, the server sends the encrypted target address to the first client, so that the first client can use the encrypted target address only by decoding the encrypted target address, the safety of the scheme is further enhanced, and the conditions that the illegal client invades the database and obtains the sensitive alarm information are effectively resisted.
Optionally, on the basis of any one of the first to sixth embodiments corresponding to fig. 3 and fig. 3, in a seventh optional embodiment of the information pushing method provided in the embodiment of the present invention, after acquiring the alarm information to be pushed, the method may further include:
and sending the alarm information to be pushed to the alternative server so that the alternative server stores the alarm information to be pushed.
In this embodiment, the information push system may further include at least one alternative server in addition to the main server, and the functions of the alternative server and the main server are substantially consistent. The alternate server may operate in place of the primary server when the primary server fails.
The main server can send the alarm information to be pushed to the alternative servers in real time or periodically, the alternative servers store the alarm information to be pushed, once the main server fails or is extinguished, the alternative servers receive the working instructions sent by the alternative servers, group the alarm information to be pushed according to the working instructions, generate URL addresses corresponding to each group, and then continue to send the URL addresses to the at least one first client.
Further, in the embodiment of the present invention, the server may also send the alarm information to be pushed to the alternative server in real time, and the alternative server may store the alarm information to be pushed. By the mode, the framework of the main server and the alternative server is adopted, after the connection of the main server exceeds the upper limit of the current system load, the subsequent request can be automatically switched to the alternative server, and the alternative server performs processing similar to that of the main server according to the alarm information to be pushed, so that the stability of information pushing is guaranteed, and the reliability and the practicability of the scheme are enhanced.
For convenience of understanding, the following may describe in detail the information pushing process in the present invention in a specific application scenario, please refer to fig. 6, where fig. 6 is a schematic flow diagram of the information pushing method in the application scenario, specifically:
in step 301, the second client receives user input, the input content refers to the alarm format standard mentioned in the above embodiment, the second client communicates with the background server access layer, and performs ticket authentication using a private encryption protocol, when the length of the data content exceeds 1300 bytes, the data packet is split, and the same protocol header and offset identifier are added, and the back-end server access layer performs reassembly and analysis according to the protocol header information and the data packet information in the cache queue;
in step 302, the second client requests to first attempt to connect to the server, and the server determines whether to forward the second client request to the access layer or the logic layer of the alternative server according to the current load condition. If the main server and the alternative server are in a high-load state at the same time, the alternative server feeds back to the second client to request response failure, and the user can determine whether to retransmit the alarm according to the second client request response information judgment logic;
in step 303, the server receiving the request information from the second client performs alarm counting and accumulation according to the frequency limit rule defined by the user, if the current alarm information hits the frequency limit rule, the current alarm information is merged or discarded, and if the current alarm information does not hit the frequency limit rule, the request of the logic layer is forwarded to the service cluster at the back end through the convergence center, and the current alarm information is recorded in the database of the structured storage for regular storage. The logic layer can also report heartbeat survival information to the convergence center at regular time, and when the heartbeat information stops exceeding a set time threshold, the convergence center can start an abnormal subprocess to trigger a serious abnormal alarm to be forwarded to the back-end service cluster so as to remind a system responsible person to follow up abnormal investigation in time;
in step 304, in order to enhance the robustness and the abnormal self-healing capability of the system, the aggregation center may further introduce a third-party monitoring service to perform abnormal hot restart recovery service processing on the access layer and the logic layer: if the success rate of request forwarding of each layer is continuously zero, the process core of each layer and the like, the convergence center process can increase the regular survival detection of the timing task;
in step 305, the warning information is periodically stored in the structured storage database;
in step 306, if the user receives the over-frequency alarm within 5 minutes, the scheduling center writes the information which is counted to meet the alarm condition into an XML file, the name of the XML file is named by the user name plus the MD5 value of the latest timestamp, the XML file is used as a static resource to provide webpage query service through a server, simultaneously, the XML file generates the alarm short message content containing the merged query URL, and forwards the alarm short message content to a service cluster for pushing and issuing so that the user can click and query all the alarm detail information within the latest 5 minutes at a mobile phone end, and the logic layer can also place the full alarm information to a database which is structurally stored;
in step 307, the service cluster selects each service gateway (such as short message, voice, WeChat or RTX) according to a First-in First-out (FIFO) request in the alarm queue, pushes and sends the alarm information to the mobile phone short message or WeChat client of the user, and the like, if the request fails to adapt, the service cluster retries again until 3 times of failures, feeds back the adaptation state to the aggregation center, and forwards the state of success or failure of sending to the second client for display back by the original route.
Referring to fig. 7, the server in the embodiment of the present invention is a server applied to an information pushing method, and the server 40 includes:
an obtaining module 401, configured to obtain alarm information to be pushed;
a dividing module 402, configured to divide the alarm information to be pushed, acquired by the acquiring module 401, into at least one alarm information set according to a preset grouping rule, where the alarm information set includes at least one piece of alarm information;
a generating module 403, configured to generate a corresponding target address according to a target alarm information set, where the target alarm information set is one of the at least one alarm information set obtained by dividing by the dividing module 402;
a pushing module 404, configured to push the target address generated by the generating module 403 to a first client, where the target address is used for the first client to query the target alarm information set.
In this embodiment, an obtaining module 401 obtains alarm information to be pushed, a dividing module 402 divides the alarm information to be pushed obtained by the obtaining module 401 into at least one alarm information set according to a preset grouping rule, where the alarm information set includes at least one piece of alarm information, a generating module 403 generates a corresponding target address according to a target alarm information set, the target alarm information set is one of the at least one alarm information set obtained by dividing by the dividing module 402, and a pushing module 404 pushes the target address generated by the generating module 403 to a first client, where the target address is used for the first client to query the target alarm information set.
The embodiment of the invention provides a server, which first obtains alarm information to be pushed by the server, then divides the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information, the server generates a corresponding target address according to the target alarm information set, the target alarm information set is one of the at least one alarm information set, and finally pushes the target address to a first client, wherein the target address is used for the first client to inquire the target alarm information set. Through the method, the server can firstly group all the acquired alarm information to obtain at least one alarm information set, and then respectively generate different addresses for each alarm information set, so that a user can only acquire the corresponding alarm information set according to a specific address, and cannot acquire all the alarm information in the database at one time, and therefore certain confidentiality is achieved on sensitive contents in the alarm information, and the safety of the scheme is improved.
Alternatively, on the basis of the embodiment corresponding to fig. 7, referring to fig. 8, in another embodiment of the server provided in the embodiment of the present invention,
the dividing module 402 comprises:
a first obtaining unit 4021, configured to obtain a first alarm information set from the alarm information to be pushed according to a first preset grouping time period;
the second obtaining unit 4022 is configured to obtain a second alarm information set from the alarm information to be pushed according to a second preset grouping time period.
Secondly, in the embodiment of the present invention, when the server divides the alarm information to be pushed, one way is to obtain a first alarm information set from the alarm information to be pushed according to a first preset grouping time period, and obtain a second alarm information set from the alarm information to be pushed according to a second preset grouping time period, that is, to group the alarm information to be pushed according to the time periods. By the method, the plurality of alarm information sets can be effectively acquired, so that the corresponding URL addresses are respectively generated for the alarm information sets in the following process, and the practicability and feasibility of the scheme are improved.
Alternatively, on the basis of the embodiment corresponding to fig. 7, referring to fig. 9, in another embodiment of the server provided in the embodiment of the present invention,
the dividing module 402 comprises:
a third obtaining unit 4023, configured to obtain a first alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold;
a fourth obtaining unit 4024, configured to obtain a second alarm information set from the alarm information to be pushed according to the preset alarm information quantity threshold.
Secondly, in the embodiment of the present invention, when the server divides the alarm information to be pushed, one way is to obtain a first alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold, and similarly, obtain a second alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold, that is, group the alarm information to be pushed according to an upper limit of the quantity of the alarm information. By the method, the plurality of alarm information sets can be effectively acquired, so that the corresponding URL addresses are respectively generated for the alarm information sets in the following process, and the practicability and feasibility of the scheme are improved.
Optionally, on the basis of the embodiment corresponding to fig. 8 or fig. 9, referring to fig. 10, in another embodiment of the server provided in the embodiment of the present invention,
the partitioning module 402 further comprises:
the first generating unit 4025 is configured to generate a corresponding first address according to the first alarm information set after the first alarm information set is acquired from the alarm information to be pushed;
the second generating unit 4026 is configured to generate a corresponding second address according to the second alarm information set after the second alarm information set is acquired from the alarm information to be pushed.
In the embodiment of the present invention, after obtaining the first set of alarm information, the server generates a first address corresponding to the first set of alarm information, and after obtaining the second set of alarm information, generates a second address corresponding to the second set of alarm information. By the method, the anti-address is fixed, and the dynamic address is adopted to inquire the alarm information in the database, so that the condition of maliciously stealing the alarm information can be effectively reduced, and the safety of the scheme is improved.
Optionally, referring to fig. 11 on the basis of the embodiment corresponding to fig. 8, in another embodiment of the server provided in the embodiment of the present invention,
the server 40 further includes:
a receiving module 405, configured to receive a frequency limit configuration instruction sent by a second client before the dividing module 402 divides the alarm information to be pushed into at least one alarm information set according to a preset grouping rule;
a determining module 406, configured to determine a quantity threshold of the alarm information according to the frequency limit configuration instruction received by the receiving module 405, where the quantity threshold of the alarm information is used to determine a quantity upper limit for sending the alarm information in the first preset grouping time period and in the second preset grouping time period.
In the embodiment of the invention, the user can adjust the mode of dividing the alarm information set by the server through the second client, and the server determines the upper limit of the quantity of the alarm information in the preset grouping time according to the frequency limit configuration instruction sent by the second client. By the method, the frequency limit configuration of the alarm information can be carried out according to the working capacity of the server, so that the normal operation of the server is maintained, and the feasibility of the scheme is favorably improved.
Optionally, referring to fig. 12 on the basis of the embodiment corresponding to fig. 7, in another embodiment of the server provided in the embodiment of the present invention,
the server 40 further includes:
a detecting module 407, configured to detect a current load of the server;
a first sending module 408, configured to send an overload message to the second client if the load detected by the detection module is greater than or equal to a preset load threshold, where the overload message is used to indicate whether the second client triggers an alarm information retransmission request.
Secondly, in the embodiment of the invention, the server can also detect the load condition of the server in real time, and once the load is detected to be greater than or equal to the preset load threshold, the server can send the overload message to the second client, so that the second client can judge whether the alarm information needs to be retransmitted or not according to the overload message. Through the method, on one hand, the load condition of the server can be monitored in real time, and the condition that the server is crashed due to overlarge load is reduced, on the other hand, if the server is overloaded, the transmission of the alarm information can be failed, and then the second server can further select whether the alarm information needs to be retransmitted or not, so that the feasibility and the operability of the scheme are improved.
Optionally, referring to fig. 13 on the basis of the embodiment corresponding to fig. 7, in another embodiment of the server provided in the embodiment of the present invention,
the generating module 403 includes:
a fifth obtaining unit 4031, configured to obtain a target timestamp corresponding to the target alarm information set;
a third generating unit 4032, configured to encrypt the target alarm information set with the target timestamp acquired by the fifth acquiring unit 4031, and generate the target address.
Secondly, in the embodiment of the present invention, the server may further perform encryption processing on the target address by using the target timestamp in the process of generating the target address. By the method, the server sends the encrypted target address to the first client, so that the first client can use the encrypted target address only by decoding the encrypted target address, the safety of the scheme is further enhanced, and the conditions that the illegal client invades the database and obtains the sensitive alarm information are effectively resisted.
Optionally, on the basis of the embodiment corresponding to any one of fig. 7 to fig. 13, referring to fig. 14, in another embodiment of the server provided in the embodiment of the present invention,
the server 40 further includes:
a second sending module 409, configured to send the alarm information to be pushed to an alternative server after the obtaining module 401 obtains the alarm information to be pushed, so that the alternative server stores the alarm information to be pushed.
Further, in the embodiment of the present invention, the server may also send the alarm information to be pushed to the alternative server in real time, and the alternative server may store the alarm information to be pushed. By the mode, the framework of the main server and the alternative server is adopted, after the connection of the main server exceeds the upper limit of the current system load, the subsequent request can be automatically switched to the alternative server, and the alternative server performs processing similar to that of the main server according to the alarm information to be pushed, so that the stability of information pushing is guaranteed, and the reliability and the practicability of the scheme are enhanced.
Fig. 15 is a schematic diagram of a server 500 according to an embodiment of the present invention, which may have a relatively large difference due to different configurations or performances, and may include one or more CPUs 522 (e.g., one or more processors) and a memory 532, and one or more storage media 530 (e.g., one or more mass storage devices) for storing applications 542 or data 544. Memory 532 and storage media 530 may be, among other things, transient storage or persistent storage. The program stored on the storage medium 530 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 522 may be configured to communicate with the storage medium 530, and execute a series of instruction operations in the storage medium 530 on the server 500.
The server 500 may also include one or more power supplies 526, one or more wired or wireless network interfaces 550, one or more input-output interfaces 558, and/or one or more operating systems 541, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
The CPU 522 is configured to perform the following steps:
acquiring alarm information to be pushed;
dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information;
generating a corresponding target address according to a target alarm information set, wherein the target alarm information set is one of the at least one alarm information set;
pushing the target address to a first client, wherein the target address is used for the first client to inquire the target alarm information set.
Optionally, the CPU 522 is specifically configured to perform the following steps:
acquiring a first alarm information set from the alarm information to be pushed according to a first preset grouping time period;
and acquiring a second alarm information set from the alarm information to be pushed according to a second preset grouping time period.
Optionally, the CPU 522 is specifically configured to perform the following steps:
acquiring a first alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold;
and acquiring a second alarm information set from the alarm information to be pushed according to the preset alarm information quantity threshold value.
Optionally, the CPU 522 is specifically configured to perform the following steps:
generating a corresponding first address according to the first alarm information set;
after acquiring a second alarm information set from the alarm information to be pushed according to a second preset grouping time period, the method further includes:
and generating a corresponding second address according to the second alarm information set.
Optionally, the CPU 522 is further configured to perform the following steps:
receiving a frequency limit configuration instruction sent by a second client;
and determining the quantity threshold of the alarm information according to the frequency limit configuration instruction, wherein the quantity threshold of the alarm information is used for determining the upper limit of the quantity of the alarm information sent in the first preset grouping time period and the second preset grouping time period.
Optionally, the CPU 522 is further configured to perform the following steps:
detecting the current load capacity of a server;
and if the load is greater than or equal to a preset load threshold, sending an excessive load message to the second client, wherein the excessive load message is used for indicating whether the second client triggers an alarm information retransmission request.
Optionally, the CPU 522 is specifically configured to perform the following steps:
acquiring a target timestamp corresponding to the target alarm information set;
and encrypting the target alarm information set by adopting the target timestamp, and generating the target address.
Optionally, the CPU 522 is further configured to perform the following steps:
and sending the alarm information to be pushed to an alternative server so that the alternative server stores the alarm information to be pushed.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (13)

1. A method of information push, comprising:
acquiring alarm information to be pushed;
dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information;
acquiring a target timestamp corresponding to a target alarm information set, encrypting the target alarm information set by adopting the target timestamp, and generating an encrypted target address corresponding to the target alarm information set; the target alarm information set is one of the at least one alarm information set, and different alarm information sets correspond to different timestamps;
encrypting the target address by using the target timestamp;
and pushing the encrypted target address corresponding to each alarm information set in the at least one alarm information set to a first client, wherein the encrypted target address corresponding to the target alarm information set is used for the first client to inquire the target alarm information set.
2. The method according to claim 1, wherein the dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule comprises:
acquiring a first alarm information set from the alarm information to be pushed according to a first preset grouping time period;
and acquiring a second alarm information set from the alarm information to be pushed according to a second preset grouping time period.
3. The method according to claim 1, wherein the dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule comprises:
acquiring a first alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold;
and acquiring a second alarm information set from the alarm information to be pushed according to the preset alarm information quantity threshold value.
4. The method according to claim 2 or 3, wherein after obtaining the first set of alarm information from the alarm information to be pushed, the method further comprises:
generating a corresponding first address according to the first alarm information set;
after acquiring a second alarm information set from the alarm information to be pushed according to a second preset grouping time period, the method further includes:
and generating a corresponding second address according to the second alarm information set.
5. The method according to claim 2, wherein before dividing the alarm information to be pushed into at least one alarm information set according to a preset grouping rule, the method further comprises:
receiving a frequency limit configuration instruction sent by a second client;
and determining the quantity threshold of the alarm information according to the frequency limit configuration instruction, wherein the quantity threshold of the alarm information is used for determining the upper limit of the quantity of the alarm information sent in the first preset grouping time period and the second preset grouping time period.
6. The method of claim 1, further comprising:
detecting the current load capacity of a server;
and if the load is greater than or equal to a preset load threshold, sending an excessive load message to a second client, wherein the excessive load message is used for indicating whether the second client triggers an alarm information retransmission request.
7. The method according to claim 1, wherein after the obtaining of the alarm information to be pushed, the method further comprises:
and sending the alarm information to be pushed to an alternative server so that the alternative server stores the alarm information to be pushed.
8. A server, comprising:
the acquisition module is used for acquiring alarm information to be pushed;
the dividing module is used for dividing the alarm information to be pushed, which is acquired by the acquiring module, into at least one alarm information set according to a preset grouping rule, wherein the alarm information set comprises at least one piece of alarm information;
the generating module is used for acquiring a target timestamp corresponding to a target alarm information set, encrypting the target alarm information set by adopting the target timestamp and generating a target address corresponding to the encrypted target alarm information set; encrypting the target address by using the target timestamp; the target alarm information set is one of the at least one alarm information set obtained by the division of the division module, and different alarm information sets correspond to different timestamps;
and the pushing module is used for pushing the encrypted target address corresponding to each alarm information set in the at least one alarm information set generated by the generating module to a first client, wherein the encrypted target address corresponding to the target alarm information set is used for the first client to inquire the target alarm information set.
9. The server of claim 8, wherein the partitioning module comprises:
the first obtaining unit is used for obtaining a first alarm information set from the alarm information to be pushed according to a first preset grouping time period;
and the second obtaining unit is used for obtaining a second alarm information set from the alarm information to be pushed according to a second preset grouping time period.
10. The server of claim 8, wherein the partitioning module comprises:
the third acquiring unit is used for acquiring a first alarm information set from the alarm information to be pushed according to a preset alarm information quantity threshold;
and the fourth obtaining unit is used for obtaining a second alarm information set from the alarm information to be pushed according to the preset alarm information quantity threshold value.
11. The server according to claim 9 or 10, wherein the server further comprises:
the first generating unit is used for generating a corresponding first address according to the first alarm information set after the first alarm information set is acquired from the alarm information to be pushed;
and the second generating unit is used for generating a corresponding second address according to the second alarm information set after the second alarm information set is acquired from the alarm information to be pushed.
12. The server of claim 9, further comprising:
the receiving module is used for receiving a frequency limit configuration instruction sent by a second client before the dividing module divides the alarm information to be pushed into at least one alarm information set according to a preset grouping rule;
a determining module, configured to determine a quantity threshold of the alarm information according to the frequency limit configuration instruction received by the receiving module, where the quantity threshold of the alarm information is used to determine a quantity upper limit for sending the alarm information in the first preset grouping time period and in the second preset grouping time period.
13. The server of claim 8, further comprising:
the detection module is used for detecting the current load of the server;
and a first sending module, configured to send an overload message to a second client if the load detected by the detection module is greater than or equal to a preset load threshold, where the overload message is used to indicate whether the second client triggers an alarm information retransmission request.
CN201710304243.8A 2017-05-03 2017-05-03 Information pushing method and server Active CN108809678B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710304243.8A CN108809678B (en) 2017-05-03 2017-05-03 Information pushing method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710304243.8A CN108809678B (en) 2017-05-03 2017-05-03 Information pushing method and server

Publications (2)

Publication Number Publication Date
CN108809678A CN108809678A (en) 2018-11-13
CN108809678B true CN108809678B (en) 2021-04-30

Family

ID=64054420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710304243.8A Active CN108809678B (en) 2017-05-03 2017-05-03 Information pushing method and server

Country Status (1)

Country Link
CN (1) CN108809678B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468471B (en) * 2020-11-17 2022-11-22 中国建设银行股份有限公司 Remote authorization method and device
CN113141316B (en) * 2021-05-08 2023-04-07 浙江宇视科技有限公司 Alarm processing method, device and equipment and readable storage medium
CN115277836B (en) * 2022-08-03 2023-05-30 四川长虹新网科技有限责任公司 Distributed data pushing platform and method for geomagnetic parking system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999415A (en) * 2012-11-22 2013-03-27 江苏睿博数据技术有限公司 Method and device for optimizing alarm informing function
CN104157089A (en) * 2014-08-27 2014-11-19 苏州四维空间电子科技有限公司 Intelligent household security alarm unit and alarming method thereof

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2265250C1 (en) * 2004-12-24 2005-11-27 Общество с ограниченной ответственностью "АЛЬТОНИКА" (ООО "АЛЬТОНИКА") Method for transferring notifications when guarding a group of objects
CN102196373B (en) * 2010-03-04 2015-07-15 新奥特(北京)视频技术有限公司 Short message alarm system and short message alarm method
CN102693604B (en) * 2012-05-09 2014-03-26 中国安全生产科学研究院 Method of radio alarm
CN103258398B (en) * 2013-04-26 2016-01-20 安科智慧城市技术(中国)有限公司 A kind of internet alarm system of checking based on video and alarm method thereof
CN104348667B (en) * 2014-11-11 2017-12-29 上海新炬网络技术有限公司 Fault Locating Method based on warning information
CN105843803B (en) * 2015-01-12 2019-04-12 上海悦程信息技术有限公司 Big data secure visual interaction analysis system and method
CN105634822B (en) * 2016-01-15 2018-10-30 武汉烽火网络有限责任公司 The method and device of quick query warning information is realized based on alarm packets

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999415A (en) * 2012-11-22 2013-03-27 江苏睿博数据技术有限公司 Method and device for optimizing alarm informing function
CN104157089A (en) * 2014-08-27 2014-11-19 苏州四维空间电子科技有限公司 Intelligent household security alarm unit and alarming method thereof

Also Published As

Publication number Publication date
CN108809678A (en) 2018-11-13

Similar Documents

Publication Publication Date Title
US10554526B2 (en) Feature vector based anomaly detection in an information technology environment
US7565336B2 (en) Method and apparatus for measurement, analysis, and optimization of content delivery
US7650403B2 (en) System and method for client side monitoring of client server communications
US20090024722A1 (en) Proxying availability indications in a failover configuration
US9135133B2 (en) Metric object tracking system
CN108809678B (en) Information pushing method and server
EP2561645B1 (en) Integrated network data collection arrangement
CN106953758A (en) A kind of dynamic allocation management method and system based on Nginx servers
CN105610648B (en) A kind of acquisition method and server of O&M monitoring data
CN104954184A (en) Monitoring and alarming method and system for cloud background server cluster
CN110535713B (en) Monitoring management system and monitoring management method
WO2013019198A1 (en) Systems and methods for distributed rule-based correlation of events
CN103152352A (en) Perfect information security and forensics monitoring method and system based on cloud computing environment
US10776245B2 (en) Analyzing physical machine impact on business transaction performance
US20060277291A1 (en) System and method for monitoring networked devices employing RSS functionality
JP6220625B2 (en) Delay monitoring system and delay monitoring method
US9166991B2 (en) Identifying business transactions from traffic in an enterprise content management system
JP5304689B2 (en) Monitoring system and method for identifying affected services
WO2015000428A1 (en) Data processing method, server and system
US7826376B1 (en) Detection of network problems in a computing system
EP2721786A1 (en) Evaluation of overall performance of interactive application service
CN106559282A (en) A kind of lock file management method and device
CN109714228B (en) Global monitoring system for equipment and workers
US10992555B2 (en) Recording, replay, and sharing of live network monitoring views
CN109388546B (en) Method, device and system for processing faults of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant