CN109067587A - The determination method and device of key message infrastructure - Google Patents

The determination method and device of key message infrastructure Download PDF

Info

Publication number
CN109067587A
CN109067587A CN201810949504.6A CN201810949504A CN109067587A CN 109067587 A CN109067587 A CN 109067587A CN 201810949504 A CN201810949504 A CN 201810949504A CN 109067587 A CN109067587 A CN 109067587A
Authority
CN
China
Prior art keywords
data
candidate
information
functional module
key message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810949504.6A
Other languages
Chinese (zh)
Other versions
CN109067587B (en
Inventor
秦小伟
李佳
史波良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810949504.6A priority Critical patent/CN109067587B/en
Publication of CN109067587A publication Critical patent/CN109067587A/en
Application granted granted Critical
Publication of CN109067587B publication Critical patent/CN109067587B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of determination method and devices of key message infrastructure, in this method, by the transmission path for determining the core dataflow of support key business normal operation, then the network facilities that core dataflow is flowed through on the transmit path is obtained, the digital asset generated when information system and on the transmit path transmission, obtain candidate's element set, the candidate's element for meeting preset condition is screened from the candidate's element set later, to obtain object element, to determine the corresponding key message infrastructure of the key business according to the object element, through the above way, it can more precisely identify key message infrastructure, be conducive to improve the accuracy of protective policy, reduce the cost of network operator.

Description

The determination method and device of key message infrastructure
Technical field
The present invention relates to key message infrastructure technique fields, and in particular to a kind of determination of key message infrastructure Method and device.
Background technique
Key message infrastructure (Critical Information Infrastructure, CII) refer to the energy, The Domain relations such as communication, finance, traffic can specifically include network and set to the facility of national economy society normal safe operation Apply, information system and digital asset etc., key message infrastructure once by destroy, loss of function, leaking data, may Seriously endanger national security, national economy and public interest.It is required according to national policy, CII network operator needs to be responsible for country Department puts the CII concrete condition itself runed on record, carries out the work such as risk assessment, Safety Examination to CII, and which clear net It is to carry out the premise and basis of above-mentioned work that key message infrastructure, which should belong to, in network facility, information system and digital asset.
For example, supporting the key business to transport for a key business (such as instant messaging business or online payment business) The quantity of the capable network facilities, information system and digital asset may be more huge, if by all-network facility, information system and Digital asset is all attributed to CII, then also will be according to for some not important network facilities, information system and digital asset CII carries out maintenance operation, and unnecessary cost will be thus caused to network operator, can also allow safeguard measure that can not gather It is burnt;And if the network facilities, information system and the digital asset for arbitrarily choosing sub-fraction are classified as CII, then may will ignore Fall the important network facilities, information system and digital asset, the network facilities, information system and the digital asset for causing these important It cannot get effective protection.
In the research and practice process to the prior art, it was found by the inventors of the present invention that in the prior art, usually from The importance of industry, which is set out, identifies CII network operator, such as common carrier, state-owned large bank, high-speed railway transportation etc., because It is once often brought sternly to national security, economic development and social stability by network attack for the Operation Network of these enterprises Ghost image is rung, however by that can only identify CII network operator in industry importance, the vast number that can not possess from CII network operator The network facilities, information system and digital asset accurately choose the scope which should be included into CII, except greatly increasing CII The cost of network operator is with also to allow safeguard measure can not effective execution.
Summary of the invention
The embodiment of the present invention provides a kind of determination method and device of key message infrastructure, can more precisely know Not Chu key message infrastructure, be conducive to improve protective policy accuracy, reduce network operator's cost.
The embodiment of the present invention provides a kind of determination method of key message infrastructure, comprising:
Determine the transmission path for the core dataflow that support key business operates normally;
Obtain the network facilities, the information system and in the transmission that core dataflow is flowed through on the transmit path The digital asset generated when transmitting on path, obtains candidate's element set;
Screening meets the candidate's element of preset condition from the candidate's element set, to obtain object element;
The corresponding key message infrastructure of the key business is determined according to the object element.
The embodiment of the present invention also provides a kind of determining device of key message infrastructure, comprising:
First determining module, the transmission path of the core dataflow for determining support key business normal operation;
First obtains module, for obtaining the network facilities, the information that core dataflow is flowed through on the transmit path The digital asset generated when system and on the transmit path transmission, obtains candidate's element set;
Screening module, for screening the candidate's element for meeting preset condition from the candidate's element set, to obtain mesh Mark element;
Second determining module, for determining that the corresponding key message basis of the key business is set according to the object element It applies.
In the determination method of key message infrastructure of the present invention, by the core for determining support key business normal operation The transmission path of data flow, then obtain core dataflow flowed through on the transmit path the network facilities, information system and The digital asset generated when data flow is transmitted on the transmit path is determined for compliance with the time of preset condition to obtain candidate's element Element is selected, object element is obtained, the corresponding key message infrastructure of key business is determined according to object element, passes through above-mentioned side Formula, this programme can relatively accurately identify key message infrastructure, are conducive to the accuracy for improving protective policy, reduce The cost of network operator.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the schematic diagram of a scenario of the determination method of key message infrastructure provided in an embodiment of the present invention;
Fig. 2 is a flow diagram of the determination method of key message infrastructure provided in an embodiment of the present invention;
Fig. 3 is the pass of nine data phases in the determination method of key message infrastructure provided in an embodiment of the present invention It is schematic diagram;
Fig. 4 is in the determination method of key message infrastructure provided in an embodiment of the present invention, from candidate's element set Screening meets the flow diagram of the candidate's element of preset condition;
Fig. 5 is another flow diagram of the determination method of key message infrastructure provided in an embodiment of the present invention;
Fig. 6 is the description of functional module in the determination method of key message infrastructure provided in an embodiment of the present invention The structural schematic diagram of file;
Fig. 7 is in the determination method of key message infrastructure provided in an embodiment of the present invention, and key message basis is set Illustrate document in the presentation information applied shows form schematic diagram;
Fig. 8 is one structural schematic diagram of determining device of key message infrastructure provided in an embodiment of the present invention;
Fig. 9 is another structural schematic diagram of determining device of key message infrastructure provided in an embodiment of the present invention;
Figure 10 is the structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of determination method and device of key message infrastructure.The key message basis is set The determining device applied can integrate in the equipment such as server.
For example, as shown in Figure 1, the determining device of the key message infrastructure is being determined for support key business just The transmission path of the core dataflow often run, path shown in arrow as dashed, key business such as can be instant messaging Using the application of, mailbox, cloud storage application etc., the network facilities, the letter that core dataflow is flowed through on the transmit path are then obtained The digital asset generated when breath system and on the transmit path transmission, so that candidate's element is obtained, candidate's member as shown in the figure Plain A, B, C, D1, D2, E, F, G, H, I are determined for compliance with the candidate's element of condition later, to obtain object element, thus according to mesh Mark element determines the corresponding key message infrastructure of key business.By the above-mentioned means, the present invention is based on the cores of key business Heart data flow obtains candidate's element, and then screening obtains the object element for meeting preset condition from candidate's element, is closed with determining Key information infrastructure is conducive to improve protective policy it is possible thereby to more accurately determine out key message infrastructure Accuracy reduces the cost of network operator.
It is described in detail separately below.
Embodiment one,
The present embodiment will be described from the angle of server.
Referring to Fig.2, including the following steps: in the determination method of key message infrastructure of the present invention
S201, the transmission path for determining the core dataflow that support key business operates normally.
Key business such as can be instant messaging application, mailbox application or cloud storage application, etc..In the present embodiment, The data flow summation of nine data phases is defined as core dataflow, i.e., in the present embodiment, support key business is operated normally Core dataflow be divided into the data flow in nine data phases, in conjunction with Fig. 3, nine data phases include design data rank Section, data collection phase, external data import the stage, the Data Integration stage, data processing stage, data at this stage, other Application stage, phase data memory and data destroying stage.
Wherein, the design data stage is the source of core dataflow, and the data destroying stage is the terminal of core dataflow, respectively The data manipulation of data phase is mainly:
In the design data stage, primarily with respect to given application environment, such as instant messaging application, design is answered suitable for this With the optimal data mode of environment, enable effectively to store, circulate, to meet the application demand of various users.
Data collection phase, mainly by design data stage designed data collection gets up process.
External data imports the stage, mainly according to the demand of key business itself, collects in addition to business itself designs Data other than information data.
The Data Integration stage, mainly by the data of different several sources (i.e. data collection phase and external data import the stage) It arranged, cleaned, load obtains a new number source after conversion, to meet the requirement that information data is uniformly processed.
Data processing stage, mainly from it is a large amount of, may be to be extracted in rambling, elusive information data And it derives for certain specific valuable, significant information datas.
Data are in the final displaying mainly to data design phase target to be achieved at this stage.
The other application stage, mainly by information data other purposes other than above-mentioned final displaying for rendering.
Information data is mainly recorded on medium by phase data memory in a certain format
The process that data destroying stage, mainly information data wither away, is divided into two kinds, one is recoverable deletions, another Kind is irrecoverable deletion.
Wherein, according to the transmission subpath of the data flow between nine data phases, determine that support key business is normally transported The transmission subpath of the transmission path of capable core dataflow, i.e. data flow in nine data phases constitutes core dataflow Complete transmission path obtain the transmission path of core dataflow from there through each transmission subpath.
S202, obtain core dataflow flowed through on the transmit path the network facilities, information system and transmission road The digital asset generated when transmitting on diameter, obtains candidate's element set.
Wherein it is possible to the network flowed through on respective transmission subpath according to the data flow in above-mentioned nine data phases The digital asset that facility, information system and data flow are generated when transmitting on transmitting subpath, obtains core dataflow and is transmitting The network facilities, information system and the generated digital asset flowed through on path, to obtain candidate's element set.
Specifically, candidate's element set is the network facilities that data flow flows through in each data phase, information system The summation of system and generated digital asset.Wherein, what each candidate's element in candidate's element set represented is a net Network facility, an information system or a digital asset.Candidate's element set forms the corresponding key message of key business The maximum possible range (boundary) of infrastructure, i.e., in the all-network facility of support key business, information system and number money In production, the network facilities, information system and digital asset in candidate's element set most possibly form the corresponding pass of key business Key information infrastructure.
S203, screening meets the candidate's element of preset condition from candidate's element set, to obtain object element.
In order to improve the accuracy of key message infrastructure identification, in the present embodiment, further candidate's element is carried out Screening, to select the candidate's element for meeting preset condition.Specifically, the time for meeting preset condition is screened from candidate's element set Selecting element may include: to judge whether the data interaction of each candidate's element in candidate's element set belongs to the friendship of refusal formula data Mutually, slowly one of formula data interaction, the data interaction of mistake formula and leakage formula data interaction;If so, candidate's element meets Preset condition, if it is not, then candidate's element does not meet preset condition.
Wherein, refuse formula data interaction: referring to and lose basic function after candidate's element is destroyed, it completely can not be to its institute The key business of support provides information-based support.For example, the whistle control system (one kind of information system) of railway is destroyed After, early warning or stop sign can not be issued to train;After the condition of a disaster early warning system is destroyed, dangerous situation early warning number can not be provided According to can not also issue control instruction;Cloud service is broken down, and any type of access request etc. is refused.
Slow formula data interaction: basic function is not lost after candidate's element is attacked although referring to, with its institute Information exchange rate between the key business of support is lower than preset level.For example, network direct broadcasting business is in client kimonos Information (receive user's request and the video information on server is pushed to client) is transmitted between business device, if support is above-mentioned After the candidate's element of function is attacked, the rate of information throughput will lower, and show as user and submit request slowly or video Play pause etc..
Mistake formula data interaction: refer to that basic function is tampered after candidate's element is attacked, in the pass supported with it Error messageization support is provided between key business.For example, electric control system is guarantee power scheduling safety, once it is attacked After can to power supply system issue false command;Navigation system provides accurate location information for user, can provide mistake after under attack Accidentally location information;Online payment business is to draw fund in the account specified to user, if system is attacked, may be incited somebody to action The fund of number of errors be transferred to mistake account on etc..
Leakage formula data interaction:, can be by key business data information that it is supported after referring to that candidate's element is attacked It leaks out.For example, operational data storage is a critical function of cloud service, under normal circumstances only between authorized user into If under attack may provide information to illegal user leaking data occurs for row information interaction;Electronic medical system There are a large amount of patient informations, if attacked, it may occur that individual privacy leaking data etc..
In the present embodiment, judge whether the data interaction of candidate's element belongs to the data interaction of refusal formula, slow formula data are handed over Mutually, one of the data interaction of mistake formula and leakage formula data interaction, are to judge candidate's element after being destroyed or being attacked It whether is any one of the above situation, if illustrating than judging that the data interaction of candidate's element belongs to refusal formula data interaction Candidate's element loses basic function after being destroyed, can not provide the key business that it is supported information-based support completely, with This analogizes.
In conjunction with Fig. 4, judge whether the data interaction of each candidate's element in candidate's element set belongs to the friendship of refusal formula data Mutually, slowly one of formula data interaction, the data interaction of mistake formula and leakage formula data interaction, can specifically include: to candidate Element is destroyed or is attacked, and then judges whether the data interaction of candidate's element belongs to refusal formula data interaction, if so, waiting It selects element to meet preset condition, object element can be determined it as, if it is not, then further judging the data interaction of candidate's element is It is no to belong to slow formula data interaction, if so, candidate's element meets preset condition, object element can be determined it as, if it is not, then Further judge whether the data interaction of candidate's element belongs to mistake formula formula data interaction, and so on.
Therefore, in the present embodiment, when the data interaction of candidate's element belongs to any one in above-mentioned four kinds of data interactions, It can determine that candidate's element meets preset condition, object element can be determined it as, when the data interaction of candidate's element does not belong to Any one in above-mentioned four kinds of data interactions, then candidate's element does not meet preset condition, not as object element.By upper State mode, the available object element for meeting preset condition.
S204, the corresponding key message infrastructure of key business is determined according to object element.
Wherein, the key message basis that the set of all object elements is determined as that key business is supported to operate normally is set It applies, i.e., in the present embodiment, all-network facility, information system and the digital group of assets of preset condition is met in candidate's element set At the key message infrastructure of key business.
The present embodiment first determines candidate's element set, i.e. key message basis by the core dataflow of key business Most have in the maximum possible range of facility, namely the support all-network facility of key business, information system and volume digital asset The part network facilities, information system and volume digital asset of key message infrastructure may be formed, then further from The object element for meeting preset condition is filtered out in candidate's element set, and then obtains the corresponding key message basis of key business Facility is conducive to the accuracy for improving protective policy, reduces it is possible thereby to more accurately determine out key message infrastructure The cost of network operator, and be conducive to improve the security protection of key message infrastructure.
Further, after step 204, further comprising the steps of as shown in figure 5, in another embodiment of the present invention:
S205, acquisition and the presentation information for exporting key message infrastructure, it includes object element list letter that information, which is presented, Breath.
Wherein, there are many modes of output presentation information, for example it can be and directly show the presentation information on the screen, or Person stores in the form of a file by information is presented, or can also be and exported by way of printing.
In the present embodiment, the presentation information of key message infrastructure can also include the name of key message infrastructure Claim, the operation information of contact information and key business.Wherein, the title of key message infrastructure can be by network operator It passes, or can also be obtained according to the profile information of key business, for example describe key in the profile information of key business Business is used for power scheduling, then the title of the key message infrastructure obtained can be power scheduling commander etc..Wherein, one In kind implementation, contact information, the operation information of key business and object element list information can be documented in one and say In plaintext shelves, therefore the presentation information of key message infrastructure includes title and illustrates document.
Wherein, object element list information is believed for the inventory for the object element for being included about key message infrastructure Breath, for example can be the name list that object element is formed using the title of object element, and then obtain object element list letter It ceases, and the function introduction of corresponding object element can be added by the title of name list, it is possible thereby to displaying target element Title and function introduction.Alternatively, in another implementation, object element can be sorted out according to function, then It is shown categorizing information as object element list information.
Specifically, it obtains and the presentation information for exporting key message infrastructure may comprise steps of:
(11) functional type information of each object element is obtained, with the function type of each object element of determination.
Which kind of function the function type namely object element of object element are accomplished that, for example instant messaging is answered With having the network facilities or password management system for realizing cryptosecurity management, have and sent and received for realizing information Receive-transmit system, etc..The functional type information of object element can be to be uploaded by network operator, for example is set a network is arranged When imposing realization information transmit-receive, network operator can upload the functional type information of the network facilities;Or it can also be according to target The function that element is realized determines its function type, and then obtains functional type information.
(12) according to the function type of each object element, function division is carried out to all object elements, to obtain at least one One or more levels a functional module, and generate each functional module retouches file, wherein the description file of functional module includes function The title of module, the description file for illustrating document and next stage functional module, functional module illustrate that document includes function mould The functional circuit information of block, network topology structure schematic diagram and comprising object element inventory.
In the present embodiment, object element is the network facilities, information system or digital asset.For example, can be by identical function The network facilities of type is classified as same class, obtains a functional module, and the information system of identical function type is classified as same class, Another functional module is obtained, thus all object elements are divided according to function type, to obtain multiple functional modules, Each functional module includes one or more object elements.
Further, obtained multiple functional modules can also further be sorted out, to obtain comprising multiple functional modules Big functional module, so that the multistage functional module about object element is obtained, for example, the object element in functional module A is equal For the network facilities of Password Management type, the object element in functional module B is the information system of Password Management type, function Modules A and functional module B are the functional module of Password Management type, can be formed functional module A and functional module B at this time Functional module C, i.e. functional module A and functional module B one big are the next stage functional module of functional module C.
As shown in fig. 6, the description file of functional module includes the title of functional module, illustrates document and next stage function The description file of module, wherein illustrating the functional circuit information in document including the same level functional module, network topology structure signal Figure and comprising object element inventory, wherein the inventory of the object element does not include the target that next functional module is included Element.
(13) it according to the description file of maximum level functional module, obtains functional module and describes listed files, and then obtain mesh Mark element list information.
Wherein, functional module describes listed files namely is formed by text by the description file of each maximum level functional module Part list.In the present embodiment, listed files is described into as object element list information for functional module.It exports in manner shown For the presentation information of key message infrastructure, in the present embodiment, when showing the presentation information of key message infrastructure, Shown object element list information is that functional module describes listed files, namely the description by each maximum level functional module File is formed by listed files.
It should be noted that although the present embodiment is that the description file of each maximum level functional module is formed by file List is shown as object element list information, however further comprises next stage in the description file of maximum level functional module The description file and the network topology structure schematic diagram of the same level functional module etc. of functional module, therefore shown presentation information In also imply content included in the description file of maximum level functional module, can pass through and click maximum level functional module Description file shows its content for being included.
For example, showing explanation included in the presentation information when showing the presentation information of key message infrastructure The form that shows of document can be as shown in Figure 7, wherein 71 illustrate that the content of document is shown for key message infrastructure in figure Interface, object element list information are the list for referring to the description file of each maximum level functional module.Wherein it is possible in content The description file of some functional module is clicked in display interface 71 to open this and describe file, such as click function module 1 is retouched After stating file, by the content in the description file for showing functional module 1, content presentation interface represented by as shown in the figure 72. It can illustrate document in the content presentation interface 72 with opening function module 1, this illustrates in the content interface such as figure of document Shown in 73, in the content presentation interface 73 for illustrating document of functional module 1, it can view about the specific of functional module 1 The object element etc. that function introduction, its network topology structure figure and the functional module are included.
Wherein, as shown in fig. 7, in the content presentation interface 71 for illustrating document of key message infrastructure, function mould The description file of block 1 can be one and be mounted with Name Documents, illustrate document and the text of the description file of next stage functional module Part folder, or it is also possible to the chained address for linking to content presentation interface 72, and the explanation in content presentation interface 72 Document can be a text document, or be also possible to the chained address for linking to content presentation interface 73.
Wherein, when certain previous functional modules, which does not include, next stage functional module, the description file of this grade of functional module It can be the only title including functional module and illustrate document.
The essential information of key message infrastructure through this embodiment can be convenient quickly access key message base The concrete condition of each object element included in Infrastructure.
In the above-described embodiments, what core dataflow was chosen is the data flow in nine data phases, in its of the invention In his embodiment, the core dataflow of key business is also possible to generated all data flows when key business operation, therefore According to the obtained candidate's element set of core dataflow can for the support all-network facility of key business, information system and The summation of digital asset.
Embodiment two,
The present embodiment will be described from the angle of server.
Refering to Fig. 8, the determining device of the key message infrastructure of the present embodiment includes the first determining module 801, first Obtain module 802, screening module 803 and the second determining module 804.
Wherein, the transmission road of core dataflow of first determining module 801 for determining support key business normal operation Diameter.Wherein, the data flow summation of nine data phases is defined as core dataflow, i.e., in the present embodiment, supports key business The core dataflow of normal operation is divided into the data flow in nine data phases, and the first determining module 801 is specifically used for basis The transmission subpath of data flow between nine data phases determines the biography for the core dataflow that support key business operates normally Defeated path.Nine data phases include design data stage, data collection phase, external data remittance stage, Data Integration rank Section, data processing stage, data at this stage, other application stage, phase data memory and data destroying stage.Wherein, The design data stage is the source of core dataflow, and the data destroying stage is the terminal of core dataflow.
First acquisition module 802 is for obtaining the network facilities, the information system that core dataflow is flowed through on the transmit path The digital asset generated when system and on the transmit path transmission, obtains candidate's element set.Specifically, first module is obtained 802 can be used for according to the data flow in above-mentioned nine data phases it is respective transmission subpath on flow through the network facilities, The digital asset that information system and data flow are generated when transmitting on transmitting subpath, obtains core dataflow on the transmit path The network facilities, information system and the generated digital asset flowed through, to obtain candidate's element set.Candidate's element set is For flowed through in each data phase inner core data flow the network facilities, information system and in each data phase produced by Digital asset summation comprising the all-network facility and information system that core dataflow is flowed through, and being transmitted across Generated all digital assets in journey.
Screening module 803 meets the candidate's element of preset condition for screening from candidate's element set, to obtain target Element.In the present embodiment, further candidate's element is screened, to select the candidate's element for meeting preset condition.Specifically, Screening module 803 is specifically used for judging whether the data interaction of each candidate's element in candidate's element set belongs to refusal formula data One of interactive, slow formula data interaction, the data interaction of mistake formula and leakage formula data interaction;If so, candidate's element accords with Preset condition is closed, if it is not, then candidate's element does not meet preset condition.
Therefore, in the present embodiment, when the data interaction of candidate's element belongs to any one in above-mentioned four kinds of data interactions, It can determine that candidate's element meets preset condition, object element can be determined it as, when the data interaction of candidate's element does not belong to Any one in above-mentioned four kinds of data interactions, then candidate's element does not meet preset condition, not as object element.By upper State mode, the available object element for meeting preset condition.
Second determining module 804 is used to determine the corresponding key message infrastructure of key business according to object element.Tool Body, the second determining module 804 is used to for the set of all object elements to be determined as the key for supporting key business to operate normally Information infrastructure, i.e., in the present embodiment, meet in candidate's element set the all-network facility of preset condition, information system and Digital asset constitutes the key message infrastructure of key business.
The present embodiment first determines candidate's element set, i.e. key message basis by the core dataflow of key business Most have in the maximum possible range of facility, namely the support all-network facility of key business, information system and volume digital asset The part network facilities, information system and volume digital asset of key message infrastructure may be formed, then further from The object element for meeting preset condition is filtered out in candidate's element set, and then obtains the corresponding key message basis of key business Facility is conducive to the accuracy for improving protective policy, reduces it is possible thereby to more accurately determine out key message infrastructure The cost of network operator.
Further, refering to Fig. 9, the determining device of the embodiment of the present invention can also include output module 805, for obtaining And the presentation information of key message infrastructure is exported, it includes object element list information that information, which is presented,.Wherein, letter is presented in output There are many modes of breath, for example can be and directly show the presentation information on the screen, or information will be presented with the shape of file Formula is stored, or be can also be and exported by way of printing.
In the present embodiment, the presentation information of key message infrastructure can also include the name of key message infrastructure Claim, the operation information of contact information and key business.Wherein, the title of key message infrastructure can be by network operator It passes, or can also be obtained according to the profile information of key business, for example describe key in the profile information of key business Business is used for power scheduling, then the title of the key message infrastructure obtained can be power scheduling commander etc..Wherein, one In kind implementation, contact information, the operation information of key business and object element list information can be documented in one and say In plaintext shelves, therefore the presentation information of key message infrastructure includes title and illustrates document.
Wherein, object element list information is believed for the inventory for the object element for being included about key message infrastructure Breath, for example can be the name list that object element is formed using the title of object element, and then obtain object element list letter It ceases, and the function introduction of corresponding object element can be added by the title of name list, it is possible thereby to displaying target element Title and function introduction.Alternatively, in another implementation, object element can be sorted out according to function, then It is shown categorizing information as object element list information.
Specifically, output module 805 can be used for obtaining the functional type information of each object element, with each target element of determination The function type of element;Then according to the function type of each object element, function division is carried out to all object elements, with obtain to Few one or more levels functional module, and generate each functional module retouches file, wherein the description file of functional module includes The title of functional module, the description file for illustrating document and next stage functional module, functional module illustrate that document includes function Can the functional circuit information of module, network topology structure schematic diagram and comprising object element inventory;Later according to maximum The description file of grade functional module obtains functional module and describes listed files, and then obtains object element list information.
In the present embodiment, output module 805 exports the presentation information in manner shown.For example, in display key message When the presentation information of infrastructure, show illustrate included in the presentation information document can with as shown in fig. 7, wherein it is possible to The description file of some functional module is clicked in the content presentation interface 71 for illustrating document of key message infrastructure to beat It opens after this describes file, such as the description file of click function module 1, will show the content in the description file of functional module 1, Content presentation interface represented by as shown in the figure 72.It can be with the explanation of opening function module 1 in the content presentation interface 72 Document, this illustrates the content interface of document as shown in 73 in figure, in the content presentation interface 73 for illustrating document of functional module 1 In, can view the concrete function introduction about functional module 1, its network topology structure figure and the functional module is included Object element etc..
The essential information of key message infrastructure through this embodiment can be convenient quickly access key message base The concrete condition of each object element included in Infrastructure.
Embodiment three,
The embodiment of the present invention also provides a kind of server, and as shown in Figure 10, it illustrates involved in the embodiment of the present invention The structural schematic diagram of server, specifically:
The server may include one or processor 1001, one or more meters of more than one processing core The components such as memory 1002, power supply 1003 and the input unit 1004 of calculation machine readable storage medium storing program for executing.Those skilled in the art can be with Understand, server architecture shown in Figure 10 does not constitute the restriction to server, may include more more or fewer than illustrating Component perhaps combines certain components or different component layouts.Wherein:
Processor 1001 is the control centre of the server, utilizes each of various interfaces and the entire server of connection Part by running or execute the software program and/or module that are stored in memory 1002, and calls and is stored in memory Data in 1002, the various functions and processing data of execute server, to carry out integral monitoring to server.Optionally, Processor 1001 may include one or more processing cores;Preferably, processor 1001 can integrate application processor and modulatedemodulate Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1001.
Memory 1002 can be used for storing software program and module, and processor 1001 is stored in memory by operation 1002 software program and module, thereby executing various function application and data processing.Memory 1002 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for server Data etc..In addition, memory 1002 may include high-speed random access memory, it can also include nonvolatile memory, A for example, at least disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 1002 It can also include Memory Controller, to provide access of the processor 1001 to memory 1002.
Server further includes the power supply 1003 powered to all parts, it is preferred that power supply 1003 can pass through power management System and processor 1001 are logically contiguous, to realize management charging, electric discharge and power managed etc. by power-supply management system Function.Power supply 1003 can also include one or more direct current or AC power source, recharging system, power failure monitor The random components such as circuit, power adapter or inverter, power supply status indicator.
The server may also include input unit 1004, which can be used for receiving the number or character of input Information, and generate keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal Input.
Although being not shown, server can also be including display unit etc., and details are not described herein.Specifically in the present embodiment, Processor 1001 in server can according to following instruction, by the process of one or more application program is corresponding can It executes file to be loaded into memory 1002, and runs the application program being stored in memory 1002 by processor 1001, It is as follows to realize various functions:
It determines the transmission path for the core dataflow that support key business operates normally, then obtains core dataflow and passing The digital asset that the network facilities that is flowed through on defeated path, information system and while transmitting on the transmit path generate, is waited Element set is selected, screens the candidate's element for meeting preset condition from candidate's element set later, to obtain object element, thus The corresponding key message infrastructure of key business is determined according to object element.
Wherein it is possible to judge whether the data interaction of each candidate's element in candidate's element set belongs to the friendship of refusal formula data Mutually, slowly one of formula data interaction, the data interaction of mistake formula and leakage formula data interaction;If so, candidate's element meets Preset condition;If it is not, then candidate's element does not meet preset condition.
Wherein it is possible to determine that support key business is normal according to the transmission subpath of the data flow in nine data phases Then the transmission path of the core dataflow of operation can flow on each transmission subpath according to the data flow in each data phase The network facilities, information system and the generated digital asset of warp, obtain the network that core dataflow flows through on the transmit path Facility, information system and generated digital asset.
Wherein, after determining key message infrastructure, it can also obtain and export the key message infrastructure Presentation information, the presentation information includes object element list information.
Wherein, the acquisition modes of object element list information can such as be believed by obtaining the function type of each object element Breath, then according to the function type of each object element, carries out all object elements with the function type of each object element of determination Function division to obtain one or more functions module, and generates the description file of each functional module, wherein functional module Describing file includes the title of functional module, the description file for illustrating document and next stage functional module, and functional module is said Plaintext shelves include the functional circuit information of functional module, network topology structure schematic diagram and comprising object element inventory, To functional module be obtained and describe listed files according to the description file of maximum level functional module, and then obtain object element column Table information.
The present embodiment first determines candidate's element set, i.e. key message basis by the core dataflow of key business Most have in the maximum possible range of facility, namely the support all-network facility of key business, information system and volume digital asset The part network facilities, information system and volume digital asset of key message infrastructure may be formed, then further from The object element for meeting preset condition is filtered out in candidate's element set, and then obtains the corresponding key message basis of key business Facility is conducive to the accuracy for improving protective policy, reduces it is possible thereby to more accurately determine out key message infrastructure The cost of network operator.
Example IV,
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be processed Device is loaded, to execute the step in the determination method of any key message infrastructure provided by the embodiment of the present invention Suddenly.For example, the instruction can be with following steps:
It determines the transmission path for the core dataflow that support key business operates normally, then obtains core dataflow and passing The digital asset that the network facilities that is flowed through on defeated path, information system and while transmitting on the transmit path generate, is waited Element set is selected, screens the candidate's element for meeting preset condition from candidate's element set later, to obtain object element, thus The corresponding key message infrastructure of key business is determined according to object element.
Wherein it is possible to judge whether the data interaction of each candidate's element in candidate's element set belongs to the friendship of refusal formula data Mutually, slowly one of formula data interaction, the data interaction of mistake formula and leakage formula data interaction;If so, candidate's element meets Preset condition;If it is not, then candidate's element does not meet preset condition.
Wherein it is possible to determine that support key business is normal according to the transmission subpath of the data flow in nine data phases Then the transmission path of the core dataflow of operation can flow on each transmission subpath according to the data flow in each data phase The network facilities, information system and the generated digital asset of warp, obtain the network that core dataflow flows through on the transmit path Facility, information system and generated digital asset.
Wherein, after determining key message infrastructure, it can also obtain and export the key message infrastructure Presentation information, the presentation information includes object element list information.
Wherein, the acquisition modes of object element list information can such as be believed by obtaining the function type of each object element Breath, then according to the function type of each object element, carries out all object elements with the function type of each object element of determination Function division to obtain one or more functions module, and generates the description file of each functional module, wherein functional module Describing file includes the title of functional module, the description file for illustrating document and next stage functional module, and functional module is said Plaintext shelves include the functional circuit information of functional module, network topology structure schematic diagram and comprising object element inventory, To functional module be obtained and describe listed files according to the description file of maximum level functional module, and then obtain object element column Table information.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any crucial letter provided by the embodiment of the present invention can be executed The step in the determination method of infrastructure is ceased, it is thereby achieved that any key message provided by the embodiment of the present invention Beneficial effect achieved by the determination method of infrastructure, is detailed in the embodiment of front, details are not described herein.
The determination method and device for being provided for the embodiments of the invention a kind of key message infrastructure above carries out It is discussed in detail, used herein a specific example illustrates the principle and implementation of the invention, above embodiments Illustrate to be merely used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to this The thought of invention, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification is not answered It is interpreted as limitation of the present invention.

Claims (12)

1. a kind of determination method of key message infrastructure characterized by comprising
Determine the transmission path for the core dataflow that support key business operates normally;
Obtain the network facilities, the information system and in the transmission path that core dataflow is flowed through on the transmit path The digital asset generated when upper transmission obtains candidate's element set;
Screening meets the candidate's element of preset condition from the candidate's element set, to obtain object element;
The corresponding key message infrastructure of the key business is determined according to the object element.
2. the method according to claim 1, wherein it is described from the candidate's element set screening meet it is default The candidate's element of condition, comprising:
Judge whether the data interaction of each candidate's element in the candidate's element set belongs to the data interaction of refusal formula, slow formula One of data interaction, the data interaction of mistake formula and leakage formula data interaction;
If so, the candidate's element meets preset condition;If it is not, then the candidate's element does not meet preset condition.
3. the method according to claim 1, wherein the core number that the determining support key business operates normally According to the transmission path of stream, comprising:
According to the transmission subpath of the data flow in nine data phases, the core data that support key business operates normally is determined The transmission path of stream, nine data phases include the design data stage, data collection phase, external data import the stage, The Data Integration stage, data processing stage, data at this stage, other application stage, phase data memory and data destroying Stage;
It is described to obtain the network facilities, the information system and in the transmission that core dataflow is flowed through on the transmit path The digital asset generated when being transmitted on path, comprising: according to the data flow in each data phase on each sub- road of transmission The network facilities, information system and the generated digital asset flowed through on diameter, obtains core dataflow on the transmit path The network facilities, information system and the generated digital asset flowed through.
4. the method according to claim 1, wherein determining the key business pair according to the object element After the key message infrastructure answered, further includes:
The presentation information of the key message infrastructure is obtained and exports, the presentation information includes object element list letter Breath.
5. according to the method described in claim 4, it is characterized in that, described obtain and export the key message infrastructure Information is presented, comprising:
The functional type information of each object element is obtained, with the function type of each object element of determination;
According to the function type of each object element, function division is carried out to all object elements, to obtain at least one One or more levels a functional module, and generate the description file of each functional module, wherein the description text of the functional module Part includes the title of functional module, the description file for illustrating document and next stage functional module, the explanation of the functional module Document include the functional circuit information of the functional module, network topology structure schematic diagram and comprising object element it is clear It is single;
It according to the description file of maximum level functional module, obtains functional module and describes listed files, and then obtain object element column Table information.
6. method according to claim 4, which is characterized in that described that the name that information further includes key message infrastructure is presented Title, contact information and the operation information of key business.
7. a kind of determining device of key message infrastructure characterized by comprising
First determining module, the transmission path of the core dataflow for determining support key business normal operation;
First obtains module, for obtaining the network facilities, the information system that core dataflow is flowed through on the transmit path And the digital asset generated when transmitting on the transmit path, obtain candidate's element set;
Screening module, for screening the candidate's element for meeting preset condition from the candidate's element set, to obtain target element Element;
Second determining module, for determining the corresponding key message infrastructure of the key business according to the object element.
8. device according to claim 7, which is characterized in that the screening module is specifically used for:
Judge whether the data interaction of each candidate's element in the candidate's element set belongs to the data interaction of refusal formula, slow formula One of data interaction, the data interaction of mistake formula and leakage formula data interaction;
If so, the candidate's element meets preset condition;If it is not, then the candidate's element does not meet preset condition.
9. device according to claim 7, which is characterized in that first determining module is specifically used for according to nine data The transmission subpath of data flow in stage determines the transmission path for the core dataflow that support key business operates normally, institute Stating nine data phases includes design data stage, data collection phase, external data remittance stage, Data Integration stage, number According to processing stage, data at this stage, other application stage, phase data memory and data destroying stage;
Described first, which obtains module, is specifically used for according to the data flow in each data phase on each transmission subpath The network facilities, information system and the generated digital asset flowed through, obtains core dataflow and flows through on the transmit path The network facilities, information system and generated digital asset.
10. device according to claim 7, which is characterized in that further include:
Output module, for obtaining and exporting the presentation information of the key message infrastructure, the presentation information includes mesh Mark element list information.
11. device according to claim 10, which is characterized in that the output module is specifically used for:
The functional type information of each object element is obtained, with the function type of each object element of determination;
According to the function type of each object element, function division is carried out to all object elements, to obtain at least one One or more levels a functional module, and generate the description file of each functional module, wherein the description text of the functional module Part includes the title of functional module, the description file for illustrating document and next stage functional module, the explanation of the functional module Document include the functional circuit information of the functional module, network topology structure schematic diagram and comprising object element it is clear It is single;
It according to the description file of maximum level functional module, obtains functional module and describes listed files, and then obtain object element column Table information.
12. device according to claim 10, which is characterized in that the presentation information further includes key message infrastructure Title, contact information and the operation information of key business.
CN201810949504.6A 2018-08-20 2018-08-20 Method and device for determining key information infrastructure Active CN109067587B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810949504.6A CN109067587B (en) 2018-08-20 2018-08-20 Method and device for determining key information infrastructure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810949504.6A CN109067587B (en) 2018-08-20 2018-08-20 Method and device for determining key information infrastructure

Publications (2)

Publication Number Publication Date
CN109067587A true CN109067587A (en) 2018-12-21
CN109067587B CN109067587B (en) 2020-09-04

Family

ID=64687531

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810949504.6A Active CN109067587B (en) 2018-08-20 2018-08-20 Method and device for determining key information infrastructure

Country Status (1)

Country Link
CN (1) CN109067587B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334904A (en) * 2019-05-30 2019-10-15 北京理工大学 Key message types of infrastructures unit based on LightGBM belongs to determination method
CN112686468A (en) * 2021-01-14 2021-04-20 浙江工商大学 Public facility stability optimization method
CN117914625A (en) * 2024-03-11 2024-04-19 四川九洲视讯科技有限责任公司 Network security situation assessment method and system based on key information infrastructure

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587488A (en) * 2009-05-25 2009-11-25 深圳市腾讯计算机系统有限公司 Method and device for detecting re-orientation of page in search engine
US20110153748A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Remote forensics system based on network
CN102799834A (en) * 2012-06-07 2012-11-28 天津大学 System-asset-based software security requirement analysis method
CN103970872A (en) * 2014-05-13 2014-08-06 上海新炬网络技术有限公司 Multi-level data processing method based on service aperture
CN104636663A (en) * 2014-12-29 2015-05-20 国家电网公司 Security threat analyzing method based on service data stream model
CN105868373A (en) * 2016-03-31 2016-08-17 国网江西省电力公司信息通信分公司 Method and device for processing key data of power service information system
CN106789322A (en) * 2017-01-05 2017-05-31 清华大学 The determination method and apparatus of key node in Information Network
CN108270605A (en) * 2016-12-31 2018-07-10 中国移动通信集团山西有限公司 The determining method, apparatus and equipment of a kind of important network element

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587488A (en) * 2009-05-25 2009-11-25 深圳市腾讯计算机系统有限公司 Method and device for detecting re-orientation of page in search engine
US20110153748A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Remote forensics system based on network
CN102799834A (en) * 2012-06-07 2012-11-28 天津大学 System-asset-based software security requirement analysis method
CN103970872A (en) * 2014-05-13 2014-08-06 上海新炬网络技术有限公司 Multi-level data processing method based on service aperture
CN104636663A (en) * 2014-12-29 2015-05-20 国家电网公司 Security threat analyzing method based on service data stream model
CN105868373A (en) * 2016-03-31 2016-08-17 国网江西省电力公司信息通信分公司 Method and device for processing key data of power service information system
CN108270605A (en) * 2016-12-31 2018-07-10 中国移动通信集团山西有限公司 The determining method, apparatus and equipment of a kind of important network element
CN106789322A (en) * 2017-01-05 2017-05-31 清华大学 The determination method and apparatus of key node in Information Network

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334904A (en) * 2019-05-30 2019-10-15 北京理工大学 Key message types of infrastructures unit based on LightGBM belongs to determination method
CN112686468A (en) * 2021-01-14 2021-04-20 浙江工商大学 Public facility stability optimization method
CN112686468B (en) * 2021-01-14 2023-05-26 浙江工商大学 Public facility stability optimization method
CN117914625A (en) * 2024-03-11 2024-04-19 四川九洲视讯科技有限责任公司 Network security situation assessment method and system based on key information infrastructure
CN117914625B (en) * 2024-03-11 2024-05-24 四川九洲视讯科技有限责任公司 Network security situation assessment method and system based on key information infrastructure

Also Published As

Publication number Publication date
CN109067587B (en) 2020-09-04

Similar Documents

Publication Publication Date Title
CN104809597B (en) Data resource management platform based on data fusion
CN106815125A (en) A kind of log audit method and platform
US20200042726A1 (en) Information processing apparatus and method for processing information
CN109067587A (en) The determination method and device of key message infrastructure
CN106228340A (en) Construction drawing digitized auditing system
KR20200057903A (en) Artificial intelligence model platform and operation method thereof
CN103366247B (en) Standard Effective judgement system and method
CN109254901B (en) A kind of Monitoring Indexes method and system
CN110113188A (en) Across subdomain communication O&M method, total O&M server and medium
CN106231074A (en) A kind of method and device of Message Processing
CN110222498A (en) A kind of supervision management system and method based on mobile interchange cloud
CN109493224A (en) A kind of block chain picture social intercourse system
CN108199860A (en) A kind of alert processing method and the network equipment
CN106817388A (en) The system that virtual machine, host obtain the method, device and access data of data
CN109918384A (en) A kind of method of data synchronization and its equipment, storage medium, electronic equipment
CN109460400A (en) System and method is established in a kind of electric power monitoring system security baseline library
Mantha et al. Cybersecurity in construction: Where do we stand and how do we get better prepared
CN104113866B (en) The processing method and processing device of wireless controller daily record
CN109753819A (en) A kind for the treatment of method and apparatus of access control policy
CN116664060A (en) Method, system and device for generating expense reimbursement basic data
CN109582406A (en) Use the safety survey based on drama of tabulating equipment frame
CN111552956B (en) Role authority control method and device for background management
CN108170838A (en) The visualization that topic develops shows method, application server and computer readable storage medium
CN107977831A (en) Management method, device, computer-readable storage medium and the electronic equipment of contract
CN107633411A (en) Authentication administrative system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant