CN109587130A - One kind being based on the consistent integrated operation support system of RTI space-time - Google Patents

One kind being based on the consistent integrated operation support system of RTI space-time Download PDF

Info

Publication number
CN109587130A
CN109587130A CN201811444267.4A CN201811444267A CN109587130A CN 109587130 A CN109587130 A CN 109587130A CN 201811444267 A CN201811444267 A CN 201811444267A CN 109587130 A CN109587130 A CN 109587130A
Authority
CN
China
Prior art keywords
mobile terminal
user
data
time
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811444267.4A
Other languages
Chinese (zh)
Other versions
CN109587130B (en
Inventor
杨灵运
文杰
张昌福
邓生雄
杨文峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUIZHOU CASICLOUD TECHNOLOGY Co.,Ltd.
Original Assignee
Guizhou Aerospace Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Aerospace Cloud Network Technology Co Ltd filed Critical Guizhou Aerospace Cloud Network Technology Co Ltd
Priority to CN201811444267.4A priority Critical patent/CN109587130B/en
Publication of CN109587130A publication Critical patent/CN109587130A/en
Application granted granted Critical
Publication of CN109587130B publication Critical patent/CN109587130B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses one kind to be based on the consistent integrated operation support system of RTI space-time, including data acquisition module, data processing module, data transmission module and risk control module, structure of the invention is scientific and reasonable, it is safe and convenient to use, the account information that user is logged in mobile terminal by mobile terminal information acquisition module, IP address, request time and request content are acquired, and collected data are stored in mobile client information storage center, the request issued according to user in mobile terminal, pass through mobile terminal data processing unit, and extract the data of mobile client information storage center, carry out data processing, by user after the request that mobile terminal issues is handled, cloud is transmitted to by Ethernet, carry out data interaction, when user is traded by mobile terminal, it is monitored when can trade to mobile terminal, and it is handing over When easily containing risky, reminder announced is carried out to user by mobile terminal.

Description

One kind being based on the consistent integrated operation support system of RTI space-time
Technical field
The present invention relates to computer network science and technology fields, specially a kind of to be based on the consistent integrated operation of RTI space-time Support system.
Background technique
High level simulation architecture is the Main way of current Large Scale Distributed Simulations technology, high-rise emulation system at present The verified requirement that can satisfy interoperability and reusability in many applications of design of well-formed, however, when in face of real When Simulation Application when, high-rise simulation architecture also shows apparent weakness, and high-rise simulation architecture specification is real-time Property on specific rule is not provided, be mainly manifested in the following aspects: (1) real-time system need end to end network performance it is pre- Survey ability, but high-rise simulation architecture does not provide the interface required for end to end performance prediction;(2) high-rise emulation body The run time infrastructure ongoing basis framework RTI of architecture is not specified how to carry out Real-Time Scheduling to Message Processing, not had yet A kind of mechanism is provided, to utilize the end-to-end forecast function and real-time function of operating system or network mechanism offer, therefore, it is necessary to One kind is provided based on the consistent integrated operation support system of RTI space-time, to meet the needs of people are present.
Summary of the invention
The present invention provides a kind of technical solution, can effectively solve the problems mentioned above in the background art.
To achieve the above object, the invention provides the following technical scheme: a kind of be based on the consistent integrated operation branch of RTI space-time Support system, including data acquisition module, data processing module, data transmission module and risk control module, the data acquisition Module is connect with data processing module, and the data processing module is connect with data transmission module, the data transmission module with Risk control module connection, the data acquisition module include mobile terminal data acquisition module, page end data acquisition module and Administrator's end data acquisition module, the data processing module include mobile terminal data processing module and page end data processing mould Block, the data transmission module include mobile terminal data transmission module and page end data transmission module, the risk control mould Block includes mobile terminal risk control module, page end risk control module, administrator end risk control module and cloud risk control Molding block.
According to the above technical scheme, the data acquisition module includes that mobile terminal data acquisition module, webpage end data are adopted Collection module and administrator's end data acquisition module, the mobile terminal data acquisition module refer to the login to mobile terminal login user Account information, the request time of the IP address of login and sending and content are acquired, and are transmitted, the webpage end data Acquisition module refers to the user for using webpage to carry out register, carries out account information, webpage logs in IP address and page end Request time and content are acquired, and are transmitted, and administrator's end data acquisition module refers to using administrator's account Number user logged in carries out multiple-enciphered verifying, and login IP address and administrator request time to account executive and content carry out Acquisition.
According to the above technical scheme, the mobile terminal data acquisition module includes mobile terminal logon account information, Yong Hudeng It records IP address and mobile terminal request time content, the page end data acquisition module includes webpage login account information, webpage IP address and page end request time content are logged in, administrator's client information acquisition module includes administrator's account password letter Breath, administrator log in IP address and administrator request time content.
According to the above technical scheme, the mobile terminal data acquisition module includes mobile terminal logon account information, Yong Hudeng Record IP address and mobile terminal request time content, the mobile terminal logon account information includes mobile terminal user's login account, close Code and the corresponding subscriber identity information of account, it is corresponding when user's login IP address refers to corresponding mobile terminal Account Logon Mobile terminal service IP address, the mobile terminal request time content refer to user using mobile terminal log in use, send out The time requested out and specific request content.
According to the above technical scheme, the mobile terminal data processing module includes mobile client information storage center and mobile terminal Data processing unit, the mobile client information storage center refer to log-on message and account in the mobile terminal used user Information is stored, and the mobile terminal data processing unit refers to the request according to user, extracts the data of mobile terminal storage, into Row data processing, and transmit.
According to the above technical scheme, the page end data processing module includes cloud data storage center, page end list The storage of secondary solicited message and cloud data processing unit, the page end data processing module include cloud data storage center, The storage of page end single request information and cloud data processing unit, the cloud data storage center refer to through network cloud The account information logged in page end stores.
According to the above technical scheme, the mobile terminal data transmission module includes Ethernet data interaction, the page end Data transmission module includes that LAN data is interactive and information real-time Transmission in cloud is shared, and the Ethernet data interaction refers to use Family issues request using mobile terminal, and mobile terminal carries out data friendship by Ethernet and cloud data storage center according to request Mutually, when the LAN data interaction refers to that user is logged in by webpage, by local area network to user's logon account information and cloud End data storage center interacts, and the cloud information real-time Transmission is shared to refer to that cloud data storage center can pass through ether User data information is carried out cloud information Real-Time Sharing by net, local area network.
According to the above technical scheme, the mobile terminal risk control module includes the management of mobile terminal risk notice and mobile terminal Transaction risk monitoring and reminding, when mobile terminal risk notice management refers to user by mobile terminal login, can to mobile terminal into Row detection, and will test as the result is shown in mobile terminal, the mobile terminal transaction risk monitoring and reminding refers to that user uses mobile terminal It when being traded, is monitored when can trade to mobile terminal, and when transaction contains risky, user is mentioned by mobile terminal It wakes up.
According to the above technical scheme, the page end risk control module includes page end monitoring and early warning and page end transaction Risk monitoring and control is reminded, and the administrator end risk control module includes the early warning of network intrusions risk monitoring and control and network intrusions IP address Retrospect, the network intrusions risk monitoring and control early warning, which refers to, is monitored system operational network, and monitors in system operational network To when invasion, early warning is carried out to administrator, after the network intrusions IP address retrospect refers to that system operational network is invaded, meeting It is traced by source of the pre-set programs to intrusion system operational network.
According to the above technical scheme, the cloud risk control module includes that network intrusions auto-alarming and protecting wall are automatic Updating maintenance when the network intrusions auto-alarming refers to cloud by external intrusion, can will be entered by local area network and Ethernet It invades situation and is transmitted to administrator, alerted, the firewall automatically updates maintenance and refers to that cloud firewall can pass through Ethernet Virus base, invasion mode data are automatically updated with local area network.
Compared with prior art, beneficial effects of the present invention: structure of the invention is scientific and reasonable, safe and convenient to use:
User is logged in by mobile terminal in use, can be logged in user in mobile terminal by mobile terminal information acquisition module Account information, IP address, request time and request content are acquired, and collected data are stored in mobile client information and are deposited Storage center combines mobile client information storage by mobile terminal data processing unit according to the request that user issues in mobile terminal Center carries out data processing, and user is transmitted to cloud by Ethernet in the request that mobile terminal issues, carries out data interaction, And when user uses mobile terminal, mobile terminal is detected, will test as the result is shown on mobile terminal, if user passes through shifting Moved end is traded, and is monitored when can trade to mobile terminal, and when transaction contains risky, is carried out by mobile terminal to user It reminds;If the account that user when page end logs in, can log in user in page end by page end information acquisition module Information, webpage log in IP address, request time and request content and are acquired, and collected data are passed through LAN data Interaction can be carried out to cloud data storage center according to the request that user issues in page end by cloud data processing unit Processing, and user is stored in information storage center beyond the clouds in the solicited message of page end, after user logs on webpage, meeting Early warning is monitored to the equipment that page end uses, if traded, transaction wind can be carried out to the equipment that page end uses Danger monitoring, and user is reminded when containing risky;Information in the data storage center of cloud can be carried out by local area network Real-time Transmission is shared, and the information of each user is carried out real-time update storage, and the data of mobile terminal can use movement in user When end logs in, the data stored in mobile terminal storing data and cloud data storage center are interacted by Ethernet;If It is that cloud data storage center is invaded, the network intrusions being subject to can be transmitted to administrator end by Ethernet and local area network It is alerted, and cloud data storage center is protected according to firewall, firewall can pass through local area network and Ethernet pair The virus base and invasion mode situation stored in firewall is automatically updated, and can carry out automatically updating maintenance to firewall, Increase the protective capacities to system operational network.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example to be used to explain the present invention together, not be construed as limiting the invention.
In the accompanying drawings:
Fig. 1 is system structure diagram of the invention.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Embodiment: as shown in Figure 1, the present invention provides a kind of technical solution, one kind being based on the consistent integrated operation of RTI space-time Support system, including data acquisition module, data processing module, data transmission module and risk control module, data acquisition module Block is connect with data processing module, and data processing module is connect with data transmission module, data transmission module and risk control mould Block connection, data acquisition module includes that mobile terminal data acquisition module, page end data acquisition module and administrator's end data are adopted Collect module, data processing module includes mobile terminal data processing module and page end data processing module, data transmission module packet Include mobile terminal data transmission module and page end data transmission module, risk control module include mobile terminal risk control module, Page end risk control module, administrator end risk control module and cloud risk control module.
According to the above technical scheme, data acquisition module includes mobile terminal data acquisition module, page end data acquisition module Block and administrator's end data acquisition module, mobile terminal data acquisition module refer to the logon account letter to mobile terminal login user The request time and content of breath, the IP address logged in and sending are acquired, and are transmitted, and page end data acquisition module is Refer to the user for using webpage to carry out register, carry out account information, webpage logs in IP address and page end request time and Content is acquired, and is transmitted, administrator's end data acquisition module refer to the user for using administrator's account to log in into The verifying of row multiple-enciphered, login IP address and administrator request time and content to account executive are acquired.
According to the above technical scheme, mobile terminal data acquisition module includes mobile terminal logon account information, user's login IP Address and mobile terminal request time content, page end data acquisition module include that webpage login account information, webpage log in IP Location and page end request time content, administrator's client information acquisition module include administrator's account password information, administrator's login IP address and administrator request time content.
According to the above technical scheme, mobile terminal data acquisition module includes mobile terminal logon account information, user's login IP Address and mobile terminal request time content, mobile terminal logon account information include mobile terminal user's login account, password and account When number corresponding subscriber identity information, user log in IP address and refer to corresponding mobile terminal Account Logon, corresponding mobile terminal clothes Business IP address, mobile terminal request time content refer to that user is logged in using mobile terminal in use, issuing time and the tool of request Body request content.
According to the above technical scheme, mobile terminal data processing module includes mobile client information storage center and mobile end data Processing unit, mobile client information storage center refer to that log-on message and account information in the mobile terminal used user carry out Storage, mobile terminal data processing unit refer to the request according to user, extract the data of mobile terminal storage, carry out data processing, And it transmits.
According to the above technical scheme, page end data processing module includes that cloud data storage center, page end single are asked Information storage and cloud data processing unit are asked, page end data processing module includes cloud data storage center, page end list Secondary solicited message storage and cloud data processing unit, cloud data storage center, which refers to, logs in page end by network cloud Account information stored.
According to the above technical scheme, mobile terminal data transmission module includes Ethernet data interaction, the transmission of webpage end data Module includes that LAN data is interactive shared with cloud information real-time Transmission, and it is mobile whole that Ethernet data interaction refers to that user uses End issues request, and mobile terminal carries out data interaction, local netting index by Ethernet and cloud data storage center according to request When referring to that user is logged in by webpage according to interaction, by local area network to user's logon account information and cloud data storage center into Row interaction, cloud information real-time Transmission is shared to refer to that cloud data storage center can be by Ethernet, local area network by user data Information carries out cloud information Real-Time Sharing.
According to the above technical scheme, risk control module in mobile terminal includes the management of mobile terminal risk notice and mobile terminal transaction Risk monitoring and control is reminded, and when risk notice management in mobile terminal refers to that user is logged in by mobile terminal, can be detected to mobile terminal, and It will test as the result is shown in mobile terminal, when mobile terminal transaction risk monitoring and reminding refers to that user is traded using mobile terminal, meeting It is monitored when to mobile terminal transaction, and when transaction contains risky, user is reminded by mobile terminal.
According to the above technical scheme, page end risk control module includes page end monitoring and early warning and page end transaction risk Monitoring and reminding, administrator end risk control module include the early warning of network intrusions risk monitoring and control and the retrospect of network intrusions IP address, net Network intrusion risk monitoring and early warning, which refers to, is monitored system operational network, and when system operational network monitors invasion, right Administrator, which carries out early warning, can pass through pre-set programs pair after the retrospect of network intrusions IP address refers to that system operational network is invaded The source of intrusion system operational network is traced.
According to the above technical scheme, risk control module in cloud includes that network intrusions auto-alarming and protecting wall automatically update Maintenance when network intrusions auto-alarming refers to cloud by external intrusion, can will invade situation by local area network and Ethernet and pass Administrator is transported to, is alerted, firewall automatically updates maintenance and refers to that cloud firewall can be by Ethernet and local area network to disease Malicious library, invasion mode data are automatically updated.
Based on above-mentioned, the present invention has the advantages that user is logged in by mobile terminal in use, can be believed by mobile terminal Account information, IP address, request time and the request content that breath acquisition module logs in user in mobile terminal are acquired, and will Collected data are stored in mobile client information storage center, according to the request that user issues in mobile terminal, pass through mobile terminal Data processing unit combines mobile client information storage center to carry out data processing, and user is passed through in the request that mobile terminal issues Ethernet is transmitted to cloud, carries out data interaction, and when user uses mobile terminal, detects to mobile terminal, will test knot Fruit is shown on mobile terminal, if user is traded by mobile terminal, is monitored when can trade to mobile terminal, and trading Containing it is risky when, user is reminded by mobile terminal;If user can be adopted when page end logs in by webpage client information Account information, webpage login IP address, request time and the request content that collection module logs in user in page end are acquired, And collected data are interactive to cloud data storage center by LAN data, it is asked according to user what page end issued It asks, can be handled by cloud data processing unit, and information is deposited beyond the clouds in the solicited message storage of page end by user In storage center, after user logs on webpage, early warning can be monitored to the equipment that page end uses, if traded, Transaction risk monitoring can be carried out to the equipment that page end uses, and user is reminded when containing risky;Cloud data are deposited It is shared that information in storage center can carry out real-time Transmission by local area network, and the information of each user progress real-time update is deposited The data of storage, mobile terminal can be when user be logged in using mobile terminal, by Ethernet to mobile terminal storing data and cloud data The data stored in storage center interact;If cloud data storage center is invaded, Ethernet and local can be passed through The network intrusions being subject to are transmitted to administrator end and alerted by net, and are prevented according to firewall cloud data storage center Shield, firewall situation can carry out automatically more in such a way that local area network and Ethernet are to the virus base and invasion stored in firewall Newly, and firewall can be carried out to automatically update maintenance.
Finally, it should be noted that being not intended to restrict the invention the foregoing is merely preferred embodiment of the invention, to the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, for those skilled in the art, still can be with It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features.It is all Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in guarantor of the invention Within the scope of shield.

Claims (10)

1. one kind is based on the consistent integrated operation support system of RTI space-time, it is characterised in that: including data acquisition module, data Processing module, data transmission module and risk control module, the data acquisition module are connect with data processing module, the number It is connect according to processing module with data transmission module, the data transmission module is connect with risk control module, the data acquisition Module includes mobile terminal data acquisition module, page end data acquisition module and administrator's end data acquisition module, the data Processing module includes mobile terminal data processing module and page end data processing module, and the data transmission module includes mobile terminal Data transmission module and page end data transmission module, the risk control module include mobile terminal risk control module, webpage Hold risk control module, administrator end risk control module and cloud risk control module.
2. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating data acquisition module includes mobile terminal data acquisition module, page end data acquisition module and administrator's end data acquisition mould Block, the mobile terminal data acquisition module refer to the logon account information, the IP address of login and hair to mobile terminal login user Request time and content out is acquired, and is transmitted, the page end data acquisition module refer to use webpage into The user of row register, carries out account information, webpage login IP address and page end request time and content is acquired, and It is transmitted, administrator's end data acquisition module refers to that carrying out multiple-enciphered to the user for using administrator's account to log in tests Card, login IP address and administrator request time and content to account executive are acquired.
3. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating mobile terminal data acquisition module includes in mobile terminal logon account information, user's login IP address and mobile terminal request time Hold, the page end data acquisition module includes webpage login account information, webpage login IP address and page end request time Content, administrator's client information acquisition module include administrator's account password information, administrator's login IP address and administrator Request time content.
4. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating mobile terminal data acquisition module includes in mobile terminal logon account information, user's login IP address and mobile terminal request time Hold, the mobile terminal logon account information includes mobile terminal user's login account, password and the corresponding user identity letter of account Breath, when user's login IP address refers to corresponding mobile terminal Account Logon, corresponding mobile terminal service IP address, the shifting Moved end request time content refers to that user is logged in using mobile terminal in use, issuing the time requested and specific request content.
5. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating mobile terminal data processing module includes mobile client information storage center and mobile terminal data processing unit, the mobile client information Storage center refers to that log-on message and account information in the mobile terminal used user store, the mobile end data Processing unit refers to the request according to user, extracts the data of mobile terminal storage, carries out data processing, and transmit.
6. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating page end data processing module includes cloud data storage center, the storage of page end single request information and cloud data processing Unit, the page end data processing module include cloud data storage center, the storage of page end single request information and cloud Data processing unit, the cloud data storage center refer to that the account information logged in by network cloud to page end is deposited Storage.
7. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating mobile terminal data transmission module includes Ethernet data interaction, and the page end data transmission module includes that LAN data is handed over Mutually and cloud information real-time Transmission is shared, and the Ethernet data interaction refers to that user issues request using mobile terminal, mobile Terminal carries out data interaction by Ethernet and cloud data storage center according to request, and the LAN data interaction refers to use When family is logged in by webpage, user's logon account information and cloud data storage center are interacted by local area network, it is described Cloud information real-time Transmission is shared to refer to that cloud data storage center can be carried out user data information by Ethernet, local area network Cloud information Real-Time Sharing.
8. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating mobile terminal risk control module includes the management of mobile terminal risk notice and mobile terminal transaction risk monitoring and reminding, the mobile terminal When risk notice management refers to that user is logged in by mobile terminal, mobile terminal can be detected, and will test and moving as the result is shown Moved end, when the mobile terminal transaction risk monitoring and reminding refers to that user is traded using mobile terminal, when can trade to mobile terminal It is monitored, and when transaction contains risky, user is reminded by mobile terminal.
9. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating page end risk control module includes page end monitoring and early warning and page end transaction risk monitoring and reminding, administrator end wind Dangerous control module includes the early warning of network intrusions risk monitoring and control and the retrospect of network intrusions IP address, and the network intrusions risk monitoring and control is pre- Police, which refers to, is monitored system operational network, and when system operational network monitors invasion, carries out early warning, institute to administrator State network intrusions IP address retrospect refer to that system operational network is invaded after, can by pre-set programs to intrusion system run net The source of network is traced.
10. according to claim 1 a kind of based on the consistent integrated operation support system of RTI space-time, which is characterized in that institute Stating cloud risk control module includes that network intrusions auto-alarming and protecting wall automatically update maintenance, and the network intrusions are accused automatically When police refers to cloud by external intrusion, it can be transmitted to administrator by situation is invaded by local area network and Ethernet, be alerted, The firewall automatically update maintenance refer to cloud firewall can in such a way that Ethernet and local area network are to virus base, invasion data It is automatically updated.
CN201811444267.4A 2018-11-29 2018-11-29 Integrated operation support system based on RTI space-time consistency Active CN109587130B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811444267.4A CN109587130B (en) 2018-11-29 2018-11-29 Integrated operation support system based on RTI space-time consistency

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811444267.4A CN109587130B (en) 2018-11-29 2018-11-29 Integrated operation support system based on RTI space-time consistency

Publications (2)

Publication Number Publication Date
CN109587130A true CN109587130A (en) 2019-04-05
CN109587130B CN109587130B (en) 2021-03-26

Family

ID=65925272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811444267.4A Active CN109587130B (en) 2018-11-29 2018-11-29 Integrated operation support system based on RTI space-time consistency

Country Status (1)

Country Link
CN (1) CN109587130B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008704A (en) * 2019-04-10 2019-07-12 河南城建学院 A kind of electronic information intelligent memory system for industrial management
CN110473110A (en) * 2019-07-05 2019-11-19 中国平安人寿保险股份有限公司 A kind of data processing method, device, readable storage medium storing program for executing and terminal device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150052253A1 (en) * 2014-09-22 2015-02-19 Weaved, Inc. Multi-server fractional subdomain dns protocol
CN105006887A (en) * 2014-12-01 2015-10-28 西安百利信息科技有限公司 System and method for remote monitoring of intelligent power distribution
CN106022782A (en) * 2016-07-13 2016-10-12 孙智博 Iris payment system
CN207301705U (en) * 2017-08-23 2018-05-01 北京科诺伟业科技股份有限公司 A kind of industrial data detection and control terminal based on Internet of Things
CN108337324A (en) * 2018-03-21 2018-07-27 合肥工业大学 A kind of card insertion intelligent cloud computing central processing unit system and its data processing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150052253A1 (en) * 2014-09-22 2015-02-19 Weaved, Inc. Multi-server fractional subdomain dns protocol
CN105006887A (en) * 2014-12-01 2015-10-28 西安百利信息科技有限公司 System and method for remote monitoring of intelligent power distribution
CN106022782A (en) * 2016-07-13 2016-10-12 孙智博 Iris payment system
CN207301705U (en) * 2017-08-23 2018-05-01 北京科诺伟业科技股份有限公司 A kind of industrial data detection and control terminal based on Internet of Things
CN108337324A (en) * 2018-03-21 2018-07-27 合肥工业大学 A kind of card insertion intelligent cloud computing central processing unit system and its data processing method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008704A (en) * 2019-04-10 2019-07-12 河南城建学院 A kind of electronic information intelligent memory system for industrial management
CN110008704B (en) * 2019-04-10 2020-01-24 河南城建学院 Intelligent electronic information storage system for industrial management
CN110473110A (en) * 2019-07-05 2019-11-19 中国平安人寿保险股份有限公司 A kind of data processing method, device, readable storage medium storing program for executing and terminal device
CN110473110B (en) * 2019-07-05 2023-11-28 中国平安人寿保险股份有限公司 Data processing method and device, readable storage medium and terminal equipment

Also Published As

Publication number Publication date
CN109587130B (en) 2021-03-26

Similar Documents

Publication Publication Date Title
Nowak et al. Verticals in 5G MEC-use cases and security challenges
CN108833397A (en) A kind of big data safety analysis plateform system based on network security
CN111209269A (en) Big data management system of wisdom city
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
CN104219218B (en) A kind of method and device of active safety defence
CN105119750A (en) Distributed information security operation and maintenance management platform based on massive data
CN106888194A (en) Intelligent grid IT assets security monitoring systems based on distributed scheduling
US10142365B2 (en) System and methods for responding to cybersecurity threats
RU2747336C2 (en) System and method for providing secure connections during data transfer in the aviation environment
CN111597555A (en) Intelligent block chain internal data release system and method based on cloud data platform
Rodrigues et al. Performance and availability evaluation of an smart hospital architecture
CN109587130A (en) One kind being based on the consistent integrated operation support system of RTI space-time
CN108347698A (en) A kind of on-line off-line event trace analysis method, apparatus and system
CN109450933B (en) Network system for nuclear power plant emergency network
CN106408460A (en) Airport emergency rescue data management system
CN108156177A (en) Information Network security postures based on big data perceive method for early warning
CN109995558A (en) Failure information processing method, device, equipment and storage medium
Odarchenko et al. 5g networks cyberincidents monitoring system for drone communications
CN109600395A (en) A kind of device and implementation method of terminal network access control system
CN113971288A (en) Big data technology-based smart campus security management and control platform
Tao et al. Combining the big data analysis and the threat intelligence technologies for the classified protection model
CN206039874U (en) General aviation flight plan processing system
KR20140110566A (en) Unified platform architecture system for volcanic disaster prevention
Reuschling et al. Toolkit to enhance cyberphysical security of critical infrastructures in air transport
CN116644934A (en) Big data management system of hydrogen energy industry

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200226

Address after: 550000 qianlingshan Road, Guiyang National High tech Industrial Development Zone, Guiyang City, Guizhou Province

Applicant after: Guizhou Aerospace Cloud Network Technology Co., Ltd.

Applicant after: Yu Wentao

Address before: 550000 Guiyang Guiyang National High-tech Industrial Development Zone, Guiyang City, Guizhou Province, 357 Qianlingshan Road, Defu Center A5 Building 2 Unit 17, Layer 1-6

Applicant before: Guizhou Aerospace Cloud Network Technology Co., Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201102

Address after: 550000 Guiyang Guiyang National High-tech Industrial Development Zone, Guiyang City, Guizhou Province, 357 Qianlingshan Road, Defu Center A5 Building 2 Unit 17, Layer 1-6

Applicant after: GUIZHOU CASICLOUD TECHNOLOGY Co.,Ltd.

Address before: 550000 qianlingshan Road, Guiyang National High tech Industrial Development Zone, Guiyang City, Guizhou Province

Applicant before: GUIZHOU CASICLOUD TECHNOLOGY Co.,Ltd.

Applicant before: Yu Wentao

GR01 Patent grant
GR01 Patent grant