CN109687586A - A kind of power monitoring Host Security inspection system - Google Patents

A kind of power monitoring Host Security inspection system Download PDF

Info

Publication number
CN109687586A
CN109687586A CN201811624084.0A CN201811624084A CN109687586A CN 109687586 A CN109687586 A CN 109687586A CN 201811624084 A CN201811624084 A CN 201811624084A CN 109687586 A CN109687586 A CN 109687586A
Authority
CN
China
Prior art keywords
portable
data
acquisition tool
test object
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811624084.0A
Other languages
Chinese (zh)
Inventor
胡海生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Electric Power Research Institute of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Electric Power Research Institute of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Electric Power Research Institute of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN201811624084.0A priority Critical patent/CN109687586A/en
Publication of CN109687586A publication Critical patent/CN109687586A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00001Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the display of information or by user interaction, e.g. supervisory control and data acquisition systems [SCADA] or graphical user interfaces [GUI]
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/50Testing of electric apparatus, lines, cables or components for short-circuits, continuity, leakage current or incorrect line connections
    • H02J13/0013

Abstract

This application provides a kind of power monitoring Host Securities to check system, comprising: safety inspection terminal and portable data acquisition tool;Portable data acquisition tool is configured as: after portable data acquisition tool and test object, which are established, to be communicated to connect, being obtained corresponding inspection item data from test object according to preset data acquisition instructions and is saved;Safety inspection terminal is configured as: after safety inspection terminal and portable data acquisition tool, which are established, to be communicated to connect, it reads and checks item data, and Data Matching and model analysis are carried out by preset feature database and risk model, export the safety inspection result of test object.The application is directly accessed test object by portable data acquisition tool, preset check item instruction is executed, host configuration information is obtained and will check data write-in USB flash disk tool, it solves existing distributed transformer substation and needs to be carry bulky inspection equipment progress site inspection by staff, check the not convenient technical problem of work.

Description

A kind of power monitoring Host Security inspection system
Technical field
This application involves equipment operation management fields more particularly to a kind of power monitoring Host Security to check system and inspection Method.
Background technique
In recent years, electric power monitoring system is along networking, Intellectualized Tendency fast development, comes for power monitoring work belt Huge convenience.Important component of the Windows host as electric power monitoring system is now widely used for substation's prison Control backstage, main station monitoring backstage, main website server etc..In order to ensure the normal operation of system, need periodically to windows host Configuration, virus do emphasis inspection and loophole investigation work.
There are the long-range checking tool of general Host Security and technologies for current industry, but this technology is to obtain number based on network According to the long-range inspection for being suitable for centralized-control type architecture system, and the distributed transformer substation of network is not built for network condition difference or, It then needs to be carry bulky inspection equipment by staff and carries out site inspection, result in existing distributed transformer substation inspection Work not convenient technical problem.
Summary of the invention
This application provides a kind of power monitoring Host Securities to check system, for solving existing distributed transformer substation inspection Look into the not convenient technical problem of work.
In view of this, this application provides a kind of power monitoring Host Security check system, comprising: safety inspection terminal and Portable data acquisition tool;
The portable data acquisition tool is configured as: when the portable data acquisition tool and test object are established After communication connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is saved;
The safety inspection terminal is configured as: when the safety inspection terminal and the portable data acquisition tool are built After vertical communication connection, the inspection item data is read, and Data Matching and mould are carried out by preset feature database and risk model Type analysis exports the safety inspection result of the test object.
Preferably, the portable data acquisition tool specifically includes: portable configuration metadata acquisition tool, Portable disease Malicious metadata acquisition tool and portable loophole metadata acquisition tool.
Preferably, the portable configuration metadata acquisition tool is specifically configured to:
After the portable configuration metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset configuration number Corresponding each configuration inspection item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections After item data, all inspection item datas are uniformly written in the portable configuration metadata acquisition tool and are saved.
Preferably, the portable viral metadata acquisition tool is specifically configured to:
When the portable viral metadata acquisition tool and test object are established after communication connection, according to preset viral number Corresponding each virus checking item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections After item data, all inspection item datas are uniformly written in the portable viral metadata acquisition tool and are saved.
Preferably, the portable loophole metadata acquisition tool is specifically configured to:
After the portable loophole metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset loophole number It obtains corresponding each loophole one by one from the test object according to acquisition instructions and checks item data, when having obtained all inspections After item data, all inspection item datas are uniformly written in the portable loophole metadata acquisition tool and are saved.
Preferably, the safety inspection terminal specifically includes: data acquisition module and comprehensive analysis module;
The data acquisition module is specifically configured to: when the data acquisition module and the portable data acquisition work After tool establishes communication connection, the inspection item data saved in the portable data acquisition tool is read;
The comprehensive analysis module is specifically configured to: according to the inspection item data read, from the check item Data extract corresponding data characteristics, and carry out Data Matching by the data characteristics and preset feature database, export institute State the safety inspection result of test object.
Preferably, the safety inspection terminal further include: preprocessing module;
The preprocessing module is specifically configured to: being formatted processing and sequence to the data characteristics extracted Change processing.
Preferably, the safety inspection terminal further include: display module;
The display module is configured as: the safety inspection result is shown according to preset displaying condition.
Preferably, the preset feature database specifically includes: baseline characteristic library, malicious code feature database and system vulnerability are special Levy library.
Preferably, the portable data acquisition tool is specially portable data acquisition USB flash disk.
Preferably, the safety inspection terminal is specially portable PC machine.
As can be seen from the above technical solutions, the application has the following advantages:
This application provides a kind of power monitoring Host Securities to check system, comprising: safety inspection terminal and portable number According to sampling instrument;The portable data acquisition tool is configured as: when the portable data acquisition tool and test object After establishing communication connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is protected It deposits;The safety inspection terminal is configured as: being established and is led to when the safety inspection terminal and the portable data acquisition tool After letter connection, the inspection item data is read, and Data Matching and model point are carried out by preset feature database and risk model Analysis, exports the safety inspection result of the test object.
The application is held as metadata acquisition tool by being directly accessed test object by portable data acquisition tool The preset check item instruction of row obtains host configuration information and will check that USB flash disk tool is written in data, to execute subsequent safety Analytical procedure solves existing distributed transformer substation and needs to be carry the bulky live inspection of inspection equipment progress by staff It looks into, checks the not convenient technical problem of work.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application without any creative labor, may be used also for those of ordinary skill in the art To obtain other attached drawings according to these attached drawings.
Fig. 1 is the system architecture of one embodiment that a kind of power monitoring Host Security provided by the present application checks system Figure;
Fig. 2 is the structure of the safety inspection terminal in a kind of power monitoring Host Security inspection system provided by the present application Figure;
Fig. 3 is the framework of the safety inspection terminal in a kind of power monitoring Host Security inspection system provided by the present application Figure.
Specific embodiment
The embodiment of the present application provides a kind of power monitoring Host Security inspection system, for solving existing distributed change Power station checks the not convenient technical problem of work.
To enable present invention purpose, feature, advantage more obvious and understandable, below in conjunction with the application Attached drawing in embodiment, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that disclosed below Embodiment be only some embodiments of the present application, and not all embodiment.Based on the embodiment in the application, this field Those of ordinary skill's all other embodiment obtained without making creative work belongs to the application protection Range.
It please refers to Fig.1 to Fig.3, this application provides a kind of power monitoring Host Securities to check system, comprising: safety inspection Terminal 1 and portable data acquisition tool 2;
The portable data acquisition tool 2 is configured as: when the portable data acquisition tool 2 is built with test object After vertical communication connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is protected It deposits;
The safety inspection terminal 1 is configured as: when the safety inspection terminal 1 and the portable data acquisition tool After 2 establish communication connection, read the inspection item data, and by preset feature database and risk model carry out Data Matching with Model analysis exports the safety inspection result of the test object.
It should be noted that the present embodiment passes through the electricity that is made of portable data acquisition tool 2 and safety inspection terminal 1 Power monitoring host computer safety check system, wherein the portable data acquisition tool 2 of the present embodiment be a kind of storage equipment (such as USB flash disk, Storage card etc.), inside structure includes the area ROM and the area DATA, and wherein the area ROM is stored with preset data acquisition instructions, works as institute It states portable data acquisition tool 2 and test object is established after communicating to connect, portable data acquisition tool 2 starts to execute preset Data acquisition instructions, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is write Enter the area DATA to portable data acquisition tool 2.
More specifically, the process that the portable data acquisition tool 2 of the application acquires data is specific as follows:
1) USB flash disk, the inspection program of booting ROM, in addition, starting are being checked by the USB interface insertion of assessment object After checking program, operation interface can also be provided by program for inspection personnel's configuration management assessment project, and confirm assessment work Make;
2) start the check item in the reading area ROM, and obtain inspection order;
3) it executes and checks order;
4) inspection result is obtained;
5) buffer area is written into inspection result, for the generation of subsequent examination result;
6) determine to check whether completion, if do not completed, read next check item;If completion entirely checked Journey then opens the write-in of the region DATA;
7) region DATA is opened;
8) data that the result and acquisition that check are read in from buffer area generate report, and the region DATA are written in report;
9) region DATA is closed, the data acquisition of USB flash disk tool is completed and is checked.
The present embodiment can be filled by using the data of portable 2 acquisition testing object of portable data acquisition tool The pocket for entering clothing, is carried, and bulky inspection can only be carry eventually by staff by overcoming traditional test mode End, by checking terminal and the direct-connected acquisition data of test object, the caused technical problem for checking that work is not convenient.
In addition, the portable data acquisition tool 2 of the present embodiment accesses measurand using USB port, in measurand It enables and checks program, item is executed by configurable interface selection, execute inspection, the data such as acquisition configuration, virus and loophole, and Safety zone finally is written into collection result, wherein what the realization of safety zone was realized by custom interface API, i.e., by fixed USB flash disk sampling instrument storage region is divided into the area ROM and the area DATA by API processed.Wherein the area ROM, which is used to store, executes the executable of inspection Program can only be written by specific software;The area DATA storage acquisition data, can only be written the region by executable program.It is logical The Read-write Catrol malicious code that can effectively prevent U mouthfuls and checked between each host, and occur in the area Guo Dui ROM, the area DATA Cross-infection problem.
Then the check item for being stored in the area portable data acquisition tool 2DATA is read out by safety inspection terminal 1 again Data, and analyzed by property data base built in safety inspection terminal 1 and risk analysis model, obtain test object Safety inspection result.
More specifically, the portable data acquisition tool 2 is specially portable data acquisition USB flash disk.
More specifically, the safety inspection terminal 1 is specially portable PC machine, wherein safety inspection terminal 1 includes multiple USB interface, network interface and serial ports, hardware are the three proofings notebook of specific customization, and feature is waterproof, shatter-resistant, dust-proof;Software is Electric power monitoring system safety inspection software.
More specifically, the portable data acquisition tool 2 specifically includes: portable configuration metadata acquisition tool, portable Formula virus metadata acquisition tool and portable loophole metadata acquisition tool.
More specifically, the portable configuration metadata acquisition tool is specifically configured to:
After the portable configuration metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset configuration number Corresponding each configuration inspection item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections After item data, all inspection item datas are uniformly written in the portable configuration metadata acquisition tool and are saved.
More specifically, the portable viral metadata acquisition tool is specifically configured to:
When the portable viral metadata acquisition tool and test object are established after communication connection, according to preset viral number Corresponding each virus checking item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections After item data, all inspection item datas are uniformly written in the portable viral metadata acquisition tool and are saved.
More specifically, the portable loophole metadata acquisition tool is specifically configured to:
After the portable loophole metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset loophole number It obtains corresponding each loophole one by one from the test object according to acquisition instructions and checks item data, when having obtained all inspections After item data, all inspection item datas are uniformly written in the portable loophole metadata acquisition tool and are saved.
More specifically, the safety inspection terminal 1 specifically includes: data acquisition module 101 and comprehensive analysis module 103;
The data acquisition module 101 is specifically configured to: when the data acquisition module and the portable data are adopted After collection tool 2 establishes communication connection, the inspection item data saved in the portable data acquisition tool 2 is read;
The comprehensive analysis module 103 is specifically configured to: according to the inspection item data read, from the inspection Item data extracts corresponding data characteristics, and carries out Data Matching, output by the data characteristics and preset feature database The safety inspection result of the test object.
More specifically, the safety inspection terminal 1 further include: preprocessing module 102;
The preprocessing module 102 is specifically configured to: to the data characteristics extracted be formatted processing and Serializing processing.
Preferably, safety inspection terminal 1 further include: display module 104;
Display module 104 is configured as: the safety inspection result is shown according to preset displaying condition.
More specifically, the preset feature database specifically includes: baseline characteristic library, malicious code feature database and system vulnerability Feature database.
It should be noted that please refer to Fig. 2 and Fig. 3, the software architecture of the safety inspection terminal 1 of the present embodiment from bottom to Upper layer is divided into data collection layer, pretreatment layer, comprehensive analysis layer and presentation layer.
The data acquisition module of data collection layer, that is, above-mentioned, including configuration information acquisition submodule, virus characteristic acquisition Module and loophole collection apparatus submodule, each module are respectively portable configuration acquisition USB flash disk tool, virus collection USB flash disk tool, leakage Hole acquisition USB flash disk tool is adapted to, and the data from the 3 class Portable U disk sampling instrument are received.
The preprocessing module of pretreatment layer, that is, above-mentioned is responsible for carrying out the configuration of acquisition, malicious code and loophole feature pre- Acquisition data are carried out serializing and formatting are handled, meet the matching condition of feature database by processing.
The comprehensive analysis module of comprehensive analysis layer, that is, above-mentioned, data collected are counted for binding characteristic library, Analysis and processing specifically carry out modeling analysis to acquisition data according to risk evaluation model, while according to power industry grade The requirement of protection carries out processing to data and secure match is analyzed, and exports the safety inspection result of the test object.
Wherein, the feature database of the present embodiment includes Configuration baseline library, malicious code library and vulnerability database, and wherein baseline library is row Baseline library is advised in the electric power monitoring system conjunction of industry, enterprise, it is desirable that meets the inspection requirements of industry and enterprise;Malicious code feature database and Vulnerability database is based on China national information security vulnerability database (CNNVD), in conjunction with the malicious code feature database of enterprise itself and leakage Cave depot is updated and safeguards.
Presentation layer, that is, above-mentioned display module is mainly wrapped for safety inspection result to be shown according to prerequisite Include the displaying of conjunction rule item, irregularity item is shown, different assessment object lateral comparisons are shown and identical assessment object longitudinal comparison displaying.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The description of the present application and term " first " in above-mentioned attached drawing, " second ", " third ", " the 4th " etc. are (if deposited ) it is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that use in this way Data are interchangeable under appropriate circumstances, so that embodiments herein described herein for example can be in addition to illustrating herein Or the sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce The other step or units of product or equipment inherently.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of power monitoring Host Security checks system characterized by comprising safety inspection terminal and portable data are adopted Collection tool;
The portable data acquisition tool is configured as: when the portable data acquisition tool is communicated with test object foundation After connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is saved;
The safety inspection terminal is configured as: being established and is led to when the safety inspection terminal and the portable data acquisition tool After letter connection, the inspection item data is read, and Data Matching and model point are carried out by preset feature database and risk model Analysis, exports the safety inspection result of the test object.
2. a kind of power monitoring Host Security according to claim 1 checks system, which is characterized in that the portable number It is specifically included according to sampling instrument: portable configuration metadata acquisition tool, portable viral metadata acquisition tool and portable leakage Hole metadata acquisition tool.
3. a kind of power monitoring Host Security according to claim 2 checks system, which is characterized in that described portable to match Metadata acquisition tool is set to be specifically configured to:
After the portable configuration metadata acquisition tool and test object, which are established, to be communicated to connect, adopted according to preset configuration data Collection instruction obtains corresponding each configuration inspection item data one by one from the test object, when having obtained all inspection item numbers According to rear, all inspection item datas are uniformly written in the portable configuration metadata acquisition tool and are saved.
4. a kind of power monitoring Host Security according to claim 2 checks system, which is characterized in that the Portable disease Malicious metadata acquisition tool is specifically configured to:
After the portable viral metadata acquisition tool and test object establish communication connection, adopted according to preset viral data Collection instruction obtains corresponding each virus checking item data one by one from the test object, when having obtained all inspection item numbers According to rear, all inspection item datas are uniformly written in the portable viral metadata acquisition tool and are saved.
5. a kind of power monitoring Host Security according to claim 2 checks system, which is characterized in that the portable leakage Hole metadata acquisition tool is specifically configured to:
After the portable loophole metadata acquisition tool and test object, which are established, to be communicated to connect, adopted according to preset loophole data Collection instruction obtains corresponding each loophole one by one from the test object and checks item data, when having obtained all inspection item numbers According to rear, all inspection item datas are uniformly written in the portable loophole metadata acquisition tool and are saved.
6. a kind of power monitoring Host Security according to claim 1 checks system, which is characterized in that the safety inspection Terminal specifically includes: data acquisition module and comprehensive analysis module;
The data acquisition module is specifically configured to: when the data acquisition module and the portable data acquisition tool are built After vertical communication connection, the inspection item data saved in the portable data acquisition tool is read;
The comprehensive analysis module is specifically configured to: according to the inspection item data read, from the inspection item data Corresponding data characteristics is extracted, and Data Matching is carried out by the data characteristics and preset feature database, exports the inspection Survey the safety inspection result of object.
7. a kind of power monitoring Host Security according to claim 6 checks system, which is characterized in that the safety inspection Terminal further include: preprocessing module;
The preprocessing module is specifically configured to: being formatted at processing and serializing to the data characteristics extracted Reason.
8. a kind of power monitoring Host Security according to claim 6 checks system, which is characterized in that the safety inspection Terminal further include: display module;
The display module is configured as: the safety inspection result is shown according to preset displaying condition.
9. a kind of power monitoring Host Security according to claim 1 checks system, which is characterized in that the preset spy Sign library specifically includes: baseline characteristic library, malicious code feature database and system vulnerability feature database.
10. checking system to a kind of power monitoring Host Security described in 9 any one according to claim 1, which is characterized in that
The safety inspection terminal is specially portable PC machine;
The portable data acquisition tool is specially portable data acquisition USB flash disk.
CN201811624084.0A 2018-12-28 2018-12-28 A kind of power monitoring Host Security inspection system Pending CN109687586A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811624084.0A CN109687586A (en) 2018-12-28 2018-12-28 A kind of power monitoring Host Security inspection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811624084.0A CN109687586A (en) 2018-12-28 2018-12-28 A kind of power monitoring Host Security inspection system

Publications (1)

Publication Number Publication Date
CN109687586A true CN109687586A (en) 2019-04-26

Family

ID=66190855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811624084.0A Pending CN109687586A (en) 2018-12-28 2018-12-28 A kind of power monitoring Host Security inspection system

Country Status (1)

Country Link
CN (1) CN109687586A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414394A (en) * 2020-03-31 2020-07-14 上海观安信息技术股份有限公司 Power grid company compliance checking and tracking method and system
CN115118481A (en) * 2022-06-22 2022-09-27 深圳星云智联科技有限公司 Host information acquisition method, device, equipment and medium
CN116723123A (en) * 2023-07-13 2023-09-08 浙江齐安信息科技有限公司 Method, terminal and storage medium for checking and managing safety configuration of industrial control host

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107578345A (en) * 2017-09-08 2018-01-12 南方电网科学研究院有限责任公司 Power system security detection method, device, storage medium and computer equipment
CN108133148A (en) * 2017-12-22 2018-06-08 北京明朝万达科技股份有限公司 Data safety inspection method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107578345A (en) * 2017-09-08 2018-01-12 南方电网科学研究院有限责任公司 Power system security detection method, device, storage medium and computer equipment
CN108133148A (en) * 2017-12-22 2018-06-08 北京明朝万达科技股份有限公司 Data safety inspection method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414394A (en) * 2020-03-31 2020-07-14 上海观安信息技术股份有限公司 Power grid company compliance checking and tracking method and system
CN115118481A (en) * 2022-06-22 2022-09-27 深圳星云智联科技有限公司 Host information acquisition method, device, equipment and medium
CN115118481B (en) * 2022-06-22 2023-11-21 深圳星云智联科技有限公司 Host information acquisition method, device, equipment and medium
CN116723123A (en) * 2023-07-13 2023-09-08 浙江齐安信息科技有限公司 Method, terminal and storage medium for checking and managing safety configuration of industrial control host
CN116723123B (en) * 2023-07-13 2024-03-08 浙江齐安信息科技有限公司 Method, terminal and storage medium for checking and managing safety configuration of industrial control host

Similar Documents

Publication Publication Date Title
CN109687586A (en) A kind of power monitoring Host Security inspection system
CN108734012A (en) Malware recognition methods, device and electronic equipment
CN107341399A (en) Assess the method and device of code file security
CN106327720A (en) Book drifting cabinet
CN108596759A (en) loan application information detecting method and server
CN113192564B (en) Management system and method for high-safety stem cell storage
CN103955429B (en) Determine the method and device of regression test scope
CN110377522A (en) The test method for scene of trading, calculates equipment and medium at device
CN110609908A (en) Case serial-parallel method and device
CN108021788A (en) The method and apparatus of deep sequencing data extraction biomarker based on cell free DNA
CN108710644A (en) One kind is about government affairs big data processing method
CN110009480A (en) The recommended method in judicial collection path, device, medium, electronic equipment
CN107944866B (en) Transaction record duplication elimination method and computer-readable storage medium
CN106844131A (en) A kind of computer motherboard detection method based on soar platform and kylin operating system
CN111931047A (en) Artificial intelligence-based black product account detection method and related device
CN105978722B (en) User property method for digging and device
CN106528566A (en) Log file output method, server and client
Foster et al. Needed: more reliable bioeffects studies at “high band” 5G frequencies
CN109800797A (en) File black and white judgment method, device and equipment based on AI
Punyasena et al. Bioinformatic and biometric methods in plant morphology
CN108734010A (en) The method, apparatus of file detection
CN114566247B (en) Automatic CRF generation method and device, electronic equipment and storage medium
CN110189141A (en) Verification method, device and the computer equipment of invoice
CN109242548A (en) A kind of sales lead recognition methods of knowledge based map and device
CN115310091A (en) Target security level identification method and device based on fusion model and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190426

RJ01 Rejection of invention patent application after publication