CN110636030B - Hierarchical security management and control method and system for electric power mobile terminal - Google Patents

Hierarchical security management and control method and system for electric power mobile terminal Download PDF

Info

Publication number
CN110636030B
CN110636030B CN201810645786.0A CN201810645786A CN110636030B CN 110636030 B CN110636030 B CN 110636030B CN 201810645786 A CN201810645786 A CN 201810645786A CN 110636030 B CN110636030 B CN 110636030B
Authority
CN
China
Prior art keywords
security policy
policy
mobile terminal
priority
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810645786.0A
Other languages
Chinese (zh)
Other versions
CN110636030A (en
Inventor
陈牧
李尼格
戴造建
邵志鹏
李勇
陈璐
方文高
席泽生
张涛
马媛媛
石聪聪
张海峰
原义栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
State Grid Liaoning Electric Power Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
State Grid Liaoning Electric Power Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, Global Energy Interconnection Research Institute, State Grid Jibei Electric Power Co Ltd, State Grid Liaoning Electric Power Co Ltd, Beijing Smartchip Microelectronics Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810645786.0A priority Critical patent/CN110636030B/en
Publication of CN110636030A publication Critical patent/CN110636030A/en
Application granted granted Critical
Publication of CN110636030B publication Critical patent/CN110636030B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention provides a layering security management and control method and system for an electric power mobile terminal, wherein the method comprises the following steps: judging whether a security policy received by an electric power mobile terminal meets an integrity requirement or not, judging whether the security policy conflicts with an executed security policy or not at the same time, selecting the security policy to be executed according to the priority of the security policy and the executed security policy, and monitoring the execution state of a feedback policy; before issuing the security policy, the method further comprises generating the security policy by defining a type of policy, a violation response action, and a priority. The invention can be applied to the current marketing, operation and inspection and other different professional power mobile operation terminals, ensures that the terminals work compliance according to the formulated safety control strategy, blocks various anomalies in real time, solves the centralized safety management problem faced by the power mobile operation terminals, and ensures the safe and stable operation of the power mobile operation terminals.

Description

Hierarchical security management and control method and system for electric power mobile terminal
Technical Field
The invention relates to the technical field of security control of power mobile operation terminals, in particular to a layering security control method and system of a power mobile terminal.
Background
With the development of informatization construction, more and more services are involved in the development process of the informatization construction, and the electric power mobile terminal is equipment for creating and storing important and sensitive data of the electric power mobile service and is an important component of an information system, so that the realization of the safety guarantee of the electric power mobile terminal becomes a key for realizing information security. At present, the electric mobile terminal faces various security risks, and the security risks are not completely solved, so how to further strengthen the daily operation supervision of the mobile operation terminal becomes a problem that the security of the electric mobile terminal must be solved.
In recent years, policy-based security management has become a security solution widely used in mobile terminals, improving the scalability and flexibility of management systems. Scalability is manifested by the ability to apply a unified policy to a range of related devices and objects; the flexibility is that the strategy can be dynamically modified to dynamically control the operation of the power mobile terminal without changing the bottom layer of the power mobile terminal or interrupting the normal operation of the power mobile terminal. The power mobile application types are multiple, the scenes are different, the unified safety management requirements of the power mobile operation terminals in different service scenes cannot be met by single strategy management and control, if the strategies are respectively set for the different types of terminals, the strategy management is complicated, and strategy conflict is caused.
Disclosure of Invention
The invention provides a layering safety control method and system for an electric power mobile terminal, and aims to solve the problem that safety strategies in the electric power mobile terminal conflict, further improve the flexibility of operation of an electric power mobile terminal system and ensure stable operation of the electric power mobile terminal under the control of the safety strategies.
The invention is realized by the following technical scheme:
in a method for hierarchical security management of an electric mobile terminal, the improvement comprising:
step 1: judging whether the security policy received by the power mobile terminal meets the integrity requirement or not, if so, entering a step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Further, before the step 1, the method includes:
defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy;
and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
Further, the defining the security policy includes:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Further, the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Further, the step 1 includes:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Further, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Further, the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
In a hierarchical security management and control system for an electric mobile terminal, the improvement comprising:
and a complete judging module: the system comprises a power mobile terminal, a conflict judging module and a power control module, wherein the power mobile terminal is used for judging whether a security strategy received by the power mobile terminal meets the integrity requirement or not, if yes, the power mobile terminal is transferred to the conflict judging module, and if not, the security strategy is deleted;
and a conflict judging module: judging whether the security policy conflicts with the executed security policy, if so, transferring to a policy selection module, and if not, executing the security policy and the executed security policy;
a strategy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Preferably, the system further comprises:
the strategy generation module: the security policy management method comprises the steps of defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy; and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
Preferably, the policy generation module is further configured to:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Preferably, the integrity judging module is configured to:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Preferably, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Preferably, the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
The invention has the beneficial effects that:
according to the technical scheme provided by the invention, the security policy is judged whether to meet the integrity requirement or not and whether the executed security policy has conflict or not is judged, and the security policy to be executed is selected according to the priority, so that the power mobile terminal can receive the updated and issued security policy in the continuous operation process, and the stability and the instantaneity are good; meanwhile, the layering management and control of the security policies provide a basis for the power mobile terminal to select the operation security policies, and the layering management of the power mobile terminal can be realized.
Drawings
Fig. 1 is a flowchart of a hierarchical security management and control method for an electric power mobile terminal according to the present invention;
FIG. 2 is a schematic diagram of a hierarchical security management and control strategy model according to the present invention;
fig. 3 is a hierarchical security management and control system diagram of an electric power mobile terminal.
Detailed Description
The following detailed description of specific embodiments of the invention refers to the accompanying drawings.
As shown in fig. 1, a hierarchical security management and control method of an electric power mobile terminal includes:
step 1: judging whether the security policy received by the power mobile terminal meets the integrity requirement or not, if so, entering a step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, before the step 1, the method includes:
defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy;
and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
For example: notifying the power mobile terminal in a UDP mode through a send function call Http(s) interface; enabling the power mobile terminal to trigger an OnMessage event to receive the security policy by calling an Http(s) interface through a recv function; if the power mobile operation terminal does not take the message in time, the power mobile terminal is informed to take the message before every heartbeat of the power mobile terminal so as to ensure that the message is taken by the power mobile terminal.
Specifically, the defining the security policy includes:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Specifically, as shown in fig. 2, the defining the priority of the security policy according to the level of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Specifically, the step 1 includes:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Specifically, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the method further comprises the following steps:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
For example, the policy configuration execution condition of the power mobile terminal is inquired and monitored through monitoring the setting state, the terminal health evaluation and the policy configuration execution condition. And monitoring a setting state, wherein the mobile terminal is provided with a monitor, when the execution result of the strategy configuration is monitored to be changed, the correct strategy configuration is immediately re-executed, for example, after the mobile terminal executes a Wifi closing strategy, when the Wifi is monitored to be turned into an on state, the Wifi closing strategy is executed again. And evaluating the health degree of the terminal, scoring according to the execution condition of the strategy configuration of the mobile terminal, and indicating that the strategy configuration is successfully executed in a number of more and less by the high score and the bottom score. And inquiring the execution condition of the strategy configuration, listing the execution result of each strategy configuration, providing the strategy configuration for a user to inquire, marking the strategy configuration which is normally executed as valid, and marking the strategy configuration which is not normally executed as invalid.
A hierarchical security management and control system for an electric power mobile terminal, as shown in fig. 3, the system comprising:
and a complete judging module: the system comprises a power mobile terminal, a conflict judging module and a power control module, wherein the power mobile terminal is used for judging whether a security strategy received by the power mobile terminal meets the integrity requirement or not, if yes, the power mobile terminal is transferred to the conflict judging module, and if not, the security strategy is deleted;
and a conflict judging module: judging whether the security policy conflicts with the executed security policy, if so, transferring to a policy selection module, and if not, executing the security policy and the executed security policy;
a strategy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, the system further comprises:
the strategy generation module: the security policy management method comprises the steps of defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy; and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
Specifically, the policy generation module is further configured to:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Specifically, the integrity judging module is configured to:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Specifically, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.

Claims (5)

1. The hierarchical security management and control method for the power mobile terminal is characterized by comprising the following steps of:
step 1: judging whether the security policy received by the power mobile terminal meets the integrity requirement or not, if so, entering a step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
step 3: selecting a security policy to be executed according to the priority of the security policy and the executed security policy;
before the step 1, the method comprises the following steps:
defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy;
transmitting the security policy with defined priority to the power mobile terminal by using an interaction protocol based on the JSON format;
the defining the security policy includes:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding;
the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal appointed according to the preset, and the priority of the individual power mobile terminal is defined as low;
the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
2. The method according to claim 1, wherein the step 1 comprises:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
3. The method of claim 1, wherein the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
4. A hierarchical security management and control system for an electric mobile terminal, the system comprising:
and a complete judging module: the system comprises a power mobile terminal, a conflict judging module and a power control module, wherein the power mobile terminal is used for judging whether a security strategy received by the power mobile terminal meets the integrity requirement or not, if yes, the power mobile terminal is transferred to the conflict judging module, and if not, the security strategy is deleted;
and a conflict judging module: judging whether the security policy conflicts with the executed security policy, if so, transferring to a policy selection module, and if not, executing the security policy and the executed security policy;
a strategy selection module: selecting a security policy to be executed according to the priority of the security policy and the executed security policy;
the system further comprises:
the strategy generation module: the security policy management method comprises the steps of defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy; transmitting the security policy with defined priority to the power mobile terminal by using an interaction protocol based on the JSON format;
the policy generation module is further configured to:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding;
the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal appointed according to the preset, and the priority of the individual power mobile terminal is defined as low;
the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy;
the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
5. The system of claim 4, wherein the integrity determination module is configured to:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
CN201810645786.0A 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal Active CN110636030B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810645786.0A CN110636030B (en) 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810645786.0A CN110636030B (en) 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal

Publications (2)

Publication Number Publication Date
CN110636030A CN110636030A (en) 2019-12-31
CN110636030B true CN110636030B (en) 2023-04-21

Family

ID=68966513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810645786.0A Active CN110636030B (en) 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal

Country Status (1)

Country Link
CN (1) CN110636030B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859397A (en) * 2020-07-23 2020-10-30 国家工业信息安全发展研究中心 Terminal protection strategy configuration method and device
CN112866264A (en) * 2021-01-25 2021-05-28 深圳融安网络科技有限公司 Network security detection method and device, network security equipment and readable storage medium
CN114205125B (en) * 2021-11-25 2024-03-29 北京国泰网信科技有限公司 Policy management method, device, equipment and medium based on security area

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215212A (en) * 2010-04-02 2011-10-12 中兴通讯股份有限公司 Method and architecture for handling conflict of security policies and unified converter
CN103475478A (en) * 2013-09-03 2013-12-25 广东电网公司电力科学研究院 Terminal safety protection method and equipment
EP2792186A1 (en) * 2011-12-14 2014-10-22 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
KR101828845B1 (en) * 2017-04-18 2018-02-14 주식회사 그리드위즈 Policy management method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007110094A1 (en) * 2006-03-27 2007-10-04 Telecom Italia S.P.A. System for enforcing security policies on mobile communications devices
WO2009151459A1 (en) * 2008-06-13 2009-12-17 Hewlett-Packard Development Company, L.P. Hierarchical policy management
KR101258834B1 (en) * 2011-09-23 2013-05-06 삼성에스디에스 주식회사 Apparatus and method for management of mobile device by security policy, and management server for management of mobile device
US10868737B2 (en) * 2016-10-26 2020-12-15 Arizona Board Of Regents On Behalf Of Arizona State University Security policy analysis framework for distributed software defined networking (SDN) based cloud environments

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215212A (en) * 2010-04-02 2011-10-12 中兴通讯股份有限公司 Method and architecture for handling conflict of security policies and unified converter
EP2792186A1 (en) * 2011-12-14 2014-10-22 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
CN103475478A (en) * 2013-09-03 2013-12-25 广东电网公司电力科学研究院 Terminal safety protection method and equipment
KR101828845B1 (en) * 2017-04-18 2018-02-14 주식회사 그리드위즈 Policy management method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
基于特征的网络安全策略验证;唐成华等;《计算机研究与发展》;20091115(第11期);全文 *
多域网络安全管理系统策略一致性研究与设计;周英;《四川文理学院学报》;20130310(第02期);全文 *
网络安全管理技术研究;厉颖等;《软件导刊》;20130220(第02期);全文 *

Also Published As

Publication number Publication date
CN110636030A (en) 2019-12-31

Similar Documents

Publication Publication Date Title
CN110636030B (en) Hierarchical security management and control method and system for electric power mobile terminal
EP2798509B1 (en) Systems and methods of remote communication
CN110493080B (en) Block link point monitoring method and device, electronic equipment and storage medium
CN110956357A (en) Intelligent regulation and control networked interaction system applied to power company
US20140258526A1 (en) Systems and methods of remote communication
KR101416280B1 (en) Event handling system and method
US20090164289A1 (en) Call center schedule compliance management
CN104967537A (en) Alarm information pushing method and device
CN110809262B (en) COAP protocol-based operation and maintenance management method for Internet of things equipment
CN109669835A (en) MySQL database monitoring method, device, equipment and readable storage medium storing program for executing
CN108429820A (en) A kind of communication means of internet of things application layer, system and terminal device
CN110673938A (en) Task processing method, system, server and storage medium
CN103905240A (en) Method and system for active network service fault reminding and processing
CN109066974A (en) Substation's status information capture method and device
CN110705893A (en) Service node management method, device, equipment and storage medium
CN115001989A (en) Equipment early warning method, device, equipment and readable storage medium
CN114925391A (en) Method and device for monitoring circulation of private information, electronic equipment and storage medium
CN103166779A (en) Alarm confirming and processing method and device based on mobile terminal
CN107911229A (en) Based reminding method, device, electronic equipment and the storage medium that operating status changes
CN106384159A (en) Judge meeting appointment method and device applied to court system
US20140237110A1 (en) Server monitoring
CN108111352A (en) A kind of Router Security control method, network management platform and system
US7948377B2 (en) Smart mediation and reaction system for protecting interdependent critical infrastructures
EP2985950B1 (en) Recovery method and apparatus for safety controller
Teodorowicz Comparison of SCADA protocols and implementation of IEC 104 and MQTT in MOSAIK

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant