CN110636030B - Hierarchical security management and control method and system for electric power mobile terminal - Google Patents
Hierarchical security management and control method and system for electric power mobile terminal Download PDFInfo
- Publication number
- CN110636030B CN110636030B CN201810645786.0A CN201810645786A CN110636030B CN 110636030 B CN110636030 B CN 110636030B CN 201810645786 A CN201810645786 A CN 201810645786A CN 110636030 B CN110636030 B CN 110636030B
- Authority
- CN
- China
- Prior art keywords
- security policy
- policy
- mobile terminal
- priority
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
The invention provides a layering security management and control method and system for an electric power mobile terminal, wherein the method comprises the following steps: judging whether a security policy received by an electric power mobile terminal meets an integrity requirement or not, judging whether the security policy conflicts with an executed security policy or not at the same time, selecting the security policy to be executed according to the priority of the security policy and the executed security policy, and monitoring the execution state of a feedback policy; before issuing the security policy, the method further comprises generating the security policy by defining a type of policy, a violation response action, and a priority. The invention can be applied to the current marketing, operation and inspection and other different professional power mobile operation terminals, ensures that the terminals work compliance according to the formulated safety control strategy, blocks various anomalies in real time, solves the centralized safety management problem faced by the power mobile operation terminals, and ensures the safe and stable operation of the power mobile operation terminals.
Description
Technical Field
The invention relates to the technical field of security control of power mobile operation terminals, in particular to a layering security control method and system of a power mobile terminal.
Background
With the development of informatization construction, more and more services are involved in the development process of the informatization construction, and the electric power mobile terminal is equipment for creating and storing important and sensitive data of the electric power mobile service and is an important component of an information system, so that the realization of the safety guarantee of the electric power mobile terminal becomes a key for realizing information security. At present, the electric mobile terminal faces various security risks, and the security risks are not completely solved, so how to further strengthen the daily operation supervision of the mobile operation terminal becomes a problem that the security of the electric mobile terminal must be solved.
In recent years, policy-based security management has become a security solution widely used in mobile terminals, improving the scalability and flexibility of management systems. Scalability is manifested by the ability to apply a unified policy to a range of related devices and objects; the flexibility is that the strategy can be dynamically modified to dynamically control the operation of the power mobile terminal without changing the bottom layer of the power mobile terminal or interrupting the normal operation of the power mobile terminal. The power mobile application types are multiple, the scenes are different, the unified safety management requirements of the power mobile operation terminals in different service scenes cannot be met by single strategy management and control, if the strategies are respectively set for the different types of terminals, the strategy management is complicated, and strategy conflict is caused.
Disclosure of Invention
The invention provides a layering safety control method and system for an electric power mobile terminal, and aims to solve the problem that safety strategies in the electric power mobile terminal conflict, further improve the flexibility of operation of an electric power mobile terminal system and ensure stable operation of the electric power mobile terminal under the control of the safety strategies.
The invention is realized by the following technical scheme:
in a method for hierarchical security management of an electric mobile terminal, the improvement comprising:
step 1: judging whether the security policy received by the power mobile terminal meets the integrity requirement or not, if so, entering a step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Further, before the step 1, the method includes:
defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy;
and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
Further, the defining the security policy includes:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Further, the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Further, the step 1 includes:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Further, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Further, the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
In a hierarchical security management and control system for an electric mobile terminal, the improvement comprising:
and a complete judging module: the system comprises a power mobile terminal, a conflict judging module and a power control module, wherein the power mobile terminal is used for judging whether a security strategy received by the power mobile terminal meets the integrity requirement or not, if yes, the power mobile terminal is transferred to the conflict judging module, and if not, the security strategy is deleted;
and a conflict judging module: judging whether the security policy conflicts with the executed security policy, if so, transferring to a policy selection module, and if not, executing the security policy and the executed security policy;
a strategy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Preferably, the system further comprises:
the strategy generation module: the security policy management method comprises the steps of defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy; and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
Preferably, the policy generation module is further configured to:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Preferably, the integrity judging module is configured to:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Preferably, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Preferably, the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
The invention has the beneficial effects that:
according to the technical scheme provided by the invention, the security policy is judged whether to meet the integrity requirement or not and whether the executed security policy has conflict or not is judged, and the security policy to be executed is selected according to the priority, so that the power mobile terminal can receive the updated and issued security policy in the continuous operation process, and the stability and the instantaneity are good; meanwhile, the layering management and control of the security policies provide a basis for the power mobile terminal to select the operation security policies, and the layering management of the power mobile terminal can be realized.
Drawings
Fig. 1 is a flowchart of a hierarchical security management and control method for an electric power mobile terminal according to the present invention;
FIG. 2 is a schematic diagram of a hierarchical security management and control strategy model according to the present invention;
fig. 3 is a hierarchical security management and control system diagram of an electric power mobile terminal.
Detailed Description
The following detailed description of specific embodiments of the invention refers to the accompanying drawings.
As shown in fig. 1, a hierarchical security management and control method of an electric power mobile terminal includes:
step 1: judging whether the security policy received by the power mobile terminal meets the integrity requirement or not, if so, entering a step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, before the step 1, the method includes:
defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy;
and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
For example: notifying the power mobile terminal in a UDP mode through a send function call Http(s) interface; enabling the power mobile terminal to trigger an OnMessage event to receive the security policy by calling an Http(s) interface through a recv function; if the power mobile operation terminal does not take the message in time, the power mobile terminal is informed to take the message before every heartbeat of the power mobile terminal so as to ensure that the message is taken by the power mobile terminal.
Specifically, the defining the security policy includes:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Specifically, as shown in fig. 2, the defining the priority of the security policy according to the level of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Specifically, the step 1 includes:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Specifically, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the method further comprises the following steps:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
For example, the policy configuration execution condition of the power mobile terminal is inquired and monitored through monitoring the setting state, the terminal health evaluation and the policy configuration execution condition. And monitoring a setting state, wherein the mobile terminal is provided with a monitor, when the execution result of the strategy configuration is monitored to be changed, the correct strategy configuration is immediately re-executed, for example, after the mobile terminal executes a Wifi closing strategy, when the Wifi is monitored to be turned into an on state, the Wifi closing strategy is executed again. And evaluating the health degree of the terminal, scoring according to the execution condition of the strategy configuration of the mobile terminal, and indicating that the strategy configuration is successfully executed in a number of more and less by the high score and the bottom score. And inquiring the execution condition of the strategy configuration, listing the execution result of each strategy configuration, providing the strategy configuration for a user to inquire, marking the strategy configuration which is normally executed as valid, and marking the strategy configuration which is not normally executed as invalid.
A hierarchical security management and control system for an electric power mobile terminal, as shown in fig. 3, the system comprising:
and a complete judging module: the system comprises a power mobile terminal, a conflict judging module and a power control module, wherein the power mobile terminal is used for judging whether a security strategy received by the power mobile terminal meets the integrity requirement or not, if yes, the power mobile terminal is transferred to the conflict judging module, and if not, the security strategy is deleted;
and a conflict judging module: judging whether the security policy conflicts with the executed security policy, if so, transferring to a policy selection module, and if not, executing the security policy and the executed security policy;
a strategy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, the system further comprises:
the strategy generation module: the security policy management method comprises the steps of defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy; and transmitting the security policy with the defined priority to the power mobile terminal by utilizing the interaction protocol based on the JSON format.
Specifically, the policy generation module is further configured to:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal designated according to the preset, and the priority of the individual power mobile terminal is defined as low.
Specifically, the integrity judging module is configured to:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Specifically, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.
Claims (5)
1. The hierarchical security management and control method for the power mobile terminal is characterized by comprising the following steps of:
step 1: judging whether the security policy received by the power mobile terminal meets the integrity requirement or not, if so, entering a step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
step 3: selecting a security policy to be executed according to the priority of the security policy and the executed security policy;
before the step 1, the method comprises the following steps:
defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy;
transmitting the security policy with defined priority to the power mobile terminal by using an interaction protocol based on the JSON format;
the defining the security policy includes:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding;
the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal appointed according to the preset, and the priority of the individual power mobile terminal is defined as low;
the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
2. The method according to claim 1, wherein the step 1 comprises:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
3. The method of claim 1, wherein the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
4. A hierarchical security management and control system for an electric mobile terminal, the system comprising:
and a complete judging module: the system comprises a power mobile terminal, a conflict judging module and a power control module, wherein the power mobile terminal is used for judging whether a security strategy received by the power mobile terminal meets the integrity requirement or not, if yes, the power mobile terminal is transferred to the conflict judging module, and if not, the security strategy is deleted;
and a conflict judging module: judging whether the security policy conflicts with the executed security policy, if so, transferring to a policy selection module, and if not, executing the security policy and the executed security policy;
a strategy selection module: selecting a security policy to be executed according to the priority of the security policy and the executed security policy;
the system further comprises:
the strategy generation module: the security policy management method comprises the steps of defining a security policy, and defining the priority of the security policy according to the hierarchy of the security policy; transmitting the security policy with defined priority to the power mobile terminal by using an interaction protocol based on the JSON format;
the policy generation module is further configured to:
defining a policy type and a violation response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation response action includes: locking a machine, popup window reminding, short message reminding and mail reminding;
the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution object of the security policy is all power mobile terminals, and the priority of the security policy is defined as high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is a power mobile terminal grouped according to a preset, and the priority of the power mobile terminal is defined as the middle;
when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual power mobile terminal appointed according to the preset, and the priority of the individual power mobile terminal is defined as low;
the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy, and stopping executing the executed security policy;
if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy;
the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
5. The system of claim 4, wherein the integrity determination module is configured to:
and checking the integrity of the security policy received by the electric mobile terminal through a national security SM3 algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810645786.0A CN110636030B (en) | 2018-06-21 | 2018-06-21 | Hierarchical security management and control method and system for electric power mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810645786.0A CN110636030B (en) | 2018-06-21 | 2018-06-21 | Hierarchical security management and control method and system for electric power mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110636030A CN110636030A (en) | 2019-12-31 |
CN110636030B true CN110636030B (en) | 2023-04-21 |
Family
ID=68966513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810645786.0A Active CN110636030B (en) | 2018-06-21 | 2018-06-21 | Hierarchical security management and control method and system for electric power mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110636030B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111859397A (en) * | 2020-07-23 | 2020-10-30 | 国家工业信息安全发展研究中心 | Terminal protection strategy configuration method and device |
CN112866264A (en) * | 2021-01-25 | 2021-05-28 | 深圳融安网络科技有限公司 | Network security detection method and device, network security equipment and readable storage medium |
CN114205125B (en) * | 2021-11-25 | 2024-03-29 | 北京国泰网信科技有限公司 | Policy management method, device, equipment and medium based on security area |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215212A (en) * | 2010-04-02 | 2011-10-12 | 中兴通讯股份有限公司 | Method and architecture for handling conflict of security policies and unified converter |
CN103475478A (en) * | 2013-09-03 | 2013-12-25 | 广东电网公司电力科学研究院 | Terminal safety protection method and equipment |
EP2792186A1 (en) * | 2011-12-14 | 2014-10-22 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
KR101828845B1 (en) * | 2017-04-18 | 2018-02-14 | 주식회사 그리드위즈 | Policy management method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007110094A1 (en) * | 2006-03-27 | 2007-10-04 | Telecom Italia S.P.A. | System for enforcing security policies on mobile communications devices |
WO2009151459A1 (en) * | 2008-06-13 | 2009-12-17 | Hewlett-Packard Development Company, L.P. | Hierarchical policy management |
KR101258834B1 (en) * | 2011-09-23 | 2013-05-06 | 삼성에스디에스 주식회사 | Apparatus and method for management of mobile device by security policy, and management server for management of mobile device |
US10868737B2 (en) * | 2016-10-26 | 2020-12-15 | Arizona Board Of Regents On Behalf Of Arizona State University | Security policy analysis framework for distributed software defined networking (SDN) based cloud environments |
-
2018
- 2018-06-21 CN CN201810645786.0A patent/CN110636030B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215212A (en) * | 2010-04-02 | 2011-10-12 | 中兴通讯股份有限公司 | Method and architecture for handling conflict of security policies and unified converter |
EP2792186A1 (en) * | 2011-12-14 | 2014-10-22 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
CN103475478A (en) * | 2013-09-03 | 2013-12-25 | 广东电网公司电力科学研究院 | Terminal safety protection method and equipment |
KR101828845B1 (en) * | 2017-04-18 | 2018-02-14 | 주식회사 그리드위즈 | Policy management method |
Non-Patent Citations (3)
Title |
---|
基于特征的网络安全策略验证;唐成华等;《计算机研究与发展》;20091115(第11期);全文 * |
多域网络安全管理系统策略一致性研究与设计;周英;《四川文理学院学报》;20130310(第02期);全文 * |
网络安全管理技术研究;厉颖等;《软件导刊》;20130220(第02期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110636030A (en) | 2019-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110636030B (en) | Hierarchical security management and control method and system for electric power mobile terminal | |
EP2798509B1 (en) | Systems and methods of remote communication | |
CN110493080B (en) | Block link point monitoring method and device, electronic equipment and storage medium | |
CN110956357A (en) | Intelligent regulation and control networked interaction system applied to power company | |
US20140258526A1 (en) | Systems and methods of remote communication | |
KR101416280B1 (en) | Event handling system and method | |
US20090164289A1 (en) | Call center schedule compliance management | |
CN104967537A (en) | Alarm information pushing method and device | |
CN110809262B (en) | COAP protocol-based operation and maintenance management method for Internet of things equipment | |
CN109669835A (en) | MySQL database monitoring method, device, equipment and readable storage medium storing program for executing | |
CN108429820A (en) | A kind of communication means of internet of things application layer, system and terminal device | |
CN110673938A (en) | Task processing method, system, server and storage medium | |
CN103905240A (en) | Method and system for active network service fault reminding and processing | |
CN109066974A (en) | Substation's status information capture method and device | |
CN110705893A (en) | Service node management method, device, equipment and storage medium | |
CN115001989A (en) | Equipment early warning method, device, equipment and readable storage medium | |
CN114925391A (en) | Method and device for monitoring circulation of private information, electronic equipment and storage medium | |
CN103166779A (en) | Alarm confirming and processing method and device based on mobile terminal | |
CN107911229A (en) | Based reminding method, device, electronic equipment and the storage medium that operating status changes | |
CN106384159A (en) | Judge meeting appointment method and device applied to court system | |
US20140237110A1 (en) | Server monitoring | |
CN108111352A (en) | A kind of Router Security control method, network management platform and system | |
US7948377B2 (en) | Smart mediation and reaction system for protecting interdependent critical infrastructures | |
EP2985950B1 (en) | Recovery method and apparatus for safety controller | |
Teodorowicz | Comparison of SCADA protocols and implementation of IEC 104 and MQTT in MOSAIK |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |