CN111414394A - Power grid company compliance checking and tracking method and system - Google Patents

Power grid company compliance checking and tracking method and system Download PDF

Info

Publication number
CN111414394A
CN111414394A CN202010246761.0A CN202010246761A CN111414394A CN 111414394 A CN111414394 A CN 111414394A CN 202010246761 A CN202010246761 A CN 202010246761A CN 111414394 A CN111414394 A CN 111414394A
Authority
CN
China
Prior art keywords
compliance
module
data
grid company
power grid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010246761.0A
Other languages
Chinese (zh)
Inventor
李俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Data Security Solutions Co Ltd
Original Assignee
Information and Data Security Solutions Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information and Data Security Solutions Co Ltd filed Critical Information and Data Security Solutions Co Ltd
Priority to CN202010246761.0A priority Critical patent/CN111414394A/en
Publication of CN111414394A publication Critical patent/CN111414394A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24553Query execution of query operations
    • G06F16/24554Unary operations; Data partitioning operations
    • G06F16/24556Aggregation; Duplicate elimination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2462Approximate or statistical queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Probability & Statistics with Applications (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a system for checking and tracking compliance of a power grid company, which utilize a compliance data aggregation module to obtain asset information of the power grid company and send the asset and related information of a corresponding responsible person to a compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; according to the method, the system and the device, the base line configuration check is carried out according to the actual condition of a power grid company, the compliance data management, the compliance detection management, the compliance disposal management and the compliance report management are completed, the full automation and the periodic automatic execution of the compliance detection process are realized, the human intervention is reduced, a user can regularly receive the latest asset compliance report, the working efficiency of related workers is improved, and the labor and time costs are saved.

Description

Power grid company compliance checking and tracking method and system
Technical Field
The invention relates to the technical field of power grids, in particular to a method and a system for checking and tracking the compliance of a power grid company.
Background
The whole of the substation and the transmission and distribution line of various voltages in the power grid system is called as a power grid. The system comprises three units of power transformation, power transmission and power distribution. The task of the power grid is to deliver and distribute electrical energy, changing the voltage.
The power grid company is responsible for data management, detection management, report management and the like of various data in the power system, and the management of various information data by the existing power grid company is not standardized enough and has low efficiency.
Disclosure of Invention
The present invention is directed to a method and a system for checking and tracking compliance of a power grid company, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a power grid company compliance checking and tracking method comprises the following specific steps: the compliance data aggregation module acquires asset information of a power grid company and sends the asset and related information of a corresponding responsible person to the compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; performing baseline configuration check according to the actual condition of the power grid company, and sending baseline configuration check condition data to a compliance data aggregation module; carrying out weak password inspection according to a power grid company, and sending inspection result data to a compliance data pre-calculation module; acquiring asset information inside a power grid company, driving a content compliance detection scanning engine, generating a content compliance inspection result and sending the content compliance inspection result to a compliance data aggregation module; the compliance data pre-calculation module receives vulnerability data, asset information, baseline configuration inspection conditions, weak passwords and content compliance inspection results from the compliance data aggregation module, and after data formatting, the data are sent to the compliance evaluation function module, the data to be inspected are analyzed, the characteristics of the data to be inspected in a data set of items to be inspected in the data are determined, and matching information is generated by matching each compliance item; obtaining a compliance examination result of the compliance item based on the generated matching result information; and the compliance detection and tracking module sends the generated compliance examination result to a compliance examination result reporting module, generates and outputs a compliance detection report matched with the examination result, and simultaneously sends the compliance detection report to the compliance detection and tracking module to track the non-compliance examination result.
A compliance checking and tracking system for a power grid company comprises a database, a data aggregation module, a file storage module, a compliance data pre-calculation module, a compliance data analysis module, a compliance data evaluation module, a compliance checking result reporting module and a compliance checking result reporting module, wherein the database is respectively connected with the data aggregation module and the file storage module, the data aggregation module and the file storage module are respectively connected with the compliance data pre-calculation module, the compliance data pre-calculation module is also connected with the compliance data analysis module and the compliance data evaluation module, the compliance data evaluation module is also connected with the compliance checking result reporting module, and the compliance checking result reporting module is also connected with the compliance checking result reporting module.
As a further technical scheme of the invention, the database comprises Oracle, SQ L Server and Informix.
As a further technical scheme of the invention: also includes a management module.
As a further technical scheme of the invention: transaction application data stored in the database.
As a further technical scheme of the invention: the operating systems adopted by the management module comprise Windows2000, Windows2003, Windows XP, Windows Vista and UNIX operating systems.
As a further technical scheme of the invention: the management module is internally provided with safety equipment, and the safety equipment comprises a Juniper firewall and a Cisco firewall.
Compared with the prior art, the invention has the beneficial effects that: the invention completes compliance data management, compliance detection management, compliance disposal management and compliance report management, realizes full automation of compliance detection process, periodically and automatically executes, reduces human intervention, and ensures that a user can regularly receive the latest asset compliance report, thereby improving the working efficiency of related workers and saving labor and time cost.
Drawings
FIG. 1 is a system diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1: referring to fig. 1, a method for checking and tracking compliance of a power grid company includes the following steps: the compliance data aggregation module acquires asset information of a power grid company and sends the asset and related information of a corresponding responsible person to the compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; performing baseline configuration check according to the actual condition of the power grid company, and sending baseline configuration check condition data to a compliance data aggregation module; carrying out weak password inspection according to a power grid company, and sending inspection result data to a compliance data pre-calculation module; acquiring asset information inside a power grid company, driving a content compliance detection scanning engine, generating a content compliance inspection result and sending the content compliance inspection result to a compliance data aggregation module; the compliance data pre-calculation module receives vulnerability data, asset information, baseline configuration inspection conditions, weak passwords and content compliance inspection results from the compliance data aggregation module, and after data formatting, the data are sent to the compliance evaluation function module, the data to be inspected are analyzed, the characteristics of the data to be inspected in a data set of items to be inspected in the data are determined, and matching information is generated by matching each compliance item; obtaining a compliance examination result of the compliance item based on the generated matching result information; and the compliance detection and tracking module sends the generated compliance examination result to a compliance examination result reporting module, generates and outputs a compliance detection report matched with the examination result, and simultaneously sends the compliance detection report to the compliance detection and tracking module to track the non-compliance examination result.
A compliance checking and tracking system for a power grid company comprises a database, a data aggregation module, a file storage module, a compliance data pre-calculation module, a compliance data analysis module, a compliance data evaluation module, a compliance checking result reporting module and a compliance checking result reporting module, wherein the database is respectively connected with the data aggregation module and the file storage module, the data aggregation module and the file storage module are respectively connected with the compliance data pre-calculation module, the compliance data pre-calculation module is also connected with the compliance data analysis module and the compliance data evaluation module, the compliance data evaluation module is also connected with the compliance checking result reporting module, and the compliance checking result reporting module is also connected with the compliance checking result reporting module.
1. Establishment of configuration checking library
And identifying the service system, analyzing the functional architecture of the service system by combining the baseline security model, and refining the functional architecture to different modules of a system level. On the basis, aiming at the characteristics of a business system, the possible security threats are analyzed, and the countermeasures aiming at the threats are decomposed into a system implementation layer by layer. The method mainly comprises the check items of a security vulnerability aspect, a security configuration aspect and the like.
The research range of the baseline policy library mainly comprises an operating system, a database, network equipment, security equipment and the like, wherein the operating system mainly comprises Windows2000, Windows2003, Windows XP, Windows Vista, UNIX operating system series (AIX, HP UNIX, L inux) and the like, the database mainly comprises network equipment such as Oracle, SQ L Server, Informix and the like, the database mainly comprises Huawei/Cisco equipment, and the security equipment mainly comprises Junper, Cisco firewall and the like.
The research content of the baseline policy library mainly comprises account numbers, passwords, authorization, logs, IP addresses and other contents. The content relates to the content of the enterprise's inspection and aspects that may affect the security of the device or system, such as the complexity of passwords, lifetime, historical passwords, password modifications, password deposits, and the like. The configuration checking part in the specification defines basic configuration safety requirements of the equipment and provides guidance for defining relevant safety requirements in the links of equipment network access testing, engineering acceptance and equipment operation and maintenance.
2. System architecture design
The configuration checking system is a WEB-based management mode, and a user uses a browser to interact with a system WEB interface module through an SS L encryption channel, so that the user management is facilitated.
1) And the scanning core module is one of the most important modules of the system and is responsible for finishing the detection and evaluation work of the target, including judging the survival state of the host, identifying the operating system, analyzing and matching rules and the like.
2) And a safety baseline configuration knowledge base, wherein the safety baseline configuration knowledge base comprises a safety configuration guide parameter checking o list of a known system, network equipment, an application, middleware, a database and the like, and is a basis for system operation, and a scanning scheduling module and a Web management module both rely on the safety configuration guide parameter checking o list to work.
3) And the scanning result library comprises result information of the scanning task, is a basis for generating a scanning result report and is a data source of the query and analysis result.
4) And the data synchronization module is responsible for version upgrading of each module in the system and provides data synchronization with the external data summarizing server.
5) And the Web interface module is responsible for interacting with the user and completing management work in cooperation with the request of the user. The Web management module comprises a plurality of sub-modules which together complete the request of the user.
6) And the local execution tool is used for providing a matched local execution tool by the configuration checking system, generating a report file after the local execution of the equipment to be checked, and importing the report file into the system for summarizing and analyzing. The tool can complete the functions of scanning, data output, report generation and the like through a functional interface provided by a WEB interface, and provides docking with other systems, and the tool has the following main functions:
and the task management function is used for finishing the management work of the user evaluation task.
And the report management function is used for reading the scanning result base and generating a scanning report according to the vulnerability description information and the solution.
And the user management function is used for completing the creation, deletion, modification and authorization management of the operation tool user.
And the audit management function is used for finishing the correction management of the tool operation records and the task result reports.
And completing the conventional configuration management of the tool.
And the template management function is used for completing the creation, deletion, modification management and maintenance of a local inspection tool of the security baseline inspection template.
3. Design of statistical analysis
The safety baseline verification tool analyzes risks from both macroscopic and microscopic perspectives. Macroscopically, the system deeply reflects the overall safety condition of the network from a plurality of visual angles, carries out fine-grained statistical analysis on multi-visual angle information such as problem distribution, harm, host information and the like, intuitively and clearly reflects the safety baseline problem distribution condition of information assets on the whole through forms such as bar charts, pie charts and the like, and microscopically, the system provides a detailed safety configuration solution for each information, supports the user to input keywords by himself to retrieve related information, so that the user can specifically know the detailed information of a certain host or a certain configuration. The method not only carries out statistical analysis on the safety baseline result and the like of a single scanning task, but also carries out comprehensive risk change and safety comparison evaluation on a plurality of scanning processes.
Example 2: on the basis of example 1, step B was carried out in two steps: firstly, simulating the irregular shape and size of particles: stretching a sphere with the radius R into an ellipsoid in any direction to enable the middle points of the sphere and the ellipsoid to be matched; the ellipsoidal surface is arbitrarily provided with N tangent planes; the smallest space enclosed by the tangent plane and the ellipsoid is the irregular-shaped particles, and the largest distance between the gravity center of the particles and the outermost surface is the radius of the particles; secondly, simulating the components of the particles: the sandstone mainly comprises three components of quartz, feldspar and rock debris, and according to different component compositions, the sandstone can be divided into seven types of quartz sandstone, feldspar sandstone, rock debris sandstone, feldspar quartz sandstone, rock debris quartz sandstone, feldspar rock debris sandstone and rock debris feldspar sandstone, so that the sandstone particles are determined to be of the seven types, and if the particles of each type are the seven typesThe ratio of particles in turn is P1、P2、P3、P4、P5、P6And P7And P is1+P2+P3+P4+P5+P6+P7=1, generate a random number P for each particle, if P ∈ [0, P1]The particle is quartz sandstone particle, if P ∈ [ P ]1, P1+P2]If the particle is feldspar sandstone particle, if P ∈ [ P ]1+P2, P1+P2+P3]The particles are rock debris sandstone particles, if P ∈ [ P ]1+P2+P3, P1+P2+P3+P4]If the particle is feldspar quartz sandstone particle, P ∈ [ P ]1+P2+P3+P4,P1+P2+P3+P4+P5]The particles are rock debris quartz sandstone particles, if P ∈ [ P ]1+P2+P3+P4+P5, P1+P2+P3+P4+P5+P6]The particle is feldspar quarry debris sandstone particle, if P ∈ [ P ]1+P2+P3+P4+P5+P6, 1]If the particles are the rock debris feldspar sandstone particles; on the basis of the two steps, all the sandstone particles are simulated by combining the distribution characteristics of the sizes of the sandstone particles.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (7)

1. A power grid company compliance checking and tracking method is characterized by comprising the following specific steps: the compliance data aggregation module acquires asset information of a power grid company and sends the asset and related information of a corresponding responsible person to the compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; performing baseline configuration check according to the actual condition of the power grid company, and sending baseline configuration check condition data to a compliance data aggregation module; carrying out weak password inspection according to a power grid company, and sending inspection result data to a compliance data pre-calculation module; acquiring asset information inside a power grid company, driving a content compliance detection scanning engine, generating a content compliance inspection result and sending the content compliance inspection result to a compliance data aggregation module; the compliance data pre-calculation module receives vulnerability data, asset information, baseline configuration inspection conditions, weak passwords and content compliance inspection results from the compliance data aggregation module, and after data formatting, the data are sent to the compliance evaluation function module, the data to be inspected are analyzed, the characteristics of the data to be inspected in a data set of items to be inspected in the data are determined, and matching information is generated by matching each compliance item; obtaining a compliance examination result of the compliance item based on the generated matching result information; and the compliance detection and tracking module sends the generated compliance examination result to a compliance examination result reporting module, generates and outputs a compliance detection report matched with the examination result, and simultaneously sends the compliance detection report to the compliance detection and tracking module to track the non-compliance examination result.
2. The utility model provides a power grid company compliance inspection and tracking system, includes database, data aggregation module, file storage module, compliance data precalculation module, compliance data analysis module, compliance data evaluation module, compliance inspection result report module and compliance inspection result report module, its characterized in that, the database is connected data aggregation module and file storage module respectively, and data aggregation module, file storage module all link to the compliance data precalculation module, and compliance data precalculation module still links to the compliance data analysis module and still connects the compliance data evaluation module, and the compliance data evaluation module still links to the compliance inspection result report module, and the compliance inspection result report module still links to the compliance inspection result report module.
3. The grid company compliance checking and tracking system of claim 2, wherein the database comprises Oracle, SQ L Server, Informix.
4. The grid company compliance checking and tracking system of claim 2, further comprising a management module.
5. A grid company compliance checking and tracking system according to claim 3, wherein said database stores transaction application data.
6. The grid company compliance checking and tracking system of claim 4, wherein the management module uses operating systems including Windows2000, Windows2003, Windows XP, Windows Vista, UNIX operating systems.
7. The grid company compliance checking and tracking system of claim 4, wherein the management module is internally provided with a security device, and the security device comprises a Juniper firewall and a Cisco firewall.
CN202010246761.0A 2020-03-31 2020-03-31 Power grid company compliance checking and tracking method and system Pending CN111414394A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010246761.0A CN111414394A (en) 2020-03-31 2020-03-31 Power grid company compliance checking and tracking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010246761.0A CN111414394A (en) 2020-03-31 2020-03-31 Power grid company compliance checking and tracking method and system

Publications (1)

Publication Number Publication Date
CN111414394A true CN111414394A (en) 2020-07-14

Family

ID=71491677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010246761.0A Pending CN111414394A (en) 2020-03-31 2020-03-31 Power grid company compliance checking and tracking method and system

Country Status (1)

Country Link
CN (1) CN111414394A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469546A (en) * 2021-07-13 2021-10-01 宝能(广州)汽车研究院有限公司 Project management and control method based on standard and regulation, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683127A (en) * 2013-11-27 2015-06-03 北京神州泰岳软件股份有限公司 Method and system for centrally checking weak passwords of equipment
CN107547228A (en) * 2016-06-29 2018-01-05 南京联成科技发展股份有限公司 A kind of safe operation management platform based on big data realizes framework
CN108763957A (en) * 2018-05-29 2018-11-06 电子科技大学 A kind of safety auditing system of database, method and server
CN109102407A (en) * 2018-08-10 2018-12-28 中募网络科技(北京)股份有限公司 A kind of Si Mu company closes rule and checks and monitoring method and system
CN109379390A (en) * 2018-12-25 2019-02-22 中国电子科技网络信息安全有限公司 A kind of network security baseline generation method based on full flow
CN109687586A (en) * 2018-12-28 2019-04-26 广东电网有限责任公司 A kind of power monitoring Host Security inspection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683127A (en) * 2013-11-27 2015-06-03 北京神州泰岳软件股份有限公司 Method and system for centrally checking weak passwords of equipment
CN107547228A (en) * 2016-06-29 2018-01-05 南京联成科技发展股份有限公司 A kind of safe operation management platform based on big data realizes framework
CN108763957A (en) * 2018-05-29 2018-11-06 电子科技大学 A kind of safety auditing system of database, method and server
CN109102407A (en) * 2018-08-10 2018-12-28 中募网络科技(北京)股份有限公司 A kind of Si Mu company closes rule and checks and monitoring method and system
CN109379390A (en) * 2018-12-25 2019-02-22 中国电子科技网络信息安全有限公司 A kind of network security baseline generation method based on full flow
CN109687586A (en) * 2018-12-28 2019-04-26 广东电网有限责任公司 A kind of power monitoring Host Security inspection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469546A (en) * 2021-07-13 2021-10-01 宝能(广州)汽车研究院有限公司 Project management and control method based on standard and regulation, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110852601B (en) Big data application method and system for environmental monitoring law enforcement decision
CN112001586B (en) Enterprise networking big data audit risk control architecture based on block chain consensus mechanism
CN111815132A (en) Network security management information publishing method and system for power monitoring system
CN105184642A (en) Comprehensive tax administration platform
CN211905008U (en) Online automatic monitoring system platform for catering oil fume
CN109582717A (en) A kind of database unified platform and its read method towards electric power big data
CN106528828A (en) Multi-dimensional checking rule-based data quality detection method
CN110806730A (en) Big data operation and maintenance platform, server and storage medium
Wu et al. Enterprise Digital Intelligent Remote Control System Based on Industrial Internet of Things
CN102043986A (en) Online processing system for abnormal electricity information transferring and application method of system
CN111538720B (en) Method and system for cleaning basic data of power industry
CN115239144A (en) Dual prevention mechanism information system based on regional risk management
CN111414394A (en) Power grid company compliance checking and tracking method and system
CN116961241B (en) Unified application monitoring platform based on power grid business
CN105975595A (en) Data quality monitoring and assessing method of real-time data center
CN115544133A (en) Big data analysis method based on hybrid energy data
CN115208641A (en) Software method based on safe operation of Internet data
CN113361949A (en) Performance management system based on big data analysis
CN114490634A (en) Multi-energy complementary data asset management method and system based on big data
CN112615812A (en) Information network unified vulnerability multi-dimensional security information collection, analysis and management system
CN112883013A (en) Consistency auditing system for urban atmospheric pollution source emission list
CN112463853A (en) Financial data behavior screening working method through cloud platform
Ionescu et al. The privacy case: Matching privacy-protection goals to human and organizational privacy concerns
CN111369211A (en) Project operation data management system and method based on business intelligence
Wu et al. Research and application of intelligent maintenance of relay protection equipment based on internet of things technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714