CN111491002B - Equipment inspection method, device, inspected equipment, inspection server and system - Google Patents

Equipment inspection method, device, inspected equipment, inspection server and system Download PDF

Info

Publication number
CN111491002B
CN111491002B CN201910087630.XA CN201910087630A CN111491002B CN 111491002 B CN111491002 B CN 111491002B CN 201910087630 A CN201910087630 A CN 201910087630A CN 111491002 B CN111491002 B CN 111491002B
Authority
CN
China
Prior art keywords
inspection
processing rule
processing
plan
patrol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910087630.XA
Other languages
Chinese (zh)
Other versions
CN111491002A (en
Inventor
卢洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision System Technology Co Ltd
Original Assignee
Hangzhou Hikvision System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision System Technology Co Ltd filed Critical Hangzhou Hikvision System Technology Co Ltd
Priority to CN201910087630.XA priority Critical patent/CN111491002B/en
Publication of CN111491002A publication Critical patent/CN111491002A/en
Application granted granted Critical
Publication of CN111491002B publication Critical patent/CN111491002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a device inspection method, a device, inspected devices, an inspection server and a network system, wherein the method comprises the following steps: receiving a patrol request sent by a patrol server; acquiring a patrol plan in the patrol request; acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan; generating a patrol task aiming at the patrol object based on the patrol object and the processing rule; executing the inspection task to obtain an inspection result; and sending the inspection result to the inspection server. In the invention, the routing inspection plan which is sent by the routing inspection server and contains the processing class and the processing rule information aiming at the processing class is received, so that the condition that routing inspection personnel input the processing rule in the equipment to be inspected is avoided, namely the routing inspection rule acquisition process of the equipment to be inspected is not needed to be finished by manpower, thereby saving routing inspection time and further improving the routing inspection efficiency of the equipment.

Description

Equipment inspection method, device, inspected equipment, inspection server and system
Technical Field
The present invention relates to the field of security management technologies, and in particular, to a device inspection method and apparatus, an inspected device, an inspection server, and a network system.
Background
In the running process of the equipment, the running condition of the equipment needs to be mastered so as to discover the defects and potential safety hazards of the equipment in time, further take effective measures, ensure the safety of the equipment and improve the running efficiency.
When equipment inspection is carried out, the adopted general method is as follows: and (3) manual inspection by a plurality of persons, namely, the inspection personnel respectively input processing rules corresponding to the inspected objects in the inspected equipment, the equipment runs according to the processing rules, and then the execution result is returned to the inspection personnel, and the inspection personnel judges the running condition of the inspected equipment according to the running result.
The inspection process is mainly finished by manpower, so that the inspection efficiency is lower.
Disclosure of Invention
The embodiment of the invention aims to provide a device inspection method and device, inspected device, inspection server and network system, so as to improve the efficiency of device inspection. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides an apparatus inspection method, which is applied to inspected apparatuses in a network system, where the network system further includes: the method comprises the following steps:
Receiving a patrol request sent by a patrol server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object;
acquiring a patrol plan in the patrol request;
acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan;
generating a patrol task aiming at the patrol object based on the patrol object and the processing rule;
executing the inspection task to obtain an inspection result;
and sending the inspection result to the inspection server.
Further, the routing inspection request sent by the routing inspection server is: a POST request containing a patrol plan;
the receiving the inspection request sent by the inspection server comprises the following steps:
receiving an HTTPS request sent by a patrol server;
judging whether the HTTPS request is a POST request or not, and if the HTTPS request is the POST request, determining that a patrol request is received;
the step of obtaining the inspection plan in the inspection request comprises the following steps:
and acquiring the inspection plan from the POST request.
Further, the processing rule information includes: a processing rule identification or a processing rule type identification;
the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan comprises the following steps:
acquiring a processing rule corresponding to the processing rule identifier from a preset processing rule base according to the processing rule identifier in the inspection plan; or,
and acquiring all processing rules corresponding to the processing rule type identifier from a preset processing rule base according to the processing rule type identifier in the inspection plan.
Further, the step of executing the inspection task to obtain an inspection result includes:
executing a processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule;
and determining the execution result as a patrol result.
Further, the processing class further includes: the performance class of the patrol objects;
the step of executing the inspection task to obtain an inspection result comprises the following steps:
executing the processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule;
And calculating the execution result according to a preset state algorithm corresponding to the performance category, and taking the calculated state index corresponding to the performance category as a patrol result.
Further, the processing rule includes: operation type and parameter value;
the step of executing the processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule comprises the following steps:
obtaining operation types and parameter values in each processing rule corresponding to the inspection task;
and executing the processing rule according to the operation type and the parameter value in the processing rule aiming at each processing rule, and obtaining an execution result of executing the processing rule.
Further, if the number of processing rules corresponding to the processing rule information obtained from a preset processing rule base is a plurality of processing rules according to the processing rule information in the inspection plan, after the inspection task is generated based on the inspection object and the processing rules, the method further includes:
monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task;
obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
Determining a preset number of optimal processing rules of the same processing class according to the equipment key performance index corresponding to each processing rule of the processing class;
and deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules.
Further, if the number of processing rules corresponding to the processing rule information obtained from a preset processing rule base is a plurality of processing rules according to the processing rule information in the inspection plan, after the inspection task is generated based on the inspection object and the processing rules, the method further includes:
monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task;
obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
determining a preset number of optimal processing rules of the same processing class according to equipment key performance indexes and inspection results corresponding to each processing rule of the same processing class;
and deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules.
Further, before the step of acquiring the processing rule corresponding to the processing rule information from the preset processing rule base according to the processing rule information in the inspection plan, the method further includes:
Adding the inspection plan obtained from the inspection request to a preset inspection plan list;
the inspection plan list is read at regular time according to a preset first time length, and a current inspection plan is obtained;
the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan comprises the following steps:
and acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan.
Further, before the step of obtaining the processing rule corresponding to the processing rule information from the preset processing rule base according to the processing rule information in the current inspection plan, the method further includes:
judging the current inspection plan to be a real-time inspection plan or a frequency inspection plan;
executing the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan when the current inspection plan is a real-time inspection plan;
when the current inspection plan is a frequency inspection plan, judging whether the time interval between the current moment and the last execution ending moment of the frequency inspection plan is larger than a preset time interval or not;
If yes, executing the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan;
the method further comprises the steps of:
when the current inspection plan is a real-time inspection plan, deleting the current inspection plan from the inspection plan list after the inspection task is executed to obtain an inspection result;
when the current inspection plan is a frequency inspection plan, after the inspection task is executed to obtain an inspection result, the information of the inspection ending time is stored.
Further, the inspection plan in the inspection request sent by the inspection server is: encrypted inspection plans;
the step of obtaining the inspection plan in the inspection request comprises the following steps:
reading the encrypted inspection plan from the inspection request, decrypting the encrypted inspection plan, and obtaining the decrypted inspection plan;
the sending the inspection result to the inspection server includes:
encrypting the inspection result to obtain an encrypted inspection result;
and sending the encrypted inspection result to the inspection server through a message queue.
In a second aspect, an embodiment of the present invention provides an equipment inspection method, which is applied to an inspection server in a network system, where the network inspection system further includes: a patrolled device, the method comprising:
sending a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the step of sending a patrol request to the patrol equipment causes the patrol equipment to acquire a patrol plan in the patrol request, acquire a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generate a patrol task for the patrol object based on the patrol object and the processing rule, and execute the patrol task to obtain a patrol result;
and receiving the inspection result sent by the inspected equipment.
Further, the inspection request is a POST request containing an inspection plan.
Further, the step of receiving the inspection result sent by the inspected device includes:
And receiving the inspection result sent by the inspected equipment through a message queue.
In a third aspect, an embodiment of the present invention provides a patrol apparatus, which is applied to a patrol device in a network system, where the network system further includes: a patrol server, the apparatus comprising:
the request receiving module is used for receiving the inspection request sent by the inspection server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object;
the plan acquisition module is used for acquiring a patrol plan in the patrol request;
the rule acquisition module is used for acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan;
the task generating module is used for generating a patrol task aiming at the patrol object based on the patrol object and the processing rule;
the result acquisition module is used for executing the inspection task to obtain an inspection result;
and the result sending module is used for sending the inspection result to the inspection server.
Further, the routing inspection request sent by the routing inspection server is: a POST request containing a patrol plan;
The request receiving module is specifically configured to receive an HTTPS request sent by the inspection server; judging whether the HTTPS request is a POST request or not, and if the HTTPS request is the POST request, determining that a patrol request is received;
the plan acquisition module is specifically configured to acquire a patrol plan from the POST request.
Further, the processing rule information includes: a processing rule identification or a processing rule type identification;
the rule acquisition module is specifically configured to acquire, according to a processing rule identifier in the inspection plan, a processing rule corresponding to the processing rule identifier from a preset processing rule library; or according to the processing rule type identifier in the inspection plan, acquiring all processing rules corresponding to the processing rule type identifier from a preset processing rule base.
Further, the result obtaining module includes: an execution result acquisition sub-module and a first inspection result acquisition sub-module;
the execution result acquisition sub-module is used for executing the processing rule corresponding to the inspection task and acquiring an execution result for executing the processing rule;
the first inspection result obtaining sub-module is used for determining the execution result as an inspection result.
Further, the processing class further includes: the performance class of the patrol objects;
the result acquisition module includes: an execution result acquisition sub-module and a second inspection result acquisition sub-module;
the execution result acquisition sub-module is used for executing the processing rule corresponding to the inspection task and acquiring an execution result for executing the processing rule;
the second inspection result obtaining sub-module is configured to calculate the execution result according to a preset state algorithm corresponding to the performance category, and use the calculated state index corresponding to the performance category as an inspection result.
Further, the processing rule includes: operation type and parameter value;
the execution result obtaining sub-module is specifically configured to obtain an operation type and a parameter value in each processing rule corresponding to the inspection task; and executing the processing rule according to the operation type and the parameter value in the processing rule aiming at each processing rule, and obtaining an execution result of executing the processing rule.
Further, the device further comprises: a first rule tuning module;
the first rule tuning module includes: the system comprises an index monitoring sub-module, an index obtaining sub-module, a first optimal rule determining sub-module and a first rule deleting sub-module;
The index monitoring submodule is used for monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task when the number of the processing rules corresponding to the processing rule information obtained from a preset processing rule base is multiple according to the processing rule information in the inspection plan;
the index obtaining submodule is used for obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
the first optimal rule determining submodule is used for determining a preset number of optimal processing rules of the same processing class according to equipment key performance indexes corresponding to each processing rule of the processing class;
the first rule deleting sub-module is configured to delete a non-optimal processing rule of the processing class in the processing rule base based on the optimal processing rule.
Further, the device further comprises: a second rule tuning module;
the second rule tuning module includes: the system comprises an index monitoring sub-module, an index obtaining sub-module, a second optimal rule determining sub-module and a second rule deleting sub-module;
the index monitoring submodule is used for monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task when the number of the processing rules corresponding to the processing rule information obtained from a preset processing rule base is multiple according to the processing rule information in the inspection plan;
The index obtaining submodule is used for obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
the second optimal rule determining submodule is used for determining a preset number of optimal processing rules of the same processing class according to the equipment key performance index and the inspection result corresponding to each processing rule of the processing class;
and the second rule deleting submodule is used for deleting the non-optimal processing rule of the processing class in the processing rule base based on the optimal processing rule.
Further, the method further comprises the following steps: a plan adding module and a current plan obtaining module;
the plan adding module is used for adding the inspection plan obtained from the inspection request to a preset inspection plan list;
the current plan obtaining module is used for regularly reading the inspection plan list according to a preset first time length to obtain a current inspection plan;
the rule acquisition module is specifically configured to acquire, according to the processing rule information in the current inspection plan, a processing rule corresponding to the processing rule information from a preset processing rule base.
Further, the method further comprises the following steps: the device comprises a plan judging module, a time judging module, a plan deleting module and a time information storing module;
The plan judging module is used for judging whether the current inspection plan is a real-time inspection plan or a frequency inspection plan;
the time judging module is used for judging whether the time interval between the current moment and the last moment of executing the frequency inspection plan is larger than a preset time interval or not when the current inspection plan is the frequency inspection plan;
the rule acquisition module is specifically configured to acquire, when the current inspection plan is a real-time inspection plan, a processing rule corresponding to the processing rule information from a preset processing rule library according to the processing rule information in the current inspection plan; or,
when the current inspection plan is a frequency inspection plan and the time interval between the current moment and the last execution ending moment of the frequency inspection plan is larger than a preset time interval, acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan;
the plan deleting module is used for deleting the current inspection plan from the inspection plan list after the inspection task is executed to obtain an inspection result when the current inspection plan is a real-time inspection plan;
And the time information storage module is used for storing the time information of the end of the current inspection after the inspection task is executed to obtain the inspection result when the current inspection plan is the frequency inspection plan.
Further, the inspection plan in the inspection request sent by the inspection server is: encrypted inspection plans;
the plan acquisition module is specifically configured to read the encrypted inspection plan from the inspection request, decrypt the encrypted inspection plan, and obtain the decrypted inspection plan;
the result sending module is specifically configured to encrypt the inspection result to obtain an encrypted inspection result; and sending the encrypted inspection result to the inspection server through a message queue.
In a fourth aspect, an embodiment of the present invention provides a routing inspection apparatus, which is located in a routing inspection server in a network system, where the network system further includes: a device being inspected, the apparatus comprising:
a request sending module and a result receiving module;
the request sending module is used for sending a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the step of sending a patrol request to the patrol equipment causes the patrol equipment to acquire a patrol plan in the patrol request, acquire a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generate a patrol task for the patrol object based on the patrol object and the processing rule, and execute the patrol task to obtain a patrol result;
The result receiving module is used for receiving the inspection result sent by the inspected equipment.
Further, the result receiving module is specifically configured to receive, through a message queue, the inspection result sent by the inspected device.
In a fifth aspect, an embodiment of the present invention provides a device under inspection, including a processor and a memory, where,
the memory is used for storing a computer program;
and the processor is used for realizing any equipment inspection method applied to inspected equipment when executing the program stored in the memory.
In a sixth aspect, an embodiment of the present invention provides a patrol server, including a processor and a memory, where,
the memory is used for storing a computer program;
and the processor is used for realizing any equipment inspection method applied to the inspection server when executing the program stored in the memory.
In a seventh aspect, an embodiment of the present invention provides a network system, including the above-mentioned device to be inspected and an inspection server.
In an eighth aspect, an embodiment of the present invention further provides a computer readable storage medium, where instructions are stored, when the computer readable storage medium runs on a computer, to cause the computer to perform any one of the device inspection methods described above.
The equipment inspection method, the equipment inspection device, the inspected equipment, the inspection server and the network system provided by the embodiment of the invention are that the inspected equipment receives the inspection request sent by the inspection server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; acquiring a patrol plan in the patrol request; acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan; generating a patrol task aiming at the patrol object based on the patrol object and the processing rule; executing the inspection task to obtain an inspection result; sending the inspection result to the inspection server; and the inspection server receives the inspection result sent by the inspected equipment. In the embodiment of the invention, the routing inspection server sends the routing inspection plan containing the processing class and the processing rule information aiming at the processing class to the equipment to be inspected, the equipment to be inspected generates the routing inspection task, executes the routing inspection task, and sends the obtained routing inspection result to the routing inspection server, and the routing inspection rule acquisition and routing inspection task execution process of the equipment to be inspected do not need to be finished by manpower, so that the routing inspection time can be saved, and the equipment routing inspection efficiency can be improved.
Of course, it is not necessary for any one product or method of practicing the invention to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1a is a schematic diagram of a network system structure applying the device inspection method provided by the embodiment of the present invention;
FIG. 1b is a schematic flow chart of an equipment inspection method applied to inspected equipment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of another method for inspecting equipment, which is provided in an embodiment of the present invention and is applied to inspected equipment;
FIG. 3 is a schematic flow chart of a method for updating a processing rule base according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of an apparatus inspection method applied to an inspection server according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an equipment inspection device according to an embodiment of the present invention;
Fig. 6 is another schematic structural diagram of an equipment inspection device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a device to be inspected according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a patrol server according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In order to improve equipment inspection efficiency, the embodiment of the invention provides equipment inspection method, equipment inspected by the equipment inspection device, an inspection server and a network system, which are respectively described in detail below.
In order to realize the inspection of the equipment in the network system, the embodiment of the invention adds an inspection server in the network system. As shown in fig. 1a, the network system includes: the inspection server 100 and the plurality of inspected apparatuses 200, and the inspection server 100 and the plurality of inspected apparatuses 200 are communicatively connected. The inspection server 100 sends an inspection request to the inspected apparatuses 200, each inspected apparatus 200 receives the inspection request, performs inspection according to the inspection request, and returns an inspection result to the inspection server 100.
Referring to fig. 1b, a schematic flow chart of an apparatus inspection method provided by the embodiment of the present invention in fig. 1b applied to inspected apparatuses specifically includes the following steps:
step 101, receiving a patrol request sent by a patrol server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: and inspecting the object.
The routing inspection request sent by the routing inspection server may be a POST request including a routing inspection plan, and receiving the routing inspection request sent by the routing inspection server may include: receiving an HTTPS request sent by a patrol server; judging whether the HTTPS request is a POST request or not, and if the HTTPS request is the POST request, determining that the inspection request is received.
The processing class in the step can also comprise the performance class of the inspection object, and the processing rule information can be a specific processing rule identifier; or may be a process rule type identification.
In order to improve the security, the inspection plan in this step may be an encrypted inspection plan.
For ease of understanding, the security of a specified database in a device being inspected is illustrated as an example: the processing object is a specified database, the performance class of the processing object is the security of the specified database, and when the database is patrolled and examined, the processing rules can be divided into two types: class a: inserting characters; class B: deleting characters, specifically: the type a processing rules include: an insert character M numbered 1 and an insert character N numbered 2; the B-type processing rule includes a deleted character M numbered 3 and a deleted character N numbered 4. In this step, the processing rule information in the inspection plan may be a type a or a type B of the processing rule; or may be the number 1 or 2 or 3 or 4 corresponding to the specific processing rule.
Step 102, obtaining a patrol plan in the patrol request.
When the inspection request obtained in step 101 is a POST request including an inspection plan, the inspection plan may be obtained from the POST request in this step.
When the inspection plan in the inspection request is an encrypted inspection plan, in this step, the encrypted inspection plan may be read from the inspection request and then decrypted, thereby obtaining a decrypted inspection plan.
Step 103, according to the processing rule information in the inspection plan, acquiring the processing rule corresponding to the processing rule information from a preset processing rule base.
In practical applications, there are two kinds of processing rule information:
when the processing rule information comprises the processing rule identifier, the processing rule corresponding to the processing rule identifier can be obtained from a preset processing rule base according to the processing rule identifier in the inspection plan in the step;
and the other is a processing rule type identifier, and when the processing rule information comprises the processing rule type identifier, the processing rule corresponding to the processing rule type identifier can be acquired from a preset processing rule base according to the processing rule type identifier in the inspection plan.
In the embodiment of the invention, the preset processing rule base can be an independent network device in communication connection with the equipment to be inspected, or can be pre-stored in each equipment to be inspected in a software form.
Step 104, generating a patrol task for the patrol object based on the patrol object and the processing rule.
And 105, executing the inspection task to obtain an inspection result.
Corresponding to the processing class in step 101, there are two ways to obtain the inspection result: first kind: if the processing class comprises the inspection object, executing a processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule; determining an execution result as a patrol result;
second kind: if the processing class comprises a patrol object and a performance class of the patrol object, executing a processing rule corresponding to the patrol task to obtain an execution result of executing the processing rule; and calculating an execution result according to a preset state algorithm corresponding to the performance category, and taking the calculated state index corresponding to the performance category as a patrol result.
And step 106, sending the inspection result to an inspection server.
In order to improve the safety of data transmission, the obtained inspection result can be encrypted to obtain the encrypted inspection result, and then the encrypted inspection result is sent to the inspection server.
Further, in order to prevent the problem that the server is paralyzed due to the fact that a plurality of equipment to be inspected send inspection results to the inspection server at the same time, the inspection results can be sent to the inspection server through a message queue, when the server needs to receive more data, the inspection results can be stored in the message queue first, and the server is sequentially waited to receive the inspection results, so that the safety of data transmission is improved.
In this embodiment, the number of processing rules corresponding to the processing rule information may be plural, and therefore, the plural processing rules may be screened and optimized. Corresponding to the inspection result in step 105, there may be two processes of processing rule screening and tuning:
first kind: if the inspection result is the execution result of the processing rule, after the inspection task for the inspection object is generated, in the process of executing the inspection task, monitoring the key performance index of the equipment corresponding to each processing rule, for example: CPU utilization rate, response time, memory utilization rate, equipment availability and the like, and processing rules with good indexes are screened out according to the key performance indexes of the equipment, so that the screened processing rules are directly used when the same type of tasks are executed next time, and the resource utilization rate and the inspection efficiency are improved.
Second kind: if the inspection result is a state index corresponding to the performance category, after the inspection task aiming at the inspection object is generated, monitoring the equipment key performance index corresponding to each processing rule in the execution process of the inspection task, and screening out the optimal processing rule according to the equipment key performance index and the inspection result.
Compared with the second tuning process, the first tuning process only needs to determine the optimal processing rule through the key performance index of the equipment, so that the operation process is simpler; in the second tuning process, the key performance index and the inspection result of the equipment are considered, so that the tuning result is more accurate and reasonable.
As can be seen from the above embodiments, by applying the embodiment of the present invention, the inspected device receives the inspection plan including the processing class and the processing rule information for the processing class sent by the inspection server, generates the inspection task, executes the inspection task, and sends the obtained inspection result to the inspection server, and the inspection rule acquisition and the inspection task execution process of the inspected device do not need to be completed manually, so that the inspection time can be saved, and the equipment inspection efficiency can be further improved.
Referring to fig. 2, another flow chart of the equipment inspection method provided by the embodiment of the invention applied to the inspected equipment in fig. 2 specifically includes the following steps:
step 201, receiving an HTTPS request sent by a patrol server.
The HTTPS request includes a patrol plan.
Step 202, it is determined whether the HTTPS request is a POST request.
In step 203, if the HTTPS request is a POST request, it is determined that a patrol request was received.
Step 204, acquiring a patrol plan from the POST request, wherein the patrol plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: patrol objects and performance categories of patrol objects.
The processing classes in this embodiment include: the inspection object and the performance class of the inspection object are examples.
In step 205, the inspection plan obtained from the inspection request is added to a preset inspection plan list.
Taking the security inspection of the designated database in the inspected device in step 101 as an example, the following description will be given:
the preset inspection plan list may include a plan number, an inspection object, and a performance class, when the inspection plan in the inspection request is not added, the inspection plan list may be empty, or the inspection plan sent by the inspection server before the inspection is stored, specifically, the inspection plan table when the inspection plan in the inspection request is not added may be as shown in table one:
Plan numbering Inspection object Performance class Rule identification
Database 1 Safety of Class A
Database 2 Safety of Class B
List one
The processing objects in the inspection plan list are designated databases, the performance class of the processing objects is security, and when the databases are inspected, the processing rules can be divided into two types: class a: inserting characters; class B: deleting characters, specifically: the type a processing rules include: an insert character M numbered 1 and an insert character N numbered 2; the B-type processing rule includes a deleted character M numbered 3 and a deleted character N numbered 4.
If the current inspection plan is: when the security of the database 3 is inspected and the processing rule is class a, the inspection plan list added with the present inspection plan may be as shown in table two:
plan numbering Inspection object Performance class Rule identification
Database 1 Safety of Class A
Database 2 Safety of Class B
Database 3 Safety of Class A
Watch II
And 206, regularly reading the inspection plan list according to a preset first time length to obtain a current inspection plan.
Step 207, determining the current inspection plan as a real-time inspection plan or a frequency inspection plan. When the current inspection plan is a real-time inspection plan, step 208 is performed; when the current inspection plan is a frequency inspection plan, step 214 is performed.
Step 208, according to the processing rule information in the current inspection plan, acquiring the processing rule corresponding to the processing rule information from a preset processing rule library.
Step 209, generating a patrol task for the patrol object based on the patrol object and the processing rule.
Step 210, obtaining operation types and parameter values in each processing rule corresponding to the inspection task.
For example: the first processing rule is as follows: inserting a character A, wherein the operation type of the processing rule is the inserted character, and the parameter value is A; the second processing rule is as follows: deleting the character B, wherein the operation type of the processing rule is deleting the character, and the parameter value is B.
Step 211, for each processing rule, executing the processing rule according to the operation type and parameter value in the processing rule, and obtaining an execution result of executing the processing rule.
And 212, calculating an execution result according to a preset state algorithm corresponding to the performance category, and taking the calculated state index corresponding to the performance category as a patrol result.
For example: the processing object in the processing class is a database A; the performance class is security; the processing rules are as follows: simultaneously inserting 100 characters, and repeatedly executing the above-mentioned inserting process 10 times;
The state indexes corresponding to the performance indexes are as follows: low, medium and high levels; the preset state algorithm corresponding to the performance category may be: counting the times that the running state of the database A is the service-available state after the execution of the processing rule is finished, and when the times are between 0 and 5, the state index is low-level; when the times are between 6 and 7, the state index is a medium level; when the number of times is between 8 and 10, the state index is high.
Assume that the execution result is: if 8 times of insertion are successful and 2 times of insertion are unsuccessful, the running state of the database A is determined to be 8 times of the service-available state, and the number of times of the service-unavailable state is determined to be 2 times, so that the state index is advanced.
And step 213, deleting the current inspection plan from the inspection plan list, and ending the inspection.
Step 214, determining whether the time interval between the current time and the last time the frequency inspection plan was executed is greater than a preset time interval.
Step 215, if yes, according to the processing rule information in the current inspection plan, acquiring the processing rule corresponding to the processing rule information from a preset processing rule base.
Step 216, generating a patrol task for the patrol object based on the patrol object and the processing rule.
And step 217, obtaining operation types and parameter values in each processing rule corresponding to the inspection task.
Step 218, for each processing rule, executing the processing rule according to the operation type and the parameter value in the processing rule, and obtaining an execution result of executing the processing rule.
Step 219, calculating the execution result according to a preset state algorithm corresponding to the performance category, and taking the calculated state index corresponding to the performance category as a patrol result.
Step 220, save the information of the end time of this inspection.
Step 221, sending the inspection result to the inspection server through the message queue.
In the embodiment of the invention, the acquisition of the inspection rule and the execution process of the inspection task of the inspected equipment are not needed to be completed by manpower, so that the equipment inspection efficiency can be improved; the inspected equipment receives a POST request sent by an inspection server; the POST request comprises a patrol plan; the security in the data transmission process can be improved by sending the inspection plan through the POST request; the performance class of the processing object is added in the processing class, the execution result can be calculated according to a preset state algorithm corresponding to the performance class after the execution result is obtained, the calculated state index corresponding to the performance class is used as a patrol result, the process of manually calculating the patrol result after the execution result is obtained is avoided, and the patrol efficiency is improved; meanwhile, the type of the inspection plan can be a real-time inspection plan or a frequency inspection plan, so that the application range is wider.
In the embodiment shown in fig. 2, the inspection result is a status index corresponding to the performance category, so after the inspection task starts to be executed, the processing rule base may be updated based on the equipment key performance index and the inspection result corresponding to different processing rules in the execution process of the inspection task. Specifically, referring to fig. 3, in the embodiment shown in fig. 2, the following steps may be adopted to update the processing rule base based on the equipment key performance indexes and the inspection results corresponding to different processing rules in the process of executing the inspection task:
step 301, monitoring key performance indexes of equipment corresponding to different processing rules in the execution process of the inspection task.
And creating a detection thread for monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task. Key performance indicators for a device may include: the specific content of the key performance indicators, such as CPU utilization, memory utilization, response time, port speed, packet loss rate, etc., is not limited herein.
Step 302, obtaining a device key performance index corresponding to each processing rule of the same processing class.
Step 303, determining a preset number of optimal processing rules of the same processing class according to the equipment key performance index and the inspection result corresponding to each processing rule of the processing class.
In this step, the optimal processing rules may be determined in multiple manners, specifically, the processing rule library may be initially screened according to the key performance index of the device, multiple processing rules with better key performance indexes are determined, and then, among the multiple processing rules with better key performance indexes, a preset number of optimal processing rules with inspection results meeting preset requirements are determined.
For example, when the inspection result is the security level of the database, the preset requirement may be: the database security level is low, namely, among a plurality of processing rules with better key performance indexes, a corresponding inspection result is a preset number of processing rules with low database security level, and the preset number of processing rules are determined to be optimal processing rules; or determining a plurality of processing rules meeting the preset requirement, and then determining a preset number of optimal processing rules with good key performance indexes of the equipment from the plurality of processing rules meeting the preset requirement, etc., which is not limited herein with respect to a specific mode of determining the optimal processing rules.
The following description is given by taking as an example that a plurality of processing rules with better key performance indexes are determined first, and then a preset number of optimal processing rules with the inspection result meeting preset requirements are determined in the plurality of processing rules with better key performance indexes:
The processing class: security of database a;
for this class of processing, the processing rules are: 1. simultaneously inserting 100 characters, and repeatedly executing the above-mentioned inserting process 10 times; 2. simultaneously inserting 200 characters, and repeatedly executing the above-mentioned inserting process 10 times; 3. simultaneously deleting 100 characters, and repeatedly executing the deleting process for 10 times; 4. simultaneously reading 100 characters, and repeatedly executing the reading process 10 times;
the key performance indexes of the equipment are as follows: CPU utilization;
the inspection result is divided into: low, medium and high, wherein: after the processing rule is executed, when the number of times that the running state of the database A is the 'service available state' is between 0 and 5, the inspection result corresponding to the processing rule is low-level; after the processing rule is executed, when the number of times that the running state of the database A is the 'service available state' is between 6 and 7, the inspection result corresponding to the processing rule is a medium level; after the processing rule is executed, when the number of times that the running state of the database A is the 'service available state' is between 8 and 10, the inspection result corresponding to the processing rule is advanced;
presetting requirements: the security level of the database A is low;
the preset number is as follows: 2;
The CPU utilization rate corresponding to each of the 4 processing rules in the execution process and the inspection result corresponding to each of the 4 processing rules after the execution are shown in a table III:
processing rule numbering CPU utilization Inspection result
1 50% Lower level
2 80% Advanced
3 50% Lower level
4 50% Intermediate grade
Watch III
As can be seen from table three, in terms of CPU utilization: the CPU utilization of processing rules 1, 3, and 4 is low, so processing rules 1, 3, and 4 are determined as processing rules with good key performance indicators, and then, in terms of inspection results: the inspection results corresponding to the processing rules 1 and 3 meet the preset condition that the security level of the database a is low, and the inspection result corresponding to the processing rule 4 does not meet the preset condition, so that finally, the processing rules 1 and 3 are determined as the optimal processing rules when the security inspection is performed on the database a.
Step 304, deleting the non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules.
In this embodiment, before monitoring the status index and the key performance index of the device, it may be first determined whether the number of processing rules of the same processing class in the processing rule base exceeds the preset number in step 303, and if so, steps 301-304 are executed; if the number does not exceed the preset number, all the processing rules in the processing rule base are reserved, and state index and equipment key performance index monitoring and subsequent processing rule base updating are not needed.
In the embodiment of the invention, the preset number of optimal processing rules of the processing class are determined according to the key performance index and the equipment state index of the equipment in the task execution process, and the non-optimal processing rules of the processing class in the processing rule base are deleted, so that the utilization rate of equipment resources in the patrol task execution process can be improved, and the usability of the equipment can be ensured.
Fig. 4 is a schematic flow chart of an apparatus inspection method applied to an inspection server according to an embodiment of the present invention, which specifically includes the following steps:
step 401, sending a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: and inspecting the object.
The method comprises the steps that the equipment to be inspected obtains an inspection plan in an inspection request, obtains processing rules corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan, generates an inspection task aiming at an inspection object based on the inspection object and the processing rules, and then executes the inspection task to obtain an inspection result.
Step 402, receiving a patrol result sent by the patrol equipment.
In the embodiment of the invention, a patrol request is sent to patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the method comprises the steps of sending a patrol request to a patrol device, enabling the patrol device to obtain a patrol plan in the patrol request, obtaining a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generating a patrol task aiming at the patrol object based on the patrol object and the processing rule, and executing the patrol task to obtain a patrol result; and receiving the inspection result sent by the inspected equipment. And sending a patrol plan containing processing types and processing rule information aiming at the processing types to the patrol equipment so that the patrol equipment generates a patrol task, executes the patrol task and sends the obtained patrol result to the patrol server, and the patrol rule acquisition and the patrol task execution process of the patrol equipment are not required to be completed by manpower, so that the patrol time can be saved, and the equipment patrol efficiency can be improved.
Based on the same inventive concept, according to the device inspection method provided by the above embodiment of the present invention, correspondingly, an embodiment of the present invention further provides a device inspection apparatus, which is located in an inspected device in a network system, where the network system further includes: the schematic structural diagram of the inspection server is shown in fig. 5, and the inspection server comprises:
A request receiving module 501, configured to receive a patrol request sent by a patrol server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object;
the plan acquisition module 502 is configured to acquire a patrol plan in the patrol request;
a rule obtaining module 503, configured to obtain, according to the processing rule information in the inspection plan, a processing rule corresponding to the processing rule information from a preset processing rule base;
the task generating module 504 is configured to generate a patrol task for the patrol object based on the patrol object and the processing rule;
the result obtaining module 505 is configured to perform a patrol task to obtain a patrol result;
and the result sending module 506 is configured to send the inspection result to the inspection server.
Further, the inspection request sent by the inspection server is: a POST request containing a patrol plan;
the request receiving module 501 is specifically configured to receive an HTTPS request sent by the inspection server; judging whether the HTTPS request is a POST request or not, and if the HTTPS request is the POST request, determining that a patrol request is received;
the plan obtaining module 502 is specifically configured to obtain the inspection plan from the POST request.
Further, the processing rule information includes: a processing rule identification or a processing rule type identification;
the rule obtaining module 503 is specifically configured to obtain, according to a processing rule identifier in the inspection plan, a processing rule corresponding to the processing rule identifier from a preset processing rule library; or according to the processing rule type identifier in the inspection plan, acquiring all the processing rules corresponding to the processing rule type identifier from a preset processing rule base.
Further, the result obtaining module 505 includes: an execution result acquisition sub-module and a first inspection result acquisition sub-module;
the execution result acquisition sub-module is used for executing the processing rules corresponding to the inspection tasks and acquiring the execution results of the execution processing rules;
and the first inspection result acquisition sub-module is used for determining the execution result as an inspection result.
Further, the result obtaining module 505 includes: an execution result acquisition sub-module and a second inspection result acquisition sub-module;
the execution result acquisition sub-module is used for executing the processing rules corresponding to the inspection tasks and acquiring the execution results of the execution processing rules;
the second inspection result obtaining sub-module is used for calculating the execution result according to a preset state algorithm corresponding to the performance category, and taking the calculated state index corresponding to the performance category as an inspection result.
Further, the processing rule includes: operation type and parameter value;
the execution result acquisition sub-module is specifically used for acquiring operation types and parameter values in each processing rule corresponding to the inspection task; and executing the processing rule according to the operation type and the parameter value in the processing rule aiming at each processing rule, and obtaining an execution result of executing the processing rule.
Further, if the number of the processing rules corresponding to the processing rule information obtained from the preset processing rule base is a plurality of processing rules according to the processing rule information in the inspection plan, the apparatus further includes: a first rule tuning module;
the first rule tuning module comprises: the system comprises an index monitoring sub-module, an index obtaining sub-module, a first optimal rule determining sub-module and a first rule deleting sub-module;
the index monitoring sub-module is used for monitoring equipment key performance indexes corresponding to performance categories in different processing rules in the process of executing the inspection task when the number of the processing rules corresponding to the processing rule information obtained from a preset processing rule base is multiple according to the processing rule information in the inspection plan; the method comprises the steps of carrying out a first treatment on the surface of the
The index obtaining submodule is used for obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
The first optimal rule determining submodule is used for determining a preset number of optimal processing rules of the same processing class according to the equipment key performance index corresponding to each processing rule of the processing class;
and the first rule deleting sub-module is used for deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules.
Further, if the number of the processing rules corresponding to the processing rule information obtained from the preset processing rule base is a plurality of processing rules according to the processing rule information in the inspection plan, the apparatus further includes: a second rule tuning module;
a second rule tuning module comprising: the system comprises an index monitoring sub-module, an index obtaining sub-module, a second optimal rule determining sub-module and a second rule deleting sub-module;
the index monitoring sub-module is used for monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task when the number of the processing rules corresponding to the processing rule information obtained from a preset processing rule base is multiple according to the processing rule information in the inspection plan;
the index obtaining submodule is used for obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
The second optimal rule determining submodule is used for determining a preset number of optimal processing rules of the same processing class according to the equipment key performance index and the inspection result corresponding to each processing rule of the processing class;
and the second rule deleting sub-module is used for deleting the non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules.
Further, the apparatus further comprises: a plan adding module and a current plan obtaining module;
the plan adding module is used for adding the inspection plan obtained from the inspection request to a preset inspection plan list;
the current plan acquisition module is used for regularly reading the inspection plan list according to a preset first time length to acquire a current inspection plan;
the rule acquisition module is specifically configured to acquire, according to the processing rule information in the current inspection plan, a processing rule corresponding to the processing rule information from a preset processing rule base.
Further, the apparatus further comprises: the device comprises a plan judging module, a time judging module, a plan deleting module and a time information saving module;
the plan judging module is used for judging the current inspection plan to be a real-time inspection plan or a frequency inspection plan;
the time judging module is used for judging whether the time interval between the current moment and the last moment of executing the frequency inspection plan is larger than a preset time interval or not when the current inspection plan is the frequency inspection plan;
The rule acquisition module is specifically used for acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan when the current inspection plan is a real-time inspection plan; or,
when the current inspection plan is a frequency inspection plan and the time interval between the current moment and the last execution ending moment of the frequency inspection plan is larger than a preset time interval, acquiring a processing rule corresponding to the processing rule information from a preset processing rule library according to the processing rule information in the current inspection plan;
the plan deleting module is used for deleting the current inspection plan from the inspection plan list after the inspection task is executed to obtain an inspection result when the current inspection plan is the real-time inspection plan;
and the time information storage module is used for storing the time information of the end of the current inspection after the inspection task is executed to obtain the inspection result when the current inspection plan is the frequency inspection plan.
Further, the inspection plan in the inspection request sent by the inspection server is: encrypted inspection plans;
the plan obtaining module 502 is specifically configured to read the encrypted inspection plan from the inspection request, decrypt the inspection plan, and obtain the decrypted inspection plan;
The result sending module 506 is specifically configured to encrypt the inspection result, and obtain an encrypted inspection result; and sending the encrypted inspection result to an inspection server through a message queue.
In the embodiment of the present invention, the request receiving module 501 receives a patrol request sent by a patrol server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the plan acquisition module 502 acquires a patrol plan in the patrol request; the rule obtaining module 503 obtains a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan; the task generating module 504 generates a patrol task for the patrol object based on the patrol object and the processing rule; the result acquisition module 505 executes the inspection task to obtain an inspection result; the result sending module 506 sends the inspection result to the inspection server. The inspection server sends an inspection plan containing processing types and processing rule information aiming at the processing types to the inspected equipment, the inspected equipment generates an inspection task, the inspection task is executed, the obtained inspection result is sent to the inspection server, and the inspection rule acquisition and inspection task execution process of the inspected equipment are not needed to be completed by manpower, so that the inspection time can be saved, and the equipment inspection efficiency is improved.
Based on the same inventive concept, according to the device inspection method provided by the above embodiment of the present invention, correspondingly, an embodiment of the present invention further provides a device inspection apparatus, an inspection server located in a network system, where the network system further includes: the structural schematic diagram of the device is shown in fig. 6, and the device comprises:
a request sending module 601, configured to send a patrol request to a patrol device; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the method comprises the steps of sending a patrol request to a patrol device, enabling the patrol device to obtain a patrol plan in the patrol request, obtaining a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generating a patrol task aiming at the patrol object based on the patrol object and the processing rule, and executing the patrol task to obtain a patrol result;
and the result receiving module 602 is configured to receive a patrol result sent by the patrol equipment.
Further, the result receiving module is specifically configured to receive, through the message queue, a patrol result sent by the patrol equipment.
In the embodiment of the invention, a request sending module 601 sends a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the method comprises the steps of sending a patrol request to a patrol device, enabling the patrol device to obtain a patrol plan in the patrol request, obtaining a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generating a patrol task aiming at the patrol object based on the patrol object and the processing rule, and executing the patrol task to obtain a patrol result; the patrol receiving module 602 receives the patrol result sent by the patrol device. The request sending module 601 sends a patrol plan containing processing types and processing rule information aiming at the processing types to the patrol equipment, the patrol equipment generates a patrol task, executes the patrol task, sends the obtained patrol result to the patrol server, and the patrol rule acquisition and the patrol task execution process of the patrol equipment are not needed to be completed by manpower, so that the patrol time can be saved, and the equipment patrol efficiency can be improved.
The embodiment of the invention also provides a device to be inspected, as shown in fig. 7, which comprises a processor 701, a communication interface 702, a memory 703 and a communication bus 704, wherein the processor 701, the communication interface 702 and the memory 703 complete communication with each other through the communication bus 704,
a memory 703 for storing a computer program;
the processor 701 is configured to execute the program stored in the memory 703, and implement the following steps:
receiving a patrol request sent by a patrol server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object;
acquiring a patrol plan in a patrol request;
acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan;
generating a patrol task aiming at the patrol object based on the patrol object and the processing rule;
executing the inspection task to obtain an inspection result;
and sending the inspection result to an inspection server.
The communication bus mentioned by the above-mentioned device to be inspected may be a peripheral component interconnect standard (Peripheral Component Interconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the inspected equipment and other equipment.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
The embodiment of the invention also provides a patrol server, as shown in fig. 8, comprising a processor 801, a communication interface 802, a memory 803 and a communication bus 804, wherein the processor 801, the communication interface 802 and the memory 803 complete communication with each other through the communication bus 804,
A memory 803 for storing a computer program;
the processor 801, when executing the program stored in the memory 803, implements the following steps:
sending a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the step of sending a patrol request to the patrol equipment causes the patrol equipment to acquire a patrol plan in the patrol request, acquire a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generate a patrol task for the patrol object based on the patrol object and the processing rule, and execute the patrol task to obtain a patrol result;
and receiving the inspection result sent by the inspected equipment.
The communication bus mentioned by the above-mentioned inspection server may be a peripheral component interconnect standard (Peripheral Component Interconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the inspection server and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment of the present invention, a computer readable storage medium is provided, where instructions are stored, which when executed on a computer, cause the computer to perform the device inspection method according to any one of the above embodiments.
In yet another embodiment of the present invention, a computer program product containing instructions that, when run on a computer, cause the computer to perform the device inspection method of any of the above embodiments is also provided.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the apparatus, the inspected device, the inspection server and the network system embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and the relevant points are referred to in the description of the method embodiments.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (24)

1. The equipment inspection method is characterized by being applied to inspected equipment in a network system, and the network system further comprises: the method comprises the following steps:
receiving a patrol request sent by a patrol server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object;
acquiring a patrol plan in the patrol request;
acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan;
generating a patrol task aiming at the patrol object based on the patrol object and the processing rule;
executing the inspection task to obtain an inspection result;
sending the inspection result to the inspection server;
the processing rule information includes: a processing rule identification or a processing rule type identification;
The step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan comprises the following steps:
acquiring a processing rule corresponding to the processing rule identifier from a preset processing rule base according to the processing rule identifier in the inspection plan; or,
according to the processing rule type identification in the inspection plan, acquiring all processing rules corresponding to the processing rule type identification from a preset processing rule base;
if the number of the processing rules corresponding to the processing rule information obtained from the preset processing rule library is a plurality of processing rules according to the processing rule information in the inspection plan, after the inspection task is generated based on the inspection object and the processing rules, the method further comprises:
judging whether the number of the processing rules of the same processing class in the processing rule base exceeds a preset number;
if the number of the processing rules of the same processing class in the processing rule library exceeds the preset number, monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task; obtaining equipment key performance indexes corresponding to each processing rule of the same processing class; determining the preset number of optimal processing rules of the same processing class according to equipment key performance indexes and inspection results corresponding to each processing rule of the same processing class; deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules;
And if the number of the processing rules of the same processing class in the processing rule base does not exceed the preset number, reserving all the processing rules in the processing rule base.
2. The method of claim 1, wherein the inspection request sent by the inspection server is: a POST request containing a patrol plan;
the receiving the inspection request sent by the inspection server comprises the following steps:
receiving an HTTPS request sent by a patrol server;
judging whether the HTTPS request is a POST request or not, and if the HTTPS request is the POST request, determining that a patrol request is received;
the step of obtaining the inspection plan in the inspection request comprises the following steps:
and acquiring the inspection plan from the POST request.
3. The method of claim 1, wherein the step of performing the inspection task to obtain an inspection result comprises:
executing a processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule;
and determining the execution result as a patrol result.
4. The method of claim 1, wherein the processing class further comprises: the performance class of the patrol objects;
the step of executing the inspection task to obtain an inspection result comprises the following steps:
Executing the processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule;
and calculating the execution result according to a preset state algorithm corresponding to the performance category, and taking the calculated state index corresponding to the performance category as a patrol result.
5. The method according to claim 3 or 4, wherein the processing rules comprise: operation type and parameter value;
the step of executing the processing rule corresponding to the inspection task to obtain an execution result of executing the processing rule comprises the following steps:
obtaining operation types and parameter values in each processing rule corresponding to the inspection task;
and executing the processing rule according to the operation type and the parameter value in the processing rule aiming at each processing rule, and obtaining an execution result of executing the processing rule.
6. The method according to claim 1, wherein before the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan, the method further comprises:
adding the inspection plan obtained from the inspection request to a preset inspection plan list;
The inspection plan list is read at regular time according to a preset first time length, and a current inspection plan is obtained;
the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan comprises the following steps:
and acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan.
7. The method according to claim 6, further comprising, before the step of acquiring, from a preset processing rule base, a processing rule corresponding to the processing rule information according to the processing rule information in the current inspection plan:
judging the current inspection plan to be a real-time inspection plan or a frequency inspection plan;
executing the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan when the current inspection plan is a real-time inspection plan;
when the current inspection plan is a frequency inspection plan, judging whether the time interval between the current moment and the last execution ending moment of the frequency inspection plan is larger than a preset time interval or not;
If yes, executing the step of acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan;
the method further comprises the steps of:
when the current inspection plan is a real-time inspection plan, deleting the current inspection plan from the inspection plan list after the inspection task is executed to obtain an inspection result;
when the current inspection plan is a frequency inspection plan, after the inspection task is executed to obtain an inspection result, the information of the inspection ending time is stored.
8. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the inspection plan in the inspection request sent by the inspection server is as follows: encrypted inspection plans;
the step of obtaining the inspection plan in the inspection request comprises the following steps:
reading the encrypted inspection plan from the inspection request, decrypting the encrypted inspection plan, and obtaining the decrypted inspection plan;
the sending the inspection result to the inspection server includes:
encrypting the inspection result to obtain an encrypted inspection result;
and sending the encrypted inspection result to the inspection server through a message queue.
9. The equipment inspection method is characterized by being applied to an inspection server in a network system, and the network inspection system further comprises the following steps: a patrolled device, the method comprising:
sending a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the step of sending a patrol request to the patrol equipment causes the patrol equipment to acquire a patrol plan in the patrol request, acquire a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generate a patrol task for the patrol object based on the patrol object and the processing rule, and execute the patrol task to obtain a patrol result;
receiving the inspection result sent by the inspected equipment;
the processing rule information includes: a processing rule identification or a processing rule type identification;
the step of obtaining the processing rule corresponding to the processing rule information from a preset processing rule base by the patrolled equipment according to the processing rule information in the patrolling plan comprises the following steps:
Acquiring a processing rule corresponding to the processing rule identifier from a preset processing rule base according to the processing rule identifier in the inspection plan; or,
according to the processing rule type identification in the inspection plan, acquiring all processing rules corresponding to the processing rule type identification from a preset processing rule base;
if the number of the processing rules corresponding to the processing rule information obtained from the preset processing rule base by the equipment to be inspected is a plurality of according to the processing rule information in the inspection plan, after the equipment to be inspected executes the inspection task generated based on the inspection object and the processing rules, executing the following steps:
judging whether the number of the processing rules of the same processing class in the processing rule base exceeds a preset number;
if the number of the processing rules of the same processing class in the processing rule library exceeds the preset number, monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task; obtaining equipment key performance indexes corresponding to each processing rule of the same processing class; determining the preset number of optimal processing rules of the same processing class according to equipment key performance indexes and inspection results corresponding to each processing rule of the same processing class; deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules;
And if the number of the processing rules of the same processing class in the processing rule base does not exceed the preset number, reserving all the processing rules in the processing rule base.
10. The method of claim 9, wherein the inspection request is a POST request containing an inspection plan.
11. The method of claim 9, wherein the step of receiving the inspection result sent by the inspected device comprises:
and receiving the inspection result sent by the inspected equipment through a message queue.
12. The inspection device is characterized by being applied to inspected equipment in a network system, and the network system further comprises: a patrol server, the apparatus comprising:
the request receiving module is used for receiving the inspection request sent by the inspection server; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object;
the plan acquisition module is used for acquiring a patrol plan in the patrol request;
the rule acquisition module is used for acquiring the processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the inspection plan;
The task generating module is used for generating a patrol task aiming at the patrol object based on the patrol object and the processing rule;
the result acquisition module is used for executing the inspection task to obtain an inspection result;
the result sending module is used for sending the inspection result to the inspection server;
the processing rule information includes: a processing rule identification or a processing rule type identification;
the rule acquisition module is specifically configured to acquire, according to a processing rule identifier in the inspection plan, a processing rule corresponding to the processing rule identifier from a preset processing rule library; or, according to the processing rule type identifier in the inspection plan, acquiring all processing rules corresponding to the processing rule type identifier from a preset processing rule base;
if the number of the processing rules corresponding to the processing rule information obtained from the preset processing rule library is a plurality of processing rules according to the processing rule information in the inspection plan, after the inspection task is generated based on the inspection object and the processing rules, the device further comprises: a first rule tuning module;
the first rule tuning module includes: the system comprises a rule judging sub-module, an index monitoring sub-module, an index obtaining sub-module, a first optimal rule determining sub-module, a first rule deleting sub-module and a rule reserving word module;
The rule judging submodule is used for judging whether the number of the processing rules of the same processing class in the processing rule base exceeds the preset number;
the index monitoring submodule is used for monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task if the number of the processing rules of the same processing class in the processing rule base exceeds the preset number;
the index obtaining submodule is used for obtaining equipment key performance indexes corresponding to each processing rule of the same processing class;
the first optimal rule determining submodule is used for determining the preset number of optimal processing rules of the same processing class according to equipment key performance indexes and inspection results corresponding to each processing rule of the processing class;
the first rule deleting submodule is used for deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules;
the rule retaining sub-module is configured to retain all the processing rules in the processing rule base if the number of processing rules of the same processing class in the processing rule base does not exceed the preset number.
13. The apparatus of claim 12, wherein the patrol request sent by the patrol server is: a POST request containing a patrol plan;
the request receiving module is specifically configured to receive an HTTPS request sent by the inspection server; judging whether the HTTPS request is a POST request or not, and if the HTTPS request is the POST request, determining that a patrol request is received;
the plan acquisition module is specifically configured to acquire a patrol plan from the POST request.
14. The apparatus of claim 12, wherein the result acquisition module comprises: an execution result acquisition sub-module and a first inspection result acquisition sub-module;
the execution result acquisition sub-module is used for executing the processing rule corresponding to the inspection task and acquiring an execution result for executing the processing rule;
the first inspection result obtaining sub-module is used for determining the execution result as an inspection result.
15. The apparatus of claim 12, wherein the processing class further comprises: the performance class of the patrol objects;
the result acquisition module includes: an execution result acquisition sub-module and a second inspection result acquisition sub-module;
The execution result acquisition sub-module is used for executing the processing rule corresponding to the inspection task and acquiring an execution result for executing the processing rule;
the second inspection result obtaining sub-module is configured to calculate the execution result according to a preset state algorithm corresponding to the performance category, and use the calculated state index corresponding to the performance category as an inspection result.
16. The apparatus according to claim 14 or 15, wherein the processing rules comprise: operation type and parameter value;
the execution result obtaining sub-module is specifically configured to obtain an operation type and a parameter value in each processing rule corresponding to the inspection task; and executing the processing rule according to the operation type and the parameter value in the processing rule aiming at each processing rule, and obtaining an execution result of executing the processing rule.
17. The apparatus as recited in claim 12, further comprising: a plan adding module and a current plan obtaining module;
the plan adding module is used for adding the inspection plan obtained from the inspection request to a preset inspection plan list;
the current plan obtaining module is used for regularly reading the inspection plan list according to a preset first time length to obtain a current inspection plan;
The rule acquisition module is specifically configured to acquire, according to the processing rule information in the current inspection plan, a processing rule corresponding to the processing rule information from a preset processing rule base.
18. The apparatus as recited in claim 17, further comprising: the device comprises a plan judging module, a time judging module, a plan deleting module and a time information storing module;
the plan judging module is used for judging whether the current inspection plan is a real-time inspection plan or a frequency inspection plan;
the time judging module is used for judging whether the time interval between the current moment and the last moment of executing the frequency inspection plan is larger than a preset time interval or not when the current inspection plan is the frequency inspection plan;
the rule acquisition module is specifically configured to acquire, when the current inspection plan is a real-time inspection plan, a processing rule corresponding to the processing rule information from a preset processing rule library according to the processing rule information in the current inspection plan; or,
when the current inspection plan is a frequency inspection plan and the time interval between the current moment and the last execution ending moment of the frequency inspection plan is larger than a preset time interval, acquiring a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the current inspection plan;
The plan deleting module is used for deleting the current inspection plan from the inspection plan list after the inspection task is executed to obtain an inspection result when the current inspection plan is a real-time inspection plan;
and the time information storage module is used for storing the time information of the end of the current inspection after the inspection task is executed to obtain the inspection result when the current inspection plan is the frequency inspection plan.
19. The apparatus of claim 12, wherein the inspection plan in the inspection request sent by the inspection server is: encrypted inspection plans;
the plan acquisition module is specifically configured to read the encrypted inspection plan from the inspection request, decrypt the encrypted inspection plan, and obtain the decrypted inspection plan;
the result sending module is specifically configured to encrypt the inspection result to obtain an encrypted inspection result; and sending the encrypted inspection result to the inspection server through a message queue.
20. The inspection device is characterized by being an inspection server positioned in a network system, and the network system further comprises: a device being inspected, the apparatus comprising: a request sending module and a result receiving module;
The request sending module is used for sending a patrol request to the patrol equipment; the inspection request comprises an inspection plan; the inspection plan comprises a processing class and processing rule information aiming at the processing class; the processing class includes: inspecting the object; the step of sending a patrol request to the patrol equipment causes the patrol equipment to acquire a patrol plan in the patrol request, acquire a processing rule corresponding to the processing rule information from a preset processing rule base according to the processing rule information in the patrol plan, generate a patrol task for the patrol object based on the patrol object and the processing rule, and execute the patrol task to obtain a patrol result;
the result receiving module is used for receiving the inspection result sent by the inspected equipment;
the processing rule information includes: a processing rule identification or a processing rule type identification;
the step of obtaining the processing rule corresponding to the processing rule information from a preset processing rule base by the patrolled equipment according to the processing rule information in the patrolling plan comprises the following steps:
acquiring a processing rule corresponding to the processing rule identifier from a preset processing rule base according to the processing rule identifier in the inspection plan; or,
According to the processing rule type identification in the inspection plan, acquiring all processing rules corresponding to the processing rule type identification from a preset processing rule base;
if the number of the processing rules corresponding to the processing rule information obtained from the preset processing rule base by the equipment to be inspected is a plurality of according to the processing rule information in the inspection plan, after the equipment to be inspected executes the inspection task generated based on the inspection object and the processing rules, executing the following steps:
judging whether the number of the processing rules of the same processing class in the processing rule base exceeds a preset number;
if the number of the processing rules of the same processing class in the processing rule library exceeds the preset number, monitoring equipment key performance indexes corresponding to different processing rules in the execution process of the inspection task; obtaining equipment key performance indexes corresponding to each processing rule of the same processing class; determining the preset number of optimal processing rules of the same processing class according to equipment key performance indexes and inspection results corresponding to each processing rule of the same processing class; deleting non-optimal processing rules of the processing class in the processing rule base based on the optimal processing rules;
And if the number of the processing rules of the same processing class in the processing rule base does not exceed the preset number, reserving all the processing rules in the processing rule base.
21. The apparatus of claim 20, wherein the device comprises a plurality of sensors,
the result receiving module is specifically configured to receive the inspection result sent by the inspected device through a message queue.
22. The device to be inspected is characterized by comprising a processor and a memory, wherein,
the memory is used for storing a computer program;
the processor is configured to implement the method steps of any of claims 1-8 when executing a program stored on the memory.
23. A patrol server is characterized by comprising a processor and a memory, wherein,
the memory is used for storing a computer program;
the processor being adapted to carry out the method steps of any of claims 9-11 when executing a program stored on the memory.
24. A network system, characterized by: comprising the patrolled device of claim 22 and the patrol server of claim 23.
CN201910087630.XA 2019-01-29 2019-01-29 Equipment inspection method, device, inspected equipment, inspection server and system Active CN111491002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910087630.XA CN111491002B (en) 2019-01-29 2019-01-29 Equipment inspection method, device, inspected equipment, inspection server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910087630.XA CN111491002B (en) 2019-01-29 2019-01-29 Equipment inspection method, device, inspected equipment, inspection server and system

Publications (2)

Publication Number Publication Date
CN111491002A CN111491002A (en) 2020-08-04
CN111491002B true CN111491002B (en) 2023-12-05

Family

ID=71794191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910087630.XA Active CN111491002B (en) 2019-01-29 2019-01-29 Equipment inspection method, device, inspected equipment, inspection server and system

Country Status (1)

Country Link
CN (1) CN111491002B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330177B (en) * 2020-11-16 2024-05-24 北京智芯微电子科技有限公司 Method, device and system for realizing inspection flow of overhead contact system
CN113347246B (en) * 2021-05-31 2023-09-08 杭州海康威视数字技术股份有限公司 Inspection method and device and electronic equipment
CN113507397B (en) * 2021-07-06 2022-03-08 北京容联七陌科技有限公司 Method for collecting terminal equipment state automatic inspection based on cloud operation and maintenance
CN115083030A (en) * 2022-05-18 2022-09-20 中诚信征信有限公司 Service inspection method and device and electronic equipment
CN115496386B (en) * 2022-09-30 2023-10-13 深圳中正信息科技有限公司 Equipment inspection method, system and computer readable storage medium
CN116805435B (en) * 2023-08-23 2023-10-31 四川川西数据产业有限公司 Intelligent inspection device for motor room

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003092603A (en) * 2001-09-17 2003-03-28 Toshiba Corp Network intrusion detecting system, apparatus and program
CN102571396A (en) * 2010-12-28 2012-07-11 中兴通讯股份有限公司 Communication network system and routing inspection subsystem and routing inspection method of communication equipment
CN103079219A (en) * 2011-10-26 2013-05-01 艾默生网络能源有限公司 Base station automatic inspection digital management system and method
CN103095475A (en) * 2011-10-31 2013-05-08 中兴通讯股份有限公司 Routing Inspection method and system of multimode communication equipment
CN104090934A (en) * 2014-06-26 2014-10-08 山东金质信息技术有限公司 Standard service platform distributed parallel computing database and retrieval method thereof
CN104348863A (en) * 2013-07-31 2015-02-11 成都勤智数码科技股份有限公司 Operation inspection terminal based on mobile self-networking technology
CN104361035A (en) * 2014-10-27 2015-02-18 深信服网络科技(深圳)有限公司 Method and device for detecting database tampering behavior
CN104518903A (en) * 2013-09-30 2015-04-15 腾讯科技(北京)有限公司 Method, system and device for patrolling online business
CN105071995A (en) * 2015-08-28 2015-11-18 北京华青融天技术有限责任公司 Out-of-band network based network device patrolling method, device and system
CN106503807A (en) * 2016-09-20 2017-03-15 西南石油大学 A kind of modified model RCM analysis methods and the dynamic appliance integrality evaluation system based on which
CN106713001A (en) * 2015-11-18 2017-05-24 中兴通讯股份有限公司 Network inspection method and apparatus
CN107196804A (en) * 2017-06-01 2017-09-22 国网山东省电力公司信息通信公司 Power system terminal communication access network Centralized Alarm Monitoring system and method
CN107800565A (en) * 2017-08-31 2018-03-13 平安科技(深圳)有限公司 Method for inspecting, device, system, computer equipment and storage medium
CN109165513A (en) * 2018-09-13 2019-01-08 新华三技术有限公司 Method for inspecting, device and the server of system configuration information

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103298040B (en) * 2012-02-24 2016-02-03 华为技术有限公司 The method of radio network optimization, Apparatus and system
US9894100B2 (en) * 2014-12-30 2018-02-13 Fortinet, Inc. Dynamically optimized security policy management
US10248115B2 (en) * 2016-11-25 2019-04-02 Tecom Co., Ltd. Patrol-type preventive inspection system for electromechanical devices

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003092603A (en) * 2001-09-17 2003-03-28 Toshiba Corp Network intrusion detecting system, apparatus and program
CN102571396A (en) * 2010-12-28 2012-07-11 中兴通讯股份有限公司 Communication network system and routing inspection subsystem and routing inspection method of communication equipment
CN103079219A (en) * 2011-10-26 2013-05-01 艾默生网络能源有限公司 Base station automatic inspection digital management system and method
CN103095475A (en) * 2011-10-31 2013-05-08 中兴通讯股份有限公司 Routing Inspection method and system of multimode communication equipment
CN104348863A (en) * 2013-07-31 2015-02-11 成都勤智数码科技股份有限公司 Operation inspection terminal based on mobile self-networking technology
CN104518903A (en) * 2013-09-30 2015-04-15 腾讯科技(北京)有限公司 Method, system and device for patrolling online business
CN104090934A (en) * 2014-06-26 2014-10-08 山东金质信息技术有限公司 Standard service platform distributed parallel computing database and retrieval method thereof
CN104361035A (en) * 2014-10-27 2015-02-18 深信服网络科技(深圳)有限公司 Method and device for detecting database tampering behavior
CN105071995A (en) * 2015-08-28 2015-11-18 北京华青融天技术有限责任公司 Out-of-band network based network device patrolling method, device and system
CN106713001A (en) * 2015-11-18 2017-05-24 中兴通讯股份有限公司 Network inspection method and apparatus
CN106503807A (en) * 2016-09-20 2017-03-15 西南石油大学 A kind of modified model RCM analysis methods and the dynamic appliance integrality evaluation system based on which
CN107196804A (en) * 2017-06-01 2017-09-22 国网山东省电力公司信息通信公司 Power system terminal communication access network Centralized Alarm Monitoring system and method
CN107800565A (en) * 2017-08-31 2018-03-13 平安科技(深圳)有限公司 Method for inspecting, device, system, computer equipment and storage medium
CN109165513A (en) * 2018-09-13 2019-01-08 新华三技术有限公司 Method for inspecting, device and the server of system configuration information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
General Scheme Research of Bridge Inspecting Vehicle Mechanical Parts;Wen Lu等;《2011 Third International Conference on Measuring Technology and Mechatronics Automation》;全文 *
基于PLC的消防自动巡检系统的设计与研究;张炜;《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》;全文 *

Also Published As

Publication number Publication date
CN111491002A (en) 2020-08-04

Similar Documents

Publication Publication Date Title
CN111491002B (en) Equipment inspection method, device, inspected equipment, inspection server and system
CN108897628B (en) Method and device for realizing distributed lock and electronic equipment
CN1996834B (en) Method and apparatus for acquiring domain information and domain-related data
US9697066B2 (en) Method for processing data quality exceptions in a data processing system
CN108255620B (en) Service logic processing method, device, service server and system
CN110287696B (en) Detection method, device and equipment for rebound shell process
CN111045933A (en) Regression strategy updating method and device, storage medium and terminal equipment
CN109660533B (en) Method and device for identifying abnormal flow in real time, computer equipment and storage medium
CN110430070B (en) Service state analysis method, device, server, data analysis equipment and medium
WO2021121019A1 (en) Sim card allocation method and apparatus, server and computer-readable storage medium
CN111414528B (en) Method and device for determining equipment identification, storage medium and electronic equipment
CN110768865B (en) Deep packet inspection engine activation method and device and electronic equipment
CN113094415B (en) Data extraction method, data extraction device, computer readable medium and electronic equipment
CN108763291B (en) Data management method and device and electronic equipment
CN111177155B (en) Message filtering method, system and computer equipment
CN110113187B (en) Configuration updating method and device, configuration server and configuration system
CN109254855B (en) Registration method and device of parameter transmission protocol and electronic equipment
US9686168B1 (en) Managing component capacity
CN111736848A (en) Packet conflict positioning method and device, electronic equipment and readable storage medium
CN110022538B (en) Method and device for identifying traffic type
CN110858848B (en) Correction method and device for task resources of cluster system
CN111405486B (en) Trajectory analysis method and device, electronic equipment and storage medium
CN113326171B (en) Memory data processing method and device and electronic equipment
CN116016241B (en) Equipment fingerprint information identification method and device, storage medium and electronic equipment
CN110347632B (en) Communication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant