CN111917708A - Multi-target cooperative network security monitoring method, client and system - Google Patents

Multi-target cooperative network security monitoring method, client and system Download PDF

Info

Publication number
CN111917708A
CN111917708A CN202010481307.3A CN202010481307A CN111917708A CN 111917708 A CN111917708 A CN 111917708A CN 202010481307 A CN202010481307 A CN 202010481307A CN 111917708 A CN111917708 A CN 111917708A
Authority
CN
China
Prior art keywords
network
information
network equipment
contact
contact person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010481307.3A
Other languages
Chinese (zh)
Other versions
CN111917708B (en
Inventor
杨腾霄
马宇尘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Niudun Technology Co ltd
Original Assignee
Shanghai Niudun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Niudun Technology Co ltd filed Critical Shanghai Niudun Technology Co ltd
Priority to CN202010481307.3A priority Critical patent/CN111917708B/en
Publication of CN111917708A publication Critical patent/CN111917708A/en
Application granted granted Critical
Publication of CN111917708B publication Critical patent/CN111917708B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1818Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention discloses a multi-target cooperative network security monitoring method, a client and a system, and relates to the technical field of network information security. The network security monitoring method comprises the following steps: establishing a plurality of contacts in the instant messaging tool based on a plurality of target communication objects; acquiring a trigger operation of a user for one contact person, and displaying network equipment information associated with the contact person in a communication interaction interface; the method comprises the steps of obtaining selection operation of a user on network equipment displayed in a communication interaction interface, obtaining contact person information corresponding to other target communication objects participating in collaborative management when the network equipment belongs to collaborative management equipment, and establishing contact persons based on the obtained contact person information and the contact persons. The invention provides the acquisition interface of the monitoring data information by utilizing the communication interaction interface of the contact person in the communication tool, establishes the contact group aiming at a plurality of target communication objects of the cooperative management equipment, has simple operation and high communication efficiency, and improves the user experience.

Description

Multi-target cooperative network security monitoring method, client and system
Technical Field
The invention relates to the technical field of network information security, in particular to a multi-target cooperative network security monitoring method, a client and a system.
Background
The network security monitoring has the functions of monitoring the activities of a network or a host in real time, monitoring and analyzing the behaviors of a user and the system, auditing the configuration and the vulnerability of the system, evaluating the integrity of a sensitive system and data, identifying attack behaviors, counting and tracking abnormal behaviors, identifying behaviors violating security regulations, recording hacker behaviors by using a cheating server and the like, so that an administrator (network manager) can effectively monitor, control and evaluate the network or the host system.
Network devices (including components in network devices) are physical entities connected to a network, and a wide variety of common network devices typically include: computers (whether personal computers or servers), hubs, switches, bridges, routers, gateways, Network Interface Cards (NICs), Wireless Access Points (WAPs), printers and modems, fiber optic transceivers, and the like. The security monitoring of the current network device is generally based on a special monitoring platform (monitoring center), and the monitoring of the network device is performed by establishing a data system and sharing information through a centralized monitoring management system. However, since the models and brands of the network devices purchased by the enterprise have diversity, the international standards established by equipment manufacturers are not unified, and the compatibility of the source devices in the network is hindered due to various aspects such as the personalized requirements of the enterprise, the configuration and maintenance of the monitoring platform cannot be followed up in time, and the most common misconfiguration and unsynchronized upgrade of bug patches can become great potential safety hazards. Based on the above problems, some computer data security monitoring systems are provided in the prior art to perform real-time monitoring and management on device data, specifically: on one hand, different acquisition modes are designed by the collectors such as the active detector, the crawler engine and the client probe according to different equipment types to realize data acquisition, and then data information acquired by the collectors is transmitted to the data analysis module to be analyzed; on the other hand, the security login module is arranged to verify the identity of the administrator, for example, an iris recognition login system is adopted for login of the administrator, so that illegal personnel are prevented from logging in the management system, and the security of data management is improved.
However, in the above security monitoring system, when there are many network devices and the network environment is complex, a plurality of administrators are often needed to manage the network devices in different sub-areas, and in consideration of the importance and confidentiality requirements of data in different sub-areas, each administrator can only see the monitoring data information of the network device in charge of the administrator, and it is difficult to know the information of the upstream network device or the downstream network device related to the network device in charge of the administrator, which may cause that the maintenance of the security monitoring system cannot follow up in time.
Disclosure of Invention
The invention aims to provide a multi-target cooperative network security monitoring method, a client and a system, and the invention has the advantages that: the communication interaction interface of the contact person in the communication tool is used for providing the acquisition interface of the monitoring data information, and the contact group is established aiming at a plurality of target communication objects of the cooperative management equipment, so that the user can conveniently and quickly acquire the network equipment information, the user and the manager of the network equipment can conveniently carry out real-time interaction of the equipment information, the operation is simple, the communication efficiency is high, and the user experience is improved.
In order to achieve the above object, the present invention provides the following technical solutions:
a multi-target cooperative network security monitoring method comprises the following steps:
establishing a plurality of contact persons in an instant messaging tool based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, and each target communication object is associated with one or more network devices;
acquiring a trigger operation of a user for one contact person, and outputting a communication interaction interface corresponding to the contact person, wherein network equipment information related to the contact person is displayed in the communication interaction interface;
the method comprises the steps of obtaining selection operation of a user on network equipment displayed in a communication interaction interface, judging whether the corresponding network equipment belongs to cooperative management equipment or not, obtaining contact person information corresponding to other target communication objects participating in cooperative management when judging that the corresponding network equipment belongs to the cooperative management equipment, and establishing contact persons together with the contact persons based on the obtained contact person information.
And further, outputting monitoring data information of the corresponding cooperative management equipment in a group communication interaction interface corresponding to the contact group.
And further, acquiring the selection operation of the user on the network equipment displayed in the communication interactive interface, and directly outputting the monitoring data information of the corresponding network equipment when judging that the network equipment does not belong to the cooperative management equipment.
Further, acquiring communication interactive content of the user and the contact, identifying network equipment information related in the communication interactive content, identifying related network equipment on the communication interactive interface, and/or acquiring real-time monitoring data output display of the related network equipment.
Further, according to the network equipment selected by the user, outputting an equipment interaction interface corresponding to the network equipment, wherein the equipment interaction interface is independent of the communication interaction interface, and the user can perform communication interaction with the contact through the equipment interaction interface;
a plurality of device interactive interfaces which are in one-to-one correspondence are arranged corresponding to the plurality of network devices, and the monitoring data information of each network device is output in the corresponding device interactive interface.
Preferably, the geographical location information of the network device is acquired, a network device map based on the contact is established, trigger items of each network device associated with the contact are displayed in the network device map based on the actual geographical location of the network device, and the device interaction interface of the network device can be output when the trigger items are triggered.
Further, the target communication object is one or more network management personnel of the network equipment, digital codes corresponding to the network management personnel are displayed on the network equipment or in the area near the network equipment, and the digital codes are associated with the communication account information of the network management personnel;
acquiring operation information of the digital code identified by a user through an instant messaging tool, and sending a contact person adding request carrying the communication account information to a server;
and after receiving the response of successful addition fed back by the server, establishing a contact corresponding to the network management personnel in the instant messaging tool.
The invention also provides a multi-target collaborative network security monitoring client, which comprises an instant communication module and:
the initialization module is used for establishing a contact person corresponding to a target communication object in a contact person list based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, and each target communication object is associated with one or more network devices;
the information acquisition module is used for acquiring the triggering operation of a user aiming at the contact person and outputting a communication interaction interface corresponding to the contact person, wherein the communication interaction interface displays the information of the network equipment related to the contact person;
the information processing module is used for acquiring the selection operation of a user on the network equipment displayed in the communication interaction interface, judging whether the corresponding network equipment belongs to the cooperative management equipment or not, and sending a group generation instruction when the network equipment belongs to the cooperative management equipment;
and the group creating module is used for acquiring the contact person information corresponding to other target communication objects participating in cooperative management according to the group generating instruction, and establishing a contact group together with the contact person based on the acquired contact person information.
The invention also provides a multi-target cooperative network security monitoring system, which comprises the following structures:
the monitoring center is used for monitoring one or more network devices and generating monitoring data information, the network devices are associated with managers, and the associated network device information and the monitoring data information can be acquired through the accounts of the managers;
the user terminal is used for establishing a contact person corresponding to a target communication object in a contact person list through an instant messaging tool on the user terminal based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, acquiring the trigger operation of a user aiming at the contact person and outputting a communication interaction interface corresponding to the contact person;
a system server connecting the user terminal and the monitoring center, the system server being configured to,
judging whether a contact person triggered by a user is associated with network equipment or not, and acquiring associated network equipment information according to a manager account of the contact person and displaying the associated network equipment information in the communication interaction interface when the contact person triggered by the user is associated with the network equipment; and acquiring the selection operation of the user on the network equipment displayed in the communication interaction interface, judging whether the corresponding network equipment belongs to the cooperative management equipment, acquiring contact information corresponding to other target communication objects participating in cooperative management when the network equipment belongs to the cooperative management equipment, and establishing contact groups together with the contact persons based on the acquired contact information.
The monitoring center further comprises a monitoring robot which is arranged corresponding to the network equipment, and the monitoring robot can actively stimulate the corresponding network equipment to acquire monitoring data information according to a triggering operation instruction of the network equipment in the communication interaction interface and transmit the acquired monitoring data information to the system server.
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects as examples: the method has the advantages that the contact person function in the communication tool is utilized, the acquisition interface of the monitoring data information is provided through the communication interaction interface of the contact person, the contact group is established aiming at a plurality of target communication objects of the cooperative management equipment, the user can conveniently and quickly acquire the network equipment information, the user can conveniently and timely interact the equipment information with the manager of the network equipment, the follow-up efficiency and the cooperativity of system maintenance can be conveniently improved, the operation is simple, the communication efficiency is high, and the user experience is improved. Furthermore, an equipment interaction interface can be generated based on the associated network equipment, so that a user can conveniently communicate with an administrator aiming at the concerned network equipment, and the communication efficiency is improved.
Drawings
Fig. 1 is a flowchart of a multi-target collaborative network security monitoring method according to an embodiment of the present invention.
Fig. 2 to fig. 4 are diagrams illustrating an operation of establishing a contact group through a network device according to an embodiment of the present invention.
Fig. 5 is a diagram of an example of displaying a contact group on a main interface according to an embodiment of the present invention.
Fig. 6 is an exemplary diagram of a display interface of monitoring data information according to an embodiment of the present invention.
Fig. 7 is an exemplary diagram of an interface of an interactive interface of a device provided in an embodiment of the present invention.
Fig. 8 is a schematic structural diagram of a multi-target collaborative network security monitoring client according to an embodiment of the present invention.
Fig. 9 is a schematic structural diagram of a multi-target collaborative network security monitoring system according to an embodiment of the present invention.
Description of reference numerals:
a user terminal 100, a user avatar 110, a contact list 120, contacts 121, 121-1, 121-2, 121-3, a group list 140, a device information group 141, group members 141-1, 141-2, 141-3;
a communication interactive interface 200, a conversation contact person display area 210, an interactive information input column 220, an interactive information display column 230, an interactive tool column 240, a network equipment information display column 250 and a monitoring data display interface 290;
a group communication interactive interface 300, a group name display area 310, an interactive information display field 320, an interactive information input field 330, a monitoring data display field 340 and a group member display field 350;
a device interaction interface 400, a conversation contact display area 410, a device display area 420, a device monitoring data display area 430, an interaction information input field 440, and an interaction information display field 450;
the system comprises a client 500, an initialization module 510, an information acquisition module 520, an information processing module 530 and a group creation module 540;
the system 600, the monitoring center 610, the user terminal 620 and the system server 630.
Detailed Description
The multi-target cooperative network security monitoring method, client and system disclosed by the invention are further described in detail with reference to the accompanying drawings and specific embodiments. It should be noted that technical features or combinations of technical features described in the following embodiments should not be considered as being isolated, and they may be combined with each other to achieve better technical effects. In the drawings of the embodiments described below, the same reference numerals appearing in the respective drawings denote the same features or components, and may be applied to different embodiments. Thus, once an item is defined in one drawing, it need not be further discussed in subsequent drawings.
It should be noted that the structures, proportions, sizes, and other dimensions shown in the drawings and described in the specification are only for the purpose of understanding and reading the present disclosure, and are not intended to limit the scope of the invention, which is defined by the claims, and any modifications of the structures, changes in the proportions and adjustments of the sizes and other dimensions, should be construed as falling within the scope of the invention unless the function and objectives of the invention are affected. The scope of the preferred embodiments of the present invention includes additional implementations in which functions may be executed out of order from that described or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present invention.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
Examples
Referring to fig. 1, a multi-target cooperative network security monitoring method according to an embodiment of the present invention is provided. The method comprises the following steps:
s100, establishing a plurality of contact persons in the instant messaging tool based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, and each target communication object is associated with one or more network devices.
The Instant Messaging tool (IM) is also called Instant Messaging tool, and generally refers to a client with Instant Messaging function in the art. By way of example and not limitation, the instant messenger may be a web application, a PC application, or a handheld APP application.
The method for establishing the contact corresponding to the target communication object in the instant communication tool can be that the user actively edits through the address book function of the instant communication tool and stores the contact and the basic information of the target communication object. The address book usually includes a contact list, the contact list is generally maintained by the user, the contact information in the contact list includes at least two parts, one part is the contact identification recorded by the user, the contact identification can be the name, nickname, code number, etc. of the target communication object; the other part is the contact way of the contact person, and the contact way is an instant communication signal, such as a QQ number, a micro signal, a mobile phone number and the like; the basic information may include, but is not limited to, a user name, a nickname, an attribute, address information, and the like.
The method for establishing the contact corresponding to the object in the instant messaging tool can also be a method for receiving an invitation or actively searching, for example, a user receives a friend adding message sent by a target communication object, or the user actively searches an instant messaging signal of the target communication object and then adds the object as a friend; after the friend is added successfully, the contact corresponding to the object is established in the communication tool of the user.
In this embodiment, preferably, the target communication object is one or more network management personnel of the network device, and a digital code corresponding to the network management personnel is displayed on the network device or in an area near the network device, where the digital code is associated with communication account information of the network management personnel. Acquiring operation information of the digital code identified by a user through an instant messaging tool, and sending a contact person adding request carrying the communication account information to a server; and after receiving the response of successful addition fed back by the server, establishing a contact corresponding to the network management personnel in the instant messaging tool.
The digital code is preferably a two-dimensional code or a bar code.
The network device associated with the network management personnel is a plurality of network devices which are responsible for management. One network device may be associated with a plurality of network managers, and the network device corresponding to the plurality of network managers is a cooperative management device, that is, a plurality of network managers are required to manage. One network manager is a target communication object, one target communication object corresponds to one contact in the contact list, and each network manager can be associated with one or more network devices.
For example, and without limitation, referring to fig. 2, for example, beijing technology limited sets 3 network management personnel Mary, liquad and ohforce, and the user adds a QQ friend whose own is Mary, liquad and ohforce by scanning a code, then adds 3 contacts 121-1, 121-2 and 121-3 in a contact list of the QQ, and the contact nicknames set by the user are sequentially Mary-beijing technology network management 1, liquad-beijing technology network management 2 and ohforce-beijing technology network management 3. Because the QQ account numbers of Mary, liquad and europe have associated network device information that is responsible for management, it is preferable that the contact head portraits or ITEM ITEMs of the contact Mary-beijing technology network management 1, liquad-beijing technology network management 2 and europe-beijing technology network management 3 are distinguished and identified in the contact list 120 to distinguish them from the common contact objects.
The association relationship (or called corresponding relationship) between the contact and the network device can be set by a user, for example, the user makes a mapping information table of the network management and the network device and stores the mapping information table in the system server; or by reading a mapping information table of preset network managers and network equipment in the associated monitoring system; the contact person can also set a mapping information table of the network management and the network equipment and upload the mapping information table to a system server so as to be convenient for the user in the system to obtain and use.
S200, collecting the trigger operation of a user aiming at one contact person, and outputting a communication interaction interface corresponding to the contact person, wherein the information of the network equipment related to the contact person is displayed in the communication interaction interface.
The user can trigger interaction operation for a certain contact in the contact list, wherein the interaction operation is commonly used, for example, clicking to trigger a corresponding contact head portrait and a group head portrait, and a communication interaction interface is generated accordingly.
And the communication interaction interface is used for displaying historical interaction information, current interaction information and the like of the user and the contact persons. Taking the instant messaging tool QQ as an example, for example, when the user triggers the avatar of the contact Mary associated with the network device in the contact list, the display screen pops up the communication interaction interface 200 corresponding to the contact, as shown in fig. 3, in which a conversation contact display area 210, an interaction information input field 220, an interaction information display field 230 and an interaction toolbar 240 are displayed.
In this embodiment, the communication interface 200 further includes a network device information display bar 250. The network device information display column 250 displays a plurality of pieces of network device information which the contact Mary is responsible for managing. Specifically, the network device for managing by the contact Mary comprises a three-layer switch, and 3 two-layer switches, personal computers, notebooks, printers, cameras and other network devices corresponding to an office area, a financial area and a server area.
Preferably, in the network device information display section 250, in order to allow the user to visually recognize the location layout of the network devices and the management device of the contact, the connection relationships of the plurality of network devices are displayed in a tree structure, and the name, model, connection relationship, and the like of each network device are briefly described.
S300, acquiring the selection operation of the user on the network equipment displayed in the communication interaction interface, judging whether the corresponding network equipment belongs to the cooperative management equipment, acquiring the contact information corresponding to other target communication objects participating in cooperative management when judging that the corresponding network equipment belongs to the cooperative management equipment, and establishing contact groups together with the contact on the basis of the acquired contact information.
And further, outputting a corresponding group communication interaction interface based on the established contact group so as to facilitate information interaction of the user.
By way of example and not limitation, a user clicks a two-layer switch that selects an office area in the network device information display bar 250 with a mouse or a finger to obtain specific information of the network device, such as monitoring data information. In this embodiment, it can be determined whether the network device selected by the user belongs to a cooperative management device related to multiple management according to the selection operation of the user. And if the communication objects belong to the cooperative management equipment, acquiring the contact information corresponding to other target communication objects participating in cooperative management, and establishing a contact group together with the contact on the basis of the acquired contact information. If the network device selected by the user does not belong to the cooperative management device, namely belongs to the single management device, the monitoring data information of the corresponding network device can be directly output.
For example, but not by way of limitation, the three-layer switch is further connected with a two-layer switch of a laboratory area and an research area, and a person responsible for network device management of the laboratory area and the research area is lie four, and the three-layer switch belongs to a cooperative management device of Mary and lie four (the Mary and the lie four participate in the management of the three-layer switch at the same time). If the user needs to view the complete monitoring data information of the switch three times, Mary and Liqun are needed to provide help at the same time. Therefore, when the network equipment selected by the user is judged to belong to the cooperative management equipment, the information of other objects participating in cooperative management is obtained, and the contact group is established together with the contact person on the basis of the instant communication identification number of the other objects. Specifically, for example, an instant messaging login number (for example, QQ, may be a QQ number of Mary and lie four) of Mary and lie four is obtained to establish a contact group (that is, a chat group), where the contact group includes a group member user Austus, a network management Mary, and network management lie four, and a group communication interaction interface corresponding to the contact group is output based on the group communication interaction interface shown in fig. 4.
The contact group is used as an equipment information group, and the group communication interactive interface 300 is an interactive group at least having an instant communication interactive function. The corresponding group communication interactive interface 300 can display the network device information related to the network management Mary and the network management Li four, and the difference from the network device information displayed in FIG. 3 is that the group communication interactive interface 300 can simultaneously display the network device information of the network management Mary and the network management Li four. When the network equipment information is displayed, the corresponding network equipment information can be displayed in a subarea mode aiming at different contact persons, and the network management information can also be displayed in the same area but marked by a dotted line frame or other marks. Other functions of the group application of the group communication interactive interface can refer to communication group functions in the prior art, and are not described herein again.
The established contact group is displayed in the group interface of the instant messaging tool.
Referring to fig. 5, a user selects a group control in the main interface, the group control is activated, the user interface outputs a group list 140, and information presented in the group list 140 may include a group avatar, a group nickname, and the like. A device information group 141- "20200308 three-layer switch-device information group" is newly created in the group list 140 according to the cooperative management device selected by the user. Preferably, the group members are displayed as sub-lists under the device information group 141, so that the user can easily and intuitively know the group member information, for example, the device information group 141 in fig. 5 includes 3 group members 141-1, 141-2, and 141-3, which are Austus, Mary-beijing technology network manager 1, and li four-beijing technology network manager 2, respectively.
When the user triggers an ITEM of the device information group 141, such as double-clicking a group avatar or a group name, the group communication interactive interface 300 shown in fig. 4 may pop up, and the user may perform information interaction in the group communication interactive interface.
Preferably, the device information group 141 is provided with a dormant state, and when a group member does not publish a message or chat in the group within a preset time range, such as 1 day, the device information group 141 can be transferred from an active state to the dormant state. Further, if the time that the device information group 141 is in the sleep state exceeds a preset time threshold (for example, 1 month), the device information group 141 is dismissed, and the group members of the contact group exit the group, and the group no longer exists.
In this embodiment, in the group communication interactive interface 300, monitoring data information of the corresponding cooperative management device is also output. Continuing with reference to FIG. 4, by way of example and not limitation, the group communication interface 300 may include a group name display area 310, an interaction information display field 320, an interaction information input field 330, a monitoring data display field 340, and a group member display field 350. And outputting the monitoring data information of the corresponding cooperative management device through the monitoring data display column 340. The monitoring data is generally time-shared, and the user can adjust the time period or duration of the monitoring data displayed in the monitoring data display column 340 by triggering the "more" button in the monitoring data display column 340.
The mode of outputting the monitoring data information of the network device may be based on window area output of the communication interface, for example, a sub-area is divided on the communication interface to output the monitoring data information of the selected device, or a new independent interface is popped up to output the monitoring data information, which is shown in the monitoring data display interface 290 shown in fig. 6.
The monitoring data information may include traffic monitoring information of the network device, such as monitoring, recording, and performing time-sharing statistics on traffic of the network device, such as a router and a switch. Meanwhile, the method also comprises the step of monitoring the packet loss of the network equipment, so that a user can master the packet loss condition of each port at any time, and further, a threshold value can be set for alarming to remind the user when packet loss occurs. The monitoring software may provide other monitoring service functions such as temperature monitoring of the CPU, disk, graphics card, etc. supporting the sensor.
By way of example and not limitation, taking a server as an example, typical monitoring data information may include CPU utilization monitoring, memory monitoring, load monitoring, network card traffic monitoring, process monitoring, and PING monitoring, and any SHELL custom project monitoring may also be set as needed. Specifically, the CPU utilization monitoring data may include a total CPU utilization of the server, and a utilization of each CPU in the multiple CPUs; the memory monitoring may include physical memory usage monitoring, physical memory available size monitoring; the load monitoring may include 1 minute average load, 5 minute average load, 15 minute average load; the network card flow monitoring may include network card flow monitoring, packet loss monitoring, and error monitoring. The process monitoring can be used for monitoring information such as memory usage, CPU usage, whether the process is started or not and the like of the process; the PING monitoring can be used to monitor whether the server is PING ready at any time.
Preferably, a threshold alarm and a multi-level alarm can be set on the communication interactive interface for the monitored object. The alarm information can be sent to the associated user in the forms of instant messaging messages, mails, short messages and the like.
In another implementation manner of this embodiment, communication interaction content between the user and the contact may also be acquired, network device information related in the communication interaction content is identified, and the related network device is identified on the communication interaction interface, so that the user and the contact can visually view information and operation information of the network device in question. Specifically, the communication interactive content between the user and the contact is obtained, the information of the network equipment involved in the communication interactive content is identified through semantic analysis, and the involved network equipment is identified on the communication interactive interface.
Furthermore, real-time monitoring data output display of related network equipment can be obtained.
The semantic analysis is to identify and process chat content (communication interactive content) to obtain semantics so as to obtain related network device information, such as name, model, number, network address, and the like of the network device. By way of example and not limitation, existing semantic analysis methods may generally include the following steps: segmenting the sentences to obtain M words; respectively carrying out semantic role labeling on the M words, and searching and positioning predicates in the sentences; and marking the assignor and the receiver of the predicate to obtain the semantics of the sentence. In the present embodiment, it is considered that when a sentence includes a plurality of pieces of information, since only the assignor and the recipient of the predicate are labeled to determine the semantics of the sentence, other important information in the sentence cannot be labeled, and information is easily lost. Moreover, when the sentence is a spoken sentence, the predicate in the sentence may not be found in the semantic analysis process. The semantic analysis can be performed as follows:
first, the text information of the chat is segmented. The method comprises the following steps of performing voice recognition on user input voice by adopting an HTK/ATK tool; the speech recognition method may also be used to perform speech recognition on the user input speech in a non-human-specific speech recognition manner, which is not limited herein.
Then, obtaining L words through word segmentation, wherein L is more than or equal to 1; respectively acquiring the characteristics of the L words; and respectively determining the information content contained in the L words according to the characteristics, and selecting at least one word containing more information content from the L words as a central word. By way of example and not limitation, when the user input information is a chinese language, a chinese word segmentation system, such as ICTCLAS, may be used to segment a text corresponding to the user input speech; when the user inputs the speech in other languages, the word segmentation system corresponding to the language can be used for word segmentation, which is not described herein again. The characteristics of the words can reflect the specific part of speech, representative meaning and other named entity characteristics of the words. Such as, by way of example and not limitation, device name, model number, network address.
Then, respectively taking the central words as centers to make windows, and determining context words of the central words; matching the context words with a semantic model obtained by pre-training to obtain a matching result; and analyzing semantics according to the matching result.
In another implementation manner of this embodiment, a device interaction interface corresponding to the network device may be further output according to the network device selected by the user, the device interaction interface is independent of the setting of the communication interaction interface, and the user may perform communication interaction with the contact through the device interaction interface. A plurality of device interactive interfaces which are in one-to-one correspondence are arranged corresponding to the plurality of network devices, and the monitoring data information of each network device is output in the corresponding device interactive interface.
By way of example and not limitation, if a user triggers 3 network devices in the network devices managed by the network management Mary, 3 device interaction interfaces are generated. The 3 equipment interaction interfaces are set independently from the communication interaction interface 200, and a user can perform communication interaction with the network management Mary through the equipment interaction interfaces and can also visually acquire monitoring data information of corresponding network equipment.
Preferably, in order to facilitate the user to manage and view the device interactive interface, a combined device interactive interface is generated for the network manager and the multiple device interactive interfaces. Referring to fig. 7, the device interactive interface 400 is a combined device interactive interface corresponding to 3 network devices, and includes: a conversation contact display area 410-such as the head portrait of webmaster Mary, a device display area 420, a device monitoring data display area 430, an interactive information input field 440, and an interactive information display field 450.
The device display area 420 is used for displaying basic information of the network devices, including but not limited to names, models, numbers, network addresses, and the like, the number of the device display area 420 is adapted to the number of the network devices, 3 network devices correspond to 3 device display areas 420, and a user can close a device interactive interface that does not need to be discussed again through a window closing option on the device display area 420 side.
The device monitoring data display area 430 is used for displaying monitoring data information of a corresponding network device. By adopting the combined equipment interactive interface, a user can efficiently communicate with a network manager aiming at the network equipment.
In this embodiment, the geographical location information of the network device may also be acquired, a network device map based on the contact may be established, a trigger item of each network device associated with the contact may be displayed in the network device map based on the actual geographical location of the network device, and the device interaction interface of the network device may be output when the trigger item is triggered. Therefore, the network equipment information is convenient for users to consult and browse.
Preferably, the device interaction interface includes a function key for the network device, and the function key corresponds to a control instruction for the network device; and when any function key is triggered, triggering the network equipment to execute a corresponding control instruction.
In another embodiment of this embodiment, multiple device management levels may be preset in correspondence to the network device, the number of levels of the device management level of the network device selected by the user is obtained, the network device information output of the upper device management level to which the network device belongs is obtained, whether a person in charge of the network device of the upper device management level is the target object is determined, and if the person in charge of the network device of the upper device management level is determined to be the target object, the monitoring data information of the network device of the upper device management level is obtained and output together with the monitoring data information of the network device selected by the user. If the person in charge of the network device at the upper device management level is not the target object and the target object does not have the data monitoring authority of the upper network device, the user can contact the administrator of the upper network device to obtain the relevant data information.
For example, without limitation, a 4-level device management hierarchy is preset corresponding to the network device, and the hierarchy is 1 level, 2 level, 3 level, and 4 level in sequence, where the 4 th level is the highest level, which represents the most important and highest data security requirement, one or more 3-level network devices may be included below the 4-level network device, one or more 2-level network devices may be included below the 3-level network device, and so on. Taking the Mary managed network device in fig. 3 as an example, for example, the three-layer switch belongs to a 3-level network device, the 3 lower two-layer switches belong to a 2-level network device, and the network device at the upper device management level to which the two-layer switches belong is the three-layer switch. Because the three-layer switch also belongs to the network equipment which is responsible for management by Mary, when the monitoring data information of the two-layer switch in the office area is output, the monitoring data information of the three-layer switch can be output together. Therefore, the operation information of the network equipment can be conveniently analyzed by the user according to the connection relation of the network equipment.
Referring to fig. 8, a multi-target collaborative network security monitoring client is provided as another embodiment of the present invention.
The client 500 includes an instant messaging module capable of instant messaging, and an initialization module 510, an information collection module 520, an information processing module 530, and a group creation module 540.
The initialization module 510 is configured to establish a contact corresponding to a target communication object in a contact list based on a plurality of target communication objects, where one contact corresponds to one target communication object, and each target communication object is associated with one or more network devices.
The information acquisition module 520 is configured to acquire a trigger operation of a user for the contact, and output a communication interaction interface corresponding to the contact, where network device information associated with the contact is displayed in the communication interaction interface.
The information processing module 530 is configured to obtain a selection operation of a user on a network device displayed in the communication interaction interface, determine whether the corresponding network device belongs to the cooperative management device, and issue a group generation instruction when the network device belongs to the cooperative management device.
The group creating module 540 is configured to obtain contact information corresponding to other target communication objects participating in collaborative management according to the group generating instruction, and establish a contact group together with the contact based on the obtained contact information.
In this embodiment, the information processing module 530 further includes an interface management unit, and the interface management unit is configured to: and outputting an equipment interaction interface corresponding to the network equipment according to the network equipment selected by the user, wherein the equipment interaction interface is independent of the communication interaction interface, and the user can perform communication interaction with the contact through the equipment interaction interface.
A plurality of device interactive interfaces which are in one-to-one correspondence are arranged corresponding to the plurality of network devices, and the monitoring data information of each network device is output in the corresponding device interactive interface. By way of example and not limitation, if a user triggers 3 network devices in the network devices managed by the network management Mary, 3 device interaction interfaces are generated. The 3 equipment interaction interfaces are independent of the communication interaction interface, a user can perform communication interaction with the network management Mary through the equipment interaction interfaces, and monitoring data information of corresponding network equipment can be visually acquired.
Preferably, to facilitate user management and viewing of the device interaction interface, the interface management module is configured to: and generating a combined equipment interactive interface aiming at the network management and the multiple equipment interactive interfaces. Specifically, the combined device interactive interface may include: and a conversation contact person display area, such as a head portrait of a webmaster Mary, an equipment display area, an equipment monitoring data display area, an interactive information input field and an interactive information display field. The device display area is used for displaying basic information of the network devices, including but not limited to names, models, numbers, network addresses and the like, the number of the device display area is adapted to the number of the network devices, 3 network devices correspond to 3 device display areas, and a user can close a device interactive interface which does not need to be discussed again through a window closing option at the side of the device display area. The equipment monitoring data display area is used for displaying monitoring data information of corresponding network equipment. By adopting the combined equipment interactive interface, a user can efficiently communicate with a network manager aiming at the network equipment.
Other technical features are referred to in the previous embodiments and are not described herein.
Referring to fig. 9, a multi-target cooperative network security monitoring system is provided as another embodiment of the present invention.
The system 600 includes a monitoring center 610, a user terminal 620, and a system server 630 connecting the user terminal and the monitoring center.
The monitoring center 610 is configured to monitor one or more network devices and generate monitoring data information, where the network devices are associated with managers, and the associated network device information and monitoring data information can be obtained through a manager account.
The user terminal 620 is configured to establish a contact corresponding to a target communication object in a contact list through an instant messaging tool on the user terminal based on a plurality of target communication objects, where one contact corresponds to one target communication object, collect a trigger operation of a user for the contact, and output a communication interaction interface corresponding to the contact.
The system server 630, configured to: judging whether a contact person triggered by a user is associated with network equipment or not, and acquiring associated network equipment information according to a manager account of the contact person and displaying the associated network equipment information in the communication interaction interface when the contact person triggered by the user is associated with the network equipment; and acquiring the selection operation of the user on the network equipment displayed in the communication interaction interface, judging whether the corresponding network equipment belongs to the cooperative management equipment, acquiring contact information corresponding to other target communication objects participating in cooperative management when the network equipment belongs to the cooperative management equipment, and establishing contact groups together with the contact persons based on the acquired contact information.
In this embodiment, the monitoring center further includes a monitoring robot configured to correspond to the network device, and the monitoring robot can actively excite the corresponding network device to acquire monitoring data information according to a trigger operation instruction of the network device in the communication interaction interface, and transmit the acquired monitoring data information to the system server.
Other technical features are referred to in the previous embodiments and are not described herein.
In the foregoing description, the disclosure of the present invention is not intended to limit itself to these aspects. Rather, the various components may be selectively and operatively combined in any number within the intended scope of the present disclosure. In addition, terms like "comprising," "including," and "having" should be interpreted as inclusive or open-ended, rather than exclusive or closed-ended, by default, unless explicitly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. Common terms found in dictionaries should not be interpreted too ideally or too realistically in the context of related art documents unless the present disclosure expressly limits them to that. Any changes and modifications of the present invention based on the above disclosure will be within the scope of the appended claims.

Claims (10)

1. A multi-target cooperative network security monitoring method is characterized by comprising the following steps:
establishing a plurality of contact persons in an instant messaging tool based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, and each target communication object is associated with one or more network devices;
acquiring a trigger operation of a user for one contact person, and outputting a communication interaction interface corresponding to the contact person, wherein network equipment information related to the contact person is displayed in the communication interaction interface;
the method comprises the steps of obtaining selection operation of a user on network equipment displayed in a communication interaction interface, judging whether the corresponding network equipment belongs to cooperative management equipment or not, obtaining contact person information corresponding to other target communication objects participating in cooperative management when judging that the corresponding network equipment belongs to the cooperative management equipment, and establishing contact persons together with the contact persons based on the obtained contact person information.
2. The network security monitoring method of claim 1, wherein: and outputting the monitoring data information of the corresponding cooperative management equipment in the group communication interactive interface corresponding to the contact group.
3. The network security monitoring method of claim 1, wherein: and acquiring the selection operation of the user on the network equipment displayed in the communication interactive interface, and directly outputting the monitoring data information of the corresponding network equipment when judging that the network equipment does not belong to the cooperative management equipment.
4. The network security monitoring method of claim 1, wherein: the method comprises the steps of obtaining communication interactive contents of a user and the contact, identifying information of network equipment related to the communication interactive contents, identifying the related network equipment on the communication interactive interface, and/or obtaining real-time monitoring data output display of the related network equipment.
5. The network security monitoring method of claim 1, wherein: outputting an equipment interaction interface corresponding to the network equipment according to the network equipment selected by the user, wherein the equipment interaction interface is independent of the communication interaction interface, and the user can perform communication interaction with the contact through the equipment interaction interface;
a plurality of device interactive interfaces which are in one-to-one correspondence are arranged corresponding to the plurality of network devices, and the monitoring data information of each network device is output in the corresponding device interactive interface.
6. The network security monitoring method of claim 5, wherein: acquiring the geographic position information of the network equipment, establishing a network equipment map based on the contact person, displaying trigger items of each network equipment related to the contact person in the network equipment map based on the actual geographic position of the network equipment, and outputting an equipment interaction interface of the network equipment when the trigger items are triggered.
7. The network security monitoring method of claim 1, wherein: the target communication object is one or more network management personnel of the network equipment, digital codes corresponding to the network management personnel are displayed on the network equipment or in the area near the network equipment, and the digital codes are associated with the communication account information of the network management personnel;
acquiring operation information of the digital code identified by a user through an instant messaging tool, and sending a contact person adding request carrying the communication account information to a server;
and after receiving the response of successful addition fed back by the server, establishing a contact corresponding to the network management personnel in the instant messaging tool.
8. A multi-target collaborative network security monitoring client comprises an instant messaging module and is characterized by further comprising:
the initialization module is used for establishing a contact person corresponding to a target communication object in a contact person list based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, and each target communication object is associated with one or more network devices;
the information acquisition module is used for acquiring the triggering operation of a user aiming at the contact person and outputting a communication interaction interface corresponding to the contact person, wherein the communication interaction interface displays the information of the network equipment related to the contact person;
the information processing module is used for acquiring the selection operation of a user on the network equipment displayed in the communication interaction interface, judging whether the corresponding network equipment belongs to the cooperative management equipment or not, and sending a group generation instruction when the network equipment belongs to the cooperative management equipment;
and the group creating module is used for acquiring the contact person information corresponding to other target communication objects participating in cooperative management according to the group generating instruction, and establishing a contact group together with the contact person based on the acquired contact person information.
9. A multi-target cooperative network security monitoring system is characterized by comprising:
the monitoring center is used for monitoring one or more network devices and generating monitoring data information, the network devices are associated with managers, and the associated network device information and the monitoring data information can be acquired through the accounts of the managers;
the user terminal is used for establishing a contact person corresponding to a target communication object in a contact person list through an instant messaging tool on the user terminal based on a plurality of target communication objects, wherein one contact person corresponds to one target communication object, acquiring the trigger operation of a user aiming at the contact person and outputting a communication interaction interface corresponding to the contact person;
the system server is connected with the user terminal and the monitoring center and is configured to judge whether a contact person triggered by a user is associated with network equipment or not, and when the contact person is judged to be associated with the network equipment, the system server acquires associated network equipment information according to an administrator account of the contact person and displays the associated network equipment information in the communication interaction interface; and acquiring the selection operation of the user on the network equipment displayed in the communication interaction interface, judging whether the corresponding network equipment belongs to the cooperative management equipment, acquiring contact information corresponding to other target communication objects participating in cooperative management when the network equipment belongs to the cooperative management equipment, and establishing contact groups together with the contact persons based on the acquired contact information.
10. The network security monitoring system of claim 9, wherein: the monitoring center also comprises a monitoring robot which is arranged corresponding to the network equipment, and the monitoring robot can actively stimulate the corresponding network equipment to acquire monitoring data information according to a triggering operation instruction of the network equipment in the communication interaction interface and transmit the acquired monitoring data information to the system server.
CN202010481307.3A 2020-05-31 2020-05-31 Multi-target cooperative network security monitoring method, client and system Active CN111917708B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010481307.3A CN111917708B (en) 2020-05-31 2020-05-31 Multi-target cooperative network security monitoring method, client and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010481307.3A CN111917708B (en) 2020-05-31 2020-05-31 Multi-target cooperative network security monitoring method, client and system

Publications (2)

Publication Number Publication Date
CN111917708A true CN111917708A (en) 2020-11-10
CN111917708B CN111917708B (en) 2023-04-18

Family

ID=73237624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010481307.3A Active CN111917708B (en) 2020-05-31 2020-05-31 Multi-target cooperative network security monitoring method, client and system

Country Status (1)

Country Link
CN (1) CN111917708B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113630398A (en) * 2021-07-28 2021-11-09 上海纽盾科技股份有限公司 Joint anti-attack method, client and system in network security
CN113630400A (en) * 2021-07-28 2021-11-09 上海纽盾科技股份有限公司 Communication method, device and system for joint attack prevention in network security
CN113645122A (en) * 2021-08-02 2021-11-12 深圳派富知识产权投资咨询有限公司 Innovative data monitoring method, client and system
CN113660221A (en) * 2021-07-28 2021-11-16 上海纽盾科技股份有限公司 Joint anti-attack method, device and system combined with game
CN113743649A (en) * 2021-08-02 2021-12-03 深圳派富知识产权投资咨询有限公司 Pre-evaluation method, client and system for enterprise financing marketing
CN113872928A (en) * 2021-07-28 2021-12-31 上海纽盾科技股份有限公司 Method, client and system for obtaining benefits through network security defense
CN114866269A (en) * 2022-03-09 2022-08-05 上海纽盾科技股份有限公司 Network security monitoring method, system and application

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015036817A1 (en) * 2013-09-15 2015-03-19 Yogesh Chunilal Rathod Structured updated status, requests, user data & programming based presenting & accessing of connections
US9479466B1 (en) * 2013-05-23 2016-10-25 Kabam, Inc. System and method for generating virtual space messages based on information in a users contact list
US20170163781A1 (en) * 2015-12-08 2017-06-08 Ram Ramesh Seshan User interface for contacts management and communication
CN107347011A (en) * 2017-08-10 2017-11-14 努比亚技术有限公司 A kind of group message processing method, equipment and computer-readable recording medium
CN107508748A (en) * 2017-09-18 2017-12-22 上海量明科技发展有限公司 Display methods, device and the JICQ of contact person's interactive interface
CN110046238A (en) * 2019-03-29 2019-07-23 华为技术有限公司 Talk with exchange method, graphic user interface, terminal device and the network equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9479466B1 (en) * 2013-05-23 2016-10-25 Kabam, Inc. System and method for generating virtual space messages based on information in a users contact list
WO2015036817A1 (en) * 2013-09-15 2015-03-19 Yogesh Chunilal Rathod Structured updated status, requests, user data & programming based presenting & accessing of connections
US20170163781A1 (en) * 2015-12-08 2017-06-08 Ram Ramesh Seshan User interface for contacts management and communication
CN107347011A (en) * 2017-08-10 2017-11-14 努比亚技术有限公司 A kind of group message processing method, equipment and computer-readable recording medium
CN107508748A (en) * 2017-09-18 2017-12-22 上海量明科技发展有限公司 Display methods, device and the JICQ of contact person's interactive interface
CN110046238A (en) * 2019-03-29 2019-07-23 华为技术有限公司 Talk with exchange method, graphic user interface, terminal device and the network equipment

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113630398A (en) * 2021-07-28 2021-11-09 上海纽盾科技股份有限公司 Joint anti-attack method, client and system in network security
CN113630400A (en) * 2021-07-28 2021-11-09 上海纽盾科技股份有限公司 Communication method, device and system for joint attack prevention in network security
CN113660221A (en) * 2021-07-28 2021-11-16 上海纽盾科技股份有限公司 Joint anti-attack method, device and system combined with game
CN113872928A (en) * 2021-07-28 2021-12-31 上海纽盾科技股份有限公司 Method, client and system for obtaining benefits through network security defense
CN113630398B (en) * 2021-07-28 2023-02-21 上海纽盾科技股份有限公司 Joint anti-attack method, client and system in network security
CN113660221B (en) * 2021-07-28 2023-03-14 上海纽盾科技股份有限公司 Joint anti-attack method, device and system combined with game
CN113645122A (en) * 2021-08-02 2021-11-12 深圳派富知识产权投资咨询有限公司 Innovative data monitoring method, client and system
CN113743649A (en) * 2021-08-02 2021-12-03 深圳派富知识产权投资咨询有限公司 Pre-evaluation method, client and system for enterprise financing marketing
CN114866269A (en) * 2022-03-09 2022-08-05 上海纽盾科技股份有限公司 Network security monitoring method, system and application
CN114866269B (en) * 2022-03-09 2023-05-02 上海纽盾科技股份有限公司 Network security monitoring method, system and application

Also Published As

Publication number Publication date
CN111917708B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN111917708B (en) Multi-target cooperative network security monitoring method, client and system
CN111934976A (en) Network security monitoring method, client and system based on instant messaging
US10797976B2 (en) System and methods for facilitating object assignments
CN111935066B (en) Method, client and system for security level protection management
US7631046B2 (en) Method and apparatus for lawful interception of web based messaging communication
US8775529B2 (en) Bridging communications between communication services using different protocols
US20050165584A1 (en) Method and system for sensing and communicating the use of communication modes by remote users
CN112350923B (en) Session message display method and device, computer equipment and storage medium
US20130262594A1 (en) Management and synchronization of related electronic communications
US11356498B2 (en) Method and a device for sharing a hosted application
EP3336776B1 (en) Method and system for classifying user processes and providing security clearance
US10263929B2 (en) Cloud based chat governance system based on behavioral patterns and situational-awareness
WO2018111426A1 (en) Detecting extraneous social media messages
CN111726456B (en) Data processing method and related device
WO2017214213A1 (en) Message content modification devices and methods
CN114124861A (en) Message group sending method and device, computer equipment and storage medium
US10171481B2 (en) System and method for enhanced display-screen security and privacy
US8438296B2 (en) Playback communications using a unified communications protocol
CN113506137A (en) E-mail marketing analysis method, system and equipment
US20180232355A1 (en) Cognitive entity reference recognition
CN109962974B (en) Blessing information processing method, device, medium and equipment in enterprise application
CN114866434A (en) Security assessment method and application of network assets
US11558318B2 (en) In-line collaboration in e-mail
CN114499984A (en) Identity authentication method, device, equipment and medium based on AI and RPA
CN112711518B (en) Log uploading method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200441 floor 11, No. 2, Lane 99, Changjiang South Road, Baoshan District, Shanghai

Applicant after: SHANGHAI NIUDUN TECHNOLOGY Co.,Ltd.

Address before: 200433 floor 11, building A5, Lane 1688, Guoquan North Road, Yangpu District, Shanghai

Applicant before: SHANGHAI NIUDUN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant