CN116051015B - Method for rapidly acquiring and automatically generating evaluation form - Google Patents

Method for rapidly acquiring and automatically generating evaluation form Download PDF

Info

Publication number
CN116051015B
CN116051015B CN202211308668.3A CN202211308668A CN116051015B CN 116051015 B CN116051015 B CN 116051015B CN 202211308668 A CN202211308668 A CN 202211308668A CN 116051015 B CN116051015 B CN 116051015B
Authority
CN
China
Prior art keywords
evaluation
library
data
knowledge base
asset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211308668.3A
Other languages
Chinese (zh)
Other versions
CN116051015A (en
Inventor
刘韧
袁立
谢关云
赵利
郭津宏
王磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhuozhi Network Security Technology Co ltd
Original Assignee
Beijing Zhuozhi Network Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhuozhi Network Security Technology Co ltd filed Critical Beijing Zhuozhi Network Security Technology Co ltd
Priority to CN202211308668.3A priority Critical patent/CN116051015B/en
Publication of CN116051015A publication Critical patent/CN116051015A/en
Application granted granted Critical
Publication of CN116051015B publication Critical patent/CN116051015B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/177Editing, e.g. inserting or deleting of tables; using ruled lines
    • G06F40/18Editing, e.g. inserting or deleting of tables; using ruled lines of spreadsheets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention discloses a method for rapidly acquiring and automatically generating an evaluation form, which belongs to the field of information security evaluation and comprises the following steps: constructing an evaluation knowledge base through a core host end, wherein the evaluation knowledge base comprises an asset base and an evaluation base, and synchronously evaluating the knowledge base through an offline terminal; acquiring asset information and problem points through an offline terminal, and generating an evaluation task; performing operation management on asset information based on an asset library, and performing operation management on problem points based on an evaluation library to obtain evaluation task data; and returning the evaluation task data to the core host end, automatically summarizing the evaluation task data through the core host end, and generating an evaluation table. The invention can realize the electronization of information security assessment field detection and data arrangement links, reduce unnecessary manpower consumption and improve the working efficiency and the quality of working results.

Description

Method for rapidly acquiring and automatically generating evaluation form
Technical Field
The invention belongs to the field of information security evaluation, and particularly relates to a method for rapidly acquiring and automatically generating an evaluation form.
Background
In the existing information security evaluation working process, the working modes of field detection and data arrangement links are generally more traditional, and electronic solutions are seriously lost because paper field notes are manually converted into excel evaluation records, so that the electronic solutions cannot be converted and accumulated into a knowledge base which can be efficiently called at any time, the existing working experience cannot be reused, and great waste of personal efficiency is caused.
Because the information security evaluation process is not traceable, the field evidence is generally lost, the evaluation conclusion is completely based on manual verification and evaluation, and the evaluation conclusion is seriously dependent on the personal working attitude and mode of professional technicians, so that the evaluation conclusion is difficult to complete, objective and complete. Even an experienced evaluation professional needs a lot of time to repeat the manual work when performing the evaluation data arrangement, and the work efficiency from the off-line data collection arrangement to the on-line data processing is extremely low. Meanwhile, technical experience and capability of the evaluation professional technicians are good, if an automatic solution is lacking, it is difficult to ensure that the quality of the result record description, the problem point description and the solution description of the final evaluation record table reach the standard, and the internal quality control management and the customer maintenance of an evaluation mechanism are not facilitated.
Disclosure of Invention
The invention aims to provide a method for quickly acquiring and automatically generating an evaluation form, so as to solve the problems in the prior art.
In order to achieve the above object, the present invention provides a method for rapidly collecting and automatically generating an evaluation form, including:
constructing an evaluation knowledge base through a core host, wherein the evaluation knowledge base comprises an asset base and an evaluation base, and synchronizing the evaluation knowledge base through an offline terminal;
acquiring asset information and problem points through an offline terminal, and generating an evaluation task; performing operation management on the asset information based on the asset library, and performing operation management on the problem points based on the evaluation library to obtain evaluation task data;
and returning the evaluation task data to a core host end, automatically summarizing the evaluation task data through the core host end, and generating an evaluation table.
Preferably, the evaluation library includes: index library, factor combination description library and problem library.
Preferably, the process of constructing the evaluation library includes:
acquiring information security evaluation standards of different industries, and constructing an evaluation index library based on the information security evaluation standards;
decomposing standard items in the index library into evaluation item factors, and setting the relation between the evaluation item factors to obtain a factor library;
judging each evaluation item factor according to the evaluation scene, and obtaining a factor combination description library based on different judgment scene descriptions of a plurality of factors;
and obtaining a question library based on the judging result of the evaluation item factors.
Preferably, the relationship between the evaluation item factors includes: parallel relationship, progressive relationship, mutual exclusion relationship and one-to-one relationship;
the problem library comprises: problem description, risk level, associated threat, risk analysis and solution.
Preferably, the process of synchronizing the evaluation knowledge base by the offline terminal includes:
and logging in the personal account through the off-line terminal, synchronizing the evaluation knowledge base, and re-synchronizing the evaluation knowledge base if the evaluation knowledge base has updated data, otherwise, re-synchronizing is not needed.
Preferably, the evaluation task data includes: task basic information data, field asset data, field evaluation data and data to be newly added in a knowledge base.
Preferably, the process of obtaining the data to be newly added in the knowledge base includes:
and acquiring asset information, if the asset information is not in the asset library, manually supplementing the asset information to an offline terminal on site, and recording the asset information as data to be newly added in a knowledge library.
Preferably, the process of transmitting the evaluation task data back to the core host includes:
logging in a personal account through an offline terminal, and returning the evaluation task data to the same task ID of the core host in an encryption mode based on the task ID of the evaluation task data.
Preferably, the evaluation table includes: evaluation result judgment, result recording, problem analysis and correction advice.
The invention has the technical effects that:
according to the invention, an evaluation knowledge base is constructed through a core host computer end, wherein the evaluation knowledge base comprises an asset base and an evaluation base, and the evaluation knowledge base is synchronized through an offline terminal; acquiring asset information and problem points through an offline terminal, and generating an evaluation task; performing operation management on the asset information based on the asset library, and performing operation management on the problem points based on the evaluation library to obtain evaluation task data; and returning the evaluation task data to a core host end, automatically summarizing the evaluation task data through the core host end, and generating an evaluation table.
The invention provides a mode of combining the core host system with the off-line terminal and intelligent processing and manual control, which realizes the electronization of the information security assessment site detection and data arrangement links, can store and convert the working experience of the assessment professional technician, excavates the multiplexing value of the data, reduces unnecessary manpower consumption, and improves the working efficiency and the working result quality.
According to the method, the automatic generation of the evaluation records can be realized based on the description rules of the typical scene knowledge base according to the feedback of the on-site evaluation key information, the differences between the personal experience and the capability of the evaluation professional technician are made up, the evaluation records tend to be comprehensive, objective and complete, and the generation efficiency and the average level of the information security evaluation result records can be greatly improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application, illustrate and explain the application and are not to be construed as limiting the application. In the drawings:
FIG. 1 is a flowchart of a method for generating an evaluation form in an embodiment of the present invention.
Detailed Description
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Example 1
As shown in fig. 1, the method for quickly collecting and automatically generating an evaluation form in this embodiment includes:
constructing an evaluation knowledge base through a core host, wherein the evaluation knowledge base comprises an asset base and an evaluation base, and synchronizing the evaluation knowledge base through an offline terminal;
acquiring asset information and problem points through an offline terminal, and generating an evaluation task; performing operation management on the asset information based on the asset library, and performing operation management on the problem points based on the evaluation library to obtain evaluation task data;
and returning the evaluation task data to a core host end, automatically summarizing the evaluation task data through the core host end, and generating an evaluation table.
The specific embodiment comprises the following steps:
step one: constructing a knowledge base at a core host end
In order to support the asset information data acquisition work and the evaluation data acquisition work of the on-site evaluation link, a knowledge base needs to be constructed at a core host end, and the knowledge base comprises an asset base and an evaluation base.
Asset library: and classifying and constructing a typical scene library, such as a transformer substation scene and a thermal power plant scene, according to the business scene related to the evaluation mechanism. The typical scene library presets, collates and accumulates asset categories, asset common names, common manufacturers, common models, common versions, uses, importance levels, etc.
And (5) evaluating library: the system comprises an index library, a factor combination description library and a question library.
And constructing an evaluation index library of different industries according to information security evaluation standards of different industries facing the industries related to the evaluation mechanism.
On the basis of the index library, the specific standard item is further decomposed into the minimum evaluation item (factor) capable of executing judgment, and the relation among the factors (including parallel relation, progressive relation, mutual exclusion relation and one-to-one relation) is set to form the factor library.
According to the evaluation scene, reasonably describing two judgment scenes of coincidence and non-coincidence of each factor; if one evaluation item is composed of a plurality of factors, different descriptions of different evaluation conditions (conforming, partially conforming and non-conforming) for standard items are completed according to the combination conditions of different judgment scenes of the plurality of factors, and a factor combination description library is formed.
And constructing a problem library aiming at factors of the 'non-conforming' condition, including problem description, risk level, associated threat, risk analysis, solution and the like, so as to facilitate completing problem analysis and correction proposal according to the combination condition of different judgment scenes of a plurality of factors.
Step two: synchronizing knowledge base to offline terminal
Under the networking environment, the personal account number is firstly logged in at the off-line terminal, and a knowledge base is required to be synchronized from a core host. Thereafter, if the core host side knowledge base is updated, resynchronization may be selected, otherwise, the synchronization need not be repeated.
Step three: managing evaluation tasks at an offline terminal
The offline terminal can be independently used in a network-free environment, and a new evaluation task is created through the offline terminal. The method can manually select the evaluation industry, select a typical scene, input a customer name, input a tested system and an evaluation level, and can selectively multiplex the historical evaluation task and the data thereof to a new task.
In a networking environment, by logging in a personal account, the related evaluation tasks of the individuals can be synchronized from a core host side.
Step four: quick acquisition of asset information through offline terminals
In the field evaluation link, the asset information can be rapidly acquired through the off-line terminal.
Based on a typical scene knowledge base, the common data such as asset directory, manufacturer, model, version, application and the like can be quickly selected and finely adjusted; if the knowledge base has no proper option temporarily, the knowledge base can be manually supplemented on site and fed back, and the offline terminal records the part of data as data to be newly added in the knowledge base.
The informatization carding of the asset information can be more rapidly completed through the data copying function between the assets and the data copying function between the systems.
Step five: quick collection of problem points through off-line terminal
The offline terminal forms an evaluation structure according to the asset catalogue and the index library which are determined on site, and provides an evaluation interface formed by the smallest evaluation item (factor) capable of performing judgment for site detection personnel, and the technical personnel only need to mark the factors which do not accord with each other in the detection process without manually describing the result record; and photographing and leaving a certificate or filling in relevant remarks for the key test evaluation points.
Step six: secure passback of task data to core hosts
After the off-line terminal finishes the on-site detection, under the networking environment, task data including task basic information data, on-site asset data, on-site evaluation data and data to be newly added of a knowledge base are returned to the task with the same ID of the core host by logging in the personal account number and taking the task ID as a unique identifier. The task data packet adopts encryption return, and can be analyzed only through a core host computer, so that the safety of return data is ensured.
Step seven: the core host automatically gathers and generates an evaluation table
If the on-site detection is completed in a multi-person cooperation mode, a plurality of off-line terminal data can be transmitted back to the same task, and the core host automatically completes the summary of multi-person cooperation detection data, including the summary of asset information, the summary of problem points, the summary of key evaluation point evidence and remarks.
And for the newly-added knowledge base data in the field, the core host computer end automatically completes the updating of the knowledge base.
After data summarization is completed, the core host automatically completes judgment of the evaluation result of the standard evaluation item, automatically completes problem analysis, automatically completes conversion of the evaluation result of the factor to reasonable description of the standard evaluation item according to the factor combination description library, and thus generates a final evaluation form which meets the requirements of the given format of the evaluation delivery object.
The beneficial effects of the embodiment are that:
the embodiment discloses a method for conveniently collecting information security assessment key information and automatically generating an assessment record, which adopts a design of matching a core host end and an off-line terminal, wherein the core host end bears an overall assessment business flow and complex business data processing; the offline terminal carries the on-site asset information acquisition and detection work and realizes data intercommunication with the core host in a mode of logging in a common account.
The embodiment compensates for the weakness of processing and utilizing the working efficiency of the core working link data from the field evaluation to the formation of the evaluation record. The evaluation method can assist the evaluation professional technicians to share and efficiently call experience data, and avoid repeated and time-consuming unnecessary work. Meanwhile, the acquisition mode solves the problem that the evaluation record is seriously dependent on the personal working level of the evaluation professional technician, and ensures that the evaluation conclusion is comprehensive, objective, complete and up to the standard.
Example two
For the specific implementation manner in the first embodiment, in this embodiment, taking the "evaluation index of" safety physical environment-physical access control "of" GB/T28448-2019 information security technology network security level protection evaluation requirement "as an example, the machine room gateway should be arranged with a dedicated person for guarding, controlling, identifying and recording the entering person", the evaluation index is disassembled into five factors, which are respectively: 1) Whether the identity of the person entering the machine room is identified; 2) Whether a special person is arranged at the machine room entrance or exit for 24 hours on duty; 3) Whether a video monitoring system is deployed at the machine room entrance; 4) Whether an access control system is arranged at the entrance and the exit of the machine room; 5) Whether to record the personnel entering the machine room.
The relation among the five factors is parallel relation, and in the factor combination description library, different descriptions of the five factors under the conditions of 'coincidence' and 'non-coincidence' judgment results and descriptions of the five factor judgment results under different combination conditions are stored.
If the determination results of the five factors at this time are respectively: compliance, non-compliance, then: automatically judging that the evaluation result of the index item is 'partially met';
the automatically generated evaluation record is: when the system enters the machine room after checking, the identity of the personnel is identified, the entrance and the exit are arranged to be attended by the special personnel for 24 hours, but the video monitoring system is not deployed, the access control system is not deployed, and the tested unit does not record the personnel entering the machine room. "
The automatically generated problem is described as: the video monitoring system and the electronic access control system are not arranged at the machine room entrance and exit, and the information such as the personnel entering and exiting range, personnel identity identification, entering and exiting time recording can not be controlled. "
The automatically generated risk level is as follows: "middle".
The automatically generated association threats are: "unauthorized access".
The automatically generated risk analysis is as follows: the video monitoring system and the electronic access control system are not deployed at the machine room entrance and exit, the entrance and exit conditions of personnel cannot be identified and recorded, and non-professional personnel and unauthorized personnel cannot be prevented from entering the machine room to contact, operate or destroy equipment and cannot trace back after accidents occur. "
The automatically generated solution is as follows: and when later rectification is suggested, a video monitoring system is deployed at the entrance and exit of the machine room, and an electronic access control system is provided for identifying and recording personnel information of entering and exiting. "
The foregoing is merely a preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. The method for quickly acquiring and automatically generating the evaluation form is characterized by comprising the following steps of:
constructing an evaluation knowledge base through a core host, wherein the evaluation knowledge base comprises an asset base and an evaluation base, and synchronizing the evaluation knowledge base through an offline terminal;
the evaluation library includes: an index library, a factor combination description library and a problem library;
the process for constructing the evaluation library comprises the following steps:
acquiring information security evaluation standards of different industries, and constructing an evaluation index library based on the information security evaluation standards;
decomposing standard items in the index library into evaluation item factors, and setting the relation between the evaluation item factors to obtain a factor library;
judging each evaluation item factor according to the evaluation scene, and obtaining a factor combination description library based on different judgment scene descriptions of a plurality of factors;
obtaining a question library based on the judging result of the evaluation item factors;
acquiring asset information and problem points through an offline terminal, and generating an evaluation task; performing operation management on the asset information based on the asset library, and performing operation management on the problem points based on the evaluation library to obtain evaluation task data;
and returning the evaluation task data to a core host end, automatically summarizing the evaluation task data through the core host end, and generating an evaluation table.
2. The method for rapid acquisition and automatic generation of an assessment form according to claim 1, wherein the relationship between the assessment item factors comprises: parallel relationship, progressive relationship, mutual exclusion relationship and one-to-one relationship;
the problem library comprises: problem description, risk level, associated threat, risk analysis and solution.
3. The method for rapid acquisition and automatic generation of an assessment form according to claim 1, wherein the process of synchronizing the assessment knowledge base by an off-line terminal comprises:
and logging in the personal account through the off-line terminal, synchronizing the evaluation knowledge base, and re-synchronizing the evaluation knowledge base if the evaluation knowledge base has updated data, otherwise, re-synchronizing is not needed.
4. The method for rapid acquisition and automatic generation of an assessment form according to claim 1, wherein the assessment task data comprises: task basic information data, field asset data, field evaluation data and data to be newly added in a knowledge base.
5. The method for quickly acquiring and automatically generating the evaluation form according to claim 4, wherein the process of obtaining the data to be newly added in the knowledge base comprises the following steps:
and acquiring asset information, if the asset information is not in the asset library, manually supplementing the asset information to an offline terminal on site, and recording the asset information as data to be newly added in a knowledge library.
6. The method for quickly acquiring and automatically generating an evaluation form according to claim 1, wherein the process of transmitting the evaluation task data back to the core host comprises:
logging in a personal account through an offline terminal, and returning the evaluation task data to the same task ID of the core host in an encryption mode based on the task ID of the evaluation task data.
7. The method for rapid acquisition and automatic generation of an assessment form according to claim 1, wherein the assessment form comprises: evaluation result judgment, result recording, problem analysis and correction advice.
CN202211308668.3A 2022-10-25 2022-10-25 Method for rapidly acquiring and automatically generating evaluation form Active CN116051015B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211308668.3A CN116051015B (en) 2022-10-25 2022-10-25 Method for rapidly acquiring and automatically generating evaluation form

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211308668.3A CN116051015B (en) 2022-10-25 2022-10-25 Method for rapidly acquiring and automatically generating evaluation form

Publications (2)

Publication Number Publication Date
CN116051015A CN116051015A (en) 2023-05-02
CN116051015B true CN116051015B (en) 2024-03-22

Family

ID=86132039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211308668.3A Active CN116051015B (en) 2022-10-25 2022-10-25 Method for rapidly acquiring and automatically generating evaluation form

Country Status (1)

Country Link
CN (1) CN116051015B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107767016A (en) * 2017-09-06 2018-03-06 梦成海泰(武汉)信息技术有限公司 A kind of digitlization staff evaluation evaluation system based on wireless network handheld terminal
CN111784169A (en) * 2020-07-02 2020-10-16 杨香 Internet-based national enterprise target management evaluation method and system
CN111930726A (en) * 2020-06-22 2020-11-13 南京南瑞信息通信科技有限公司 Off-line form-based grade protection evaluation data acquisition and analysis method and system
CN112308375A (en) * 2020-09-28 2021-02-02 武汉珈安消防技术服务有限公司 Fire safety assessment system and method based on artificial intelligence

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7203707B2 (en) * 2004-02-13 2007-04-10 Taiwan Semiconductor Manufacturing Co., Ltd. System and method for knowledge asset acquisition and management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107767016A (en) * 2017-09-06 2018-03-06 梦成海泰(武汉)信息技术有限公司 A kind of digitlization staff evaluation evaluation system based on wireless network handheld terminal
CN111930726A (en) * 2020-06-22 2020-11-13 南京南瑞信息通信科技有限公司 Off-line form-based grade protection evaluation data acquisition and analysis method and system
CN111784169A (en) * 2020-07-02 2020-10-16 杨香 Internet-based national enterprise target management evaluation method and system
CN112308375A (en) * 2020-09-28 2021-02-02 武汉珈安消防技术服务有限公司 Fire safety assessment system and method based on artificial intelligence

Also Published As

Publication number Publication date
CN116051015A (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN108428141B (en) Food traceability information management system based on ERP system and block chain
CN109086895A (en) A kind of operation management system and method for heating ventilation air-conditioning system
CN110929900B (en) Intelligent maintenance management system and method for power grid
CN109658067A (en) A kind of power engineering project control platform and system
CN105631522A (en) IT system operation and maintenance management system
CN104240342A (en) Access control method and device
CN107066500B (en) Power grid mass data quality verification method based on PMS model
CN111612646A (en) Networked intelligent secondary operation and maintenance system
CN104135521A (en) Method and system of identifying data abnormal values of environment automatic monitoring network
CN115150589A (en) Video monitoring operation and maintenance management system for coal mine enterprise
CN107693997B (en) Fire fighting equipment detection and maintenance management system and management method
CN111046000A (en) Government data exchange sharing oriented security supervision metadata organization method
CN114254982A (en) Smart factory cloud management system
CN112949798B (en) Laboratory equipment management method and system based on RFID technology
CN111932200A (en) Remote bidding evaluation system
CN113506096B (en) Inter-system interface method based on industrial internet identification analysis system
CN111461359A (en) Transformer substation protection information and fixed value management and control system
CN116051015B (en) Method for rapidly acquiring and automatically generating evaluation form
CN114048972A (en) Distribution network automation terminal defect management and control system and method based on big data
CN116384702B (en) Enterprise personnel management method and system
CN109426719A (en) Device authentication management method and verification management system
CN115829192A (en) Digital management system and method for realizing engineering information safety supervision
CN109658318A (en) Control system and method is stared in a kind of construction based on monitor of the railway signal automatically
CN114066181A (en) Intelligent state evaluation system for thermal equipment
CN110298585B (en) Hierarchical automatic auditing method for monitoring information of substation equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant