CN1556612A - Network medium content safety macromonitoring method - Google Patents
Network medium content safety macromonitoring method Download PDFInfo
- Publication number
- CN1556612A CN1556612A CNA2003101098386A CN200310109838A CN1556612A CN 1556612 A CN1556612 A CN 1556612A CN A2003101098386 A CNA2003101098386 A CN A2003101098386A CN 200310109838 A CN200310109838 A CN 200310109838A CN 1556612 A CN1556612 A CN 1556612A
- Authority
- CN
- China
- Prior art keywords
- supervision
- data
- rule
- content
- safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 230000008569 process Effects 0.000 claims description 32
- 238000012550 audit Methods 0.000 claims description 12
- 238000005538 encapsulation Methods 0.000 claims description 11
- 238000007726 management method Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000008676 import Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 claims description 5
- 239000000344 soap Substances 0.000 claims description 5
- 238000001914 filtration Methods 0.000 claims description 2
- 238000012795 verification Methods 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 abstract description 9
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000015572 biosynthetic process Effects 0.000 abstract description 2
- 230000003993 interaction Effects 0.000 abstract description 2
- 238000007789 sealing Methods 0.000 abstract 1
- 238000003786 synthesis reaction Methods 0.000 abstract 1
- 230000007812 deficiency Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000009472 formulation Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000013332 literature search Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1043—Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10009—Improvement or modification of read or write signals
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10009—Improvement or modification of read or write signals
- G11B20/10305—Improvement or modification of read or write signals signal quality assessment
- G11B20/10398—Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors
- G11B20/10425—Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors by counting out-of-lock events of a PLL
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03L—AUTOMATIC CONTROL, STARTING, SYNCHRONISATION OR STABILISATION OF GENERATORS OF ELECTRONIC OSCILLATIONS OR PULSES
- H03L7/00—Automatic control of frequency or phase; Synchronisation
- H03L7/06—Automatic control of frequency or phase; Synchronisation using a reference signal applied to a frequency- or phase-locked loop
- H03L7/08—Details of the phase-locked loop
- H03L7/085—Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal
- H03L7/091—Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal the phase or frequency detector using a sampling device
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/23—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using convolutional codes, e.g. unit memory codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2903—Methods and arrangements specifically for encoding, e.g. parallel encoding of a plurality of constituent codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2957—Turbo codes and decoding
- H03M13/2993—Implementing the return to a predetermined state, i.e. trellis termination
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/63—Joint error correction and other techniques
- H03M13/635—Error control coding in combination with rate matching
- H03M13/6356—Error control coding in combination with rate matching by repetition or insertion of dummy data, i.e. rate reduction
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/63—Joint error correction and other techniques
- H03M13/635—Error control coding in combination with rate matching
- H03M13/6362—Error control coding in combination with rate matching by puncturing
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M7/00—Conversion of a code where information is represented by a given sequence or number of digits to a code where the same, similar or subset of information is represented by a different sequence or number of digits
- H03M7/30—Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
- H03M7/40—Conversion to or from variable length codes, e.g. Shannon-Fano code, Huffman code, Morse code
- H03M7/4006—Conversion to or from arithmetic code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/25—Arrangements specific to fibre transmission
- H04B10/2575—Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
- H04B10/25752—Optical arrangements for wireless networks
- H04B10/25753—Distribution optical network, e.g. between a base station and a plurality of remote units
- H04B10/25754—Star network topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/24—Radio transmission systems, i.e. using radiation field for communication between two or more posts
- H04B7/26—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
- H04B7/2628—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile using code-division multiple access [CDMA] or spread spectrum multiple access [SSMA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J13/00—Code division multiplex systems
- H04J13/0077—Multicode, e.g. multiple codes assigned to one user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J13/00—Code division multiplex systems
- H04J13/16—Code allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0064—Concatenated codes
- H04L1/0066—Parallel concatenated codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0067—Rate matching
- H04L1/0068—Rate matching by puncturing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03012—Arrangements for removing intersymbol interference operating in the time domain
- H04L25/03019—Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception
- H04L25/03038—Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception with a non-recursive structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/38—Synchronous or start-stop systems, e.g. for Baudot code
- H04L25/40—Transmitting circuits; Receiving circuits
- H04L25/49—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
- H04L25/497—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems by correlative coding, e.g. partial response coding or echo modulation coding transmitters and receivers for partial response systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1104—Session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/12—Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
- H04M7/1205—Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
- H04M7/1295—Details of dual tone multiple frequency signalling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/103—Selection of coding mode or of prediction mode
- H04N19/109—Selection of coding mode or of prediction mode among a plurality of temporal predictive coding modes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/134—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
- H04N19/136—Incoming video signal characteristics or properties
- H04N19/137—Motion inside a coding unit, e.g. average field, frame or block difference
- H04N19/139—Analysis of motion vectors, e.g. their magnitude, direction, variance or reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
- H04N19/625—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/90—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
- H04N19/91—Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/22—Signal processing not specific to the method of recording or reproducing; Circuits therefor for reducing distortions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42221—Conversation recording systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/085—Access point devices with remote components
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S370/00—Multiplex communications
- Y10S370/901—Wide area network
- Y10S370/902—Packet switching
- Y10S370/903—Osi compliant network
- Y10S370/906—Fiber data distribution interface, FDDI
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S370/00—Multiplex communications
- Y10S370/901—Wide area network
- Y10S370/902—Packet switching
- Y10S370/903—Osi compliant network
- Y10S370/907—Synchronous optical network, SONET
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Probability & Statistics with Applications (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Electromagnetism (AREA)
- Power Engineering (AREA)
- Discrete Mathematics (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to a monitoring method for network media content security, which belongs to network technology field. The invention realizes the macro supervising to the content through the interaction between the national supervising centre, local supervising centre and media website supervising centre, the national supervising centre issues the content security behavior rules by using the rules issuing flow, the rules are leaded to local supervising centre and media website supervising centre with the leading flow, the media website supervising centre uses the content security behavior security rules distribution flow to act on the media website supervising subsystem, each subsystem generates supervising original information which is sealed by the isomeric data sealing flow, they are transmitted to local supervising centre, and are backed up with supervising data backup model, transmitted to national supervising centre to be audited through the synthesis auditing flow, the content security behavior rule are created through the content security behavior, returns to the national supervising centre. The invention realizes the management to the network globally.
Description
Technical field
The present invention relates to a kind of network media macroscopic view content safety monitoring and managing method, is a kind of network medium contents safety macroscopic supervision method with three layers of supervision structure.Belong to networking technology area.
Background technology
The network media is a kind of new type of Media, the domestic media website is thousands of at present, Regional Distribution is extensive, the isomerism of network environment makes press chief department can not utilize conventional supervision method promptly to rely on manpower to click one by one merely, carry out subjective assessment again, under the prior art condition, also can't realize issue is monitored and authorized to network medium contents at any time.And the technology that exists now is just to supervising individual other Web content unit, as to BBS, the chatroom, the supervisory systems of webpage etc., can not satisfy press chief department to the macro-management of web site contents safety and the formulation and the adjustment of macro policy, and help the subjective department of news that the overall monitoring and managing method of network medium contents safety is also relatively lacked at present.
At present the method for effectively supervising for network medium contents safety is less, find by literature search, the 28th the 5th phase of volume of " computer engineering " May in 2003, " based on multi-protocols agency's the internet content safety classification supervision " that Bao Jia delivers, this article proposes a kind of by using the content safety classification monitoring and managing method of multi-agent technology, but the deficiency of method is, all to make up an agency for each supervision content, " each service, its default port; protocol format; data difference mean that each all needs independently to act on behalf of ", cause some problems like this, for example service response speed slows down, it is many to act on behalf of quantity, causes difficult in maintenancely, and agreement and Data Format Transform are frequent, different environment will add different agencies, has increased the burden of supervision.
Summary of the invention
The objective of the invention is at the deficiency in the background technology, be based on the regulatory responsibility of China News authorities and the characteristics of adaptation network medium contents safety, a kind of network medium contents safety macroscopic supervision method is provided, be press chief department effective technical means and utility system are provided, satisfy it carries out macroscopic supervision to Chinese network medium contents demand, make press chief department can obtain the supervision situation and the feedback information of each online media sites, and can be according to the unified strategy of adjusting the online media sites content safety monitoring of the development of situation, and online media sites can be according to the actual conditions of this locality and the Regulation Policy of press chief department, formulation meets the content safety strategy of local demand, can be to different kinds of information such as webpage, BBS, the chatroom, Emails etc. carry out unified management, having remedied traditional network medium contents monitoring administration method disperses independently to be difficult to the deficiency that manages from the overall situation.
The present invention is achieved by the following technical solutions, the inventive method is based upon on the basis of three grades of supervisory systems that authority separates, comprise that three supervision center are the state supervision center, local supervision center and online media sites supervision center, the macroscopic supervision of the mutual realization content by these three supervision center, be specially: the state supervision center, local supervision center, the online media sites supervision center connects with network mutually, and each supervision center is provided with independently communication port in order to carry out dedicated data transmission, the supervision subsystem is connected on the online media sites supervision center with network, the state supervision center utilizes the content distributed safety management rule of conduct of content safety rule of conduct issue flow process, import flow process by the content safety rule of conduct and import local supervision center respectively, the online media sites supervision center; It is that online media sites are supervised subsystem that the online media sites supervision center utilizes content safety rule of conduct allocation flow to act on respectively, after each subsystem generation supervision raw information encapsulates via isomeric data encapsulation flow process, deliver to local supervision center, by the backup of supervision data backup module records, deliver to the heart channel of Hang-Shaoyin comprehensive audit flow process generation audit information in the state supervision, formulate flow process through the content safety behavior and produce new content safety rule of conduct, turn back to the state supervision center.
Below the present invention is further illustrated, particular content is as follows:
1, content safety rule of conduct issue flow process
Content safety rule of conduct issue flow process is will formulate good rule of conduct earlier to store with pre-specified data format, but use extension flag language (XML) form that it is encapsulated then, use simple target access protocal (SOAP) to its transmission at the transmit port of special use at last;
2, content behavior safety Rulemaking flow process
Content behavior safety Rulemaking flow process mainly is to determine and add and filter keyword, formulates monitor strategy, determines the serious grade of content etc., according to prompting set by step by user's input information, waits user's submission information then after, the rule of a reference format of formation.Monitor strategy can be divided into two kinds of macroscopical leading type monitor strategy and local self-discipline type monitor strategy: macroscopical leading type monitor strategy produces at the state supervision center and issue, can arrive all the subordinate's supervision center in its coverage; Local produce and only this supervision center compass of competency is worked in local supervision center from type of law monitor strategy.
3, the content safety rule of conduct imports flow process
It is that the information that will receive at private port receives according to soap protocol that the content safety rule of conduct imports flow process, separate protocol package then, obtain the XML encapsulation of data, then this encapsulation of data is resolved, obtain rule of conduct according to the storage of fixed data form.
4, content safety rule of conduct allocation flow
Content safety rule of conduct allocation flow then is to judge earlier management domain BBS in this way under this rule according to the type attribute in the rule of conduct, the chatroom still is a webpage etc., (BBS supervises subsystem to select corresponding supervision subsystem according to the type again, chatroom supervision subsystem still is a webpage supervision subsystem), rule is sent in the correct supervision subsystem.
5, isomeric data encapsulation flow process
This flow process is utilized some characteristic informations such as the data type (BBS, chatroom or web data) of XML form with original supervision data and these data, the sender, and dates of shipping etc. encapsulate, and are packaged into the packet according to standard x ML format organization.
6, comprehensive audit flow process
The comprehensive audit flow process is carried out detailed information analysis, in order to supervision information is controlled, is convenient to formulate rule of conduct.Detailed process is:
Read Audit data: the data query that is undertaken by various conditions, as conditions such as time period, IP address field, content keyword are set, just can in Large Volume Data, inquire the own information of being concerned about apace;
Browsing data: every data record has all been stipulated authority, will carry out Authority Verification here, only has to read authority and just can check concrete content;
Analyze data: utilize conventional data analysing method that data are handled and added up, as can be by date, serious hierarchical arrangement data record be made tables of data and figure, log record statistics etc., and the use of these auditing methods does not have strict sequencing;
Data are preserved: data after will auditing and record are written in the audit document of appointment, and initial data is preserved back database.
The needed data of supervision center provide by the application subsystem that is articulated in each online media sites, and upload to the state supervision center by local supervision center collection with after handling.Each supervision center is arranged in the subjective department of news, and the online media sites supervision center is deployed in online media sites.The online media sites supervision center receives the details of respectively supervising the relevant information that subsystem (BBS, chatroom, webpage) sends, and is recorded in daily record and the record storehouse, in order to inquiry, so that the record of being preserved is carried out various forms of query analysis.The state supervision center need utilize various information to carry out the macroscopic analysis of the content safety of news website, formulate online media sites safety behavior rule, the area supervision center mainly is responsible for the content monitoring work of online media sites in the scope of this area, its function realizes the transmission to the content safety rule of conduct of each online media sites, receives the supervision target data of each online media sites simultaneously.Each supervision center is according to the supervision demand customized development of self.
Can carry out the transmission of information by the Internet between online media sites supervision center and regional supervision center and the state supervision center, realization is issued relevant policies and management expectancy by the upper management center to subordinate administrative center, news administrative department can be thus to the relevant management policy of web site contents supervision center issue, the online media sites supervision center also can by this efficiently approach to administrative department's feedback management suggestion.Each supervision center is by the Internet and other supervision center and the associated working of centralized supervisory platform, finish various work of uploading the information of assigning, each supervision center of while can deposit the information of catching that receives in each database and be convenient to work such as record, tabulation, investigation, analysis.
The network media macroscopic supervision method that the present invention proposes is supported in the distributed heterogeneous network carries out the supervision of the content safety overall situation to the network media, can also can browse related content and various statistics by the configuration monitoring strategy, satisfy the differentiated control of country, can realize upgrading in time of information filtering strategy content.The present invention meets national conditions to foundation online media sites content safety macroscopic supervision pattern is to realize that the supervision on the common meaning more is once effectively to explore.The present invention has realized the information interaction of supervision center at different levels and online media sites, to the unified management and the content auditing function of isomery website, makes press chief department more effective to the content safety management of online media sites.
Description of drawings
Fig. 1 is a monitoring and managing method schematic diagram of the present invention
Embodiment
As shown in Figure 1, the content with method provides an embodiment in conjunction with the accompanying drawings, and is specific as follows:
Three grades of supervision center are the state supervision center, local supervision center, the online media sites supervision center connects with network mutually, and each supervision center need be provided with that independently communication port is in order to carry out dedicated data transmission, and the supervision subsystem is connected on the online media sites supervision center with network.Content safety administration behaviour rule after the state supervision center utilizes content safety rule of conduct issue flow process by dedicated issue communication port issue process XML form and soap protocol encapsulation, local supervision center, the online media sites supervision center imports respectively if having information to reach then call content safety rule of conduct importing flow process then in the detecting of dedicated communication ports place; If local supervision center has imported the content safety rule of conduct that the issue of state supervision center is arranged, then it is published to suitable online media sites supervision center according to the content according to rule by dedicated communication ports, if the online media sites supervision center has imported the state supervision center or local supervision center is issued the rule of coming, then its effect field according to rule utilizes content safety rule of conduct allocation flow to act on respectively to be online media sites supervision subsystem, each subsystem is had an effect according to the rule that receives, produce original supervision information and carry out the encapsulation of XML form via the isomeric data package module, supervision information after the encapsulation is delivered to the online media sites supervision center, deliver to local supervision center via the online media sites supervision center by network data contribute supervision information again, by supervision data backup module supervision information record is backed up, supervision information is simultaneously delivered to the state supervision center, the heart channel of Hang-Shaoyin comprehensive audit flow process is audited to supervision information and (is added up in the state supervision, record etc.) produce audit information, authorities formulate flow process by the content safety rule of conduct and formulate new content safety rule of conduct according to the audit information that produces, turn back to the state supervision center, and by its issue.
The present invention has the administration interface of unified Web webpage, the functional module link arrangement of each supervision center is on the page, be easy to visit and operation, utilize the simple target access protocal to realize transfer of data between the heterogeneous network, data are encrypted in transmission course, prevent that data from not intercepted and captured and distorting, each supervision center all uses private port to receive and dispatch carrying out the needed data of macroscopic supervision, simultaneously can carry out data ciphering and deciphering, ensure the fail safe of communicating by letter between each supervision center.But utilize XML to realize that each isomery content-data form identifies with unified format, can effectively be embedded among the SOAP simultaneously and transmit, transmit by data being converted to the XML data format, and then according to the database that will change over to the XML data are returned to and to change in the database, realize the isomeric data transmission.
Claims (7)
1, a kind of network medium contents safety macroscopic supervision method, it is characterized in that, be based upon on the basis of three grades of supervisory systems that authority separates, comprise that three supervision center are the state supervision center, local supervision center and online media sites supervision center, the macroscopic supervision of the mutual realization content by these three supervision center, be specially: the state supervision center, local supervision center, the online media sites supervision center connects with network mutually, and each supervision center is provided with independently communication port in order to carry out dedicated data transmission, the supervision subsystem is connected on the online media sites supervision center with network, the state supervision center utilizes the content distributed safety management rule of conduct of content safety rule of conduct issue flow process, imports flow process by the content safety rule of conduct and imports local supervision center respectively, the online media sites supervision center; It is that online media sites are supervised subsystem that the online media sites supervision center utilizes content safety rule of conduct allocation flow to act on respectively, after each subsystem generation supervision raw information encapsulates via isomeric data encapsulation flow process, deliver to local supervision center, by the backup of supervision data backup module records, deliver to the heart channel of Hang-Shaoyin comprehensive audit flow process generation audit information in the state supervision, formulate flow process through the content safety behavior and produce new content safety rule of conduct, turn back to the state supervision center.
2, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content safety rule of conduct issue flow process, be to formulate good rule of conduct earlier to store with pre-specified data format, but with the extension flag language format it is encapsulated then, the transmit port in special use sends it with the simple target access protocal at last.
3, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content behavior safety Rulemaking flow process, mainly be to determine and interpolation filtration keyword, formulate monitor strategy, determine the serious grade of content, according to pointing out set by step by user's input information, after waiting user's submission information then, form the rule of a reference format, monitor strategy is divided into two kinds of macroscopical leading type monitor strategy and local self-discipline type monitor strategy: macroscopical leading type monitor strategy produces at the state supervision center and issue, arrive all the subordinate's supervision center in its coverage, locally produce and only this supervision center compass of competency is worked in local supervision center from type of law monitor strategy.
4, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content safety rule of conduct imports flow process, be to receive according to soap protocol in the information that private port receives, separate protocol package then, but obtain extension flag language encapsulation of data, then this encapsulation of data is resolved, obtain rule of conduct according to the storage of fixed data form.
5, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content safety rule of conduct allocation flow, be according to the management domain under the elder generation of the type attribute in the rule of conduct this rule of judgement, select corresponding supervision subsystem according to the type again, rule is sent in the correct supervision subsystem.
6, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described isomeric data encapsulation flow process, but be to utilize the extension flag language format that some characteristic informations of original supervision data and these data are encapsulated, as data type, sender, date of shipping, but be packaged into packet according to standard extension flag language format tissue.
7, network medium contents safety macroscopic supervision method according to claim 1 is characterized in that described comprehensive audit flow process is carried out detailed information analysis, in order to supervision information is controlled, is convenient to formulate rule of conduct, and detailed process is:
Read Audit data: the data query that is undertaken by various conditions, as time period, IP address field, content keyword are set, in Large Volume Data, inquire the own information of being concerned about apace;
Browsing data: every data record has all been stipulated authority, carries out Authority Verification, only has to read authority and just can check concrete content;
Analyze data: utilize data analysing method that data are handled and added up;
Data are preserved: data after will auditing and record are written in the audit document of appointment, and initial data is preserved back database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2003101098386A CN100466533C (en) | 2003-12-30 | 2003-12-30 | Network medium content safety macromonitoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2003101098386A CN100466533C (en) | 2003-12-30 | 2003-12-30 | Network medium content safety macromonitoring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1556612A true CN1556612A (en) | 2004-12-22 |
CN100466533C CN100466533C (en) | 2009-03-04 |
Family
ID=34335397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2003101098386A Expired - Fee Related CN100466533C (en) | 2003-12-30 | 2003-12-30 | Network medium content safety macromonitoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100466533C (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1633065B (en) * | 2004-12-28 | 2010-05-12 | 华中师范大学 | Method and system for secure distribution of network digital books with content monitoring |
CN102316104A (en) * | 2011-09-01 | 2012-01-11 | 北京中兴网安科技有限公司 | Method, apparatus and systems for recording perfect information |
CN106484885A (en) * | 2016-10-17 | 2017-03-08 | 深圳市穗彩科技开发有限公司 | The auditing method of multi-source heterogeneous data and system |
CN109361683A (en) * | 2018-11-13 | 2019-02-19 | 华迪计算机集团有限公司 | Low layer, middle layer, high-rise website maintenance device and system based on trust systems |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1349190A (en) * | 2001-12-03 | 2002-05-15 | 上海交通大学 | Central network medium safety monitoring system |
-
2003
- 2003-12-30 CN CNB2003101098386A patent/CN100466533C/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1633065B (en) * | 2004-12-28 | 2010-05-12 | 华中师范大学 | Method and system for secure distribution of network digital books with content monitoring |
CN102316104A (en) * | 2011-09-01 | 2012-01-11 | 北京中兴网安科技有限公司 | Method, apparatus and systems for recording perfect information |
CN106484885A (en) * | 2016-10-17 | 2017-03-08 | 深圳市穗彩科技开发有限公司 | The auditing method of multi-source heterogeneous data and system |
CN109361683A (en) * | 2018-11-13 | 2019-02-19 | 华迪计算机集团有限公司 | Low layer, middle layer, high-rise website maintenance device and system based on trust systems |
CN109361683B (en) * | 2018-11-13 | 2020-12-15 | 华迪计算机集团有限公司 | Trust system-based low-level, middle-level and high-level website supervision device and system |
Also Published As
Publication number | Publication date |
---|---|
CN100466533C (en) | 2009-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101826993A (en) | Method, system and device for monitoring security event | |
US7185366B2 (en) | Security administration server and its host server | |
CN103152352B (en) | A kind of perfect information security forensics monitor method based on cloud computing environment and system | |
EP1604486B1 (en) | Relational model for management information in network devices | |
CN109286676B (en) | Electric power data safety information system based on block chain | |
CN102291280A (en) | Intelligent measuring and controlling Internet of things platform based on cloud computing and measuring and controlling method thereof | |
CN105631522A (en) | IT system operation and maintenance management system | |
CN103034929A (en) | Operations management system (OMS) and remote information management system for sewage plants | |
CN103559570A (en) | Fault recording master station information management system | |
CN102156447A (en) | Basic automation-based plant-level equipment management and alarming system and method | |
CN102932846A (en) | Data management system for distributed heterogeneous sensing network and data management method for data management system | |
CN105262210A (en) | System and method for analysis and early warning of substation network security | |
CN103532749A (en) | Main station information management system | |
CN113849553A (en) | Substation data acquisition and processing method and system based on Internet of things equipment data acquisition | |
CN102148827A (en) | Security event management method, device and security management platform | |
CN109214788A (en) | A kind of OA management system | |
CN105401771A (en) | Stereo garage integrated management system | |
CN109164720A (en) | Injection molding machine group of planes remote monitoring system and method based on IIoT | |
CN202275310U (en) | Intelligent monitor system of cold storage warehouse assembly | |
CN100495975C (en) | Network message safety comprehensive management method based on safety application servicer | |
CN114827140A (en) | Real-time data centralized management and control system for wind tunnel site | |
CN100466533C (en) | Network medium content safety macromonitoring method | |
CN106407072A (en) | Monitoring system of big data platform | |
CN103067355A (en) | Network guard method and system based on domain name | |
CN102316122A (en) | Method for managing intranet security based on cooperative mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090304 Termination date: 20141230 |
|
EXPY | Termination of patent right or utility model |