CN113438248B - A self-checking management system for the network IP address of the master station - Google Patents
A self-checking management system for the network IP address of the master station Download PDFInfo
- Publication number
- CN113438248B CN113438248B CN202110732277.3A CN202110732277A CN113438248B CN 113438248 B CN113438248 B CN 113438248B CN 202110732277 A CN202110732277 A CN 202110732277A CN 113438248 B CN113438248 B CN 113438248B
- Authority
- CN
- China
- Prior art keywords
- module
- data
- address
- management
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
技术领域technical field
本发明涉及数据管理技术领域,尤其涉及一种便于主站网络IP地址自查管理系统。The invention relates to the technical field of data management, in particular to a self-checking management system for a network IP address of a master station.
背景技术Background technique
随着公司业务规模的扩大,信息化水平的不断发展,网络设备的快速扩张,现有的公司的网络管理工具已经满足不了当前的管理,目前系统运行部网络安全部还在使用常规的管理工具和管理手段,即通过人工记录IP地址,管理IP地址状态,工作效率低下、且不可避免的存在安全风险,而准确跟踪网络中的IP地址并高效管理IP规划对于网络安全运维人员来说非常重要;因此,发明出一种便于主站网络IP地址自查管理系统变得尤为重要;With the expansion of the company's business scale, the continuous development of the level of informatization, and the rapid expansion of network equipment, the existing network management tools of the company can no longer meet the current management. At present, the Network Security Department of the System Operation Department is still using conventional management tools. and management methods, that is, by manually recording IP addresses and managing IP address status, work efficiency is low, and there are inevitable security risks. Accurate tracking of IP addresses in the network and efficient management of IP planning are very important for network security operation and maintenance personnel. Important; therefore, it is particularly important to invent a self-check management system for the master station network IP address;
经检索,中国专利号CN105872127A公开了一种IP地址管理系统,该发明虽然使总服务器数据趋于准确全面,具有较高的容错性,但需要工作人员手动对IP地址进行管理,可能会导致工作人员误操作的安全风险;此外,现有的便于主站网络IP地址自查管理系统管理各IP地址过程中出现异常操作时,无法及时终止系统运行并将异常数据反馈给工作人员,需要工作人员对错误数据进行人工排查以及漏洞定位与修复,增加工作人员的工作量,信息安全风险高,为此,我们提出一种便于主站网络IP地址自查管理系统。After searching, Chinese Patent No. CN105872127A discloses an IP address management system. Although the invention makes the total server data more accurate and comprehensive, and has high fault tolerance, it requires staff to manage the IP address manually, which may lead to work problems. Safety risk of personnel misoperation; in addition, when an abnormal operation occurs during the management of each IP address by the existing IP address self-check management system of the master station network, the system cannot be terminated in time and the abnormal data can be fed back to the staff. Manual inspection of erroneous data and vulnerability location and repair increase the workload of the staff, and the risk of information security is high. For this reason, we propose a self-inspection management system for the network IP address of the main station.
发明内容SUMMARY OF THE INVENTION
本发明的目的是为了解决现有技术中存在的缺陷,而提出的一种便于主站网络IP地址自查管理系统。The purpose of the present invention is to propose a self-checking management system for the network IP address of the master station in order to solve the defects existing in the prior art.
为了实现上述目的,本发明采用了如下技术方案:In order to achieve the above object, the present invention adopts the following technical solutions:
一种便于主站网络IP地址自查管理系统,包括设备信息收集模块、智能管理模块、漏洞检测反馈模块、修复日志生成模块、数据处理模块以及检索调用模块;A self-checking management system for the network IP address of the main station is convenient, including a device information collection module, an intelligent management module, a vulnerability detection feedback module, a repair log generation module, a data processing module and a retrieval calling module;
其中,所述智能管理模块分别与设备信息收集模块、漏洞检测反馈模块以及数据处理模块通信连接,漏洞检测反馈模块与修复日志生成模块通信连接,检索调用模块分别与数据处理模块、修复日志生成模块通信连接;The intelligent management module is respectively connected in communication with the device information collection module, the vulnerability detection feedback module and the data processing module, the vulnerability detection feedback module is in communication connection with the repair log generation module, and the retrieval calling module is respectively connected with the data processing module and the repair log generation module communication connection;
所述设备信息收集模块包括数据收集单元以及管理列表更新单元。The device information collection module includes a data collection unit and a management list update unit.
进一步地,所述管理列表更新单元用于接收工作人员上传的管理列表,并对外部服务器中存储的管理列表进行数据更新,其数据更新具体步骤如下:Further, the management list update unit is used to receive the management list uploaded by the staff, and update the data of the management list stored in the external server, and the specific steps of the data update are as follows:
步骤一:管理列表更新单元接收到用户上传的管理列表,开始从外部服务器中提取过往管理列表;Step 1: the management list update unit receives the management list uploaded by the user, and starts to extract the past management list from the external server;
步骤二:将两组管理列表进行数据比对,并将重复IP地址删除,删除完成,开始将进行数据整合生成新管理列表,并将其上传至服务端进行存储;Step 2: Compare the data of the two sets of management lists, and delete the duplicate IP addresses. After the deletion is complete, start to integrate the data to generate a new management list, and upload it to the server for storage;
所述数据收集单元用于实时检测并收集用户设备各项信息,并对其进行分类标记,其分类标记具体步骤如下:The data collection unit is used to detect and collect various information of the user equipment in real time, and to classify and mark it. The specific steps of the classification and marking are as follows:
步骤(1):数据收集单元开始调用外部服务器中存储的IP地址管理列表,并开始对列表中IP地址所对应的用户设备进行信息收集;Step (1): the data collection unit starts to call the IP address management list stored in the external server, and starts to collect information on the user equipment corresponding to the IP address in the list;
步骤(2):将收集到的信息按照设备名、设备连接状态以及设备操作数据进行分类,并分别标记为A、B、C;Step (2): classify the collected information according to the device name, device connection status and device operation data, and mark them as A, B, and C respectively;
步骤(3):标记完成,依据各用户设备所属用户身份信息分配给该用户设备不同的操作权限。Step (3): marking is completed, and different operation rights are assigned to the user equipment according to the user identity information to which the user equipment belongs.
进一步地,所述用户设备具体为笔记本电脑、移动式Ipad或智能手机中的一种。Further, the user equipment is specifically one of a notebook computer, a mobile Ipad or a smart phone.
进一步地,所述智能管理模块用于接收A、B以及C,并对其进行智能管理,其智能管理具体步骤如下:Further, the intelligent management module is used to receive A, B and C, and perform intelligent management on them, and the specific steps of the intelligent management are as follows:
第一步:智能管理模块开始依据内部脚本数据对B以及C进行数据分析,若B或C中存在异常,则开始对相关设备名A进行查询;Step 1: The intelligent management module starts to analyze the data of B and C according to the internal script data. If there is an abnormality in B or C, it starts to query the relevant device name A;
第二步:设备名A查询完成,开始追踪对应IP地址,并对其进行删除或修改处理。Step 2: After the device name A query is completed, start tracking the corresponding IP address and delete or modify it.
进一步地,所述漏洞检测反馈模块用于对智能管理模块进行实时监测,并将监测结果反馈给工作人员,其实时监测具体步骤如下:Further, the vulnerability detection feedback module is used for real-time monitoring of the intelligent management module, and the monitoring results are fed back to the staff. The specific steps of the real-time monitoring are as follows:
S1:智能管理模块开始运行,漏洞检测反馈模块开始对其进行实时监测,若存在处理异常,则中断智能管理模块运行,并反馈工作人员“需要进行手动更改”;S1: The intelligent management module starts to run, and the vulnerability detection feedback module starts to monitor it in real time. If there is an abnormality in processing, the operation of the intelligent management module will be interrupted, and the staff will be fed back that "manual changes are required";
S2:对处理异常进行数据定位,并将其反馈给工作人员,同时将工作人员的修复操作通过数据转换处理生成记录数据,并将其发送至修复日志生成模块;S2: Locating data for processing exceptions, and feeding it back to the staff, at the same time, the staff's repair operations are processed through data conversion to generate record data, and sent to the repair log generation module;
所述修复日志生成模块用于自行生成漏洞修复日志,并记录漏洞发现日期、漏洞类型、漏洞发生位置、修复日期以及修复人员姓名,同时将生成的漏洞修复日志进行编号,并上传至外部服务器进行存储。The repair log generation module is used to generate a vulnerability repair log by itself, and record the date of discovery of the vulnerability, the type of the vulnerability, the location of the vulnerability, the date of repair, and the name of the repairer, and at the same time, the generated vulnerability repair log is numbered and uploaded to an external server for processing. storage.
进一步地,所述数据处理模块用于接收各IP地址的处理信息,并对其进行数据记录,同时生成处理日志,其数据记录具体步骤如下:Further, the data processing module is used to receive the processing information of each IP address, and perform data recording on it, and generate a processing log at the same time, and the specific steps of its data recording are as follows:
SS1:对工作人员手动处理数据以及智能管理模块自动处理数据进行收集;SS1: Collect data manually processed by staff and automatically processed by intelligent management module;
SS2:收集完成,从两组数据中提取出IP地址、用户设备名、异常操作信息以及处理结果,同时将其导入表格中,并生成处理日志;SS2: After the collection is completed, extract the IP address, user device name, abnormal operation information and processing results from the two sets of data, import them into the table, and generate processing logs;
SS3:将生成的处理日志进行编号,并上传至外部服务器进行存储。SS3: Number the generated processing logs and upload them to an external server for storage.
进一步地,所述检索调用模块用于工作人员对修复日志以及处理日志进行调用查看,其调用查看具体步骤如下:Further, the retrieval and calling module is used for the staff to call and view the repair log and the processing log, and the specific steps of the call and view are as follows:
P1:工作人员通过外部输入设备输入需要查看的文件类型,检索调用模块开始对其进行检测判断,并按照修复日志以及处理日志进行分类,并分别标记为X、Y;P1: The staff enters the file type to be viewed through the external input device, and the retrieval calling module starts to detect and judge it, and classify it according to the repair log and processing log, and mark them as X and Y respectively;
P2:判断完成,用户再次输入需要查看的文件生成日期Z以及文件编号N;P2: The judgment is completed, and the user enters the generation date Z and the file number N of the file to be viewed again;
P3:检索调用模块开始依据用户输入的X或Y、Z以及N对外部服务器中所存储的文件进行精确检索,并将检索结果反馈给工作人员查看。P3: The retrieval calling module starts to accurately retrieve the files stored in the external server according to the X or Y, Z and N input by the user, and feeds back the retrieval results to the staff for viewing.
进一步地,所述输入设备具体为键盘、电子笔或触控屏中的一种。Further, the input device is specifically one of a keyboard, an electronic pen or a touch screen.
相比于现有技术,本发明的有益效果在于:Compared with the prior art, the beneficial effects of the present invention are:
1、本发明设置有智能管理模块,设备信息收集模块依据IP地址列表对用户设备信息收集完成,同时将各用户设备权限进行智能分配,智能管理模块接收相关用户设备信息,并开始对用户设备进行实时监测,若设备连接状态以及设备操作数据存在异常,智能管理模块则开始依据内部脚本数据对该用户设备所对应的IP地址进行删除或修改处理,能够自行对各IP地址进行管理,避免工作人员在手动管理时出现误操作,降低安全风险,减少手动管理任务的数量,提高工作人员工作效率;1. The present invention is provided with an intelligent management module, the equipment information collection module completes the collection of user equipment information according to the IP address list, and at the same time, intelligently allocates the permissions of each user equipment, and the intelligent management module receives the relevant user equipment information and starts to carry out the user equipment. Real-time monitoring, if the device connection status and device operation data are abnormal, the intelligent management module starts to delete or modify the IP address corresponding to the user device according to the internal script data, and can manage each IP address by itself to avoid staff Misoperations occur during manual management, reduce security risks, reduce the number of manual management tasks, and improve staff work efficiency;
2、本发明设置有漏洞检测反馈模块,智能管理模块在对用户设备所对应的IP地址进行管理过程中出现异常操作时,漏洞监测反馈模块开始中断智能管理模块的运行,并将错误处理的IP地址信息反馈给工作人员,同时对数据漏洞进行自动定位,并将其反馈给工作人员,同时提示工作人员进行数据修复,无需工作人员人工排查与定位漏洞位置,节省工作人员时间,提高工作人员处理速率,提高信息安全。2. The present invention is provided with a vulnerability detection feedback module. When the intelligent management module has an abnormal operation in the process of managing the IP address corresponding to the user equipment, the vulnerability monitoring feedback module starts to interrupt the operation of the intelligent management module, and the IP address of the error processing is processed. The address information is fed back to the staff, and the data loopholes are automatically located and fed back to the staff. At the same time, the staff is reminded to repair the data. There is no need for the staff to manually check and locate the vulnerability location, saving staff time and improving staff handling. speed and improve information security.
附图说明Description of drawings
附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明的实施例一起用于解释本发明,并不构成对本发明的限制。The accompanying drawings are used to provide a further understanding of the present invention, and constitute a part of the specification, and are used to explain the present invention together with the embodiments of the present invention, and do not constitute a limitation to the present invention.
图1为本发明提出的一种便于主站网络IP地址自查管理系统的系统框图;Fig. 1 is a kind of system block diagram that is convenient for the self-check management system of the main station network IP address proposed by the present invention;
图2为本发明提出的一种便于主站网络IP地址自查管理系统中设备信息收集模块的结构示意图。FIG. 2 is a schematic structural diagram of a device information collection module in a self-check management system for a network IP address of a master station according to the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments.
在本发明的描述中,需要理解的是,术语“上”、“下”、“前”、“后”、“左”、“右”、“顶”、“底”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。In the description of the present invention, it should be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inside", " The orientation or positional relationship indicated by "outside" is based on the orientation or positional relationship shown in the accompanying drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the indicated device or element must have a specific orientation, so as to The specific orientation configuration and operation are therefore not to be construed as limitations of the present invention.
参照图1-2,一种便于主站网络IP地址自查管理系统,包括设备信息收集模块、智能管理模块、漏洞检测反馈模块、修复日志生成模块、数据处理模块以及检索调用模块;Referring to Fig. 1-2, a self-check management system for the network IP address of the main station is convenient, including a device information collection module, an intelligent management module, a vulnerability detection feedback module, a repair log generation module, a data processing module, and a retrieval calling module;
其中,智能管理模块分别与设备信息收集模块、漏洞检测反馈模块以及数据处理模块通信连接,漏洞检测反馈模块与修复日志生成模块通信连接,检索调用模块分别与数据处理模块、修复日志生成模块通信连接;The intelligent management module is respectively connected to the device information collection module, the vulnerability detection feedback module and the data processing module, the vulnerability detection feedback module is connected to the repair log generation module, and the retrieval call module is respectively connected to the data processing module and the repair log generation module. ;
设备信息收集模块包括数据收集单元以及管理列表更新单元。The device information collection module includes a data collection unit and a management list update unit.
管理列表更新单元用于接收工作人员上传的管理列表,并对外部服务器中存储的管理列表进行数据更新。The management list updating unit is used for receiving the management list uploaded by the staff, and updating the data of the management list stored in the external server.
具体的,该管理列表更新单元数据更新工作原理如下:管理列表更新单元接收到用户上传的管理列表,开始从外部服务器中提取过往管理列表,将两组管理列表进行数据比对,并将重复IP地址删除,删除完成,开始将进行数据整合生成新管理列表,并将其上传至服务端进行存储。Specifically, the data update working principle of the management list update unit is as follows: the management list update unit receives the management list uploaded by the user, starts to extract the past management list from the external server, compares the data of the two sets of management lists, and repeats the IP address. After the address is deleted, the deletion is completed, and the data will be integrated to generate a new management list, which will be uploaded to the server for storage.
数据收集单元用于实时检测并收集用户设备各项信息,并对其进行分类标记。The data collection unit is used to detect and collect various information of the user equipment in real time, and classify and mark it.
本实施例中提供了一种分类标记方法,其分类标记具体工作原理如下:数据收集单元开始调用外部服务器中存储的IP地址管理列表,并开始对列表中IP地址所对应的用户设备进行信息收集,将收集到的信息按照设备名、设备连接状态以及设备操作数据进行分类,并分别标记为A、B、C,标记完成,依据各用户设备所属用户身份信息分配给该用户设备不同的操作权限。This embodiment provides a classification marking method, and the specific working principle of the classification marking is as follows: the data collection unit starts to call the IP address management list stored in the external server, and starts to collect information on the user equipment corresponding to the IP addresses in the list , classify the collected information according to the device name, device connection status, and device operation data, and mark them as A, B, and C, respectively. The marking is completed, and different operation permissions are assigned to the user equipment according to the user identity information to which the user equipment belongs. .
具体的,本实施例中提供的一种用户设备具体为笔记本电脑、移动式Ipad或智能手机中的一种。Specifically, the user equipment provided in this embodiment is one of a notebook computer, a mobile Ipad, or a smart phone.
智能管理模块用于接收A、B以及C,并对其进行智能管理。The intelligent management module is used to receive A, B and C, and manage them intelligently.
在本实施例中公开了一种智能管理方法,其智能管理工作原理如下:智能管理模块开始依据内部脚本数据对B以及C进行数据分析,若B或C中存在异常,则开始对相关设备名A进行查询,设备名A查询完成,开始追踪对应IP地址,并对其进行删除或修改处理。In this embodiment, an intelligent management method is disclosed. The intelligent management works as follows: the intelligent management module starts to perform data analysis on B and C according to the internal script data, and if there is an abnormality in B or C, it starts to analyze the relevant device name. A performs a query, the device name A query is completed, and the corresponding IP address is tracked and deleted or modified.
漏洞检测反馈模块用于对智能管理模块进行实时监测,并将监测结果反馈给工作人员。The vulnerability detection feedback module is used for real-time monitoring of the intelligent management module, and feedback the monitoring results to the staff.
在本实施例中公开了一种漏洞监测反馈模块,该漏洞监测反馈模块具体作用在于:智能管理模块开始运行时,漏洞检测反馈模块开始对其进行实时监测,若存在处理异常,则中断智能管理模块运行,并反馈工作人员“需要进行手动更改”,对处理异常进行数据定位,并将其反馈给工作人员,同时将工作人员的修复操作通过数据转换处理生成记录数据,并将其发送至修复日志生成模块;A vulnerability monitoring feedback module is disclosed in this embodiment. The specific function of the vulnerability monitoring feedback module is: when the intelligent management module starts to run, the vulnerability detection feedback module starts to monitor it in real time, and if there is a processing abnormality, the intelligent management is interrupted. The module runs and feeds back to the staff that "manual changes are required", locates the data for processing exceptions, and feeds them back to the staff. At the same time, the staff's repair operations are processed through data conversion to generate record data and send it to the repairer. log generation module;
修复日志生成模块用于自行生成漏洞修复日志,并记录漏洞发现日期、漏洞类型、漏洞发生位置、修复日期以及修复人员姓名,同时将生成的漏洞修复日志进行编号,并上传至外部服务器进行存储。The repair log generation module is used to generate a vulnerability repair log by itself, and record the date of vulnerability discovery, vulnerability type, location of vulnerability occurrence, repair date, and the name of the repairer, and at the same time, the generated vulnerability repair log is numbered and uploaded to an external server for storage.
数据处理模块用于接收各IP地址的处理信息,并对其进行数据记录,同时生成处理日志。The data processing module is used to receive the processing information of each IP address, record the data, and generate a processing log at the same time.
具体的,该数据处理模块具体数据记录原理如下对工作人员手动处理数据以及智能管理模块自动处理数据进行收集,收集完成,从两组数据中提取出IP地址、用户设备名、异常操作信息以及处理结果,同时将其导入表格中,并生成处理日志,将生成的处理日志进行编号,并上传至外部服务器进行存储。Specifically, the specific data recording principle of the data processing module is as follows: Collect the data manually processed by the staff and the data automatically processed by the intelligent management module. After the collection is completed, the IP address, user device name, abnormal operation information, and processing information are extracted from the two sets of data. As a result, it is imported into the table at the same time, and a processing log is generated, and the generated processing log is numbered and uploaded to an external server for storage.
检索调用模块用于工作人员对修复日志以及处理日志进行调用查看。The retrieval call module is used by workers to call and view the repair log and processing log.
在本实施例中公开了一种调用查看方法,其具体工作原理如下:工作人员通过外部输入设备输入需要查看的文件类型,检索调用模块开始对其进行检测判断,并按照修复日志以及处理日志进行分类,并分别标记为X、Y,判断完成,用户再次输入需要查看的文件生成日期Z以及文件编号N,检索调用模块开始依据用户输入的X或Y、Z以及N对外部服务器中所存储的文件进行精确检索,并将检索结果反馈给工作人员查看。In this embodiment, a method for calling and viewing is disclosed, and its specific working principle is as follows: a worker inputs the file type to be viewed through an external input device, the retrieval and calling module starts to detect and judge it, and executes the process according to the repair log and the processing log. Classify and mark them as X and Y respectively. After the judgment is completed, the user enters the generation date Z and the file number N of the file to be viewed again, and the retrieval calling module starts to use the X or Y, Z and N input by the user to store in the external server. The documents are precisely searched, and the search results are fed back to the staff for review.
本实施例中公开了一种输入设备,其具体为键盘、电子笔或触控屏中的一种。This embodiment discloses an input device, which is specifically one of a keyboard, an electronic pen or a touch screen.
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,根据本发明的技术方案及其发明构思加以等同替换或改变,都应涵盖在本发明的保护范围之内。The above description is only a preferred embodiment of the present invention, but the protection scope of the present invention is not limited to this. The equivalent replacement or change of the inventive concept thereof shall be included within the protection scope of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110732277.3A CN113438248B (en) | 2021-06-30 | 2021-06-30 | A self-checking management system for the network IP address of the master station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110732277.3A CN113438248B (en) | 2021-06-30 | 2021-06-30 | A self-checking management system for the network IP address of the master station |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113438248A CN113438248A (en) | 2021-09-24 |
CN113438248B true CN113438248B (en) | 2022-08-02 |
Family
ID=77757895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110732277.3A Active CN113438248B (en) | 2021-06-30 | 2021-06-30 | A self-checking management system for the network IP address of the master station |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113438248B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114201045B (en) * | 2021-12-10 | 2024-04-19 | 湖北青柚籽科技发展有限公司 | VR conference system based on wireless helmet |
CN114201760A (en) * | 2021-12-16 | 2022-03-18 | 广州安海信息安全技术有限公司 | Vulnerability information management system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PT1271896E (en) * | 2001-06-18 | 2004-12-31 | Swisscom Mobile Ag | METHOD AND SYSTEM FOR INTERNET PROTOCOL (IP) MECHANISMS IN HETEROGENETIC NETWORKS |
JP2004109958A (en) * | 2002-09-17 | 2004-04-08 | Wataru Aisaka | Internet advertisement site specified for animation downloading with function of inducing to store |
CN104283889B (en) * | 2014-10-20 | 2018-04-24 | 国网重庆市电力公司电力科学研究院 | APT attack detectings and early warning system inside electric system based on the network architecture |
CN111459719B (en) * | 2020-04-01 | 2023-02-07 | 黄河水利职业技术学院 | An anti-downtime and power-off protection system for computer |
CN112822210B (en) * | 2021-02-06 | 2023-01-03 | 华能国际电力股份有限公司 | Vulnerability management system based on network assets |
-
2021
- 2021-06-30 CN CN202110732277.3A patent/CN113438248B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN113438248A (en) | 2021-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113438248B (en) | A self-checking management system for the network IP address of the master station | |
CN102999524B (en) | A kind of document associations search method and system | |
CN103729905A (en) | Graphical inspection system and inspection method | |
CN203849768U (en) | Graphical inspection system | |
CN114091912B (en) | Method for analyzing topological transaction of medium-voltage power grid by applying knowledge graph | |
CN117909392B (en) | Intelligent data asset inventory method and system | |
CN111125116B (en) | Method and system for positioning code field in service table and corresponding code table | |
CN113688288A (en) | Data association analysis method and device, computer equipment and storage medium | |
CN114880405A (en) | Data lake-based data processing method and system | |
CN110825725A (en) | Data quality verification method and system based on double helix management | |
CN111831634A (en) | Cloud platform processing system and method based on big data | |
CN112598142B (en) | Wind turbine maintenance working quality inspection auxiliary method and system | |
CN116976369B (en) | RFID bolt and nut applied to equipment state detection | |
CN117290183A (en) | ETL-based cross-system exception monitoring processing method and device | |
CN106407292B (en) | The method and device of vector data Geometrical change detection in a kind of spatial database | |
CN116187973A (en) | An aircraft failure maintenance management system | |
CN115438093A (en) | Fault judgment method and detection system for power communication equipment | |
CN113886378A (en) | Big data management system | |
CN113722571B (en) | Internet + based supplementary quota determination method and device | |
CN101145216A (en) | System and method for inspecting and maintaining electronic components | |
CN112650796A (en) | Automatic application data collection and storage management system | |
CN111241141B (en) | Rapid screening method for vehicle purchase tax monitoring management platform problem enterprises | |
CN113486230A (en) | Method for generating labeled message template | |
CN108665077B (en) | Information computer lab intelligent movement overhauls system based on iBeacon | |
CN119690952A (en) | Industry data statistics reporting system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |