CN207884647U - A kind of security log retention system - Google Patents
A kind of security log retention system Download PDFInfo
- Publication number
- CN207884647U CN207884647U CN201820282668.3U CN201820282668U CN207884647U CN 207884647 U CN207884647 U CN 207884647U CN 201820282668 U CN201820282668 U CN 201820282668U CN 207884647 U CN207884647 U CN 207884647U
- Authority
- CN
- China
- Prior art keywords
- data collector
- unit
- interchanger
- background process
- router
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000014759 maintenance of location Effects 0.000 title description 3
- 238000000034 method Methods 0.000 claims abstract description 23
- 238000004891 communication Methods 0.000 claims abstract description 12
- 238000006243 chemical reaction Methods 0.000 claims abstract description 11
- 230000003993 interaction Effects 0.000 claims abstract description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000001514 detection method Methods 0.000 claims description 4
- 238000002955 isolation Methods 0.000 claims description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 4
- 239000000779 smoke Substances 0.000 claims description 2
- 238000012423 maintenance Methods 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 3
- 238000012806 monitoring device Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 231100000572 poisoning Toxicity 0.000 description 1
- 230000000607 poisoning effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
- Alarm Systems (AREA)
Abstract
The utility model discloses a kind of security logs to retain system,The system comprises several safety equipments,Data collector,Router,Interchanger and background process server,The data collector includes information acquisition unit,Control unit,AD conversion unit and communication unit,Described information collecting unit,AD conversion unit and communication unit are connected with described control unit respectively,The output end of the safety equipment is connected with the input terminal of the data collector,The output end of the data collector is connected with the input terminal of the router by signal,The router is connected by network to carry out data interaction with the interchanger,The interchanger is connected with the background process server by twisted-pair feeder,By the system acquisition and summarize the warning message and log information of all kinds of safety equipments,For operation maintenance personnel analysis and summary.
Description
Technical field
The utility model is related to fields of communication technology more particularly to a kind of security log to retain system.
Background technology
For any enterprise, produces movable security needs and obtained by being monitored management talent to all various aspects
Include the monitoring, the monitoring to equipment, goods and materials storage environment, the prison to equipment operating environment to come in and go out to personnel to effective guarantee
Control etc., although many enterprises all employ corresponding monitoring device in the above or take corresponding measure, these prisons
It is often respective independent, mutually incoherent state, the monitoring data of various monitoring devices acquisitions, the daily record of generation between control equipment
Information, warning message can not effectively be summarized, and the difficulty of operation maintenance personnel maintenance management has both been increased, while also are difficult to these
Information carries out effective analysis to be correspondingly improved and be managed to relevant device.
Utility model content
For mirror with this, the purpose of this utility model is to provide a kind of security logs to retain system, at least to solve above ask
Topic.
Technical solution used by the utility model is as follows:
A kind of security log retains system, including several safety equipments, data collector, router, interchanger and after
Platform processing server, the data collector include information acquisition unit, control unit, AD conversion unit and communication unit,
Described information collecting unit, AD conversion unit and communication unit are connected with described control unit respectively, the safety equipment
Output end be connected with the input terminal of the data collector, the output end of the data collector is defeated with the router
Enter end by signal to be connected, the router is connected by network with the interchanger to carry out data interaction, the friendship
It changes planes and is connected by twisted-pair feeder with the background process server.
Further, the safety equipment includes monitor camera, access controller, Network Security Device, environmental information
It is one or more in collector.
Further, the Network Security Device includes in proxy server, hardware firewall and intruding detection system
It is one or more.
Further, the environment information acquisition device includes temperature sensor, humidity sensor, water sensor and smog
It is one or more in detector.
Further, net control device, the network control are additionally provided between the interchanger and background process server
Control equipment includes protocol converter, safety isolation network gate, flow controller.
Further, the background process server is equipped with small operation terminal, and the small operation terminal is equipped with touch-control
Formula display screen.
Further, the small operation terminal is connected with printer and short message terminal module.
Compared with prior art, the utility model has the beneficial effects that:
A kind of security log provided by the utility model retains system, passes through data collector acquisition monitoring device, net
Warning message and log information caused by all kinds of safety equipments such as network equipment converge via intermediate equipments such as router and interchangers
Always in background process server, operation maintenance personnel can check the log information in background process server at any time, and pass through this
The association that a little log information analysis and arrangements go out between every safety time is to take specific aim measure to be managed.
Description of the drawings
It is required in being described below to embodiment in order to illustrate more clearly of the technical scheme in the embodiment of the utility model
Attached drawing to be used is briefly described, it should be apparent that, the accompanying drawings in the following description is only the preferred reality of the utility model
Example is applied, it for those of ordinary skill in the art, without having to pay creative labor, can also be attached according to these
Figure obtains other attached drawings.
Fig. 1 is the overall system architecture schematic diagram of the utility model embodiment 1.
Fig. 2 is the data collector overall structure diagram of the utility model embodiment 1.
Fig. 3 is the overall system architecture schematic diagram of the utility model embodiment 2.
In figure, 1 is safety equipment, and 2 be data collector, and 3 be router, and 4 be interchanger, and 5 be background process server,
6 be net control device, and 11 be information acquisition unit, and 12 be control unit, and 13 be AD conversion unit, and 14 be communication unit,
51 be small operation terminal, and 511 be printer, and 512 be short message terminal module.
Specific implementation mode
The principles of the present invention and feature are described below in conjunction with attached drawing, cited embodiment is served only for explaining this
Utility model is not intended to limit the scope of the utility model.
Embodiment 1
Referring to Fig.1, the utility model provides a kind of security log retention system, and the system comprises several safety equipments
1, data collector 2, router 3, interchanger 4 and background process server 5.
With reference to Fig. 2, the data collector 2 for acquire security log information caused by the safety equipment 1 and
Warning message, including information acquisition unit 11, control unit 12, AD conversion unit 13 and communication unit 14, described information
Collecting unit 11, AD conversion unit 13 and communication unit 14 are connected with described control unit 12 respectively.Described information acquires
Unit 11 is used to acquire the log information and warning message of safety equipment;The AD conversion unit 13 is used for safety equipment
Generated analog signal is converted to digital signal;The communication module 14 is used to establish with the router and connect with into line number
According to interaction;Described control unit 12 controls other units for coordinating.The input terminal of the data collector 2 is set with the safety
Standby 1 output end is connected.
The safety equipment 1 includes monitor camera, access controller, Network Security Device, environment information acquisition device.Institute
The log information of safety equipment 1 can be acquired in a manner of one-to-one by stating data collector 2, can also in a manner of one-to-many into
Row acquisition, can be according to the actual arrangement situation flexible arrangement of safety equipment 1, to reduce the input of equipment.
The Network Security Device includes that proxy server, hardware firewall and intruding detection system etc. are used for protection net
Network malicious attack, the network equipment for detecting intrusion behavior.
The environment information acquisition device includes temperature sensor, humidity sensor, water sensor and smoke detector, institute
Environment information acquisition device is stated for collecting device running environment information, including temperature, humidity, whether by water logging, whether occur
The information such as fire.
The safety equipment 1 in day-to-day operation distinguish monitoring personnel discrepancys, network attack detection, poisoning intrusion defend,
Equipment operating environment, the warning message and log information generated are acquired by the information acquisition unit of data collector 2, such as
The collected information of fruit is analog signal, then described control unit calls AD conversion unit to be converted into digital signal, with
It is established afterwards by the communication unit and the router 3 and connects and send log information, the router 3 receives daily record letter
The interchanger 4 is transmitted to after breath, log information is sent to the background process server 5 by interchanger 4.The background process
Server 5 carries out classification storage to log information, and operation maintenance personnel can transfer corresponding safety from background process server 5 at any time
The log information of equipment is checked, can be provided for maintenance work with reference to take specific aim measure by analyzing log information.
Embodiment 2
With reference to figure, the difference place of the present embodiment and embodiment 2 is, the interchanger 4 and background process server 5 it
Between be additionally provided with net control device 6.The net control device 6 include but not limited to protocol converter, safety isolation network gate and
Flow controller.The protocol converter is used for the mutual conversion between heterogeneous network protocol, makes using distinct interface agreement
Equipment can carry out data interaction;The safety isolation network gate may with potential attack for being isolated from physical layer and blocking
Network connection, ensure the data safety of background process server 5, while can also effectively prevent leaking for data;The stream
Amount controller is used to be allocated the flow for accessing background process server 5 and be managed with control.It is set by the network-control
It is standby, it can find that network problem, quick locating network fault reduce the unavailable time of network rapidly, while simplifying network prison
Control means, increase network utilization.
Specifically, the background process server 5 is additionally provided with small operation terminal 51, the small operation terminal 51 is equipped with
Touch-sensitive display screen.Operation maintenance personnel can be input operation instruction and adjusted by the touch-sensitive display screen of the small operation terminal 51
Security log is taken to be checked, managed.
The small operation terminal 51 is also associated with printer 511 and short message terminal module 512.Operation maintenance personnel can lead to
Cross the security log data that the printer 511 prints background process server 5.
On the other hand, operation maintenance personnel can set background process server by the small operation terminal 51,
The security log that can will leave a question open of the background process server 5 is sent to the small operation terminal 51, small operation terminal 51
The short message terminal module 512 is controlled to check to operation maintenance personnel transmission warning short message prompting.
The above is only the preferred embodiment of the present invention, is not intended to limit the utility model, all in this practicality
Within novel spirit and principle, any modification, equivalent replacement, improvement and so on should be included in the guarantor of the utility model
Within the scope of shield.
Claims (7)
1. a kind of security log retains system, which is characterized in that the system comprises several safety equipments, data collector,
Router, interchanger and background process server, the data collector include information acquisition unit, control unit, modulus turn
Change unit and communication unit, described information collecting unit, AD conversion unit and communication unit respectively with described control unit phase
Connection, the output end of the safety equipment are connected with the input terminal of the data collector, the output of the data collector
End is connected with the input terminal of the router by signal, the router and the interchanger by network be connected with into
Row data interaction, the interchanger are connected with the background process server by twisted-pair feeder.
2. a kind of security log according to claim 1 retains system, which is characterized in that the safety equipment includes monitoring
It is one or more in video camera, access controller, Network Security Device, environment information acquisition device.
3. a kind of security log according to claim 2 retains system, which is characterized in that the Network Security Device includes
It is one or more in proxy server, hardware firewall and intruding detection system.
4. a kind of security log according to claim 2 retains system, which is characterized in that the environment information acquisition device packet
It includes one or more in temperature sensor, humidity sensor, water sensor and smoke detector.
5. a kind of security log according to claim 1 retains system, which is characterized in that the interchanger and background process
Net control device is additionally provided between server, the net control device includes protocol converter, safety isolation network gate, flow
Controller.
6. a kind of security log according to claim 1 retains system, which is characterized in that the background process server is set
There are small operation terminal, the small operation terminal to be equipped with touch-sensitive display screen.
7. a kind of security log according to claim 6 retains system, which is characterized in that the small operation terminal connection
There are printer and short message terminal module.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201820282668.3U CN207884647U (en) | 2018-02-28 | 2018-02-28 | A kind of security log retention system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201820282668.3U CN207884647U (en) | 2018-02-28 | 2018-02-28 | A kind of security log retention system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN207884647U true CN207884647U (en) | 2018-09-18 |
Family
ID=63495833
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201820282668.3U Active CN207884647U (en) | 2018-02-28 | 2018-02-28 | A kind of security log retention system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN207884647U (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114124657A (en) * | 2021-11-15 | 2022-03-01 | 北京天地和兴科技有限公司 | Alarm system and method suitable for one-way isolation environment |
-
2018
- 2018-02-28 CN CN201820282668.3U patent/CN207884647U/en active Active
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114124657A (en) * | 2021-11-15 | 2022-03-01 | 北京天地和兴科技有限公司 | Alarm system and method suitable for one-way isolation environment |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106789177B (en) | A kind of system of dealing with network breakdown | |
| CN107770174A (en) | A kind of intrusion prevention system and method towards SDN | |
| CN206075468U (en) | Video monitoring and fire control alarm leakage system | |
| WO2017219286A1 (en) | Internet of things operation and maintenance monitoring apparatus | |
| CN101567884A (en) | Method for detecting network theft Trojan | |
| WO2022215841A1 (en) | Building fire safety management system and method | |
| DE60012913T2 (en) | CABLE INTEGRITY TESTING TECHNOLOGY FOR REMOTE HARSH ENVIRONMENTAL MONITORING | |
| CN106209902A (en) | A kind of network safety system being applied to intellectual property operation platform and detection method | |
| CN109714573A (en) | A kind of video monitoring system and method based on Internet of Things and 5G mobile communication | |
| KR20030056652A (en) | Blacklist management apparatus in a policy-based network security management system and its proceeding method | |
| CN207884647U (en) | A kind of security log retention system | |
| WO2024136078A1 (en) | Information transmission system for closed network cctv | |
| CN109523043A (en) | A kind of charging station video monitoring wisdom operation management platform | |
| CN115102865A (en) | Network security device topology management method and system | |
| CN105217395A (en) | Elevator hall's door lock automatic checkout equipment, system and method | |
| CN110798660B (en) | Integrated operation and maintenance system based on cloud federation audio and video fusion platform | |
| CN105448054B (en) | Intelligent safety and defence system for Modern Community | |
| CN108924095A (en) | A kind of government website security monitoring alarm platform | |
| CN100466537C (en) | Device and method for detecting computer access status in network | |
| CN207743973U (en) | A kind of mobile network's trouble analysis system based on intelligent terminal | |
| Liu et al. | A distributed intrusion detection system based on agents | |
| CN207993218U (en) | One key alarm system | |
| CN106447813A (en) | Intelligent office platform | |
| CN110519565A (en) | Monitoring method and device, storage medium, processor | |
| CN109688142A (en) | Threat Management method and system in a kind of industrial control system network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| GR01 | Patent grant | ||
| GR01 | Patent grant |