Safety monitoring method and system

A security monitoring system and security monitoring technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of lack of sensitive data verification and analysis, inability to satisfy post-event tracing, inability to effectively extract sensitive information on pages, etc., to improve efficiency , the effect of improving the quality

Inactive Publication Date: 2011-06-01
HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED
View PDF2 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The network bypass interception technology can only check the maintenance operations of a few hosts using open protocols such as telnet and ftp. Even if some systems can record the entire page according to the HTTP protocol, they cannot effectively extract The sensitive information on the page makes it impossible to effectively verify the operation of the BOSS front page
[0006] (2) The log module embedded in the business system only records the operator, operation time, and query operations such as customer details, user information, and payment for each operation. It does not record access to sensitive data, which cannot meet the needs of subsequent investigations. Verification analysis of sensitive data
[0007] (3) Most business systems lack security audit functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety monitoring method and system
  • Safety monitoring method and system
  • Safety monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0023] method embodiment

[0024] figure 1 It is a flow chart of Embodiment 1 of the security monitoring method of the present invention. Such as figure 1 As shown, this embodiment includes:

[0025] Step S102: The verification and monitoring center sends security monitoring information to the business terminal, where the security monitoring information includes the preset monitored page objects and monitoring methods; see the specific operation process figure 2 Explanation of step S201;

[0026] Step S104: The business terminal generates a behavior log corresponding to the monitored page according to the security monitoring information, and uploads all the beh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety monitoring method and system. The method comprises the following steps of: sending safety monitoring information to a service terminal by a checking and monitoring center, wherein the safety monitoring information comprises a preset monitored page and a monitoring mode; generating behavior logs corresponding to the monitored page by the service terminal according to the safety monitoring information; and uploading all the behavior logs to the checking and monitoring center. In the embodiments of the invention, services are counted in batches and recorded in the forms of logs through the service terminal according to the safety monitoring information, thereby sensitive information of the page is effectively extracted, the requirement of afterwards tracing can be met, the quality of safety monitoring is improved conveniently, and the safety monitoring efficiency is further improved.

Description

technical field [0001] The invention relates to the field of business support, in particular to a safety monitoring method and system. Background technique [0002] Business support system (BOSS), business analysis system, etc. are the core support systems of the mobile business, covering functions such as billing, settlement, business, accounting, and customer service, and centralize sensitive data such as customer personal information and core business data. The security of these data directly affects the benefit and reputation of the enterprise. At present, the operation, acquisition and display of these data are mainly carried out through the pages of its business system. Therefore, page operations have a great risk of leakage and become a key control point to ensure the security of sensitive data. However, incidents of leakage of customer personal information and business operation data occur from time to time, and are becoming more and more serious. [0003] There ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24
Inventor 霍绍博任智广闫振英
Owner HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products