Operation and maintenance safety auditing method and system

An operation and maintenance security, operation and maintenance technology, applied in the direction of transmission system, computing, computer parts, etc., can solve the problems of lost mobile phone, can not be eliminated in time, can not be identified by IT operation and maintenance personnel, etc., to prevent malicious use and ensure authenticity and reliability effects

Inactive Publication Date: 2017-01-11
STATE GRID CORP OF CHINA +2
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to leaked account passwords, lost mobile phones, or the inability to perform face recognition, identification cannot be performed before operation and maintenance, and IT operation and maintenance personnel cannot be identified before operation and maintenance during or after operation and maintenance, resulting in inability to Identification of the true identity of IT operation and maintenance personnel
[0004] In addition, during the operation and maintenance process, improper operation and maintenance operations will leave potential security threats. Due to the lack of management and operation and maintenance process records, the responsible person cannot be designated to conduct audits in a timely manner, resulting in system problems that cannot be traced to the source in time and cannot be timely exclude

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation and maintenance safety auditing method and system
  • Operation and maintenance safety auditing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] see figure 1 , figure 1 It is a schematic diagram of an operation and maintenance security audit method provided by an embodiment of the present invention.

[0044] In a specific implementation manner, an operation and maintenance security audit method is provided, including the following steps:

[0045] Step S01: Receive the login request sent by the operation and maintenance personnel, and verify the login request;

[0046] Among them, before the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation and maintenance safety auditing method. The operation and maintenance safety auditing method comprises the following steps: receiving a login request sent by operation and maintenance personnel, and verifying the login request; if the verification is passed, obtaining and storing face image information of the operation and maintenance personnel in real time, and meanwhile recording an operation and maintenance operation on operation and maintenance target equipment in real time; verifying the identity of the operation and maintenance personnel in real time according to the face image information, and judging whether the operation and maintenance operation is an illegal operation; if the verification of the identity of the operation and maintenance personnel is wrong, and / or the operation and maintenance operation is the illegal operation, sending an alarm signal and / or interrupting the operation and maintenance operation; and carrying out correlation analysis on the face image information and the operation and maintenance operation, forming an operation and maintenance link, and carrying out audit according to the operation and maintenance link. Identity authentication can be carried out on the identity of the IT operation and maintenance personnel in an operation and maintenance personnel process, and the illegal operation and maintenance operation can be found in time. The invention further discloses an operation and maintenance safety auditing system.

Description

technical field [0001] The present invention relates to the technical field of operation and maintenance security, and more specifically, relates to an operation and maintenance security audit method, and also relates to an operation and maintenance security audit system. Background technique [0002] IT system operation and maintenance means that IT operation and maintenance personnel maintain and repair the IT operating environment such as software environment and network environment. Operation and maintenance security is the cornerstone of enterprise security, especially for Internet companies. It is different from web security, mobile security or business security. Because operation and maintenance security is at the bottom, or involves servers, network equipment, and basic applications, once a security problem occurs, it will directly threaten the security of the server and seriously affect the company's core business. [0003] At present, in the prior art, the identifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/00
CPCH04L63/0815H04L63/0861G06V40/16
Inventor 方圆杨宗跃吴斌李明王萍刘军蒋明管建超蔡梦臣徐敏武欣欣马永孙强俞骏豪
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products