Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Alarm method and system

An alarm system and monitoring server technology, applied in transmission systems, digital transmission systems, electrical components, etc., to ensure operation and improve efficiency

Active Publication Date: 2019-01-01
武汉思普崚技术有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that it is often necessary to further process the alarm information in the network system to find out the root cause of abnormal events, this application provides an alarm method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method and system
  • Alarm method and system
  • Alarm method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to solve the problem in the prior art that it is often necessary to further process the alarm information in the network system to find out the root cause of abnormal events, the present application provides an alarm method and system through the following embodiments.

[0063] In the network system, in order to meet the needs of security management, the network system is often divided into multiple security domains, and mutual access between different security domains needs to follow specific rules. In the embodiment of this application, these rules are implemented by means of a firewall. Firewall settings Between each security domain, each firewall has different access control policies, and the access control policies of these firewalls are used to realize the security management of the network system. Inside each security domain, there are often different services, and the mutual access between each service also needs to follow certain rules. Therefore, a fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an alarm method and system. The method comprises the steps of: obtaining an access control policy base line formed by a plurality of matrix units by a monitoring server;analyzing the matrix units by the monitoring server, and obtaining access control policies corresponding to the matrix units; determining an actual link result between a source network region and a target network region by the monitoring server; determining whether the actual link result is consistent to a link result specified by the access control policies or not by the monitoring server; if not, generating alarm detail information by the monitoring server. In the method, the actual link result is not consistent to the specified link result, it is shown that there is abnormal events in thenetwork system, once the abnormal events are generated, alarm detail information can be generated, and according to the source network region and the target network region in the alarm detail information, the generation source of the abnormal events is determined.

Description

technical field [0001] The present application relates to the technical field of computer security, in particular to an alarm method and system. Background technique [0002] A network system usually includes multiple network areas, and two different network areas usually access each other and exchange data flows according to certain rules. In order to ensure the security of each network area, it is necessary to send an alarm for abnormal events occurring in the network area. [0003] At present, in order to realize an alarm for abnormal events, security devices, such as firewalls, are usually set up between various network areas. In the process of data flow interaction, the data flow sent by the source network area is transmitted to the security device, and the security device analyzes the received data flow to determine whether the data flow is legal. If it is legal, the security device sends the data flow to the destination In the network area, if the security device de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L41/0686H04L63/02H04L63/20
Inventor 李先瞧
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products