Asset transaction monitoring method

An asset and asset information technology, applied in the field of communication and network, can solve serious security and problems, and achieve the effect of efficient asset management

Pending Publication Date: 2020-02-14
西安交大捷普网络科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while enjoying the convenience brought by computers and networks, the increasingly serious security problems have become urgent problems to be solved in front of every unit and enterprise.
[0003] The current technical means are still unable to meet such a requirement: asset information can be identified according to preset rules, and asset names can be automatically generated, so as to form real-time and intuitive asset monitoring, network topology relationship and business relationship views, and improve the management efficiency of internal assets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset transaction monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The asset naming rule is stipulated as "An_Bn_Cn_X", where An represents the unit, Bn represents the department, Cn represents the group, and X represents the Arabic numeral number; divide different network segments for different levels, that is, when the network segment is located at a1, the asset belongs to the A1 unit, and further When the network segment is still in the b1 segment, it still belongs to the B1 department. When the network segment is also in the c1, the asset still belongs to the C1 group; and the rule is encrypted and stored.

[0044] The structure of the specified asset attribute rule is "hostname_IP_MAC_hardware brand / model".

[0045] Establish an asset information list according to the above-mentioned asset naming rules and attribute rules.

[0046] Start asset detection, obtain all information that can describe assets through ping (packet exploration), snmp (simple network management protocol), ssh protocol, wmi (Windows Management Instrumentation...

Embodiment 2

[0056] The asset naming rule is stipulated as "An_Bn_Cn_X", where An, Bn, and Cn represent different authority levels from high to low, and X is an Arabic numeral number. For example, if asset 1 only has the third-level permission 1, its asset name can be "A0_B0_C1_01"; asset 2 has the second-level permission 1, then its asset name can be "A0_B1_C0_01"; asset 3 has the first-level permission If the authority is 1, its asset name can be "A1_B0_C0_01"; assets without any authority can be named "A0_B0_C0_01"; assets with the same authority can be distinguished by the last Arabic numeral.

[0057] It is stipulated that the structure of the asset attribute rule is "hostname_IP_MAC_permission_vulnerability library version".

[0058] Establish an asset information list according to the above-mentioned asset naming rules and attribute rules.

[0059] Start asset detection, obtain all information that can describe assets through ping (packet exploration), snmp (simple network manageme...

Embodiment 3

[0069] The asset naming rule is stipulated as "An_Bn_Cn_X", where An, Bn, and Cn represent the application software categories that assets can be installed and used, and X is an Arabic numeral number. For example, if asset 1 can only install and use A1 software, its asset name can be "A1_B0_C0_01"; asset 2 can install and use A1 and B1 software, then its asset name can be "A1_B1_C0_01"; asset 3 can install and use A1 If software of the same category, software of category B1, and software of category C1, the asset name can be "A1_B1_C1_01"; assets that can be installed with the same category of software can be distinguished sequentially by the last digit of the Arabic numeral.

[0070] It is stipulated that the structure of the asset attribute rule is "host name_IP_MAC_installable software category_system version".

[0071] Establish an asset information list according to the above-mentioned asset naming rules and attribute rules.

[0072] Start asset detection, obtain all inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asset transaction monitoring method, which comprises the steps of establishing an asset information table according to an asset naming rule and an attribute rule; performingasset detection, and generating an asset name according to the detected asset information and naming rules; filling the asset name and the corresponding asset information into the asset information table; creating an asset scanning rule and a monitoring rule; scanning the assets according to the scanning rule, judging whether the asset information is matched with the monitoring rule or not, and if not, indicating that the assets have transaction. Real-time and visual asset transaction monitoring is achieved, visual network topology and service views are achieved, and asset management can be conducted more efficiently.

Description

technical field [0001] The invention belongs to the field of communication and network technologies, and in particular relates to a method for detecting and identifying assets and monitoring abnormalities. Background technique [0002] With the development of communication and network technology, computer hosts and network equipment have gradually become important information carriers and transmission channels for enterprises, governments and various organizations. However, while enjoying the convenience brought by computers and networks, the increasingly serious security issues have become urgent problems to be solved in front of every unit and enterprise. [0003] The current technical means are still unable to meet such a requirement: asset information can be identified according to preset rules, and asset names can be automatically generated, so as to form real-time and intuitive asset monitoring, network topology relationship and business relationship views, and improve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06F16/2457
CPCG06Q10/06312G06F16/2457
Inventor 郭增晖王平陈宏伟
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products