Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security monitoring method, system and device, storage medium and computer equipment

A security device and security monitoring technology, applied in the computer field, can solve problems such as low operation and maintenance efficiency, inability to display the specific location of the affected equipment, inability to visually conduct risk investigation, risk location and risk convergence, etc.

Pending Publication Date: 2020-05-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In traditional technology, two-dimensional dashboard statistical graphics and data lists are usually used, which only list emergency alarms and safety risk data information, and cannot show the specific location of the affected equipment
However, the operation and maintenance personnel know the security risk data information through the two-dimensional dashboard statistical graphics or data list, and cannot intuitively carry out risk investigation, risk location and risk convergence, etc., which may easily lead to low operation and maintenance efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method, system and device, storage medium and computer equipment
  • Network security monitoring method, system and device, storage medium and computer equipment
  • Network security monitoring method, system and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0056] figure 1 It is an application environment diagram of the network security monitoring method in one embodiment. refer to figure 1 , the network security monitoring method is applied to a network security monitoring system. The network security monitoring system includes a processing terminal 110 , a security device monitoring device 120 and at least one security device 130 . The processing terminal 110 is connected to the service server through a network, and the safety device monitoring device 120 is connected to at least one safety device 130 through a network. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security monitoring method, system and device, a computer readable storage medium and computer equipment. The method comprises the following steps: displaying a network topology three-dimensional model, wherein the network topology three-dimensional model comprises a plurality of model network areas, wherein each model network area comprises a plurality of safetyequipment models, the safety equipment model corresponds to real safety equipment, and the model network area corresponds to a real network area; receiving safety monitoring data in real time, wherein the safety monitoring data is sub-safety monitoring data corresponding to real safety equipment; when the safety monitoring data is matched with a preset alarm rule,, determining a corresponding target model network area from the network topology three-dimensional model and a target safety equipment model in the target model network area according to the safety monitoring data, and identifying the target model network area in the network topology three-dimensional model and the target safety equipment model. According to the scheme provided by the invention, the network security operation and maintenance efficiency can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a network security monitoring method, system, device, computer-readable storage medium and computer equipment. Background technique [0002] In traditional technology, two-dimensional dashboard statistical graphics and data lists are usually used, which only list emergency alarms and safety risk data information, and cannot show the specific location of the affected equipment. However, the operation and maintenance personnel know the security risk data information through the two-dimensional dashboard statistical graphics or data list, and cannot intuitively carry out risk investigation, risk location and risk convergence, etc., which may easily lead to low operation and maintenance efficiency. Contents of the invention [0003] Based on this, it is necessary to provide a network security monitoring method, system, device, computer-readable storage medium and comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/18G06F16/215H04L12/24H04L29/06
CPCH04L63/1441G06F16/215G06F16/1815H04L41/12H04L41/145
Inventor 许艾斯杨勇甘祥郑兴唐文韬申军利范宇河常优华珊珊苗霖何澍王悦
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products