Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security monitoring method, client and system based on instant messaging

A network security and communication technology, which is applied in the field of network information security, can solve the problems that the security monitoring system maintenance cannot be followed up in time, takes a long time, and the network environment is complex, so as to improve follow-up efficiency and coordination, and improve communication efficiency , Improve the effect of user experience

Inactive Publication Date: 2020-11-13
SHANGHAI NEWDON TECH CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the above-mentioned security monitoring system, due to the large amount of monitoring data and the complex network environment, it is relatively cumbersome for non-administrator professionals in other positions to obtain the monitoring data information of the equipment concerned. Due to the lack of professional knowledge and If you don’t understand the monitoring system, it may take a long time to find the monitoring data of the equipment you care about; on the other hand, when there are many network devices and the network environment is complex, you may need to set up multiple However, considering the importance and confidentiality requirements of data in different sub-regions, each administrator can usually only see the monitoring data information of the network equipment he is responsible for, and it is difficult to understand the upstream information related to the network equipment he is responsible for. The information of network equipment or downstream network equipment may lead to the failure to follow up the maintenance of the security monitoring system in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method, client and system based on instant messaging
  • Network security monitoring method, client and system based on instant messaging
  • Network security monitoring method, client and system based on instant messaging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0046] see figure 1 As shown, it is an instant messaging-based network security monitoring method provided by the embodiment of the present invention. The method comprises the steps of:

[0047] S100. Based on the target object, establish a contact corresponding to the target object in an instant messaging tool, and the target object is associated with one or more network devices.

[0048] The instant messaging tool (IM: Instant Messaging, also referred to as an instant messaging tool) generally refers to a client terminal with an instant messaging function in the field. As an example and not a limitation, the instant messaging tool may be a network version application, a PC version application or a handheld terminal APP application.

[0049] The method of establishing a contact corresponding to the object in the instant messaging tool may be that the user actively edits through the address book function of the instant messaging tool, and stores the contact information and b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security monitoring method, client and system based on instant messaging, and relates to the technical field of network information security. The network security monitoring method comprises the steps that based on a target object, a contact person corresponding to the target object is established in an instant messaging tool, and the target object is associated with one or more pieces of network equipment; trigger operation of a user for the contact person is collected, a communication interaction interface corresponding to the contact person is output, and network equipment information associated with the contact person is displayed in the communication interaction interface; and a selection operation of a user on the network equipment displayed in the communication interaction interface is obtained, and monitoring data information of the corresponding network equipment is output. According to the invention, the contact function in the communicationtool is utilized, the monitoring data information acquisition interface is provided through the communication interaction interface of the contact, the operation is simple, the communication efficiency is high, and the user experience is improved.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to an instant messaging-based network security monitoring method, client and system. Background technique [0002] With the emergence and development of the Internet, Internet security issues have become increasingly prominent. Hackers can easily exploit the security holes of some Internet smart devices, making them a new tool for traditional network attacks. Network security monitoring monitors network or host activities in real time, monitors and analyzes user and system behaviors, audits system configurations and vulnerabilities, evaluates the integrity of sensitive systems and data, identifies attack behaviors, conducts statistics and tracking of abnormal behaviors, and identifies violations of security regulations Behaviors such as tricking servers into recording hacker behaviors enable administrators (network administrators) to effectively monitor, control...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58H04L12/24H04L12/18H04L29/06
CPCH04L12/185H04L41/044H04L41/18H04L51/046H04L63/105
Inventor 杨腾霄马宇尘
Owner SHANGHAI NEWDON TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More