Disaster recovery drill method and system for network security
A network security and disaster recovery technology, applied in the field of network security, can solve the problems of incomplete information representation, unintuitive expression, poor efficiency of end-to-end visual management, etc., and achieve the effect of improving the efficiency of drills
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0032] The present invention will now be described in further detail.
[0033] This application adopts following technical scheme:
[0034] A disaster recovery drill method for network security, comprising the following steps:
[0035] S1: The event reporting module of the analog alarm device creates a disaster recovery drill business command, and combines the command with its own ID information to generate a business command tag ID, and then sends it to the business early warning module;
[0036] S2: The business early warning module accesses the alarm database through the business instruction tag ID, obtains the IP address information of the alarm data source in the analog alarm device, and stores the IP address information in the business instruction tag ID and the tag database respectively, and then updates the data The following business instruction tag ID is sent to the caller module;
[0037] S3: The convening personnel module obtains the IP address information in the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com