Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Disaster recovery drill method and system for network security

A network security and disaster recovery technology, applied in the field of network security, can solve the problems of incomplete information representation, unintuitive expression, poor efficiency of end-to-end visual management, etc., and achieve the effect of improving the efficiency of drills

Pending Publication Date: 2022-04-22
CHINA TELECOM DIGITAL INTELLIGENCE TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are certain dimensional limitations in the traditional disaster recovery drill. If an error occurs in a certain process during the operation of the drill system, it is generally difficult to perceive it accurately and quickly. Therefore, the business process expression of the disaster recovery drill in the existing IT business system is not intuitive. Incomplete information performance, causing technicians to trace the alarm occurrence to the alarm-related resource layer, application layer, network layer life cycle, end-to-end visual management efficiency is poor and the drill efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will now be described in further detail.

[0033] This application adopts following technical scheme:

[0034] A disaster recovery drill method for network security, comprising the following steps:

[0035] S1: The event reporting module of the analog alarm device creates a disaster recovery drill business command, and combines the command with its own ID information to generate a business command tag ID, and then sends it to the business early warning module;

[0036] S2: The business early warning module accesses the alarm database through the business instruction tag ID, obtains the IP address information of the alarm data source in the analog alarm device, and stores the IP address information in the business instruction tag ID and the tag database respectively, and then updates the data The following business instruction tag ID is sent to the caller module;

[0037] S3: The convening personnel module obtains the IP address information in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the disaster recovery drill method and system for network security, an event reporting module generates a service instruction mark ID and sends the service instruction mark ID to a service early warning module, and the service early warning module obtains IP address information of an alarm data source through the service instruction mark ID and stores the IP address information into the service instruction mark ID and a mark database; then, the business instruction mark ID after data updating is sent to a personnel calling module; the personnel calling module obtains personnel set information corresponding to the IP address information through the service instruction mark ID, then stores data information of a personnel set into a mark database, and sends the service instruction mark ID to the disaster evaluation module; and the disaster evaluation module obtains disaster data source information corresponding to the IP address through the service instruction mark ID, and analyzes the obtained disaster data source information. According to the scheme, the disaster recovery drill business process expression of the IT business system is more visual and complete.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security disaster recovery drill method and system. Background technique [0002] With the gradual deepening of digital development, network security has become an important guarantee for social development, making disaster recovery drills more valuable. The collection and processing of disaster recovery data information is an important link in disaster recovery drills. Comprehensive information collection and accurate data can ensure the normal execution of each task of the disaster recovery drill. The processing process of the drill is highly similar to the processing process when a real disaster occurs, ensuring that the disaster recovery drill can play a role in the work, so that the disaster recovery drill can serve as a reference for later data maintenance. [0003] There are certain dimensional limitations in the traditional disaster recovery drill. If ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/0631H04L41/14
CPCH04L63/1416H04L63/1425H04L41/0631H04L41/145Y02A10/40
Inventor 满新宇陈世亮丁涛朱庭俊魏小进
Owner CHINA TELECOM DIGITAL INTELLIGENCE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products