Safety monitoring system

A technology of safety monitoring system and supervision system, applied in transmission systems, digital transmission systems, safety communication devices, etc., can solve problems such as lack of big data analysis, inability to provide effective support for safe decision-making, inability to synchronously expand supervision capabilities, etc. Manage the effect of multi-party coordinated management

Pending Publication Date: 2022-05-20
CHINA AUTOMOTIVE INNOVATION CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The management of information assets and key infrastructure by the network security supervision department is mainly manual. Manual management is time-consuming, labor-intensive and subjective. When analyzing information security, it is easy to make mistakes in judgment.
[0004] 2. When the network security supervision department does not fully control the information assets and key infrastructure in the area under its jurisdiction, the information assets and key infrastructure are vague, and the relationship between websites, platforms, and systems, and the ownership of the main unit and other information are not clear, it is impossible to Provide effective support for security decisions
[0005] 3. The network security supervision department lacks sufficient security assessment methods for the area under its jurisdiction, and its perception of the risk status of the information system in the area under its jurisdiction lags behind. Especially in the lack of big data analysis in the ultra-huge amount of security logs, it is impossible to effectively detect and perceive security risks.
[0006] 4. The network security supervision department lacks effective management support means for the information system and key infrastructure in the area under its jurisdiction, and cannot carry out effective dynamic supervision of network security
[0007] 5. With the development of new technologies, new services, and new models of the Internet, the information systems and key infrastructures faced by cybersecurity regulatory agencies are becoming more and more complex, and it is impossible to simultaneously expand regulatory capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety monitoring system
  • Safety monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiment is only one embodiment of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0041] The "embodiment" referred to herein refers to a specific feature, structure or characteristic that may be included in at least one implementation of the present application. In the description of the embodiments of the present application, it should be understood that the terms "including" and "for" and any variations thereof are intended to cover non-exclusive inclusion.

[0042] A specific embodiment of a safety monitor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The security monitoring system disclosed by the embodiment of the invention comprises an information acquisition system, and the information acquisition system is used for acquiring a to-be-supervised information set of each to-be-supervised system in a preset jurisdiction based on a backbone network of the preset jurisdiction; the data processing system is connected with the information acquisition system, and the data processing system is used for determining a label information set of each to-be-supervised system according to the to-be-supervised information set of each to-be-supervised system; the supervision system is connected with the data processing system, and the supervision system is used for determining a relation graph corresponding to a preset jurisdiction area and safety state information corresponding to each to-be-supervised system according to the label information set and the to-be-supervised information set of each to-be-supervised system. Based on the embodiment of the invention, global insight, real-time decision, global management and multi-party coordination management can be realized.

Description

technical field [0001] The invention relates to the technical field of network safety supervision, in particular to a safety monitoring system. Background technique [0002] Network security supervision departments, such as network information departments, public security departments, and network security departments, are responsible for the management of energy, transportation, water conservancy, finance, public services, telecommunications, e-government and other information systems and key enterprises within their jurisdictions, and Manage key infrastructure such as cloud computing, big data analysis, Internet of Things, 5G, edge computing, and industrial control systems. In the process of management, it is necessary to grasp the information assets and key infrastructure in the entire jurisdiction, investigate the risk status of the information system, and build and archive information security incidents. Due to the characteristics of numerous information assets, complex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q50/30H04L9/40
CPCG06Q10/103G06Q50/30H04L63/1416H04L63/1425H04L63/1433
Inventor 王波杨彦召郭超
Owner CHINA AUTOMOTIVE INNOVATION CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products