Nothing Special   »   [go: up one dir, main page]

TWI662436B - Method and system for managing computer sequences - Google Patents

Method and system for managing computer sequences Download PDF

Info

Publication number
TWI662436B
TWI662436B TW106101380A TW106101380A TWI662436B TW I662436 B TWI662436 B TW I662436B TW 106101380 A TW106101380 A TW 106101380A TW 106101380 A TW106101380 A TW 106101380A TW I662436 B TWI662436 B TW I662436B
Authority
TW
Taiwan
Prior art keywords
program
computer program
teller machine
security device
computer
Prior art date
Application number
TW106101380A
Other languages
Chinese (zh)
Other versions
TW201828146A (en
Inventor
李鴻生
李境豈
Original Assignee
新誼整合科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新誼整合科技股份有限公司 filed Critical 新誼整合科技股份有限公司
Priority to TW106101380A priority Critical patent/TWI662436B/en
Publication of TW201828146A publication Critical patent/TW201828146A/en
Application granted granted Critical
Publication of TWI662436B publication Critical patent/TWI662436B/en

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

提出一種電腦程序管理方法與系統,方法主要執行於一受到保全管制的終端裝置中,執行於終端裝置的監視程式依照一程序安全資料,監視終端裝置中運行的電腦程序,當判斷其中有至少一電腦程序的運作並不符合程序安全資料,即產生一異常訊息,於是,將異常訊息傳送至保全裝置,並由保全裝置通報管制中心,並且,終端裝置可以根據此異常訊息阻斷有異常的電腦程序。 A computer program management method and system are proposed. The method is mainly executed in a terminal device subject to security control. A monitoring program executed in the terminal device monitors a computer program running in the terminal device according to a program safety data. The operation of the computer program does not comply with the program safety data, that is, an abnormal message is generated, so the abnormal message is transmitted to the security device, and the security device reports to the control center, and the terminal device can block the abnormal computer according to the abnormal message program.

Description

電腦程序管理方法與系統    Computer program management method and system   

本發明關於一種電腦科技的管理技術,特別是有關偵測到有異常的電腦程序而執行通報的的電腦能序管理方法與系統。 The invention relates to a computer technology management technology, in particular to a computer energy sequence management method and system for performing notification when an abnormal computer program is detected.

在強調安全的保全系統中,任何危害都可能造成嚴重的後果,除了傳統的人身安全、居家安全與各種設施上的安全都仰賴保全系統外,保全系統更需要防堵任何有關資訊安全的威脅。 In a security system that emphasizes security, any hazard can have serious consequences. In addition to the traditional personal security, home security and security on various facilities, which rely on the security system, the security system needs to prevent any threats to information security.

然而,以電腦系統為基礎架構的保全系統仍有可能面對資訊安全的漏洞,例如人為操作不當造成的安全資料外洩,或是病毒感染,使得保全系統的資訊安全防護措施更行重要。 However, security systems based on computer systems may still face information security vulnerabilities, such as leakage of security data caused by improper human operations or virus infection, making the information security protection measures of the security system even more important.

為了防堵因為資安問題造成系統不正常,而且如果是保全系統受到資安威脅還會產生更大的危害,本發明揭露書提出一種電腦程序管理方法,方法主要運作在受到保全管制的終端裝置,終端裝置連接到一個保全裝置上,由保全裝置執行一主監視程式,終端裝置執行一個從監視程式,從監視程式依照一程序安全資料監視終端裝置內執行的多個電腦程序。 In order to prevent the system from being abnormal due to security issues, and if the security system is threatened by security threats, it will cause greater harm. The disclosure of the present invention proposes a computer program management method, which mainly operates on terminal devices subject to security control. The terminal device is connected to a security device, the security device executes a master monitoring program, the terminal device executes a slave monitoring program, and the monitoring program monitors multiple computer programs executed in the terminal device according to a program safety data.

在一實施例中,當判斷終端裝置內有一電腦程序的運作並不符合程序安全資料,即產生一異常訊息,於是將此異常訊息傳送 至保全裝置所執行的主監視程式,以執行一通報,如通報一管制中心。 In one embodiment, when it is determined that the operation of a computer program in the terminal device does not conform to the program safety data, an abnormal message is generated, and the abnormal message is transmitted to a main monitoring program executed by the security device to execute a notification. Such as reporting to a control centre.

根據一實施例,所述保全裝置可為一數位監視錄影機(DVR),於接收此異常訊息時可啟動一攝影機錄製現場影像。對於終端裝置,內部程式可以根據異常訊息阻斷判斷為異常的電腦程序。所述程序安全資料為記載對應終端裝置的一電腦程序安全清單,而此程序安全資料更可以為記載各電腦程序的一安全運作條件。 According to an embodiment, the security device may be a digital surveillance video recorder (DVR). When receiving the abnormal message, a camera may be activated to record live images. For terminal devices, internal programs can block computer programs determined to be abnormal based on abnormal messages. The program safety data is a computer program safety list for the corresponding terminal device, and the program safety data may be a safe operating condition for each computer program.

在一實施例中,方法運作於一電腦程序管理系統,系統主要為客戶端的保全裝置,連接管制中心,其中執行一主監視程式,以及一終端裝置,以一通訊連線連接保全裝置,其中執行一從監視程式。從監視程式經終端裝置之一處理器執行後,執行以上描述的電腦程序管理方法。 In one embodiment, the method operates in a computer program management system. The system is mainly a client-side security device connected to the control center, where a main monitoring program is executed, and a terminal device is connected to the security device by a communication connection. One from the monitoring program. After the monitoring program is executed by a processor of the terminal device, the computer program management method described above is executed.

為了能更進一步瞭解本發明為達成既定目的所採取之技術、方法及功效,請參閱以下有關本發明之詳細說明、圖式,相信本發明之目的、特徵與特點,當可由此得以深入且具體之瞭解,然而所附圖式僅提供參考與說明用,並非用來對本發明加以限制者。 In order to further understand the technology, methods and effects adopted by the present invention to achieve the intended purpose, please refer to the following detailed description and drawings of the present invention. It is believed that the purpose, features and characteristics of the present invention can be deepened and specific It is understood, however, the drawings are provided for reference and description only, and are not intended to limit the present invention.

10‧‧‧網路 10‧‧‧Internet

101,103‧‧‧保全裝置 101,103‧‧‧security device

102,104‧‧‧終端裝置 102,104‧‧‧Terminals

105‧‧‧終端管理平台 105‧‧‧Terminal Management Platform

12‧‧‧管制中心 12‧‧‧ Control Center

20‧‧‧網路 20‧‧‧Internet

22‧‧‧數位監視錄影機 22‧‧‧ Digital Surveillance Video Recorder

221‧‧‧主監視程式 221‧‧‧Master monitoring program

222‧‧‧控制單元 222‧‧‧Control unit

223‧‧‧網路單元 223‧‧‧Network Unit

224‧‧‧連接埠 224‧‧‧Port

225‧‧‧輸出入單元 225‧‧‧I / O Unit

226‧‧‧攝影機 226‧‧‧Camera

24‧‧‧終端裝置 24‧‧‧Terminal device

241‧‧‧從監視程式 241‧‧‧ From the monitoring program

步驟S301~S311‧‧‧電腦程序管理流程 Steps S301 ~ S311‧‧‧ Computer program management process

步驟S401~S413‧‧‧電腦程序管理流程 Steps S401 ~ S413‧‧‧ Computer program management process

圖1顯示本發明電腦程序管理系統的實施例架構圖;圖2顯示本發明電腦程序管理系統客戶端裝置的實施例圖;圖3顯示本發明電腦程序管理方法的流程實施例圖之一;圖4顯示本發明電腦程序管理方法的流程實施例圖之二。 FIG. 1 shows an embodiment architecture diagram of a computer program management system of the present invention; FIG. 2 shows an embodiment diagram of a client device of a computer program management system of the present invention; FIG. 3 shows one of the flowchart embodiment diagrams of a computer program management method of the present invention; FIG. 4 shows the second embodiment of the flowchart of the computer program management method of the present invention.

保全系統的設計通常設有一管制中心,主要是管理各客戶端的保全設備,能夠在接獲異常通報時,根據事件的安全程度執行不同的保全措施,包括指示客戶端裝置的運作,以及派員前往現 場處理。客戶端一般則包括各式保全裝置,如保全主機以及聯繫的各式感知器、數位監視錄影機(Digital Video Recorder,DVR)與攝影機,或是由保全裝置連接客戶端其他終端設備執行管制,如門禁設備、電腦設備、商店中的端點資訊服務器(Point of Sale/Service,POS)、Kiosk,甚至是銀行業者提供的櫃員機(ATM)等設備。而在本發明所提出的電腦程序管理系統中,更涵蓋執行於保全裝置的主監視程式,以及執行於終端裝置的從監視程式。 The design of the security system usually has a control center, which is mainly used to manage the security equipment of each client. When receiving an exception notification, it can implement different security measures according to the security level of the incident, including instructing the operation of the client device and sending personnel to On-site processing. The client generally includes various security devices, such as the security host and various sensors, digital video recorders (DVRs) and cameras, or the security device is connected to the client's other terminal devices to perform control, such as Access control equipment, computer equipment, point of sale / service (POS) in the store, Kiosk, and even ATMs provided by bankers. In the computer program management system provided by the present invention, the master monitoring program executed on the security device and the slave monitoring program executed on the terminal device are further covered.

圖1顯示本發明電腦程序管理系統的實施例架構圖。 FIG. 1 is a structural diagram of an embodiment of a computer program management system according to the present invention.

此圖顯示一管制中心12經網路10連接各端保全設備,或可以專線連線,連接如保全裝置101與受到保全裝置101管制的終端裝置102,以及另一端包括保全裝置103與受到管制的終端裝置104,而終端裝置104則可能屬於一個終端管理平台105,如常見於商店內的端點資訊服務器(POS)可能透過另一專屬連線受到其擁有者,或是有另一POS管理平台管理。 This figure shows that a control center 12 is connected to various end security devices via the network 10, or can be connected by a dedicated line to connect, for example, the security device 101 and the terminal device 102 controlled by the security device 101, and the other end includes the security device 103 and the controlled Terminal device 104, which may belong to a terminal management platform 105. For example, the endpoint information server (POS), which is commonly found in stores, may be owned by its owner through another dedicated connection, or may have another POS management platform management.

其中,保全裝置101,103為連接管制中心12與終端裝置102,104之間裝置,可如保全主機、前述的數位監視錄影機,與網路閘道器。而管制中心12則如一保全中心,可連接與管理多端的保全設備。 Among them, the security devices 101 and 103 are devices connected between the control center 12 and the terminal devices 102 and 104, and can be, for example, a security host, the aforementioned digital surveillance video recorder, and a network gateway. The control center 12 is a security center, which can connect and manage multiple security devices.

本發明提出的電腦程序管理方法係運作於管制中心12、保全裝置101,103與終端裝置102,104中,可接著參考圖2所示本發明電腦程序管理系統客戶端裝置的實施例圖。 The computer program management method provided by the present invention is operated in the control center 12, the security devices 101, 103, and the terminal devices 102, 104. Referring to FIG. 2, the embodiment of the client device of the computer program management system of the present invention is illustrated.

此圖例顯示一客戶端設備,實施例顯示包括有數位監視錄影機22與終端裝置24,數位監視錄影機22主要為利用攝影機226錄製所監視現場的影像,除了錄製儲存外,更可經網路20傳送到另一端管制中心。 This illustration shows a client device. The embodiment shows a digital surveillance video recorder 22 and a terminal device 24. The digital surveillance video recorder 22 mainly uses the camera 226 to record the image of the monitored site. In addition to recording and storing, it can also be transmitted over the network. 20 teleports to the control center on the other end.

根據實施例,數位監視錄影機22中的主要電路方塊有處理裝置內部訊號的控制單元222,以及電性連接此控制單元222的網路單元223、連接埠224,以及輸出入單元225。數位監視錄影機22 中的網路單元223為處理與外部網路20傳輸的數據封包,在數位監視錄影機22的實施例中,主要為傳輸影像訊號。數位監視錄影機22的連接埠224常採用序列式的通訊埠(communication port)連接所管制的終端裝置24,如RS-232等工業規格的通訊連接技術。這類通訊連接技術好處是並非使用數據網路的規格,不容易被侵入破壞,資料無法從外部被擷取,但實際實施也不限於這類通訊連接方式。數位監視錄影機22的輸出入單元225用以連接一或多個攝影機226,執行訊號控制傳輸與影像接收。 According to the embodiment, the main circuit blocks in the digital surveillance video recorder 22 include a control unit 222 for processing internal signals of the device, a network unit 223, a port 224, and an input / output unit 225 electrically connected to the control unit 222. The network unit 223 in the digital surveillance video recorder 22 processes data packets transmitted to and from the external network 20. In the embodiment of the digital surveillance video recorder 22, it mainly transmits image signals. The connection port 224 of the digital surveillance video recorder 22 often adopts a serial communication port to connect the controlled terminal device 24, such as industrial-standard communication connection technology such as RS-232. The advantage of this type of communication connection technology is that it does not use the specifications of the data network, is not easily invaded and destroyed, and data cannot be retrieved from the outside, but the actual implementation is not limited to this type of communication connection. The I / O unit 225 of the digital surveillance video camera 22 is used to connect one or more cameras 226 to perform signal control transmission and image reception.

根據本發明電腦程序管理方法的實施例,數位監視錄影機22內記憶體載有一主監視程式221,經處理器執行主監視程式221後,與終端裝置24所執行的從監視程式241以一安全訊息通道通訊。運作時,主監視程式221可以定時由從監視程式241取得監視結果,或由從監視程式241主動將監視結果經安全訊息通道傳送到主監視程式221。 According to the embodiment of the computer program management method of the present invention, the memory in the digital surveillance video recorder 22 carries a master monitoring program 221, and after the processor executes the main monitoring program 221, the slave monitoring program 241 executed by the terminal device 24 is secure. Message channel communication. During operation, the master monitoring program 221 can obtain the monitoring results from the slave monitoring program 241 at regular intervals, or the slave monitoring program 241 can actively send the monitoring results to the master monitoring program 221 through the secure message channel.

在本發明的實施例中,終端裝置24以通訊連線連接保全裝置,如此例的數位監視錄影機22,從監視程式241經終端裝置24之一處理器執行後,即執行如圖3所示之電腦程序管理方法的實施例流程。 In the embodiment of the present invention, the terminal device 24 is connected to the security device by a communication connection. The digital surveillance video recorder 22 of this example is executed by the monitoring program 241 through a processor of the terminal device 24, as shown in FIG. 3 The embodiment procedure of the computer program management method.

步驟S301顯示執行電腦程序管理的一般運作前,系統定義一程序安全資料,此如一電腦程序安全清單(或稱白名單),定義出終端裝置正常運作時的電腦程序,如常駐接收感知器的程序、定時回報保全裝置的程序、定時系統修復的程序、裝置內休眠與啟動程序等。還可進一步定義出各電腦程序的安全運作條件,在此所述的安全運作條件可以依照各電腦程序的屬性定義出一個安全運作的範圍,可以避免電腦程序被病毒感染產生的運作異常狀況,例如有電腦程序一般僅佔用處理器運算能力的10%,突然上升到60%;或是有異常佔用數據頻寬的電腦程序等,在此安全運作的條件判斷下,可以判為異常狀況。程序安全資料可由管制中 心統一管理,根據各客戶端的終端裝置的形式與需求制定各自的程序安全資料,並派發程序安全資料至各保全裝置,並可轉送至各終端裝置,並非一定是統一設定。 Step S301 shows that before executing the general operation of the computer program management, the system defines a program safety data, such as a computer program safety list (or white list), which defines the computer program during the normal operation of the terminal device, such as the program of the resident receiver. , The program of the regular report security device, the program of the regular system repair, the hibernation and startup program in the device, etc. The safe operating conditions of each computer program can be further defined. The safe operating conditions described herein can define a safe operating range according to the properties of each computer program, which can prevent the computer program from being infected by a virus and causing abnormal operating conditions, such as Computer programs generally occupy only 10% of the processor's computing power and suddenly rise to 60%; or computer programs that abnormally occupy the data bandwidth can be judged as abnormal under the conditions of safe operation. The program safety data can be uniformly managed by the control center. According to the form and requirements of the terminal devices of each client, the program safety data can be formulated, and the program safety data can be distributed to each security device and can be transferred to each terminal device.

步驟S303描述由保全裝置執行主監視程式,由終端裝置執行從監視程式,接著,如步驟S305,由從監視程式執行程序監視,依照前述對應終端裝置的程序安全資料,從監視程式監視終端裝置內執行的多個電腦程序,如步驟S307,以判斷是否有異常的電腦程序。當對照程序安全資料後,包括比對其中電腦程序安全清單,或是各電腦程序的一安全運作條件,沒有異常時(否),重複步驟S305。 Step S303 describes the execution of the master monitoring program by the security device and the execution of the slave monitoring program by the terminal device. Then, in step S305, the execution of the monitoring program by the slave monitoring program monitors the inside of the terminal device from the monitoring program according to the program safety data corresponding to the terminal device. Multiple computer programs are executed, such as step S307, to determine whether there are abnormal computer programs. After comparing the program safety data, including comparing the computer program safety list or a safe operating condition of each computer program, if there is no abnormality (No), repeat step S305.

當發現終端裝置內執行的電腦程序中有未列電腦程序安全清單的電腦程序,或是判斷有電腦程序雖列於電腦程序安全清單,但是卻不符程序安全資料記載的安全運作條件,則判斷為異常(是),即執行步驟S309,由從監視程式產生異常訊息,包括驅使終端裝置內控制程式阻斷被判斷為異常的電腦程序,或可以終端裝置內控制程式暫停對應此程序的服務。進一步如步驟S311,實施例可包括由保全裝置的主監視程式接收到異常訊息時,產生通報管制中心的訊息。 When it is found that the computer program executed in the terminal device has a computer program that is not listed in the computer program safety list, or it is determined that the computer program is on the computer program safety list but does not meet the safe operating conditions recorded in the program safety data, it is judged as Abnormal (Yes), that is, step S309 is executed to generate an abnormal message from the monitoring program, including driving the control program in the terminal device to block the computer program judged to be abnormal, or the control program in the terminal device to suspend the service corresponding to this program. Further to step S311, the embodiment may include generating a message to the control center when the abnormal monitoring message is received by the main monitoring program of the security device.

圖4描述以數位監視錄影機作為保全裝置的電腦程序管理方法的實施例流程。 FIG. 4 illustrates a flowchart of an embodiment of a computer program management method using a digital surveillance video recorder as a security device.

在此流程中,當終端裝置執行從監視程式後,如步驟S401,以常駐的方式執行程序監視,如步驟S403,監視的方式主要是執行比對程序安全資料,如步驟S405,判斷是否有未列於程序安全資料中電腦程序安全清單內的不明電腦程序,或是有在清單內的電腦程序卻不符設定的安全運作條件。 In this process, after the terminal device executes the slave monitoring program, such as step S401, the program monitoring is performed in a resident manner, such as step S403. The monitoring method is mainly to perform comparison of the program safety data, such as step S405, to determine whether there is any Unknown computer programs listed in the computer program safety list in the program safety data, or there are computer programs in the list that do not meet the set safe operating conditions.

當判斷沒有不符程序安全資料的異常程序(否),重複步驟S401,反之,判斷有異常程序(是),即執行步驟S407,產生異常訊息,運行於數位監視錄影機的主監視程式從終端裝置內從監 視程式取得異常訊息,如步驟S409,啟動數位監視錄影機的錄影程序,啟動一攝影機錄製影像。 When it is judged that there is no abnormal program that does not match the program safety data (No), repeat step S401, otherwise, judge that there is an abnormal program (Yes), that is, execute step S407 to generate an abnormal message, and run the main monitoring program of the digital surveillance video recorder from the terminal device Obtain an abnormal message from the monitoring program in step S409, start the recording program of the digital surveillance video recorder, and start a camera to record the image.

之後,可如步驟S411所述將影像錄製存檔,或是如步驟S413,根據此異常訊息通報管制中心。在另一實施例中,若終端裝置本身也連接所屬的終端管理平台,相關異常訊息也可通報終端管理平台。 After that, the image recording may be archived as described in step S411, or may be notified to the control center according to the abnormal message according to step S413. In another embodiment, if the terminal device itself is also connected to the terminal management platform to which it belongs, the related abnormal information may also be notified to the terminal management platform.

根據揭露書所揭露的電腦程序管理方法與系統,方法主要運作在受到保全管制的終端裝置,系統包括在客戶端設置的終端裝置與所連接的保全裝置,由保全裝置執行一主監視程式,終端裝置執行一個從監視程式,從監視程式依照一程序安全資料監視終端裝置內執行的多個電腦程序。需要一提的是,程序安全資料可為對各種不同終端裝置設有各自的電腦程序安全清單,或加上各程序的安全運作條件。 According to the computer program management method and system disclosed in the disclosure, the method mainly operates on terminal devices subject to security control. The system includes a terminal device set on the client and the connected security device. The security device executes a main monitoring program. The terminal The device executes a slave monitoring program, and the slave monitoring program monitors a plurality of computer programs executed in the terminal device according to a procedure safety data. It needs to be mentioned that the program safety data can be set up with different computer program safety lists for various terminal devices, or added with the safe operating conditions of each program.

惟以上所述僅為本發明之較佳可行實施例,非因此即侷限本發明之專利範圍,故舉几運用本發明說明書及圖示內容所為之等效結構變化,均同理包含於本發明之範圍內,合予陳明。 However, the above is only the preferred and feasible embodiment of the present invention, and therefore does not limit the scope of the patent of the present invention. Therefore, the equivalent structural changes made by using the description and the illustrated content of the present invention are included in the present invention in the same way. Within the scope, joint Chen Ming.

Claims (8)

一種電腦程序管理方法,包括:依照一程序安全資料,執行於一櫃員機的一從監視程式監視該櫃員機內執行的多個電腦程序,其中該程序安全資料記載對應該櫃員機的一電腦程序安全清單,以及對應各電腦程序的一安全運作條件,用以定義出該櫃員機正常運作時的多個電腦程序,並藉以判斷是否有未列於該電腦程序安全清單內的不明電腦程序;當判斷該櫃員機內有任一電腦程序的運作並不符合該程序安全資料,即產生一異常訊息;以及傳送該異常訊息至一保全裝置所執行之一主監視程式,以執行一通報。A computer program management method includes: monitoring a plurality of computer programs executed in a teller machine by a monitoring program executed on a teller machine according to a program safety data, wherein the program safety data records a computer program safety list corresponding to the teller machine, And a safe operating condition corresponding to each computer program, which is used to define multiple computer programs during the normal operation of the teller machine, and to determine whether there are unknown computer programs not listed in the computer program safety list; when judging the teller machine The operation of any computer program does not conform to the safety data of the program, that is, an abnormal message is generated; and the abnormal message is transmitted to a main monitoring program executed by a security device to perform a notification. 如請求項1所述的電腦程序管理方法,其中該櫃員機為該保全裝置管制的裝置,該櫃員機以一通訊連線連接該保全裝置。The computer program management method according to claim 1, wherein the teller machine is a device controlled by the security device, and the teller machine is connected to the security device by a communication connection. 如請求項2所述的電腦程序管理方法,其中該保全裝置為一數位監視錄影機,於接收該異常訊息時啟動一攝影機錄製影像。The computer program management method according to claim 2, wherein the security device is a digital surveillance video recorder, and when receiving the abnormal message, a camera is started to record images. 如請求項3所述的電腦程序管理方法,其中該保全裝置係通報一管制中心。The computer program management method according to claim 3, wherein the security device is notified to a control center. 如請求項4所述的電腦程序管理方法,其中該程序安全資料係由該管制中心制定,並派發該程序安全資料至該保全裝置與/或該櫃員機。The computer program management method according to claim 4, wherein the program safety data is formulated by the control center, and the program safety data is distributed to the security device and / or the teller machine. 如請求項1所述的電腦程序管理方法,其中該櫃員機根據該異常訊息阻斷判斷為異常的該電腦程序。The computer program management method according to claim 1, wherein the teller machine blocks the computer program determined to be abnormal according to the abnormal message. 一種電腦程序管理系統,包括:一保全裝置,連接一管制中心,其中執行一主監視程式;一櫃員機,以一通訊連線連接該保全裝置,其中執行一從監視程式,該從監視程式與該主監視程式之間經該通訊連線建立一安全訊息通道,該從監視程式經該櫃員機之一處理器執行後,執行以下步驟:a.依照一程序安全資料,該從監視程式監視該櫃員機內執行的多個電腦程序,其中該程序安全資料記載對應該櫃員機的一電腦程序安全清單,以及對應各電腦程序的一安全運作條件,用以定義出該櫃員機正常運作時的多個電腦程序,並藉以判斷是否有未列於該電腦程序安全清單內的不明電腦程序;b.當判斷該櫃員機內有一電腦程序的運作並不符合該程序安全資料,即產生一異常訊息;c.傳送該異常訊息至該保全裝置所執行之該主監視程式,以執行一通報;以及d.該櫃員機根據該異常訊息阻斷判斷為異常的該電腦程序。A computer program management system includes: a security device connected to a control center, where a master monitoring program is executed; a teller machine, connected to the security device by a communication connection, wherein a slave monitoring program is executed, and the slave monitoring program and the A safety message channel is established between the master monitoring program via the communication connection, and the slave monitoring program is executed by a processor of the teller machine, and the following steps are performed: a. According to a procedure safety data, the slave monitoring program monitors the inside of the teller machine. A plurality of computer programs executed, wherein the program safety data records a computer program safety list corresponding to the ATM and a safe operating condition corresponding to each computer program, and is used to define the multiple computer programs during the normal operation of the ATM, and To determine whether there are unknown computer programs not listed in the computer program safety list; b. When it is determined that a computer program operation in the teller machine does not comply with the program safety data, an abnormal message is generated; c. The abnormal message is transmitted To the main monitoring program executed by the security device to execute a notification; and d. The cabinet Blocking unit according to the abnormality determination of the abnormal message is a computer program. 如請求項7所述的電腦程序管理系統,其中該保全裝置為一數位監視錄影機,於接收該異常訊息時啟動一攝影機錄製影像。The computer program management system according to claim 7, wherein the security device is a digital surveillance video recorder, and when receiving the abnormal message, a camera is started to record images.
TW106101380A 2017-01-16 2017-01-16 Method and system for managing computer sequences TWI662436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW106101380A TWI662436B (en) 2017-01-16 2017-01-16 Method and system for managing computer sequences

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW106101380A TWI662436B (en) 2017-01-16 2017-01-16 Method and system for managing computer sequences

Publications (2)

Publication Number Publication Date
TW201828146A TW201828146A (en) 2018-08-01
TWI662436B true TWI662436B (en) 2019-06-11

Family

ID=63960562

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106101380A TWI662436B (en) 2017-01-16 2017-01-16 Method and system for managing computer sequences

Country Status (1)

Country Link
TW (1) TWI662436B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI728637B (en) * 2020-01-02 2021-05-21 中華電信股份有限公司 Information security protection method and computer-readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200535606A (en) * 2004-04-30 2005-11-01 Inventec Corp System to monitor the usage state of computer equipment
CN103890770A (en) * 2011-10-17 2014-06-25 迈可菲公司 System and method for whitelisting applications in a mobile network environment
TW201524156A (en) * 2015-02-05 2015-06-16 Koutoku Patent & Trademark Office Ltd Real-time network monitoring system
TW201541418A (en) * 2014-04-18 2015-11-01 Taiwan Secom Co Ltd Security supervisory system
US20160309122A1 (en) * 2015-04-16 2016-10-20 Offender Smartphone Monitoring, LLC Monitoring process

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200535606A (en) * 2004-04-30 2005-11-01 Inventec Corp System to monitor the usage state of computer equipment
CN103890770A (en) * 2011-10-17 2014-06-25 迈可菲公司 System and method for whitelisting applications in a mobile network environment
TW201541418A (en) * 2014-04-18 2015-11-01 Taiwan Secom Co Ltd Security supervisory system
TW201524156A (en) * 2015-02-05 2015-06-16 Koutoku Patent & Trademark Office Ltd Real-time network monitoring system
US20160309122A1 (en) * 2015-04-16 2016-10-20 Offender Smartphone Monitoring, LLC Monitoring process

Also Published As

Publication number Publication date
TW201828146A (en) 2018-08-01

Similar Documents

Publication Publication Date Title
TWI677213B (en) Monitor apparatus, method, and computer program product thereof
WO2018198733A1 (en) Security monitoring system and security monitoring method
KR20160008267A (en) User's behavior analysis system on the network based video surveillance system
KR101794005B1 (en) Error detection system for network camera
JPWO2018134939A1 (en) Attack detection device, attack detection method and attack detection program
CN105765942A (en) System and method for interrupting information security threat via border gateway
KR101769442B1 (en) Method, system and computer-readable recording medium for security operation using internet of thing gateway
TWI662436B (en) Method and system for managing computer sequences
TW201738795A (en) Intrusion detection device, intrusion detection method, and intrusion detection program
KR101871406B1 (en) Method for securiting control system using whitelist and system for the same
CN114584366A (en) Power monitoring network safety detection system and method
CN114584363A (en) Network attack detection method, device, equipment and computer readable storage medium
JP5752316B2 (en) Connection failure determination device and connection failure determination method for video input device
WO2015154439A1 (en) Alarm management method, apparatus and packet transport device
TWI619031B (en) Metadata server, network device and automatic resource management method
CN106416178A (en) Transport accelerator implementing extended transmission control functionality
WO2023107700A1 (en) On-premises communication bridges for premises security systems
CN106254163B (en) Monitor the method and device of the USB port of computer in local area network
KR101606090B1 (en) Apparatus and method for protecting network
TWI711939B (en) Systems and methods for malicious code detection
KR102242111B1 (en) System and method for fire surveillance using blockchain and computer program for the same
KR101859598B1 (en) System for remote management of security equipment
TW201729589A (en) Monitoring system for conditional backup image and image-monitoring device thereof
CN111988333B (en) Proxy software work abnormality detection method, device and medium
CN111786826A (en) Industrial control equipment operation and maintenance auditing system, industrial control equipment operation and maintenance method and computer equipment