TWI662436B - Method and system for managing computer sequences - Google Patents
Method and system for managing computer sequences Download PDFInfo
- Publication number
- TWI662436B TWI662436B TW106101380A TW106101380A TWI662436B TW I662436 B TWI662436 B TW I662436B TW 106101380 A TW106101380 A TW 106101380A TW 106101380 A TW106101380 A TW 106101380A TW I662436 B TWI662436 B TW I662436B
- Authority
- TW
- Taiwan
- Prior art keywords
- program
- computer program
- teller machine
- security device
- computer
- Prior art date
Links
Landscapes
- Alarm Systems (AREA)
Abstract
提出一種電腦程序管理方法與系統,方法主要執行於一受到保全管制的終端裝置中,執行於終端裝置的監視程式依照一程序安全資料,監視終端裝置中運行的電腦程序,當判斷其中有至少一電腦程序的運作並不符合程序安全資料,即產生一異常訊息,於是,將異常訊息傳送至保全裝置,並由保全裝置通報管制中心,並且,終端裝置可以根據此異常訊息阻斷有異常的電腦程序。 A computer program management method and system are proposed. The method is mainly executed in a terminal device subject to security control. A monitoring program executed in the terminal device monitors a computer program running in the terminal device according to a program safety data. The operation of the computer program does not comply with the program safety data, that is, an abnormal message is generated, so the abnormal message is transmitted to the security device, and the security device reports to the control center, and the terminal device can block the abnormal computer according to the abnormal message program.
Description
本發明關於一種電腦科技的管理技術,特別是有關偵測到有異常的電腦程序而執行通報的的電腦能序管理方法與系統。 The invention relates to a computer technology management technology, in particular to a computer energy sequence management method and system for performing notification when an abnormal computer program is detected.
在強調安全的保全系統中,任何危害都可能造成嚴重的後果,除了傳統的人身安全、居家安全與各種設施上的安全都仰賴保全系統外,保全系統更需要防堵任何有關資訊安全的威脅。 In a security system that emphasizes security, any hazard can have serious consequences. In addition to the traditional personal security, home security and security on various facilities, which rely on the security system, the security system needs to prevent any threats to information security.
然而,以電腦系統為基礎架構的保全系統仍有可能面對資訊安全的漏洞,例如人為操作不當造成的安全資料外洩,或是病毒感染,使得保全系統的資訊安全防護措施更行重要。 However, security systems based on computer systems may still face information security vulnerabilities, such as leakage of security data caused by improper human operations or virus infection, making the information security protection measures of the security system even more important.
為了防堵因為資安問題造成系統不正常,而且如果是保全系統受到資安威脅還會產生更大的危害,本發明揭露書提出一種電腦程序管理方法,方法主要運作在受到保全管制的終端裝置,終端裝置連接到一個保全裝置上,由保全裝置執行一主監視程式,終端裝置執行一個從監視程式,從監視程式依照一程序安全資料監視終端裝置內執行的多個電腦程序。 In order to prevent the system from being abnormal due to security issues, and if the security system is threatened by security threats, it will cause greater harm. The disclosure of the present invention proposes a computer program management method, which mainly operates on terminal devices subject to security control. The terminal device is connected to a security device, the security device executes a master monitoring program, the terminal device executes a slave monitoring program, and the monitoring program monitors multiple computer programs executed in the terminal device according to a program safety data.
在一實施例中,當判斷終端裝置內有一電腦程序的運作並不符合程序安全資料,即產生一異常訊息,於是將此異常訊息傳送 至保全裝置所執行的主監視程式,以執行一通報,如通報一管制中心。 In one embodiment, when it is determined that the operation of a computer program in the terminal device does not conform to the program safety data, an abnormal message is generated, and the abnormal message is transmitted to a main monitoring program executed by the security device to execute a notification. Such as reporting to a control centre.
根據一實施例,所述保全裝置可為一數位監視錄影機(DVR),於接收此異常訊息時可啟動一攝影機錄製現場影像。對於終端裝置,內部程式可以根據異常訊息阻斷判斷為異常的電腦程序。所述程序安全資料為記載對應終端裝置的一電腦程序安全清單,而此程序安全資料更可以為記載各電腦程序的一安全運作條件。 According to an embodiment, the security device may be a digital surveillance video recorder (DVR). When receiving the abnormal message, a camera may be activated to record live images. For terminal devices, internal programs can block computer programs determined to be abnormal based on abnormal messages. The program safety data is a computer program safety list for the corresponding terminal device, and the program safety data may be a safe operating condition for each computer program.
在一實施例中,方法運作於一電腦程序管理系統,系統主要為客戶端的保全裝置,連接管制中心,其中執行一主監視程式,以及一終端裝置,以一通訊連線連接保全裝置,其中執行一從監視程式。從監視程式經終端裝置之一處理器執行後,執行以上描述的電腦程序管理方法。 In one embodiment, the method operates in a computer program management system. The system is mainly a client-side security device connected to the control center, where a main monitoring program is executed, and a terminal device is connected to the security device by a communication connection. One from the monitoring program. After the monitoring program is executed by a processor of the terminal device, the computer program management method described above is executed.
為了能更進一步瞭解本發明為達成既定目的所採取之技術、方法及功效,請參閱以下有關本發明之詳細說明、圖式,相信本發明之目的、特徵與特點,當可由此得以深入且具體之瞭解,然而所附圖式僅提供參考與說明用,並非用來對本發明加以限制者。 In order to further understand the technology, methods and effects adopted by the present invention to achieve the intended purpose, please refer to the following detailed description and drawings of the present invention. It is believed that the purpose, features and characteristics of the present invention can be deepened and specific It is understood, however, the drawings are provided for reference and description only, and are not intended to limit the present invention.
10‧‧‧網路 10‧‧‧Internet
101,103‧‧‧保全裝置 101,103‧‧‧security device
102,104‧‧‧終端裝置 102,104‧‧‧Terminals
105‧‧‧終端管理平台 105‧‧‧Terminal Management Platform
12‧‧‧管制中心 12‧‧‧ Control Center
20‧‧‧網路 20‧‧‧Internet
22‧‧‧數位監視錄影機 22‧‧‧ Digital Surveillance Video Recorder
221‧‧‧主監視程式 221‧‧‧Master monitoring program
222‧‧‧控制單元 222‧‧‧Control unit
223‧‧‧網路單元 223‧‧‧Network Unit
224‧‧‧連接埠 224‧‧‧Port
225‧‧‧輸出入單元 225‧‧‧I / O Unit
226‧‧‧攝影機 226‧‧‧Camera
24‧‧‧終端裝置 24‧‧‧Terminal device
241‧‧‧從監視程式 241‧‧‧ From the monitoring program
步驟S301~S311‧‧‧電腦程序管理流程 Steps S301 ~ S311‧‧‧ Computer program management process
步驟S401~S413‧‧‧電腦程序管理流程 Steps S401 ~ S413‧‧‧ Computer program management process
圖1顯示本發明電腦程序管理系統的實施例架構圖;圖2顯示本發明電腦程序管理系統客戶端裝置的實施例圖;圖3顯示本發明電腦程序管理方法的流程實施例圖之一;圖4顯示本發明電腦程序管理方法的流程實施例圖之二。 FIG. 1 shows an embodiment architecture diagram of a computer program management system of the present invention; FIG. 2 shows an embodiment diagram of a client device of a computer program management system of the present invention; FIG. 3 shows one of the flowchart embodiment diagrams of a computer program management method of the present invention; FIG. 4 shows the second embodiment of the flowchart of the computer program management method of the present invention.
保全系統的設計通常設有一管制中心,主要是管理各客戶端的保全設備,能夠在接獲異常通報時,根據事件的安全程度執行不同的保全措施,包括指示客戶端裝置的運作,以及派員前往現 場處理。客戶端一般則包括各式保全裝置,如保全主機以及聯繫的各式感知器、數位監視錄影機(Digital Video Recorder,DVR)與攝影機,或是由保全裝置連接客戶端其他終端設備執行管制,如門禁設備、電腦設備、商店中的端點資訊服務器(Point of Sale/Service,POS)、Kiosk,甚至是銀行業者提供的櫃員機(ATM)等設備。而在本發明所提出的電腦程序管理系統中,更涵蓋執行於保全裝置的主監視程式,以及執行於終端裝置的從監視程式。 The design of the security system usually has a control center, which is mainly used to manage the security equipment of each client. When receiving an exception notification, it can implement different security measures according to the security level of the incident, including instructing the operation of the client device and sending personnel to On-site processing. The client generally includes various security devices, such as the security host and various sensors, digital video recorders (DVRs) and cameras, or the security device is connected to the client's other terminal devices to perform control, such as Access control equipment, computer equipment, point of sale / service (POS) in the store, Kiosk, and even ATMs provided by bankers. In the computer program management system provided by the present invention, the master monitoring program executed on the security device and the slave monitoring program executed on the terminal device are further covered.
圖1顯示本發明電腦程序管理系統的實施例架構圖。 FIG. 1 is a structural diagram of an embodiment of a computer program management system according to the present invention.
此圖顯示一管制中心12經網路10連接各端保全設備,或可以專線連線,連接如保全裝置101與受到保全裝置101管制的終端裝置102,以及另一端包括保全裝置103與受到管制的終端裝置104,而終端裝置104則可能屬於一個終端管理平台105,如常見於商店內的端點資訊服務器(POS)可能透過另一專屬連線受到其擁有者,或是有另一POS管理平台管理。 This figure shows that a control center 12 is connected to various end security devices via the network 10, or can be connected by a dedicated line to connect, for example, the security device 101 and the terminal device 102 controlled by the security device 101, and the other end includes the security device 103 and the controlled Terminal device 104, which may belong to a terminal management platform 105. For example, the endpoint information server (POS), which is commonly found in stores, may be owned by its owner through another dedicated connection, or may have another POS management platform management.
其中,保全裝置101,103為連接管制中心12與終端裝置102,104之間裝置,可如保全主機、前述的數位監視錄影機,與網路閘道器。而管制中心12則如一保全中心,可連接與管理多端的保全設備。 Among them, the security devices 101 and 103 are devices connected between the control center 12 and the terminal devices 102 and 104, and can be, for example, a security host, the aforementioned digital surveillance video recorder, and a network gateway. The control center 12 is a security center, which can connect and manage multiple security devices.
本發明提出的電腦程序管理方法係運作於管制中心12、保全裝置101,103與終端裝置102,104中,可接著參考圖2所示本發明電腦程序管理系統客戶端裝置的實施例圖。 The computer program management method provided by the present invention is operated in the control center 12, the security devices 101, 103, and the terminal devices 102, 104. Referring to FIG. 2, the embodiment of the client device of the computer program management system of the present invention is illustrated.
此圖例顯示一客戶端設備,實施例顯示包括有數位監視錄影機22與終端裝置24,數位監視錄影機22主要為利用攝影機226錄製所監視現場的影像,除了錄製儲存外,更可經網路20傳送到另一端管制中心。 This illustration shows a client device. The embodiment shows a digital surveillance video recorder 22 and a terminal device 24. The digital surveillance video recorder 22 mainly uses the camera 226 to record the image of the monitored site. In addition to recording and storing, it can also be transmitted over the network. 20 teleports to the control center on the other end.
根據實施例,數位監視錄影機22中的主要電路方塊有處理裝置內部訊號的控制單元222,以及電性連接此控制單元222的網路單元223、連接埠224,以及輸出入單元225。數位監視錄影機22 中的網路單元223為處理與外部網路20傳輸的數據封包,在數位監視錄影機22的實施例中,主要為傳輸影像訊號。數位監視錄影機22的連接埠224常採用序列式的通訊埠(communication port)連接所管制的終端裝置24,如RS-232等工業規格的通訊連接技術。這類通訊連接技術好處是並非使用數據網路的規格,不容易被侵入破壞,資料無法從外部被擷取,但實際實施也不限於這類通訊連接方式。數位監視錄影機22的輸出入單元225用以連接一或多個攝影機226,執行訊號控制傳輸與影像接收。 According to the embodiment, the main circuit blocks in the digital surveillance video recorder 22 include a control unit 222 for processing internal signals of the device, a network unit 223, a port 224, and an input / output unit 225 electrically connected to the control unit 222. The network unit 223 in the digital surveillance video recorder 22 processes data packets transmitted to and from the external network 20. In the embodiment of the digital surveillance video recorder 22, it mainly transmits image signals. The connection port 224 of the digital surveillance video recorder 22 often adopts a serial communication port to connect the controlled terminal device 24, such as industrial-standard communication connection technology such as RS-232. The advantage of this type of communication connection technology is that it does not use the specifications of the data network, is not easily invaded and destroyed, and data cannot be retrieved from the outside, but the actual implementation is not limited to this type of communication connection. The I / O unit 225 of the digital surveillance video camera 22 is used to connect one or more cameras 226 to perform signal control transmission and image reception.
根據本發明電腦程序管理方法的實施例,數位監視錄影機22內記憶體載有一主監視程式221,經處理器執行主監視程式221後,與終端裝置24所執行的從監視程式241以一安全訊息通道通訊。運作時,主監視程式221可以定時由從監視程式241取得監視結果,或由從監視程式241主動將監視結果經安全訊息通道傳送到主監視程式221。 According to the embodiment of the computer program management method of the present invention, the memory in the digital surveillance video recorder 22 carries a master monitoring program 221, and after the processor executes the main monitoring program 221, the slave monitoring program 241 executed by the terminal device 24 is secure. Message channel communication. During operation, the master monitoring program 221 can obtain the monitoring results from the slave monitoring program 241 at regular intervals, or the slave monitoring program 241 can actively send the monitoring results to the master monitoring program 221 through the secure message channel.
在本發明的實施例中,終端裝置24以通訊連線連接保全裝置,如此例的數位監視錄影機22,從監視程式241經終端裝置24之一處理器執行後,即執行如圖3所示之電腦程序管理方法的實施例流程。 In the embodiment of the present invention, the terminal device 24 is connected to the security device by a communication connection. The digital surveillance video recorder 22 of this example is executed by the monitoring program 241 through a processor of the terminal device 24, as shown in FIG. 3 The embodiment procedure of the computer program management method.
步驟S301顯示執行電腦程序管理的一般運作前,系統定義一程序安全資料,此如一電腦程序安全清單(或稱白名單),定義出終端裝置正常運作時的電腦程序,如常駐接收感知器的程序、定時回報保全裝置的程序、定時系統修復的程序、裝置內休眠與啟動程序等。還可進一步定義出各電腦程序的安全運作條件,在此所述的安全運作條件可以依照各電腦程序的屬性定義出一個安全運作的範圍,可以避免電腦程序被病毒感染產生的運作異常狀況,例如有電腦程序一般僅佔用處理器運算能力的10%,突然上升到60%;或是有異常佔用數據頻寬的電腦程序等,在此安全運作的條件判斷下,可以判為異常狀況。程序安全資料可由管制中 心統一管理,根據各客戶端的終端裝置的形式與需求制定各自的程序安全資料,並派發程序安全資料至各保全裝置,並可轉送至各終端裝置,並非一定是統一設定。 Step S301 shows that before executing the general operation of the computer program management, the system defines a program safety data, such as a computer program safety list (or white list), which defines the computer program during the normal operation of the terminal device, such as the program of the resident receiver. , The program of the regular report security device, the program of the regular system repair, the hibernation and startup program in the device, etc. The safe operating conditions of each computer program can be further defined. The safe operating conditions described herein can define a safe operating range according to the properties of each computer program, which can prevent the computer program from being infected by a virus and causing abnormal operating conditions, such as Computer programs generally occupy only 10% of the processor's computing power and suddenly rise to 60%; or computer programs that abnormally occupy the data bandwidth can be judged as abnormal under the conditions of safe operation. The program safety data can be uniformly managed by the control center. According to the form and requirements of the terminal devices of each client, the program safety data can be formulated, and the program safety data can be distributed to each security device and can be transferred to each terminal device.
步驟S303描述由保全裝置執行主監視程式,由終端裝置執行從監視程式,接著,如步驟S305,由從監視程式執行程序監視,依照前述對應終端裝置的程序安全資料,從監視程式監視終端裝置內執行的多個電腦程序,如步驟S307,以判斷是否有異常的電腦程序。當對照程序安全資料後,包括比對其中電腦程序安全清單,或是各電腦程序的一安全運作條件,沒有異常時(否),重複步驟S305。 Step S303 describes the execution of the master monitoring program by the security device and the execution of the slave monitoring program by the terminal device. Then, in step S305, the execution of the monitoring program by the slave monitoring program monitors the inside of the terminal device from the monitoring program according to the program safety data corresponding to the terminal device. Multiple computer programs are executed, such as step S307, to determine whether there are abnormal computer programs. After comparing the program safety data, including comparing the computer program safety list or a safe operating condition of each computer program, if there is no abnormality (No), repeat step S305.
當發現終端裝置內執行的電腦程序中有未列電腦程序安全清單的電腦程序,或是判斷有電腦程序雖列於電腦程序安全清單,但是卻不符程序安全資料記載的安全運作條件,則判斷為異常(是),即執行步驟S309,由從監視程式產生異常訊息,包括驅使終端裝置內控制程式阻斷被判斷為異常的電腦程序,或可以終端裝置內控制程式暫停對應此程序的服務。進一步如步驟S311,實施例可包括由保全裝置的主監視程式接收到異常訊息時,產生通報管制中心的訊息。 When it is found that the computer program executed in the terminal device has a computer program that is not listed in the computer program safety list, or it is determined that the computer program is on the computer program safety list but does not meet the safe operating conditions recorded in the program safety data, it is judged as Abnormal (Yes), that is, step S309 is executed to generate an abnormal message from the monitoring program, including driving the control program in the terminal device to block the computer program judged to be abnormal, or the control program in the terminal device to suspend the service corresponding to this program. Further to step S311, the embodiment may include generating a message to the control center when the abnormal monitoring message is received by the main monitoring program of the security device.
圖4描述以數位監視錄影機作為保全裝置的電腦程序管理方法的實施例流程。 FIG. 4 illustrates a flowchart of an embodiment of a computer program management method using a digital surveillance video recorder as a security device.
在此流程中,當終端裝置執行從監視程式後,如步驟S401,以常駐的方式執行程序監視,如步驟S403,監視的方式主要是執行比對程序安全資料,如步驟S405,判斷是否有未列於程序安全資料中電腦程序安全清單內的不明電腦程序,或是有在清單內的電腦程序卻不符設定的安全運作條件。 In this process, after the terminal device executes the slave monitoring program, such as step S401, the program monitoring is performed in a resident manner, such as step S403. The monitoring method is mainly to perform comparison of the program safety data, such as step S405, to determine whether there is any Unknown computer programs listed in the computer program safety list in the program safety data, or there are computer programs in the list that do not meet the set safe operating conditions.
當判斷沒有不符程序安全資料的異常程序(否),重複步驟S401,反之,判斷有異常程序(是),即執行步驟S407,產生異常訊息,運行於數位監視錄影機的主監視程式從終端裝置內從監 視程式取得異常訊息,如步驟S409,啟動數位監視錄影機的錄影程序,啟動一攝影機錄製影像。 When it is judged that there is no abnormal program that does not match the program safety data (No), repeat step S401, otherwise, judge that there is an abnormal program (Yes), that is, execute step S407 to generate an abnormal message, and run the main monitoring program of the digital surveillance video recorder from the terminal device Obtain an abnormal message from the monitoring program in step S409, start the recording program of the digital surveillance video recorder, and start a camera to record the image.
之後,可如步驟S411所述將影像錄製存檔,或是如步驟S413,根據此異常訊息通報管制中心。在另一實施例中,若終端裝置本身也連接所屬的終端管理平台,相關異常訊息也可通報終端管理平台。 After that, the image recording may be archived as described in step S411, or may be notified to the control center according to the abnormal message according to step S413. In another embodiment, if the terminal device itself is also connected to the terminal management platform to which it belongs, the related abnormal information may also be notified to the terminal management platform.
根據揭露書所揭露的電腦程序管理方法與系統,方法主要運作在受到保全管制的終端裝置,系統包括在客戶端設置的終端裝置與所連接的保全裝置,由保全裝置執行一主監視程式,終端裝置執行一個從監視程式,從監視程式依照一程序安全資料監視終端裝置內執行的多個電腦程序。需要一提的是,程序安全資料可為對各種不同終端裝置設有各自的電腦程序安全清單,或加上各程序的安全運作條件。 According to the computer program management method and system disclosed in the disclosure, the method mainly operates on terminal devices subject to security control. The system includes a terminal device set on the client and the connected security device. The security device executes a main monitoring program. The terminal The device executes a slave monitoring program, and the slave monitoring program monitors a plurality of computer programs executed in the terminal device according to a procedure safety data. It needs to be mentioned that the program safety data can be set up with different computer program safety lists for various terminal devices, or added with the safe operating conditions of each program.
惟以上所述僅為本發明之較佳可行實施例,非因此即侷限本發明之專利範圍,故舉几運用本發明說明書及圖示內容所為之等效結構變化,均同理包含於本發明之範圍內,合予陳明。 However, the above is only the preferred and feasible embodiment of the present invention, and therefore does not limit the scope of the patent of the present invention. Therefore, the equivalent structural changes made by using the description and the illustrated content of the present invention are included in the present invention in the same way. Within the scope, joint Chen Ming.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106101380A TWI662436B (en) | 2017-01-16 | 2017-01-16 | Method and system for managing computer sequences |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106101380A TWI662436B (en) | 2017-01-16 | 2017-01-16 | Method and system for managing computer sequences |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201828146A TW201828146A (en) | 2018-08-01 |
TWI662436B true TWI662436B (en) | 2019-06-11 |
Family
ID=63960562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW106101380A TWI662436B (en) | 2017-01-16 | 2017-01-16 | Method and system for managing computer sequences |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI662436B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI728637B (en) * | 2020-01-02 | 2021-05-21 | 中華電信股份有限公司 | Information security protection method and computer-readable medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200535606A (en) * | 2004-04-30 | 2005-11-01 | Inventec Corp | System to monitor the usage state of computer equipment |
CN103890770A (en) * | 2011-10-17 | 2014-06-25 | 迈可菲公司 | System and method for whitelisting applications in a mobile network environment |
TW201524156A (en) * | 2015-02-05 | 2015-06-16 | Koutoku Patent & Trademark Office Ltd | Real-time network monitoring system |
TW201541418A (en) * | 2014-04-18 | 2015-11-01 | Taiwan Secom Co Ltd | Security supervisory system |
US20160309122A1 (en) * | 2015-04-16 | 2016-10-20 | Offender Smartphone Monitoring, LLC | Monitoring process |
-
2017
- 2017-01-16 TW TW106101380A patent/TWI662436B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200535606A (en) * | 2004-04-30 | 2005-11-01 | Inventec Corp | System to monitor the usage state of computer equipment |
CN103890770A (en) * | 2011-10-17 | 2014-06-25 | 迈可菲公司 | System and method for whitelisting applications in a mobile network environment |
TW201541418A (en) * | 2014-04-18 | 2015-11-01 | Taiwan Secom Co Ltd | Security supervisory system |
TW201524156A (en) * | 2015-02-05 | 2015-06-16 | Koutoku Patent & Trademark Office Ltd | Real-time network monitoring system |
US20160309122A1 (en) * | 2015-04-16 | 2016-10-20 | Offender Smartphone Monitoring, LLC | Monitoring process |
Also Published As
Publication number | Publication date |
---|---|
TW201828146A (en) | 2018-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI677213B (en) | Monitor apparatus, method, and computer program product thereof | |
WO2018198733A1 (en) | Security monitoring system and security monitoring method | |
KR20160008267A (en) | User's behavior analysis system on the network based video surveillance system | |
KR101794005B1 (en) | Error detection system for network camera | |
JPWO2018134939A1 (en) | Attack detection device, attack detection method and attack detection program | |
CN105765942A (en) | System and method for interrupting information security threat via border gateway | |
KR101769442B1 (en) | Method, system and computer-readable recording medium for security operation using internet of thing gateway | |
TWI662436B (en) | Method and system for managing computer sequences | |
TW201738795A (en) | Intrusion detection device, intrusion detection method, and intrusion detection program | |
KR101871406B1 (en) | Method for securiting control system using whitelist and system for the same | |
CN114584366A (en) | Power monitoring network safety detection system and method | |
CN114584363A (en) | Network attack detection method, device, equipment and computer readable storage medium | |
JP5752316B2 (en) | Connection failure determination device and connection failure determination method for video input device | |
WO2015154439A1 (en) | Alarm management method, apparatus and packet transport device | |
TWI619031B (en) | Metadata server, network device and automatic resource management method | |
CN106416178A (en) | Transport accelerator implementing extended transmission control functionality | |
WO2023107700A1 (en) | On-premises communication bridges for premises security systems | |
CN106254163B (en) | Monitor the method and device of the USB port of computer in local area network | |
KR101606090B1 (en) | Apparatus and method for protecting network | |
TWI711939B (en) | Systems and methods for malicious code detection | |
KR102242111B1 (en) | System and method for fire surveillance using blockchain and computer program for the same | |
KR101859598B1 (en) | System for remote management of security equipment | |
TW201729589A (en) | Monitoring system for conditional backup image and image-monitoring device thereof | |
CN111988333B (en) | Proxy software work abnormality detection method, device and medium | |
CN111786826A (en) | Industrial control equipment operation and maintenance auditing system, industrial control equipment operation and maintenance method and computer equipment |