CN102664758A - Method for binding and automatically recovering network configuration - Google Patents

Method for binding and automatically recovering network configuration Download PDF

Info

Publication number
CN102664758A
CN102664758A CN2012101283032A CN201210128303A CN102664758A CN 102664758 A CN102664758 A CN 102664758A CN 2012101283032 A CN2012101283032 A CN 2012101283032A CN 201210128303 A CN201210128303 A CN 201210128303A CN 102664758 A CN102664758 A CN 102664758A
Authority
CN
China
Prior art keywords
terminal computer
network configuration
configuration information
service end
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101283032A
Other languages
Chinese (zh)
Other versions
CN102664758B (en
Inventor
李凯
金魁
吴艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
360 Digital Security Technology Group Co Ltd
Original Assignee
SHENYANG GENERALSOFT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENYANG GENERALSOFT CO Ltd filed Critical SHENYANG GENERALSOFT CO Ltd
Priority to CN201210128303.2A priority Critical patent/CN102664758B/en
Publication of CN102664758A publication Critical patent/CN102664758A/en
Application granted granted Critical
Publication of CN102664758B publication Critical patent/CN102664758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for binding and automatically recovering network configuration. The method comprises the following steps that: a server acquires the network configuration information of a terminal computer; the server generates a legal network configuration information list, and binds the network configuration information of the terminal computer; and the terminal computer monitors changes in the network configuration information of the terminal computer in real time. According to the method, the server remotely and uniformly plans the network configuration information of the terminal computer, the terminal computer monitors the network configuration information in real time, and the network configuration information of the terminal computer is remotely updated according to specific needs or the illegally changed network configuration information of the terminal computer is recovered, so that the problems of high workload, low efficiency, high system resource occupation rate and centralized and unified planning and automatic maintenance incapability of system network configuration binding and automatic recovery in a large-scale local area network are solved, working efficiency is greatly improved, and operation and maintenance cost is reduced; and the method is wide in application range.

Description

A kind of network configuration is bound and the method for recovering automatically
Technical field
The invention belongs to the COMPUTER NETWORK SECURITY MANAGEMENT technical field, particularly relate to a kind of to large scale network, more long-range to multiple spot network configuration binding efficiently and the method for recovering automatically.
Background technology
In network management, the network configuration of terminal computer is the important component part in the daily management, also is a loaded down with trivial details thing.Network configuration information generally includes computer name, IP address, subnet mask, gateway, DNS (domain name system), WINS (Windows Internet Naming Server); And be the basic work of guaranteeing the normal operation of computer network to the centralized and unified management of IP address and network of relation configuration; For large scale network; Terminal use's computer level is uneven; The network configuration information of terminal computer is often by hack, and these behavior meetings of revising terminal configuration privately cause IP conflict, suspension, falsely use IP imposes serious consequences such as illegal operation.When change takes place in the network configuration information of terminal computer (as revising IP address, refitting operating system); Service end can be defined as a new terminal computer with it; Thereby cause the failure of original information mistake and strategy or task execution, if things go on like this can form the network configuration information of much invalid terminal computer.In addition; Disperse because network size is huge and terminal computer distributes; Regular maintenance hand-kept, craft are reset, the manual network configuration information that recovers has become to take the work that network management center's time is maximum, labor intensive is maximum; Greatly reduce operating efficiency, increased operation maintenance cost.In sum, there is certain limitation in the recovery of network configuration information, and particularly after terminal computer was reinstalled operating system, its network configuration information can be lost, and can't recover; To the monitoring of the network configuration information of terminal computer change, in the prior art, generally adopt the periodic monitor mode, when timing cycle more in short-term, system resource takies higher, and timing cycle after the user revises network configuration privately, can't recover again when longer immediately.Therefore, need a kind of safe and reliable network configuration to bind and solve the problems referred to above with the mode of recovering automatically.
Summary of the invention
Main purpose of the present invention is to provide a kind of network configuration to bind and the method for recovering automatically; This method has fundamentally been stopped the terminal computer user and has been revised network configuration privately, and service end can be through the network configuration information of network remote renewal or batch modification terminal computer.
In order to achieve the above object, the technical scheme that the present invention adopted is following:
A kind of network configuration is bound and the method for recovering automatically, comprises following steps:
A. service end is obtained the network configuration information of terminal computer:
Service end is obtained the network configuration information and the hardware information of all terminal computers in the network, with the unique identifying information of hardware information as this terminal computer;
Said network configuration information comprises computer name, IP address, subnet mask, gateway, DNS, WINS;
Said hardware information comprises mainboard ID, MAC Address;
B. service end generates the tabulation of legitimate network configuration information:
The network configuration information of all terminal computers that service end will be obtained is long-range to carry out unified planning; And on service end the network configuration information and the hardware information of all terminal computers of storage, generate the legitimate network configuration information according to the network configuration information stored and hardware information and tabulate;
C. bind the network configuration information of terminal computer:
Service end setting on service end needs the network configuration information of the terminal computer of binding to change;
Service end needs the terminal computer of binding according to the hardware information notice of the said terminal computer that need bind;
The said terminal computer that needs to bind utilizes the API hook technology, sets the network configuration information of its terminal computer and can not change;
D. terminal computer is monitored the change of the network configuration information of its terminal computer in real time:
The terminal computer of having bound utilizes the API hook technology, monitors the change of the network configuration information of its terminal computer in real time.
In said steps d, the terminal computer of having bound utilizes the API hook technology, monitors the change of the network configuration information of its terminal computer in real time, further may further comprise the steps:
If the terminal computer of d1. having bound monitors the request of the network configuration information of revising its terminal computer, continue execution in step d2; If the terminal computer of having bound does not monitor the request of the network configuration information of revising its terminal computer, then execution in step d4;
D2. the terminal computer of having bound judges whether said modification request is legitimate request, if the modification request that service end is sent then is a legitimate request; Continue execution in step d3; If not the modification request that service end is sent, then be illegal request, execution in step d4;
D3. according to said legitimate request; Service end is updated in the network configuration information of the terminal computer of this legitimate request requirement modification in the legitimate network configuration information tabulation on the service end; And this terminal computer of remote access, revise the network configuration information of this terminal computer, execution in step d1;
D4. terminal computer judges whether its terminal computer is to start back operation for the first time:
If the terminal computer of having bound is to start back operation for the first time, this terminal computer sends the hardware information of its terminal computer to service end;
Service end is obtained the network configuration information of this terminal computer from the legitimate network configured list according to the hardware information of this terminal computer that receives;
This terminal computer is obtained in the service end transmission from the legitimate network configured list network configuration information is to this terminal computer;
The network configuration information of this terminal computer that this terminal computer will receive from service end and the network configuration information of its terminal computer are compared; If the two is inconsistent; Then unusual change takes place in the network configuration information of this terminal computer, continues execution in step d5; If the two unanimity, then unusual change, execution in step d1 do not take place in the network configuration information of this terminal computer;
If the terminal computer of having bound is not to start back operation for the first time, execution in step d1;
The terminal computer of the unusual change of d5. said generation sends to service end with the hardware information of its terminal computer;
D6. service end is obtained the network configuration information of the terminal computer of the unusual change of this generation according to the hardware information of the terminal computer of the unusual change of the generation that receives the legitimate network configuration information tabulation on service end;
D7. the terminal computer of the unusual change of the said generation of service end remote access is used the network configuration information of this terminal computer of network configuration information recovery of the terminal computer of the unusual change of this generations of from the tabulation of legitimate network configuration information, obtaining;
D8. bind the network configuration information of the terminal computer that unusual change takes place:
Service end is set the network configuration information of the terminal computer that unusual change takes place and can not be changed on service end;
Service end is notified the terminal computer of the unusual change of this generation according to the hardware information of the terminal computer of the unusual change of said generation;
The terminal computer of the unusual change of said generation utilizes the API hook technology, sets the network configuration information of its terminal computer and can not change execution in step d1.
The invention has the beneficial effects as follows:
Network configuration of the present invention is bound and the method for recovering automatically; Through the long-range network configuration information that carries out the unified planning terminal computer; Bind the network configuration information of terminal computer; Terminal computer is monitored the mode of change of the network configuration information of its terminal computer in real time; According to network configuration information that specifically needs the remote update terminal computer or the illegal network configuration information that the terminal computer of change takes place of recovery; Solved the configuration of grid in the extensive local area network (LAN) bind with the amount of resuming work is big automatically, efficient is low, system resource takies height, can not centralized and unified planning and the problem safeguarded automatically, greatly improved operating efficiency, reduced operation maintenance cost.
Description of drawings
Fig. 1 is the flow chart of network configuration binding of the present invention and the automatic method of recovering;
Fig. 2 is the flow chart of the steps d of network configuration binding of the present invention and the automatic method of recovering;
Fig. 3 is the structural representation of the applied environment of embodiments of the invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment, network configuration of the present invention bound to do with the method for recovering automatically describe in further detail.
Centralized and unified management to IP address and network of relation configuration is the basic work of guaranteeing the normal operation of computer network.
Network configuration of the present invention is bound with the method for recovering automatically and is not received the quantity of terminal computer in the network and the restriction of network condition; Can bind the network configuration information of terminal computer; Service end can the remotely modifying terminal computer network configuration information such as IP address, subnet mask, gateway, DNS etc.; Support Single NIC, two network interface card, isolate multiple situation such as card and the two IP of Single NIC, therefore, can satisfy the application demand of daily network configuration; Break away from sesquipedalian network configuration troublesome operation, improved operating efficiency.In addition, also can carry out network configuration operations in batches, attributes such as the gateway of many station terminals computer, DNS, WINS are unified configuration, and all are provided with and do not need terminal computer to restart and come into force immediately.
Embodiment
For example, 500 station terminal computers, terminal computer PC1 are arranged in the local area network (LAN); PC2 ..., PC500; A service end computer (SERVER); This 500 station terminal computer is carried out the terminal computer that network configuration is bound and generation is changed unusually to network configuration information recover its former network configuration information automatically, network configuration of the present invention is bound the method with automatic recovery, specifically comprises the steps:
A. the service end computer obtains the network configuration information of terminal computer:
The service end computer obtains the network configuration information and the hardware information of all 500 station terminal computers in the local area network (LAN), with the unique identifying information of hardware information as terminal computer;
Said network configuration information comprises computer name, IP address, subnet mask, gateway, DNS, WINS;
Said hardware information comprises mainboard ID, MAC Address;
Wherein the computer name of terminal computer PC2 is that Name2, IP address are that 192.168.0.123, subnet mask are that 255.255.255.0, gateway are that 192.168.0.1, DNS are that 202.96.75.68, WINS are that 64-0503-032608-MCP61, MAC Address are 00-1F-C6-D1-31-90 for empty, mainboard ID;
B. the service end computer generates the tabulation of legitimate network configuration information:
The service end computer carries out unified planning with the network configuration information of all 500 station terminal computers in the local area network (LAN) that obtains is long-range; With the gateway unified planning of terminal computer PC1 to PC100 is 192.168.0.1; With the gateway unified planning of terminal computer PC101 to PC200 is 192.168.0.6; With the gateway unified planning of terminal computer PC201 to PC500 is 192.168.0.8; And on the service end computer network configuration information and the hardware information of all 500 station terminal computers of storage, generate the legitimate network configuration information according to the network configuration information stored and hardware information and tabulate;
Wherein: the network configuration information of the terminal computer PC2 in the legitimate network configuration information tabulation be computer name: Name2, IP address: 192.168.0.123, subnet mask: 255.255.255.0, gateway: 192.168.0.1, DNS be 202.96.75.68, WINS for empty, hardware information is mainboard ID:64-0503-032608-MCP61, MAC Address: 00-1F-C6-D1-31-90;
C. bind the network configuration information of terminal computer:
The service end computer is set the network configuration information of all 500 station terminal computers and can not be changed on the service end computer;
The service end computer is notified this 500 station terminal computer according to the said hardware information of 500 station terminal computers of binding that needs;
Said 500 terminal computers that need to bind utilize the API hook technology respectively, set the network configuration information of its terminal computer and can not change;
D. terminal computer is monitored the change of the network configuration information of this terminal computer in real time:
The terminal computer of having bound utilizes the API hook technology, monitors the change of the network configuration information of this terminal computer in real time, and concrete job step is following:
D1. in the present embodiment; The service end computer requests is revised as the gateway 192.168.0.6 of terminal computer PC101 to PC200 the request of 192.168.0.7; Therefore, terminal computer PC101 to PC200 can monitor the modification request of service end computer, continues execution in step d2; And terminal computer PC1 to PC100 and PC201 to PC500 can not monitor the modification request of service end computer, execution in step d4;
D2. because being the modification request of sending of service end computer is revised as 192.168.0.7 with the gateway 192.168.0.6 of PC101 to PC200, be legitimate request therefore, continue execution in step d3; (if not the modification request that service end is sent, being the modification request that terminal computer sends, then is illegal request, execution in step d4; )
D3. according to said legitimate request; The gateway that the service end computer upgrades PC101 to PC200 in the tabulation of legitimate network configuration information is 192.168.0.7; The service end computer passes through remote terminal access computer PC 101 to PC200; The unified 192.168.0.7, execution in step d1 of being updated to of gateway 192.168.0.6 with terminal computer PC101 to PC200;
D4. terminal computer judges whether its terminal computer is to start back operation for the first time:
In the present embodiment, terminal computer PC2 has reinstalled operating system, and change has taken place its network configuration information, is specially; Computer name is that PC2, IP address are that 192.168.0.120, subnet mask are that 255.255.255.0, gateway are that 192.168.0.1, DNS are that 202.96.75.68, WINS are sky, and its hardware information is: mainboard ID is that 64-0503-032608-MCP61, MAC Address are 00-1F-C6-D1-31-90;
Terminal computer PC2 starts back operation for the first time, and this terminal computer PC2 sends the hardware information (mainboard ID is that 64-0503-032608-MCP61, MAC Address are 00-1F-C6-D1-31-90) of its terminal computer to the service end computer;
The service end computer obtains the network configuration information (computer name is that Name2, IP address are that 192.168.0.123, subnet mask are that 255.255.255.0, gateway are that 192.168.0.1, DNS are that 202.96.75.68, WINS are for empty) of this terminal computer from the legitimate network configured list according to the hardware information of this terminal computer PC2 that receives;
The service end computer sends the network configuration information of this terminal computer that from the legitimate network configured list, obtains to this terminal computer PC2;
The network configuration information of this terminal computer PC2 that this terminal computer PC2 will receive from the service end computer and the network configuration information of this terminal computer are compared; In the present embodiment; The operating system because terminal computer PC2 has reset; Computer name in its network configuration information is that PC2, IP address are 192.168.0.120, and the computer name of the terminal computer PC2 in tabulating with the legitimate network configuration information is that Name2, IP address are 192.168.0.123, and the two is inconsistent; Unusual change takes place in the network configuration information of this terminal computer PC2, continues execution in step d5; If (the two unanimity, then unusual change, execution in step d1 do not take place in the network configuration information of terminal computer; )
If (terminal computer of having bound is not to start back operation for the first time, execution in step d1; Reason is: if the terminal computer of having bound is not to start back operation for the first time; Because bound the network configuration information of terminal computer; The network configuration information of terminal computer can not be changed; Therefore do not need to judge again whether its network configuration information unusual change takes place,, reduce system resource and take to improve the operating efficiency of system; If start back operation for the first time, whether possibly reset operating system etc. of terminal computer changes the operation of its network configuration informations, therefore need rejudge its network configuration information and change);
D5. said terminal computer PC2 is with hardware information (mainboard ID:64-0503-032608-MCP61, the MAC Address: 00-1F-C6-D1-31-90) send to the service end computer of its terminal computer PC2;
D6. (mainboard: ID64-0503-032608-MCP61, MAC Address: 00-1F-C6-D1-31-90) from the tabulation of legitimate network configuration information, obtain the former network configuration information of terminal computer PC2, promptly computer name is that Name2, IP address are that 192.168.0.123, subnet mask are that 255.255.255.0, gateway are that 192.168.0.1, DNS are that 202.96.75.68, WINS are for empty to the service end computer according to the hardware information of the terminal computer PC2 that receives;
D7. service end computer remote access terminal computer PC 2; Use the network configuration information of former network configuration information (computer name is that Name2, IP address are that 192.168.0.123, subnet mask are that 255.255.255.0, gateway are that 192.168.0.1, DNS are that 202.96.75.68, WINS are for empty) the recovering terminal computer PC 2 of the terminal computer PC2 that from the tabulation of legitimate network configuration information, obtains, the network configuration information that is about to the terminal computer PC2 on terminal computer PC2 reverts to: computer name is that Name2, IP address are that 192.168.0.123, subnet mask are that 255.255.255.0, gateway are that 192.168.0.1, DNS are that 202.96.75.68, WINS are for empty;
D8. bind the network configuration information of terminal computer PC2:
The network configuration information of service end computer setting terminal computer PC 2 on the service end computer can not be changed;
The service end computer is according to hardware information (mainboard ID is that 64-0503-032608-MCP61, MAC Address are 00-1F-C6-D1-31-90) the notice terminal computer PC2 of terminal computer PC2;
Terminal computer PC2 utilizes the API hook technology, sets the network configuration information of its terminal computer PC2 and can not change execution in step d1.
System resource involved in the present invention takies situation and mainly comprises the required system resource of real time monitoring network configuration and recover the system resource that correct network configuration consumed, and contrasts as follows with existing periodic monitor method:
Be configured to example with 5 minutes timing monitoring networks; When an illegal modifications takes place in the terminal computer user; The method of periodic monitor of the prior art takies 100 milliseconds approximately; Recovering the system resource time that correct network configuration consumes is about 3000 milliseconds, and therefore, the system resources consumption of every day is 100+3000=31800 milliseconds of 24 *, 60/5 *.Method of the present invention is not owing to relate to periodic monitor; The needed system resource of periodic monitor is 0 millisecond; Because the illegal modifications operation can not changed success; The time of therefore recovering the needed system resource of correct network configuration is less than 1 millisecond,, the system resources consumption of method of the present invention every day is less than 1 millisecond.
Method of the present invention is operated through long-range; The network configuration information of centralized and unified management terminal computer is to guarantee the normal operation and the maintenance of network; Centralized monitor, more long-range configuration to multiple spot realize the planning and the configuration of IP address, computer name, gateway intuitively.Strict IP address binding even the terminal use reinstalls operating system, also can revert to the IP address before binding, and makes the existing network configuration specificationization; Bind computer name, and the computer name that unusual change takes place is recovered, prevent that user's private from changing the terminal computer name, avoided the chaotic and inconvenient problem of bringing because of renaming privately of management of the network information.

Claims (2)

1. a network configuration is bound and the method for recovering automatically, comprises following steps:
A. service end is obtained the network configuration information of terminal computer:
Service end is obtained the network configuration information and the hardware information of all terminal computers in the network, with the unique identifying information of hardware information as this terminal computer;
Said network configuration information comprises computer name, IP address, subnet mask, gateway, DNS, WINS;
Said hardware information comprises mainboard ID, MAC Address;
B. service end generates the tabulation of legitimate network configuration information:
The network configuration information of all terminal computers that service end will be obtained is long-range to carry out unified planning; And on service end the network configuration information and the hardware information of all terminal computers of storage, generate the legitimate network configuration information according to the network configuration information stored and hardware information and tabulate;
C. bind the network configuration information of terminal computer:
Service end setting on service end needs the network configuration information of the terminal computer of binding to change;
Service end needs the terminal computer of binding according to the hardware information notice of the said terminal computer that need bind;
The said terminal computer that needs to bind utilizes the API hook technology, sets the network configuration information of its terminal computer and can not change;
D. terminal computer is monitored the change of the network configuration information of its terminal computer in real time:
The terminal computer of having bound utilizes the API hook technology, monitors the change of the network configuration information of its terminal computer in real time.
2. network configuration as claimed in claim 1 is bound and the method for recovering automatically, and the terminal computer of having bound utilizes the API hook technology, monitors the change of the network configuration information of its terminal computer in real time, may further comprise the steps:
If the terminal computer of d1. having bound monitors the request of the network configuration information of revising its terminal computer, continue execution in step d2; If the terminal computer of having bound does not monitor the request of the network configuration information of revising its terminal computer, then execution in step d4;
D2. the terminal computer of having bound judges whether said modification request is legitimate request, if the modification request that service end is sent then is a legitimate request; Continue execution in step d3; If not the modification request that service end is sent, then be illegal request, execution in step d4;
D3. according to said legitimate request; Service end is updated in the network configuration information of the terminal computer of this legitimate request requirement modification in the legitimate network configuration information tabulation on the service end; And this terminal computer of remote access, revise the network configuration information of this terminal computer, execution in step d1;
D4. terminal computer judges whether its terminal computer is to start back operation for the first time:
If the terminal computer of having bound is to start back operation for the first time, this terminal computer sends the hardware information of its terminal computer to service end;
Service end is obtained the network configuration information of this terminal computer from the legitimate network configured list according to the hardware information of this terminal computer that receives;
Service end is sent the network configuration information of this terminal computer that from the legitimate network configured list, obtains to this terminal computer;
The network configuration information of this terminal computer that this terminal computer will receive from service end and the network configuration information of its terminal computer are compared; If the two is inconsistent; Then unusual change takes place in the network configuration information of this terminal computer, continues execution in step d5; If the two unanimity, then unusual change, execution in step d1 do not take place in the network configuration information of this terminal computer;
If the terminal computer of having bound is not to start back operation for the first time, execution in step d1;
The terminal computer of the unusual change of d5. said generation sends to service end with the hardware information of its terminal computer;
D6. service end is obtained the network configuration information of the terminal computer of the unusual change of this generation according to the hardware information of the terminal computer of the unusual change of the generation that receives the legitimate network configuration information tabulation on service end;
D7. the terminal computer of the unusual change of the said generation of service end remote access is used the network configuration information of this terminal computer of network configuration information recovery of the terminal computer of the unusual change of this generations of from the tabulation of legitimate network configuration information, obtaining;
D8. bind the network configuration information of the terminal computer that unusual change takes place:
Service end is set the network configuration information of the terminal computer that unusual change takes place and can not be changed on service end;
Service end is notified the terminal computer of the unusual change of this generation according to the hardware information of the terminal computer of the unusual change of said generation;
The terminal computer of the unusual change of said generation utilizes the API hook technology, sets the network configuration information of its terminal computer and can not change execution in step d1.
CN201210128303.2A 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration Active CN102664758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210128303.2A CN102664758B (en) 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210128303.2A CN102664758B (en) 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration

Publications (2)

Publication Number Publication Date
CN102664758A true CN102664758A (en) 2012-09-12
CN102664758B CN102664758B (en) 2015-03-25

Family

ID=46774177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210128303.2A Active CN102664758B (en) 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration

Country Status (1)

Country Link
CN (1) CN102664758B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095489A (en) * 2012-12-14 2013-05-08 上海斐讯数据通信技术有限公司 Management method for network device
CN104683163A (en) * 2013-11-27 2015-06-03 东莞市微云系统科技有限公司 Cloud terminal network connectivity checking method, cloud terminal network connectivity checking system, and cloud terminal equipment
CN107070967A (en) * 2016-12-23 2017-08-18 沈阳通用软件有限公司 A kind of general terminal system reinforcement means
CN107273247A (en) * 2017-07-13 2017-10-20 郑州云海信息技术有限公司 A kind of method and device for recovering hardware device
CN108156262A (en) * 2018-02-13 2018-06-12 中国联合网络通信集团有限公司 A kind of method and device for the validity for checking DNS configuration files
CN108880853A (en) * 2017-11-27 2018-11-23 北京视联动力国际信息技术有限公司 A kind of configuration information recovery method and configuration information server regarding networked server
CN111130843A (en) * 2019-11-22 2020-05-08 中国联合网络通信集团有限公司 Configuration recovery method and device for server
CN111556503A (en) * 2020-03-30 2020-08-18 沈阳通用软件有限公司 Personal WIFI hotspot management method based on Windows operating system
CN112653583A (en) * 2020-12-22 2021-04-13 沈阳通用软件有限公司 IP address management method based on Windows operating system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630233A (en) * 2003-12-18 2005-06-22 联想(北京)有限公司 Automatic network setting method and system for computer
CN101217398A (en) * 2007-12-28 2008-07-09 华为技术有限公司 A distributed network management acquisition system, realization method and corresponding device
CN101227465A (en) * 2007-12-29 2008-07-23 北京亿阳信通软件研究院有限公司 Method and system for administrating IP address
CN101436129A (en) * 2008-11-18 2009-05-20 浪潮集团山东通用软件有限公司 Method for centralized managing basic information
CN101694683A (en) * 2009-10-13 2010-04-14 中国软件与技术服务股份有限公司 Method for preventing Trojans ferrying via movable memories to steal files
CN102170424A (en) * 2010-12-13 2011-08-31 沈晖 Mobile medium safety protection system based on three-level security architecture
CN102231729A (en) * 2011-05-18 2011-11-02 浪潮集团山东通用软件有限公司 Method for supporting various CA (Certification Authority) identity authentications
CN102412978A (en) * 2010-09-21 2012-04-11 杭州华三通信技术有限公司 Method for carrying out network configuration for VM and system thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630233A (en) * 2003-12-18 2005-06-22 联想(北京)有限公司 Automatic network setting method and system for computer
CN101217398A (en) * 2007-12-28 2008-07-09 华为技术有限公司 A distributed network management acquisition system, realization method and corresponding device
CN101227465A (en) * 2007-12-29 2008-07-23 北京亿阳信通软件研究院有限公司 Method and system for administrating IP address
CN101436129A (en) * 2008-11-18 2009-05-20 浪潮集团山东通用软件有限公司 Method for centralized managing basic information
CN101694683A (en) * 2009-10-13 2010-04-14 中国软件与技术服务股份有限公司 Method for preventing Trojans ferrying via movable memories to steal files
CN102412978A (en) * 2010-09-21 2012-04-11 杭州华三通信技术有限公司 Method for carrying out network configuration for VM and system thereof
CN102170424A (en) * 2010-12-13 2011-08-31 沈晖 Mobile medium safety protection system based on three-level security architecture
CN102231729A (en) * 2011-05-18 2011-11-02 浪潮集团山东通用软件有限公司 Method for supporting various CA (Certification Authority) identity authentications

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095489A (en) * 2012-12-14 2013-05-08 上海斐讯数据通信技术有限公司 Management method for network device
CN104683163A (en) * 2013-11-27 2015-06-03 东莞市微云系统科技有限公司 Cloud terminal network connectivity checking method, cloud terminal network connectivity checking system, and cloud terminal equipment
CN107070967A (en) * 2016-12-23 2017-08-18 沈阳通用软件有限公司 A kind of general terminal system reinforcement means
CN107273247A (en) * 2017-07-13 2017-10-20 郑州云海信息技术有限公司 A kind of method and device for recovering hardware device
CN108880853A (en) * 2017-11-27 2018-11-23 北京视联动力国际信息技术有限公司 A kind of configuration information recovery method and configuration information server regarding networked server
CN108156262A (en) * 2018-02-13 2018-06-12 中国联合网络通信集团有限公司 A kind of method and device for the validity for checking DNS configuration files
CN108156262B (en) * 2018-02-13 2019-06-25 中国联合网络通信集团有限公司 A kind of method and device for the validity checking DNS configuration file
CN111130843A (en) * 2019-11-22 2020-05-08 中国联合网络通信集团有限公司 Configuration recovery method and device for server
CN111556503A (en) * 2020-03-30 2020-08-18 沈阳通用软件有限公司 Personal WIFI hotspot management method based on Windows operating system
CN112653583A (en) * 2020-12-22 2021-04-13 沈阳通用软件有限公司 IP address management method based on Windows operating system
CN112653583B (en) * 2020-12-22 2023-10-31 三六零数字安全科技集团有限公司 IP address management method based on Windows operating system

Also Published As

Publication number Publication date
CN102664758B (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN102664758A (en) Method for binding and automatically recovering network configuration
CN102427481B (en) System for managing cloud computing service and cloud computing management method
CN110086652B (en) Management system and method for service network element in 5G core network
CN105354044A (en) Application awakening method and apparatus
CN102882908A (en) Cloud computing management system and cloud computing management method
CN102355667A (en) Method and system for controlling network connection of application programs in mobile intelligent terminal system
CN103986786A (en) Remote cloud desktop operation system
CN107682460B (en) Distributed storage cluster data communication method and system
CN110651256B (en) System and method for preventing service interruption during software update
CN102882968A (en) Method for dynamically distributing cloud desktops
CN102238108A (en) Off-line message transmission method
CN103118100A (en) Guarantee method and guarantee system for improving usability of virtual machine application
CN104219069A (en) Access frequency control method, device and control system
CN111367542A (en) Household appliance and household appliance firmware upgrading method
CN112416969A (en) Parallel task scheduling system in distributed database
US9607275B2 (en) Method and system for integration of systems management with project and portfolio management
CN102053876A (en) Snapshot creating method and system as well as application server
CN104516744A (en) Software updating method and system
CN110417876A (en) Node server and main control device in session method, distributed system
CN114598484B (en) Certificate updating method, device, cluster and storage medium
US9106659B2 (en) Decoupling cluster data from cloud deployment
US9792305B1 (en) System for controlling access to stored values
CN102801566A (en) Sever cluster unattended remote control
CN103428357A (en) Method and apparatus for realizing local service sharing of mobile terminal operating system
CN114328026B (en) Virtual disk backup method, device, equipment and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: Hunnan New District Wenhui street Shenyang city Liaoning province 110002 No. 19 High-tech Industrial Park No. 21 Jin Penglong

Applicant after: Shenyang GeneralSoft Co.,Ltd.

Address before: 2, 8-1 floor, 110002 Antu street, Heping District, Liaoning, Shenyang

Applicant before: Shenyang GeneralSoft Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210720

Address after: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Beijing Hongteng Intelligent Technology Co.,Ltd.

Address before: No. 21, jinpenglong high tech Industrial Park, No. 19, Wenhui street, Hunnan New District, Shenyang, Liaoning 110002

Patentee before: SHENYANG GENERALSOFT Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Beijing Hongteng Intelligent Technology Co.,Ltd.