CN107545198A - A kind of button management method and device - Google Patents

A kind of button management method and device Download PDF

Info

Publication number
CN107545198A
CN107545198A CN201710351987.5A CN201710351987A CN107545198A CN 107545198 A CN107545198 A CN 107545198A CN 201710351987 A CN201710351987 A CN 201710351987A CN 107545198 A CN107545198 A CN 107545198A
Authority
CN
China
Prior art keywords
key information
client
kvm
kvm clients
clients
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710351987.5A
Other languages
Chinese (zh)
Other versions
CN107545198B (en
Inventor
莫洪强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
Unis Huashan Information Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unis Huashan Information Technologies Co Ltd filed Critical Unis Huashan Information Technologies Co Ltd
Priority to CN201710351987.5A priority Critical patent/CN107545198B/en
Publication of CN107545198A publication Critical patent/CN107545198A/en
Application granted granted Critical
Publication of CN107545198B publication Critical patent/CN107545198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The application, which provides a kind of button management method and device, this method, to be included:After the KVM clients obtain focus, the communication between key information and the applications client is blocked by the monitoring client, so that the applications client can not get the key information;The key information is supplied to the KVM clients, so that the KVM clients operate server corresponding with the KVM clients using the key information.By the technical scheme of the application, the key information of Intrusion Detection based on host, KVM clients can operate long-range server, convenient to operate long-range server, improve user's impression.

Description

A kind of button management method and device
Technical field
The application is related to communication technical field, more particularly to a kind of button management method and device.
Background technology
Effective management of server is the inevitable problem of administrative staff, and current implementation method is:Administrative staff are led to Cross the management that KVM (Keyboard Video Mouse, keyboard, display terminal and mouse) realizes server.As shown in figure 1, it is The schematic diagram that administrative staff are managed by KVM clients to server, in PC (Personal Computer, individual calculus Machine) on be configured with KVM clients for being managed to server, and administrative staff can pass through KVM clients on PC To operate long-range server.
The content of the invention
The application provides a kind of button management method, applied to including applications client, KVM clients and monitoring client Main frame, methods described includes:
After the KVM clients obtain focus, key information and the application visitor are blocked by the monitoring client Communication between the end of family, so that the applications client can not get the key information;
The key information is supplied to the KVM clients, so that the KVM clients are grasped using the key information Make server corresponding with the KVM clients.
The application provides a kind of button managing device, applied to including applications client, KVM clients and monitoring client Main frame, described device specifically includes:
Processing module, for after the KVM clients obtain focus, key information to be blocked by the monitoring client With the communication between the applications client so that the applications client can not get the key information;
Sending module, for the key information to be supplied into the KVM clients, so that the KVM clients utilize The key information operates server corresponding with the KVM clients.
Based on above-mentioned technical proposal, in the embodiment of the present application, after key information is listened to, can block key information with Communication between applications client, so that applications client can not get the key information, and the key information is supplied to KVM clients, so that KVM clients can utilize the key information to operate server corresponding with the KVM clients.So, The key information of Intrusion Detection based on host, KVM clients can operate long-range server, convenient to operate long-range server, improve and use Experience at family.
Brief description of the drawings
, below will be to the application in order to clearly illustrate the embodiment of the present application or technical scheme of the prior art The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below Accompanying drawing is only some embodiments described in the application, for those of ordinary skill in the art, can also be according to this Apply for that these accompanying drawings of embodiment obtain other accompanying drawings.
Fig. 1 is the schematic diagram being managed by KVM clients to server;
Fig. 2 is the application scenarios schematic diagram in a kind of embodiment of the application;
Fig. 3 is the flow chart of the button management method in a kind of embodiment of the application;
Fig. 4 is the structure chart of the button managing device in a kind of embodiment of the application;
Fig. 5 is the hardware structure diagram of main frame in a kind of embodiment of the application.
Embodiment
Purpose in term used in this application merely for the sake of description specific embodiment, and unrestricted the application.This Shen Please " one kind " with the singulative used in claims, " described " and "the" are also intended to including most forms, unless Context clearly shows that other implications.It is also understood that terminology used in this article "and/or" etc., refers to include one Or multiple associated list items purposes any or all may combine.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, in addition, used word " if " can be construed to " ... when ", or, " when ... ", or, " in response to determining ".
The embodiment of the present application proposes a kind of button management method, and this method can apply to include operating system, using visitor Family end, KVM clients and the main frame (i.e. PC) for monitoring client, it is shown in Figure 2, for the application scenarios of the button management method Schematic diagram.Wherein, operating system is management and the hardware resource of control main frame and the computer program of software resource, is basic System software, other application program are required to run under the support of operating system.KVM clients are installed on main frame Application program, for being managed to server.It is the application program installed on main frame to monitor client, for believing button Breath is monitored, and blocks the communication between the key information listened to and applications client, so that applications client can not obtain Key information is got, and KVM clients is obtained key information, then server is managed using key information. Applications client is other clients outside the local KVM clients of main frame, for realizing corresponding function, such as application client End can be word, pdf, browser, QQ etc..
In one example, by configuring button for KVM clients, so that KVM clients are by button operation server, Can be that user brings great convenience.But it is identical with the button of applications client if the button of KVM clients configuration, then Applications client may preferential answering button, KVM clients may also preferential answering button, if applications client preferential answering is pressed During key, then KVM clients cannot respond to button, so as to cause KVM clients can not influence user by button operation server Use feeling.
The button management method proposed for above-mentioned discovery, the embodiment of the present application, can be by monitoring client to button Information is monitored, and blocks the communication between key information and applications client so that applications client can not get by Key information, and KVM clients is obtained the key information.
In one example, operating system can include but is not limited to Windows operating system, (SuSE) Linux OS, IOS operating systems, Android operation system etc., for convenience of describing, subsequently illustrate by taking Windows operating system as an example, for Linux Other operating systems such as operating system, iOS operating systems, Android operation system, its processing mode and Windows operating system Processing mode is similar, subsequently repeats no more.
On the main frame of installation Windows operating system, it can (also may be used by HOOK (hook) program to monitor client To be referred to as Hook Function) realize.The essence of HOOK programs is a function for being used to handle message, by calling Windows The API (Application Programming Interface, application programming interface) of operating system, by HOOK programs Windows operating system is linked into, when particular message (message as carried key information) is sent, mesh is not reached in particular message Window (such as applications client) before, HOOK programs can first capture the particular message, i.e. HOOK programs first obtain control.
Certainly, in actual applications, client is monitored to realize, the blocking (as blocked function) by other functions Function can be linked into operating system (such as Windows operating system, (SuSE) Linux OS), when particular message is (as carried button The message of information) when sending, before particular message does not reach purpose window (such as applications client), block function first to catch The particular message is obtained, that is, blocks function first to obtain control.The implementation of this monitoring client is not limited, as long as can Realize above-mentioned function.
It is shown in Figure 3 under above-mentioned application scenarios, for the schematic flow sheet of the button management method.
Step 301, after KVM clients obtain focus, key information and applications client are blocked by monitoring client Between communication so that the applications client can not get the key information.
In one example, after KVM clients obtain focus, key information can be monitored by monitoring client. After key information is listened to, then leading between the key information and applications client can be blocked by monitoring client Letter, so that the applications client can not get the key information.
In one example, before KVM clients obtain focus, monitor client and be closed, will not pass through Monitor client and monitor key information.In addition, after KVM clients obtain focus, it is possible to start and monitor client, then Key information is monitored by monitoring client.In addition, after KVM clients lose focus, then monitoring client can be closed, No longer key information is monitored by monitoring client.Wherein, the monitoring client is a client for being used to monitor key information End.
Wherein, when main frame display window is the window of KVM clients, mean that KVM clients have currently obtained Jiao Point, now, user are directed to the operation of main frame, aiming at the operation of KVM clients.In addition, when main frame display window is no longer During the window of KVM clients, mean that KVM clients have currently lost focus, now, user is directed to the operation of main frame, no It is the operation for KVM clients.
In one example, the message for carrying key information can be listened to by monitoring client, that is, monitoring client can be with Listen to key information.Specifically, operating system after the message for carrying key information is listened to, will carry disappearing for key information Breath is sent to monitoring client, and key information can be listened to by monitoring client.
In one example, the key information listened to for monitoring client, can have for applications client preferentially makes There is no the key information of preferential right with the key information or applications client of power.Based on this, listen to key information it Afterwards, it can also judge whether applications client has the preferential right of the key information by monitoring client;If it is, can To block communication between the key information and applications client by monitoring client, so that the applications client can not obtain To the key information;If it is not, then the key information directly can be supplied to the KVM clients for having obtained focus, do not have to Perform and block operation.
In one example, in order that monitoring client can know that applications client does not have the button letter of preferential right Breath, applications client have the key information of preferential right, then can also be that the monitoring client configures an information table, the letter Breath table is used to record the key information of no preferential right and/or has the key information of preferential right.Based on this information table, Monitor client after key information is listened to, it is possible to by inquiring about the information table, judge applications client whether have by The preferential right of key information.
If for example, the information table is configured with the key information of no preferential right, after key information is listened to, if The key information in the information table be present, the preferential right of the not no key information of applications client is meant that, if the information The key information is not present in table, means that applications client has the preferential right of the key information.In another example if information Table is configured with the key information of preferential right, then after key information is listened to, believes if the button in the information table be present Breath, means that applications client has the preferential right of the key information, if the key information is not present in the information table, with regard to table Show the preferential right of the not no key information of applications client.In another example if the information table is configured with no preferential right Key information, have the key information of preferential right, then after key information is listened to, by inquiring about the information table can Directly judge whether applications client has the preferential right of the key information.
In one example, the key information that applications client has preferential right refers to:Operating system is obtaining button After information, the key information will not be supplied to the KVM clients for having obtained focus, but the key information is supplied to Applications client, so that applications client is operated based on the key information, such as obtaining pressing corresponding to button (Alt+Tab) After key information, the key information is supplied to applications client by operating system, is carried out by applications client based on the key information Tangent screen operates.The key information that applications client does not have preferential right refers to:Operating system, will after key information is obtained The key information is supplied to the KVM clients for having obtained focus, and is grasped by the KVM clients based on the key information Make, such as ctrl+c, ctrl+v are exactly that applications client does not have the key information of preferential right.
In one example, can be using caused information during user's operation keyboard as key information, moreover, button is believed Breath can be common key information (such as a, b, c) and shortcut key information (such as ctrl+c, ctrl+v).Wherein, shortcut key information It is information caused by user's key swift to operate, shortcut is properly termed as fast key or hot key again, by some specific keys, presses Key order or key combination can replace mouse to complete a few thing to complete to operate using shortcut, for example, ctrl+c Represent to replicate, ctrl+v represents to paste.
Step 302, key information is supplied to KVM clients, so that KVM clients are operated using the key information and should Server corresponding to KVM clients.Wherein, when blocking the communication between key information and applications client, applications client The key information can not be got, in such manner, it is possible to which the key information is supplied into KVM clients, is pressed so that KVM clients utilize Key information operates server.
In one example, for the process of " key information is supplied into KVM clients ", can include but is not limited to: Mode one, by monitoring client the key information is sent to KVM clients;It is or mode two, true by monitoring client Fixed adjusting parameter corresponding with the key information, and configuration file is changed according to the adjusting parameter;Then, KVM clients are passed through The configuration file is monitored, adjusting parameter is parsed from the configuration file, and determine key information corresponding with the adjusting parameter. Wherein, the form of the configuration file is specifically including but not limited to:Txt forms or xml forms or json forms or Word forms or PDF format etc., this file format is not limited;In addition, the adjusting parameter is specifically including but not limited to: Identification information, execution number corresponding to key information.
For mode one, when blocking the communication between key information and applications client, applications client can not obtain To key information, and KVM clients can not get key information.In order that KVM clients get key information, may be used also Following function is configured to monitor client:Key information is sent to KVM clients, based on this, monitoring client can will be by Key information is sent to KVM clients.
For mode two, when blocking the communication between key information and applications client, applications client can not obtain To key information, and KVM clients can not get key information.In order that KVM clients get key information, may be used also Think that monitoring client configures following function:Configuration file is changed by adjusting parameter corresponding with key information.Based on this, supervise Client is listened after key information is listened to, it is determined that adjusting parameter corresponding with key information (identifies letter as corresponding to Alt+Tab Breath, perform number etc.), and the adjusting parameter is recorded in configuration file.Match somebody with somebody in addition, KVM clients can periodically monitor this File is put, when the configuration file changes, adjusting parameter can be parsed from configuration file, and determine to join with the adjustment Key information corresponding to number, so, KVM clients can obtain key information.
Wherein, identification information can include but is not limited to corresponding to above-mentioned key information:Title (such as Alt+ of key information Tab buttons), unique string (such as character string 123123 of Alt+Tab buttons) corresponding to key information, to this identification information not It is limited, as long as key information can be distinguished.
Wherein, there are identification information corresponding to key information and execution number due to being recorded in configuration file, therefore, KVM visitors Family end can parse the identification information from configuration file and perform number, then obtain key information.For example, at upper one In the cycle, Alt+Tab buttons are recorded in configuration file and perform number 1, and Alt+Tab is recorded in current period, configuration file Button can know that key information is Alt+Tab buttons with execution number 2, then KVM clients.In another example in upper a cycle, In configuration file record ctrl+c buttons and perform number 1, and in current period, configuration file record Alt+Tab buttons and Number 1 is performed, then KVM clients can know that key information is Alt+Tab buttons.
Based on above-mentioned technical proposal, in the embodiment of the present application, after key information is listened to, can block key information with Communication between applications client, so that applications client can not get the key information, and the key information is supplied to KVM clients, so that KVM clients can utilize the key information to operate server corresponding with the KVM clients.So, Key information based on PC, KVM clients can operate long-range server, convenient to operate long-range server, improve user Impression.
Conceived based on the application same with the above method, a kind of button managing device is also proposed in the embodiment of the present application, should For including the main frame of applications client, KVM clients and monitoring client, as shown in figure 4, the button pipe proposed for the application The structure chart of device is managed, the button managing device specifically includes:
Processing module 401, for after the KVM clients obtain focus, button to be blocked by the monitoring client Communication between information and the applications client, so that the applications client can not get the key information;
Sending module 402, for the key information to be supplied into the KVM clients, so that the KVM clients are sharp Server corresponding with the KVM clients is operated with the key information.
The processing module 401, it is additionally operable to after the KVM clients obtain focus, starts the monitoring client; After the KVM clients lose focus, the monitoring client is closed;
Wherein, the monitoring client is used to monitor key information.
The sending module 402, specifically for during the key information is supplied into the KVM clients, The key information is sent to by the KVM clients by the monitoring client;Or
Adjusting parameter corresponding with the key information is determined by the monitoring client, and according to the adjusting parameter Change configuration file;The configuration file is monitored by the KVM clients, the adjustment is parsed from the configuration file Parameter, and determine key information corresponding with the adjusting parameter.
The form for the configuration file that the sending module 402 is changed according to the adjusting parameter is specially:Txt lattice Formula or xml forms or json forms;The adjusting parameter that the sending module 402 determines specifically includes:It is described to press Identification information, execution number corresponding to key information.
The processing module 401, specifically for blocking key information and the application visitor by the monitoring client During communication between the end of family, judge whether the applications client has the excellent of key information by the monitoring client The first right to use;If it is, the communication between key information and the applications client is blocked by the monitoring client.
The main frame that the embodiment of the present application provides, for hardware view, the hardware structure schematic diagram of the main frame specifically can be with It is shown in Figure 5.Including:Machinable medium and processor, wherein:
Machinable medium:Store instruction code.
Processor:Communicate, stored in reading and execution machinable medium described with machinable medium Instruction code, realize that button management disclosed in the application above-mentioned example operates.
Here, machinable medium can be any electronics, magnetic, optics or other physical storage devices, can be with Comprising or storage information, such as executable instruction, data, etc..For example, machinable medium can be:RAM(Radom Access Memory, random access memory), volatile memory, nonvolatile memory, flash memory, memory driver is (as hard Disk drive), solid state hard disc, any kind of storage dish (such as CD, dvd), either similar storage medium or they Combination.
System, device, module or the unit that above-described embodiment illustrates, it can specifically be realized by computer chip or entity, Or realized by the product with certain function.One kind typically realizes that equipment is computer, and the concrete form of computer can To be personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet PC, wearable device or these equipment The combination of any several equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the embodiment of the present application can use wherein includes computer usable program code in one or more The computer that computer-usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of program product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product Figure and/or block diagram describe.It is generally understood that by each in computer program instructions implementation process figure and/or block diagram Flow and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer journeys can be provided Sequence instruction to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices processor with Produce a machine so that produce and be used for by the instruction of computer or the computing device of other programmable data processing devices Realize the dress for the function of being specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames Put.
Moreover, these computer program instructions can also be stored in computer or other programmable datas can be guided to handle and set In the standby computer-readable memory to work in a specific way so that the instruction being stored in the computer-readable memory produces Manufacture including command device, the command device are realized in one flow of flow chart or multiple flows and/or block diagram one The function of being specified in individual square frame or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer Or the instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram The step of function of being specified in one square frame or multiple square frames.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can use the implementation in terms of complete hardware embodiment, complete software embodiment or combination software and hardware The form of example.Moreover, the application can use wherein includes the calculating of computer usable program code at one or more The computer that machine usable storage medium is implemented on (can include but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of program product.
Embodiments herein is the foregoing is only, is not limited to the application.For those skilled in the art For, the application can have various modifications and variations.All any modifications made within spirit herein and principle, it is equal Replace, improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of button management method, it is characterised in that applied to including applications client, KVM clients and monitoring client Main frame, methods described includes:
After the KVM clients obtain focus, key information and the applications client are blocked by the monitoring client Between communication so that the applications client can not get the key information;
The key information is supplied to the KVM clients so that the KVM clients using the key information operation with Server corresponding to the KVM clients.
2. according to the method for claim 1, it is characterised in that methods described also includes:
After the KVM clients obtain focus, start the monitoring client;
After the KVM clients lose focus, the monitoring client is closed;
Wherein, the monitoring client is used to monitor key information.
3. according to the method for claim 1, it is characterised in that
The process that the key information is supplied to the KVM clients, is specifically included:
The key information is sent to by the KVM clients by the monitoring client;Or
Adjusting parameter corresponding with the key information is determined by the monitoring client, and changed according to the adjusting parameter Configuration file;The configuration file is monitored by the KVM clients, the adjustment ginseng is parsed from the configuration file Number, and determine key information corresponding with the adjusting parameter.
4. according to the method for claim 3, it is characterised in that
The form of the configuration file is specially:Txt forms or xml forms or json forms;
The adjusting parameter specifically includes:Identification information, execution number corresponding to the key information.
5. according to the method for claim 1, it is characterised in that it is described by it is described monitoring client block key information with The process of communication between the applications client, is specifically included:
Judge whether the applications client has the preferential right of key information by the monitoring client;If it is, The communication between key information and the applications client is blocked by the monitoring client.
6. a kind of button managing device, it is characterised in that applied to including applications client, KVM clients and monitoring client Main frame, described device specifically includes:
Processing module, for after the KVM clients obtain focus, key information and institute to be blocked by the monitoring client The communication between applications client is stated, so that the applications client can not get the key information;
Sending module, for the key information to be supplied into the KVM clients, so that described in KVM clients utilization Key information operates server corresponding with the KVM clients.
7. device according to claim 6, it is characterised in that
The processing module, it is additionally operable to after the KVM clients obtain focus, starts the monitoring client;In the KVM After client loses focus, the monitoring client is closed;
Wherein, the monitoring client is used to monitor key information.
8. device according to claim 6, it is characterised in that
The sending module, specifically for during the key information is supplied into the KVM clients, by described Monitor client and the key information is sent to the KVM clients;Or
Adjusting parameter corresponding with the key information is determined by the monitoring client, and changed according to the adjusting parameter Configuration file;The configuration file is monitored by the KVM clients, the adjustment ginseng is parsed from the configuration file Number, and determine key information corresponding with the adjusting parameter.
9. device according to claim 8, it is characterised in that
The form for the configuration file that the sending module is changed according to the adjusting parameter is specially:Txt forms or Xml forms or json forms;The adjusting parameter that the sending module determines specifically includes:The key information is corresponding Identification information, perform number.
10. device according to claim 6, it is characterised in that the processing module, specifically for passing through the monitoring During client blocks the communication between key information and the applications client, institute is judged by the monitoring client State whether applications client has the preferential right of key information;If it is, button is blocked to believe by the monitoring client Communication between breath and the applications client.
CN201710351987.5A 2017-05-18 2017-05-18 Key management method and device Active CN107545198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710351987.5A CN107545198B (en) 2017-05-18 2017-05-18 Key management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710351987.5A CN107545198B (en) 2017-05-18 2017-05-18 Key management method and device

Publications (2)

Publication Number Publication Date
CN107545198A true CN107545198A (en) 2018-01-05
CN107545198B CN107545198B (en) 2020-02-11

Family

ID=60966819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710351987.5A Active CN107545198B (en) 2017-05-18 2017-05-18 Key management method and device

Country Status (1)

Country Link
CN (1) CN107545198B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060143473A1 (en) * 2004-12-29 2006-06-29 Kumar Mohan J Software key implementation using system management firmware
CN101072381A (en) * 2007-06-14 2007-11-14 华为技术有限公司 Terminal control message processing method and message processor and media server
CN101127784A (en) * 2007-09-29 2008-02-20 网秦无限(北京)科技有限公司 Method and system for quickly obtaining network information service at mobile terminal
CN101452376A (en) * 2007-12-06 2009-06-10 宏正自动科技股份有限公司 Methods and systems for client computer managing multiple servers
CN101819468A (en) * 2009-02-26 2010-09-01 国际商业机器公司 Method and device for accessing input fields in form
CN103020526A (en) * 2012-12-21 2013-04-03 北京奇虎科技有限公司 Initiative intercept method and initiative intercept device for malicious program and client end equipment
CN103067176A (en) * 2013-01-11 2013-04-24 浪潮集团有限公司 Safety authentication method applied to multi-unit server management
CN103888296A (en) * 2014-03-21 2014-06-25 浪潮电子信息产业股份有限公司 Blade server KVM switching technology
CN104636103A (en) * 2014-12-31 2015-05-20 华为技术有限公司 Keyboard data transmission method and device
CN105051713A (en) * 2013-03-15 2015-11-11 安迈科技股份有限公司 System and method of web-based keyboard, video and mouse (kvm) redirection and application of the same

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060143473A1 (en) * 2004-12-29 2006-06-29 Kumar Mohan J Software key implementation using system management firmware
CN101072381A (en) * 2007-06-14 2007-11-14 华为技术有限公司 Terminal control message processing method and message processor and media server
CN101127784A (en) * 2007-09-29 2008-02-20 网秦无限(北京)科技有限公司 Method and system for quickly obtaining network information service at mobile terminal
CN101452376A (en) * 2007-12-06 2009-06-10 宏正自动科技股份有限公司 Methods and systems for client computer managing multiple servers
CN101819468A (en) * 2009-02-26 2010-09-01 国际商业机器公司 Method and device for accessing input fields in form
CN103020526A (en) * 2012-12-21 2013-04-03 北京奇虎科技有限公司 Initiative intercept method and initiative intercept device for malicious program and client end equipment
CN103067176A (en) * 2013-01-11 2013-04-24 浪潮集团有限公司 Safety authentication method applied to multi-unit server management
CN105051713A (en) * 2013-03-15 2015-11-11 安迈科技股份有限公司 System and method of web-based keyboard, video and mouse (kvm) redirection and application of the same
CN103888296A (en) * 2014-03-21 2014-06-25 浪潮电子信息产业股份有限公司 Blade server KVM switching technology
CN104636103A (en) * 2014-12-31 2015-05-20 华为技术有限公司 Keyboard data transmission method and device

Also Published As

Publication number Publication date
CN107545198B (en) 2020-02-11

Similar Documents

Publication Publication Date Title
US10554805B2 (en) Information processing method, terminal, and computer-readable storage medium
EP3480816B1 (en) Method for voice recognition and electronic device for performing the same
US9152529B2 (en) Systems and methods for dynamically altering a user interface based on user interface actions
WO2016107327A1 (en) Method and apparatus for implementing unified management of intelligent hardware devices by app, and client
KR20180042557A (en) Electronic device for monitoring a status of a machine and control method thereof
US20180335908A1 (en) Electronic device and content output method of electronic device
CN105630326A (en) Electronic device and method of controlling object in electronic device
JP2016507824A5 (en)
US20170249067A1 (en) User interface feature recommendation
US10897512B2 (en) Generating push notifications
US20160170607A1 (en) Electronic device and method for executing application by electronic device
US20170094219A1 (en) Method and electronic device for providing video of a specified playback time
KR20180014632A (en) Electronic apparatus and operating method thereof
CN104091102A (en) Android system based multi-user management method and device
EP3455712B1 (en) Electronic device and control method therefor
US10599410B2 (en) Method and electronic device for updating configuration settings
KR102548687B1 (en) Wearable Device for Controlling Application Executed on Device and Method Thereof
CN108139811B (en) Method of recording execution screen and electronic device processing the same
US10133408B2 (en) Method, system and computer program product
US10210104B2 (en) Apparatus and method for providing handoff thereof
CN111736825B (en) Information display method, device, equipment and storage medium
KR20170046496A (en) Electronic device having camera and image processing method of the same
CN102339240A (en) Detecting state lost on device
KR20180122137A (en) Method for giving dynamic effect to video and electronic device thereof
CN109643245B (en) Execution of task instances associated with at least one application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Xinhua Sanxin Information Technology Co., Ltd.

Address before: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant before: Huashan Information Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant