CN102664758B - Method for binding and automatically recovering network configuration - Google Patents

Method for binding and automatically recovering network configuration Download PDF

Info

Publication number
CN102664758B
CN102664758B CN201210128303.2A CN201210128303A CN102664758B CN 102664758 B CN102664758 B CN 102664758B CN 201210128303 A CN201210128303 A CN 201210128303A CN 102664758 B CN102664758 B CN 102664758B
Authority
CN
China
Prior art keywords
terminal computer
network configuration
configuration information
service end
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210128303.2A
Other languages
Chinese (zh)
Other versions
CN102664758A (en
Inventor
李凯
金魁
吴艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
360 Digital Security Technology Group Co Ltd
Original Assignee
SHENYANG GENERALSOFT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENYANG GENERALSOFT CO Ltd filed Critical SHENYANG GENERALSOFT CO Ltd
Priority to CN201210128303.2A priority Critical patent/CN102664758B/en
Publication of CN102664758A publication Critical patent/CN102664758A/en
Application granted granted Critical
Publication of CN102664758B publication Critical patent/CN102664758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a method for binding and automatically recovering network configuration. The method comprises the following steps that: a server acquires the network configuration information of a terminal computer; the server generates a legal network configuration information list, and binds the network configuration information of the terminal computer; and the terminal computer monitors changes in the network configuration information of the terminal computer in real time. According to the method, the server remotely and uniformly plans the network configuration information of the terminal computer, the terminal computer monitors the network configuration information in real time, and the network configuration information of the terminal computer is remotely updated according to specific needs or the illegally changed network configuration information of the terminal computer is recovered, so that the problems of high workload, low efficiency, high system resource occupation rate and centralized and unified planning and automatic maintenance incapability of system network configuration binding and automatic recovery in a large-scale local area network are solved, working efficiency is greatly improved, and operation and maintenance cost is reduced; and the method is wide in application range.

Description

A kind of network configuration binding and the method automatically recovered
Technical field
The invention belongs to COMPUTER NETWORK SECURITY MANAGEMENT technical field, particularly relate to a kind of for large scale network, the efficient network configuration binding of long-range point to multi--point and the method automatically recovered.
Background technology
In network management, the network configuration of terminal computer is the important component part in daily management, is also a loaded down with trivial details thing.Network configuration information generally includes computer name, IP address, subnet mask, gateway, DNS(domain name system), WINS(Windows Internet Naming Server), and be the basic work guaranteeing that computer network normally runs to the centralized and unified management of IP address and network of relation configuration, for large scale network, the computer level of terminal use is uneven, the network configuration information of terminal computer is often arbitrarily revised, and these behaviors privately revising terminal configuration can cause IP conflict, suspension, falsely use IP imposes the serious consequences such as illegal operation.When the network configuration information of terminal computer occurs to change (as amendment IP address, repacking operation system), service end can be defined as a new terminal computer, thus cause the failure of original information mistake and strategy or tasks carrying, if things go on like this can form the network configuration information of much invalid terminal computer.In addition, due to the huge dispersion and terminal computer distributes of network size, regular maintenance hand-kept, craft reset, manual recovery network configuration information has become to take the work that network management center's time is maximum, labor intensive is maximum, significantly reduce operating efficiency, add operation maintenance cost.In sum, there is certain limitation in the recovery of network configuration information, and particularly after operating system reinstalled by terminal computer, its network configuration information can be lost, and cannot recover; To the monitoring that the network configuration information of terminal computer changes, in prior art, general employing periodic monitor mode, when timing cycle is shorter, system resource takies higher, and when timing cycle is longer, after user revises network configuration privately, cannot recover immediately again.Therefore, need a kind of safe and reliable network configuration to bind and solve the problems referred to above with the mode automatically recovered.
Summary of the invention
Main purpose of the present invention is to provide a kind of network configuration to bind and the method automatically recovered, the method has fundamentally been stopped terminal computer user and has privately been revised network configuration, and service end can be upgraded by network remote or the network configuration information of batch modification terminal computer.
In order to achieve the above object, the technical solution adopted in the present invention is as follows:
Network configuration binding and the method automatically recovered, comprise following steps:
A. service end obtains the network configuration information of terminal computer:
Service end obtains network configuration information and the hardware information of all terminal computers in network, using the unique identifying information of hardware information as this terminal computer;
Described network configuration information comprises computer name, IP address, subnet mask, gateway, DNS, WINS;
Described hardware information comprises mainboard ID, MAC Address;
B. service end generates the list of legitimate network configuration information:
Service end carries out unified planning by long-range for the network configuration information of all terminal computers obtained, and in service end, store network configuration information and the hardware information of all terminal computers, generate the list of legitimate network configuration information according to the network configuration information stored and hardware information;
C. the network configuration information of binding terminal computer:
Service end sets in service end needs the network configuration information of the terminal computer of binding to change;
Service end is according to the described terminal computer needing the hardware information notice of the terminal computer of binding to need binding;
The described terminal computer of binding that needs utilizes API hook technology, and the network configuration information setting its terminal computer can not be changed;
D. the change of the network configuration information of its terminal computer of terminal computer Real-Time Monitoring:
The terminal computer bound utilizes API hook technology, the change of the network configuration information of its terminal computer of Real-Time Monitoring.
In described steps d, the terminal computer bound utilizes API hook technology, and the change of the network configuration information of its terminal computer of Real-Time Monitoring is further comprising the steps:
If the terminal computer d1. bound monitors the request of the network configuration information of its terminal computer of amendment, continue to perform steps d 2; If the terminal computer bound does not monitor the request of the network configuration information of its terminal computer of amendment, then perform steps d 4;
D2. the terminal computer bound judges whether described amendment request is legitimate request, if the amendment request that service end sends, is then legitimate request, continue to perform steps d 3, if not the amendment request that service end sends, be then illegal request, perform steps d 4;
D3. according to described legitimate request, service end this legitimate request upgraded in the legitimate network configuration information list in service end requires the network configuration information of the terminal computer of amendment, and this terminal computer of remote access, revise the network configuration information of this terminal computer, perform steps d 1;
D4. terminal computer judges whether its terminal computer is first time operation after starting:
If the terminal computer bound is first time operation after starting, this terminal computer sends the hardware information of its terminal computer to service end;
The hardware information of this terminal computer that service end foundation receives obtains the network configuration information of this terminal computer from legitimate network configured list;
Service end transmission obtains the network configuration information of this terminal computer to this terminal computer from legitimate network configured list;
The network configuration information of this terminal computer received from service end and the network configuration information of its terminal computer are compared by this terminal computer, if the two is inconsistent, then there is abnormal change in the network configuration information of this terminal computer, continues to perform steps d 5; If the two is consistent, then the network configuration information no exceptions of this terminal computer changes, and performs steps d 1;
If the terminal computer bound is not first time operation after starting, perform steps d 1;
D5. the hardware information of its terminal computer is sent to service end by the described terminal computer that abnormal change occurs;
D6. service end is according to the hardware information of the abnormal terminal computer changed of the generation received, and obtains the network configuration information of the abnormal terminal computer changed of this generation from the legitimate network configuration information list service end;
D7. there is the abnormal terminal computer changed described in service end remote access, recover the network configuration information of this terminal computer with the network configuration information of the abnormal terminal computer changed of this generation obtained from the list of legitimate network configuration information;
D8. there is the network configuration information of the abnormal terminal computer changed in binding:
Service end sets the network configuration information that the abnormal terminal computer changed occurs and can not change in service end;
Service end notifies the abnormal terminal computer changed of this generation according to the described hardware information that the abnormal terminal computer changed occurs;
The described terminal computer that abnormal change occurs utilizes API hook technology, and the network configuration information setting its terminal computer can not be changed, and performs steps d 1.
the invention has the beneficial effects as follows:
Network configuration binding of the present invention and the method automatically recovered, by the long-range network configuration information carrying out unified planning terminal computer, the network configuration information of binding terminal computer, the mode of the change of the network configuration information of its terminal computer of terminal computer Real-Time Monitoring, according to specifically needing the network configuration information of remote update terminal computer or recovering the illegal network configuration information that the terminal computer changed occurs, solving grid configuration in extensive LAN binds with the amount of resuming work is large automatically, efficiency is low, system resource takies height, can not centralized and unified planning and the problem automatically safeguarded, drastically increase operating efficiency, decrease operation maintenance cost.
Accompanying drawing explanation
Fig. 1 is the flow chart of network configuration of the present invention binding and the automatic method recovered;
Fig. 2 is the flow chart of the steps d of network configuration of the present invention binding and the automatic method recovered;
Fig. 3 is the structural representation of the applied environment of embodiments of the invention.
Detailed description of the invention
Below in conjunction with drawings and Examples, network configuration binding of the present invention is described in further detail with the method automatically recovered.
The centralized and unified management configured IP address and network of relation is the basic work guaranteeing that computer network normally runs.
Network configuration binding of the present invention and the method automatically recovered be not by the quantity of terminal computer and the restriction of network condition in network, can the network configuration information of binding terminal computer, service end can the network configuration information of remotely modifying terminal computer as IP address, subnet mask, gateway, DNS etc., support the multiple situations such as the two IP of Single NIC, double netcard, isolation card and Single NIC, therefore, the application demand of commodity network configuration can be met, break away from sesquipedalian network configuration troublesome operation, improve operating efficiency.In addition, also can carry out network configuration operations in batches, configuration is unified to the attribute such as gateway, DNS, WINS of multiple stage terminal computer, and all settings not need terminal computer restart and come into force.
Embodiment
Such as, 500 station terminal computers are had in a LAN, terminal computer PC1, PC2 ..., PC500, a server computer (SERVER), carry out network configuration binding and to network configuration information, the abnormal terminal computer changed occurs automatically recovering its former network configuration information to this 500 station terminal computer, network configuration binding of the present invention and the method automatically recovered, specifically comprise the steps:
A. server computer obtains the network configuration information of terminal computer:
Server computer obtains network configuration information and the hardware information of all 500 station terminal computers in LAN, using the unique identifying information of hardware information as terminal computer;
Described network configuration information comprises computer name, IP address, subnet mask, gateway, DNS, WINS;
Described hardware information comprises mainboard ID, MAC Address;
Wherein the computer name of terminal computer PC2 is Name2, IP address is 192.168.0.123, subnet mask is 255.255.255.0, gateway to be 192.168.0.1, DNS be 202.96.75.68, WINS for empty, mainboard ID be 64-0503-032608-MCP61, MAC Address is 00-1F-C6-D1-31-90;
B. server computer generates the list of legitimate network configuration information:
Server computer carries out unified planning by long-range for the network configuration information of 500 station terminal computers all in the LAN of acquisition, be 192.168.0.1 by the gateway unified planning of terminal computer PC1 to PC100, be 192.168.0.6 by the gateway unified planning of terminal computer PC101 to PC200, be 192.168.0.8 by the gateway unified planning of terminal computer PC201 to PC500, and on server computer, store network configuration information and the hardware information of all 500 station terminal computers, the list of legitimate network configuration information is generated according to the network configuration information stored and hardware information,
Wherein: the network configuration information of the terminal computer PC2 in the list of legitimate network configuration information is computer name: Name2, IP address: 192.168.0.123, subnet mask: 255.255.255.0, gateway: 192.168.0.1, DNS are 202.96.75.68, WINS is sky, and hardware information is mainboard ID:64-0503-032608-MCP61, MAC Address: 00-1F-C6-D1-31-90;
C. the network configuration information of binding terminal computer:
The network configuration information that server computer sets all 500 station terminal computers on server computer can not be changed;
Server computer notifies this 500 station terminal computer according to the described hardware information of 500 station terminal computers of binding that needs;
Described 500 terminal computers of binding that need utilize API hook technology respectively, and the network configuration information setting its terminal computer can not be changed;
D. the change of the network configuration information of this terminal computer of terminal computer Real-Time Monitoring:
The terminal computer bound utilizes API hook technology, the change of the network configuration information of this terminal computer of Real-Time Monitoring, and specific works step is as follows:
D1. in the present embodiment, the gateway 192.168.0.6 of terminal computer PC101 to PC200 is revised as the request of 192.168.0.7 by server computer request, therefore, terminal computer PC101 to PC200 can monitor the amendment request of server computer, continues to perform steps d 2; And terminal computer PC1 to PC100 and PC201 to PC500 can not monitor the amendment request of server computer, perform steps d 4;
D2. because be that the gateway 192.168.0.6 of PC101 to PC200 is revised as 192.168.0.7 by the amendment request that server computer sends, be therefore legitimate request, continue to perform steps d 3; (if not the amendment request that service end sends, being the amendment request that terminal computer sends, is then illegal request, performs steps d 4; )
D3. according to described legitimate request, the gateway that server computer upgrades PC101 to PC200 in the list of legitimate network configuration information is 192.168.0.7, server computer is by remote terminal access computer PC 101 to PC200, be updated to 192.168.0.7 by unified for the gateway 192.168.0.6 of terminal computer PC101 to PC200, perform steps d 1;
D4. terminal computer judges whether its terminal computer is first time operation after starting:
In the present embodiment, terminal computer PC2 has reinstalled operating system, and its network configuration information there occurs change, is specially; Computer name is PC2, IP address is 192.168.0.120, subnet mask is 255.255.255.0, gateway to be 192.168.0.1, DNS be 202.96.75.68, WINS for empty, its hardware information is: mainboard ID is 64-0503-032608-MCP61, MAC Address is 00-1F-C6-D1-31-90;
After terminal computer PC2 starts, first time is run, and this terminal computer PC2 sends the hardware information (mainboard ID be 64-0503-032608-MCP61, MAC Address be 00-1F-C6-D1-31-90) of its terminal computer to server computer;
Server computer obtains the network configuration information (computer name is Name2, IP address is 192.168.0.123, subnet mask is 255.255.255.0, gateway be 192.168.0.1, DNS be that 202.96.75.68, WINS are for empty) of this terminal computer according to the hardware information of this terminal computer PC2 received from legitimate network configured list;
Server computer sends the network configuration information of this terminal computer obtained from legitimate network configured list to this terminal computer PC2;
The network configuration information of this terminal computer PC2 received from server computer and the network configuration information of this terminal computer are compared by this terminal computer PC2, in the present embodiment, the operating system because terminal computer PC2 has reset, computer name in its network configuration information is PC2, IP address is 192.168.0.120, be Name2 with the computer name of the terminal computer PC2 in the list of legitimate network configuration information, IP address is 192.168.0.123, the two is inconsistent, there is abnormal change in the network configuration information of this terminal computer PC2, continue to perform steps d 5, if (the two is consistent, then the network configuration information no exceptions of terminal computer changes, and performs steps d 1, )
If (terminal computer bound is not first time operation after starting, and performs steps d 1; Reason is: if the terminal computer bound is not first time operation after starting, because the network configuration information of binding terminal computer, the network configuration information of terminal computer can not be changed, therefore do not need to judge whether its network configuration information abnormal change occurs again, to improve the operating efficiency of system, reduce system resource and take; Whether if first time operation after starting, may there is the operation that repacking operation system etc. changes its network configuration informations in terminal computer, therefore need to rejudge its network configuration information and change);
D5. the hardware information (mainboard ID:64-0503-032608-MCP61, MAC Address: 00-1F-C6-D1-31-90) of its terminal computer PC2 is sent to server computer by described terminal computer PC2;
D6. server computer obtains the former network configuration information of terminal computer PC2 from the list of legitimate network configuration information according to the hardware information (mainboard: ID64-0503-032608-MCP61, MAC Address: 00-1F-C6-D1-31-90) of the terminal computer PC2 received, and namely computer name is Name2, IP address is 192.168.0.123, subnet mask is 255.255.255.0, gateway to be 192.168.0.1, DNS be 202.96.75.68, WINS be for empty;
D7. server computer remote terminal access computer PC 2, with the former network configuration information of the terminal computer PC2 obtained from the list of legitimate network configuration information, (computer name is Name2, IP address is 192.168.0.123, subnet mask is 255.255.255.0, gateway is 192.168.0.1, DNS is 202.96.75.68, WINS is empty) recover the network configuration information of terminal computer PC2, the network configuration information being about to the terminal computer PC2 on terminal computer PC2 reverts to: computer name is Name2, IP address is 192.168.0.123, subnet mask is 255.255.255.0, gateway is 192.168.0.1, DNS is 202.96.75.68, WINS is empty,
D8. the network configuration information of binding terminal computer PC 2:
The network configuration information of server computer setting terminal computer PC 2 on server computer can not be changed;
Server computer is according to hardware information (mainboard ID be 64-0503-032608-MCP61, MAC Address be 00-1F-C6-D1-31-90) the notification terminal computer PC 2 of terminal computer PC2;
Terminal computer PC2 utilizes API hook technology, and the network configuration information setting its terminal computer PC2 can not be changed, and performs steps d 1.
system resource involved in the present invention takies situation and mainly comprises the system resource needed for real time monitoring network configuration and recover the system resource that consumes of correct network configuration, contrasts as follows with existing periodic monitor method:
For 5 minutes periodic monitor network configuration, when there is an illegal modifications in terminal computer user, the method of periodic monitor of the prior art about takies 100 milliseconds, recover the system resource time that correct network configuration consumes and be about 3000 milliseconds, therefore, the system resources consumption of every day is 24 * 60/5 * 100+3000=31800 milliseconds.Method of the present invention is not owing to relating to periodic monitor, system resource required for periodic monitor is 0 millisecond, because illegal modifications operation can not be changed successfully, the time of therefore recovering the system resource required for correct network configuration is less than 1 millisecond,, the system resources consumption of method of the present invention every day is less than 1 millisecond.
Method of the present invention is operated by long-range, the network configuration information of centralized and unified management terminal computer is to guarantee the normal operation and maintenance of network, the configuration of Centralized Monitoring, long-range point to multi--point, realizes IP address, computer name, the planning of gateway and configuration intuitively.Strict IP address binding, even if terminal use reinstalls operating system, also can revert to the IP address before binding, make existing network configuration specification; Binding computer name, and recover there is the abnormal computer name changed, preventing user's private from changing terminal computer name, avoiding the network information confusion and the inconvenient problem of management brought because privately renaming.

Claims (1)

1. network configuration binding and the method automatically recovered, comprises following steps:
A. service end obtains the network configuration information of terminal computer:
Service end obtains network configuration information and the hardware information of all terminal computers in network, using the unique identifying information of hardware information as this terminal computer;
Described network configuration information comprises computer name, IP address, subnet mask, gateway, DNS, WINS;
Described hardware information comprises mainboard ID, MAC Address;
B. service end generates the list of legitimate network configuration information:
Service end carries out unified planning by long-range for the network configuration information of all terminal computers obtained, and in service end, store network configuration information and the hardware information of all terminal computers, generate the list of legitimate network configuration information according to the network configuration information stored and hardware information;
C. the network configuration information of binding terminal computer:
Service end sets in service end needs the network configuration information of the terminal computer of binding to change;
Service end is according to the described terminal computer needing the hardware information notice of the terminal computer of binding to need binding;
The described terminal computer of binding that needs utilizes API hook technology, and the network configuration information setting its terminal computer can not be changed;
D. the change of the network configuration information of its terminal computer of terminal computer Real-Time Monitoring:
The terminal computer bound utilizes API hook technology, and the change of the network configuration information of its terminal computer of Real-Time Monitoring, comprises the following steps:
If the terminal computer d1. bound monitors the request of the network configuration information of its terminal computer of amendment, continue to perform steps d 2; If the terminal computer bound does not monitor the request of the network configuration information of its terminal computer of amendment, then perform steps d 4;
D2. the terminal computer bound judges whether described amendment request is legitimate request, if the amendment request that service end sends, is then legitimate request, continue to perform steps d 3, if not the amendment request that service end sends, be then illegal request, perform steps d 4;
D3. according to described legitimate request, service end this legitimate request upgraded in the legitimate network configuration information list in service end requires the network configuration information of the terminal computer of amendment, and this terminal computer of remote access, revise the network configuration information of this terminal computer, perform steps d 1;
D4. terminal computer judges whether its terminal computer is first time operation after starting:
If the terminal computer bound is first time operation after starting, this terminal computer sends the hardware information of its terminal computer to service end;
The hardware information of this terminal computer that service end foundation receives obtains the network configuration information of this terminal computer from legitimate network configured list;
Service end sends the network configuration information of this terminal computer obtained from legitimate network configured list to this terminal computer;
The network configuration information of this terminal computer received from service end and the network configuration information of its terminal computer are compared by this terminal computer, if the two is inconsistent, then there is abnormal change in the network configuration information of this terminal computer, continues to perform steps d 5; If the two is consistent, then the network configuration information no exceptions of this terminal computer changes, and performs steps d 1;
If the terminal computer bound is not first time operation after starting, perform steps d 1;
D5. the hardware information of its terminal computer is sent to service end by the described terminal computer that abnormal change occurs;
D6. service end is according to the hardware information of the abnormal terminal computer changed of the generation received, and obtains the network configuration information of the abnormal terminal computer changed of this generation from the legitimate network configuration information list service end;
D7. there is the abnormal terminal computer changed described in service end remote access, recover the network configuration information of this terminal computer with the network configuration information of the abnormal terminal computer changed of this generation obtained from the list of legitimate network configuration information;
D8. there is the network configuration information of the abnormal terminal computer changed in binding:
Service end sets the network configuration information that the abnormal terminal computer changed occurs and can not change in service end;
Service end notifies the abnormal terminal computer changed of this generation according to the described hardware information that the abnormal terminal computer changed occurs;
The described terminal computer that abnormal change occurs utilizes API hook technology, and the network configuration information setting its terminal computer can not be changed, and performs steps d 1.
CN201210128303.2A 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration Active CN102664758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210128303.2A CN102664758B (en) 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210128303.2A CN102664758B (en) 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration

Publications (2)

Publication Number Publication Date
CN102664758A CN102664758A (en) 2012-09-12
CN102664758B true CN102664758B (en) 2015-03-25

Family

ID=46774177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210128303.2A Active CN102664758B (en) 2012-04-28 2012-04-28 Method for binding and automatically recovering network configuration

Country Status (1)

Country Link
CN (1) CN102664758B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095489B (en) * 2012-12-14 2018-05-01 上海斐讯数据通信技术有限公司 A kind of management method to the network equipment
CN104683163A (en) * 2013-11-27 2015-06-03 东莞市微云系统科技有限公司 Cloud terminal network connectivity checking method, cloud terminal network connectivity checking system, and cloud terminal equipment
CN107070967A (en) * 2016-12-23 2017-08-18 沈阳通用软件有限公司 A kind of general terminal system reinforcement means
CN107273247A (en) * 2017-07-13 2017-10-20 郑州云海信息技术有限公司 A kind of method and device for recovering hardware device
CN108880853A (en) * 2017-11-27 2018-11-23 北京视联动力国际信息技术有限公司 A kind of configuration information recovery method and configuration information server regarding networked server
CN108156262B (en) * 2018-02-13 2019-06-25 中国联合网络通信集团有限公司 A kind of method and device for the validity checking DNS configuration file
CN111130843A (en) * 2019-11-22 2020-05-08 中国联合网络通信集团有限公司 Configuration recovery method and device for server
CN111556503B (en) * 2020-03-30 2024-06-18 三六零数字安全科技集团有限公司 Personal WIFI hotspot management method based on Windows operating system
CN112653583B (en) * 2020-12-22 2023-10-31 三六零数字安全科技集团有限公司 IP address management method based on Windows operating system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630233A (en) * 2003-12-18 2005-06-22 联想(北京)有限公司 Automatic network setting method and system for computer
CN101217398A (en) * 2007-12-28 2008-07-09 华为技术有限公司 A distributed network management acquisition system, realization method and corresponding device
CN101227465A (en) * 2007-12-29 2008-07-23 北京亿阳信通软件研究院有限公司 Method and system for administrating IP address
CN101436129A (en) * 2008-11-18 2009-05-20 浪潮集团山东通用软件有限公司 Method for centralized managing basic information
CN101694683A (en) * 2009-10-13 2010-04-14 中国软件与技术服务股份有限公司 Method for preventing Trojans ferrying via movable memories to steal files
CN102170424A (en) * 2010-12-13 2011-08-31 沈晖 Mobile medium safety protection system based on three-level security architecture
CN102231729A (en) * 2011-05-18 2011-11-02 浪潮集团山东通用软件有限公司 Method for supporting various CA (Certification Authority) identity authentications
CN102412978A (en) * 2010-09-21 2012-04-11 杭州华三通信技术有限公司 Method for carrying out network configuration for VM and system thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630233A (en) * 2003-12-18 2005-06-22 联想(北京)有限公司 Automatic network setting method and system for computer
CN101217398A (en) * 2007-12-28 2008-07-09 华为技术有限公司 A distributed network management acquisition system, realization method and corresponding device
CN101227465A (en) * 2007-12-29 2008-07-23 北京亿阳信通软件研究院有限公司 Method and system for administrating IP address
CN101436129A (en) * 2008-11-18 2009-05-20 浪潮集团山东通用软件有限公司 Method for centralized managing basic information
CN101694683A (en) * 2009-10-13 2010-04-14 中国软件与技术服务股份有限公司 Method for preventing Trojans ferrying via movable memories to steal files
CN102412978A (en) * 2010-09-21 2012-04-11 杭州华三通信技术有限公司 Method for carrying out network configuration for VM and system thereof
CN102170424A (en) * 2010-12-13 2011-08-31 沈晖 Mobile medium safety protection system based on three-level security architecture
CN102231729A (en) * 2011-05-18 2011-11-02 浪潮集团山东通用软件有限公司 Method for supporting various CA (Certification Authority) identity authentications

Also Published As

Publication number Publication date
CN102664758A (en) 2012-09-12

Similar Documents

Publication Publication Date Title
CN102664758B (en) Method for binding and automatically recovering network configuration
EP2675127B1 (en) Method and device for automatically migrating system configuration item
US20100287280A1 (en) System and method for cloud computing based on multiple providers
EP3635547B1 (en) Systems and methods for preventing service disruption during software updates
CN107682460B (en) Distributed storage cluster data communication method and system
WO2016169166A1 (en) Virtual machine scheduling method and device
CN102148841B (en) Method for remotely monitoring multiple operating systems
CN103188088A (en) Equipment information acquisition system and equipment information acquisition method
EP2880528A1 (en) Monitoring for managed services
CN102866998A (en) Centralized password management method and centralized password management system in synchronous system
CN103716188B (en) The management of Linux server cluster management and maintaining method
CN105404530B (en) It is a kind of to realize easy deployment and the system and method using private clound
CN111813419B (en) Method for managing life cycle of bare computer based on kubernetes declaration
CN114666333A (en) Control method for cloud computing resource scheduling problem based on multi-tenant theory
CN104516744A (en) Software updating method and system
CN203135901U (en) Encryption equipment management device
CN104270430A (en) Server remote dispatching method suitable for cloud computing
US9106659B2 (en) Decoupling cluster data from cloud deployment
EP4258609A1 (en) Container cluster management method and apparatus
CN102801566A (en) Sever cluster unattended remote control
CN106713483B (en) Distributed software distribution method
CN111314408B (en) Local edge calculation and Internet of things management method based on communication layer multi-data item caching task
CN114285842A (en) Electronic reading room building method and system based on cloud desktop
US11010823B2 (en) Connector leasing for long-running software operations
CN108011920B (en) Cloud backup method, electronic equipment, storage medium and system for all-in-one machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: Hunnan New District Wenhui street Shenyang city Liaoning province 110002 No. 19 High-tech Industrial Park No. 21 Jin Penglong

Applicant after: Shenyang GeneralSoft Co.,Ltd.

Address before: 2, 8-1 floor, 110002 Antu street, Heping District, Liaoning, Shenyang

Applicant before: Shenyang GeneralSoft Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210720

Address after: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Beijing Hongteng Intelligent Technology Co.,Ltd.

Address before: No. 21, jinpenglong high tech Industrial Park, No. 19, Wenhui street, Hunnan New District, Shenyang, Liaoning 110002

Patentee before: SHENYANG GENERALSOFT Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100020 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Beijing Hongteng Intelligent Technology Co.,Ltd.