CN106603744A - Virtual-environment client unique identification matching method and system - Google Patents
Virtual-environment client unique identification matching method and system Download PDFInfo
- Publication number
- CN106603744A CN106603744A CN201611170159.3A CN201611170159A CN106603744A CN 106603744 A CN106603744 A CN 106603744A CN 201611170159 A CN201611170159 A CN 201611170159A CN 106603744 A CN106603744 A CN 106603744A
- Authority
- CN
- China
- Prior art keywords
- virtual machine
- matching
- mac address
- management platform
- client software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
Abstract
The invention provides a virtual-environment client unique identification matching method and system. According to the method, under common use occasions, on the basis of an MAC address, matching between a client ID and a virtual machine ID can be realized, an excellent matching effect is realized, a user-defined matching mode having higher priority is provided, timely correction is carried out when matching fails, and thereby business linkage between a business management platform and a virtual host machine management platform is realized.
Description
Technical field
The present invention relates to the technical field of system architecture, client unique mark under more particularly to a kind of virtualized environment
Method of completing the square and system.
Background technology
In the prior art, the business management system of a typical service end-client type, wherein usually containing
One management end and several clients (also known as agent side), are communicated, in client by message-oriented middleware (such as MQ)
It is registered to during initialization in management platform, management platform distinguishes different clients with different ID.In classical use field
Jing Zhong, when client registers are to management platform, management platform can all give the client one ID, to distinguish different clients
Hold and be managed, this ID is hereinafter referred to as client id.
As Intel Virtualization Technology development in recent years is day by day ripe, client is no longer often physical machine, but virtual machine, at this
Under planting scene, user often has the demand of higher level.In virtualized environment, virtual machine is run on fictitious host computer, often
One virtual machine all has the ID of itself as mark, and fictitious host computer distinguishes different virtual machines to enter by this ID
Row management, this ID is hereinafter referred to as virtual machine ID.
System model of the prior art is:Client software ID=C-1 is run on fictitious host computer ID=H-1, and objective
Family end software I D=C-2 is run on virtual machine ID=V-2, and virtual machine V-2 is also run on fictitious host computer H-1, but
It is the different software system of two classes from C-1.Client software C-1 and C-2 is registered to the management platform of certain concrete business simultaneously
M-2, is indifferent to herein M-2 and is mounted in where.Fictitious host computer management software M-1 be responsible for fictitious host computer and virtual machine are monitored and
Management, and management platform M-2 for being responsible for certain concrete business can be third-party, realize that some customizations, M-1 cannot be realized
Function, such as security protection and monitoring, in order to be described below conveniently, the system model is fixed tentatively it and realizes scanning safe condition simultaneously
And the function of giving a mark.
For some fictitious host computer management softwares, (it is soft that fictitious host computer management software refers to be managed fictitious host computer
Part, such as VMWare Workstation), it is carried out by the API Calls of system bottom come the virtual machine to operation thereon
Management, and cannot be communicated by common ICP/IP protocol.And sometimes the use scene of user needs to realize to client
The matching of software I D and virtual machine ID, to realize matching of the virtual machine to its business.By taking system model mentioned above as an example:It is empty
Intend Host Administration software M-1 and know that fictitious host computer H-1 operates above virtual machine V-2, and based on the reason for above describing, it is simultaneously
Do not know the client software C-2 of the operation of face thereon, and M-2 maintains the C-1 that runs on H-1 and runs on V-2
The information of C-2.
In traditional demand, M-1 and M-2 are non-interference, each realize respective systemic-function, but user wishes
(the safety marking of each virtual machine is for example checked when the service condition of M-2 is directly inquired about in M-1), setting above is then not enough to
Meet such demand.Therefore, how the present invention in M-2 management platforms for realize matchings of the C-2 to V-2, it is proposed that one
Plant client matching process and system based on MAC Address under virtualized environment.
The content of the invention
The present invention proposes the client matching process and system under a kind of virtualized environment based on MAC Address, common
Under using scene, matching for client id and virtual machine ID can be realized, so as to realize Business Management Platform and fictitious host computer pipe
The business linkage of platform.
Wherein, commonly used scene is referred to:After a successfully virtual machine is created in fictitious host computer, fictitious host computer
Automatically it is its one Microsoft Loopback Adapter of distribution, and it is within the specific limits unduplicated, i.e., and Microsoft Loopback Adapter has uniqueness.
During virtual machine use, this Microsoft Loopback Adapter no longer changes, until the virtual machine is deleted.This is also implied that virtually
The MAC Address of main frame is constant in the life cycle of fictitious host computer, and this setting is the basis that this method is realized, and this sets
It can be satisfaction to be scheduled in most of practical matters.
Client unique mark matching process under a kind of virtualized environment, it is characterised in that:
Second client software is installed on the second virtual machine, second virtual machine has MAC Address,
Second client software to Business Management Platform sends the MAC Address,
The corresponding MAC Address mapping storage of second client software is arrived mapping database by the Business Management Platform,
Auto-matching is carried out, Business Management Platform to the first client software sends special instruction,
First client software receives the special instruction, obtains the MAC of operation and all virtual machines on fictitious host computer
Address, and the MAC Address of the second virtual machine is fed back to Business Management Platform,
The mapping database is inquired about, the client id that the MAC Address and the second virtual machine MAC Address match is obtained,
With the client software for running on the second virtual machine.
Wherein, the MAC Address of the virtual machine is obtained according to virtual machine ID, and virtual machine ID is uniquely corresponding with MAC Address.
Wherein, the MAC Address of virtual machine is unique.
Wherein, by matching result storage to matching database.
Wherein, the Auto-matching is the Auto-matching of periodic triggers.
Wherein, fictitious host computer management software sends PUSH message to the Business Management Platform, and the PUSH message is used for
Obtain the safe condition of virtual machine;According to PUSH message, Business Management Platform match query data base, the second client is obtained soft
The safety marking of part;The safety marking fraction is returned to the second virtual machine by Business Management Platform.
Wherein, when it fails to match and/or during self-defined matching, in the mapping of UI interfaces designated virtual machine and client software
Relation, carries out self-defined matching, and the self-defined matching priority is higher than Auto-matching.
Client unique mark matching system under a kind of virtualized environment, it is characterised in that include with lower module:
Software installation module, for installing the second client software on the second virtual machine, second virtual machine has MAC ground
Location;Sending module, the MAC Address is sent for second client software to Business Management Platform;
Mapping memory module, arrives the corresponding MAC Address mapping storage of the second client software for the Business Management Platform
Mapping database;
Instruction sending module, for carrying out during Auto-matching, Business Management Platform to the first client software sends special instruction;
Feedback module, for first client software special instruction is received, and obtains operation and the institute on fictitious host computer
There is the MAC Address of virtual machine, and the MAC Address of the second virtual machine is fed back to Business Management Platform;
As a result acquisition module, for inquiring about the mapping database, obtains the MAC Address and the second virtual machine MAC Address phase
The client id of matching, matching runs on the client software of the second virtual machine.
Wherein, the MAC Address of the virtual machine is obtained according to virtual machine ID, and virtual machine ID is uniquely corresponding with MAC Address.
Wherein, the MAC Address of virtual machine is unique.
Wherein, by matching result storage to matching database.
Wherein, the Auto-matching is the Auto-matching of periodic triggers.
Wherein, preferably also include, pushing module, send to the Business Management Platform for fictitious host computer management software
PUSH message, the PUSH message is used to obtain the safe condition of virtual machine;Marking acquisition module, for according to PUSH message,
Business Management Platform match query data base, obtains the safety marking of the second client software;Marking returns module, for business
The safety marking fraction is returned to the second virtual machine by management platform.
Wherein, custom block, for when it fails to match and/or during self-defined matching, UI interfaces designated virtual machine with
The mapping relations of client software, carry out self-defined matching, and the self-defined matching priority is higher than Auto-matching.
As known from the above, the invention discloses the method and system that client is matched under a kind of virtualized environment, the present invention
Method and system be applied to virtualized environment, matched as unique mark according to MAC Address, reached good matching
Effect, and there is provided the setting scheme of the user with higher priority so that can be modified in time when it fails to match.This
Invention can also be realized checking secure virtual machine marking situation in fictitious host computer management software, without the need for by individually logging in business
Management platform is come the beneficial effect checked.
Description of the drawings
Fig. 1,2 are method of the present invention flow charts;
Fig. 3 is the system flow block diagram of the present invention.
Fig. 4 is the system construction drawing of the present invention
Fig. 5 is the principle flow chart of the present invention
Specific embodiment
Specific embodiment is elaborated as follows:Wherein, the virtual machine ID of first and second virtual machine is respectively V-1, V-2, empty
Plan main frame is H-1, and the client id of first and second client software is respectively C-1, C-2, and Business Management Platform is M-2, virtual main
Machine management software is M-1.
The invention provides client unique mark matching process under a kind of virtualized environment, method flow such as accompanying drawing 1,2
It is shown,
Step 101, installs the second client software on the second virtual machine, and second virtual machine has MAC Address, the
Two client softwares to Business Management Platform sends the MAC Address;
After in virtual machine V-2 client software C-2 installed above, when each virtual machine V-2 starts, client software C-
2 random starts and send the MAC Address MAC-2 of oneself to Business Management Platform M-2.
Step 102, the Business Management Platform is by the corresponding MAC Address mapping storage of the second client software to mapping number
According to storehouse;
It is MAC-2 that the corresponding MAC Address of client software C-2 is have recorded in Business Management Platform M-2, and the two mapping is closed
System's storage is to mapping database.Business Management Platform M-2 is not relevant for client software C-2 and runs on virtual machine V-2.
Step 103, carries out Auto-matching, and Business Management Platform to the first client software sends special instruction;
When needing to be matched (such as periodic triggers), Business Management Platform M-2 to client software C-1 sends out
Send a special instruction.
Step 104, first client software receives the special instruction, obtains all in operation and fictitious host computer
The MAC Address of virtual machine, and feed back the MAC Address of the second virtual machine to Business Management Platform.
Client software C-1 is obtained after this instruction, just calling system API, obtain it is all run on fictitious host computer H-1 it
On virtual machine virtual machine ID and corresponding MAC Address, in this example, when client software C-1 receives Business Management Platform
After the special instruction that M-2 sends, just the virtual machine information above fictitious host computer H-1 is fed back to Business Management Platform M-2 so that industry
Business management platform M-2 obtains the information that the MAC Address of virtual machine V-2 is MAC-2.
Because either client software C-1 or fictitious host computer H-1 or fictitious host computer management software M-1, now not
The ID for knowing the service customer end software run on virtual machine V-2 is C-2, is exactly herein to solve in this void in this case
Intend the ID matching problems of main frame.And why client software C-1 or fictitious host computer H-1 does not know what is run on virtual machine V-2
Client id is C-2, has been carried out explaining above.
Step 105, inquires about the mapping database, what the acquisition MAC Address and the second virtual machine MAC Address matched
Client id, matching runs on the client software of the second virtual machine.
It is just counter from data base to inquire about after the MAC that Business Management Platform M-2 receives virtual machine V-2 is MAC-2,
Because of client software C-2, when reaching the standard grade, warp-wise Business Management Platform M-2 has reported the information that the MAC of oneself is MAC-2, so
By MAC-2, it is C-2 that Business Management Platform M-2 can be matched and be run on the ID of the client on virtual machine V-2, business pipe
This matching result is deposited standby into matching database by platform M-2, and matching is completed.
In order to easily facilitate understanding, the meaning for illustrating this matching scheme is continued herein.
In order to illustrate the meaning of this programme, following scene is set:M-1 is fictitious host computer management software, and it does not have peace
The function of full management, and Business Management Platform M-2 is safety management platform, it has abundant management function.In order to reduce coupling
Conjunction property and reduce system complexity, increase system trimming and customizability, M-1 be impossible fully-integrated M-2 it is all
Function.
Step 201, fictitious host computer management software to the Business Management Platform sends PUSH message, and the PUSH message is used
In the safe condition for obtaining virtual machine;
In use, M-2 is according to the client software C-2 being arranged on above virtual machine V-2, the safety to virtual machine V-2
State is estimated, and provides marking, and when user wishes just see this marking by M-1, M-2 to M-1 sends
PUSH message, content is exactly the safety marking result got (by client software C-2) above virtual machine V-2.
Step 202, according to PUSH message, Business Management Platform match query data base, obtains the second client software
Safety marking;Matching result in M-2 match query data bases, obtains to the marking situation of client software C-2.
The safety marking fraction is returned to the second virtual machine by step 203, Business Management Platform;M-2 gets client
The marking situation of end software C-2, by the fraction of marking virtual machine V-2 is sent to.
Present invention also offers client unique mark matching system under a kind of virtualized environment, system flow block diagram is for example attached
Shown in Fig. 3,
Software installation module, for installing the second client software on the second virtual machine, second virtual machine has
MAC Address;Sending module, the MAC Address is sent for second client software to Business Management Platform;
After in virtual machine V-2 client software C-2 installed above, when each virtual machine V-2 starts, client software C-
2 random starts and send the MAC Address MAC-2 of oneself to Business Management Platform M-2.
Mapping memory module, deposits the corresponding MAC Address mapping of the second client software for the Business Management Platform
Store up mapping database;
It is MAC-2 that the corresponding MAC Address of client software C-2 is have recorded in Business Management Platform M-2, and the two mapping is closed
System's storage is to mapping database.Business Management Platform M-2 is not relevant for client software C-2 and runs on virtual machine V-2.
Instruction sending module, for carrying out during Auto-matching, Business Management Platform sends special to the first client software
Instruction;
When needing to be matched (such as periodic triggers), Business Management Platform M-2 to client software C-1 sends out
Send a special instruction.
Feedback module, for first client software special instruction is received, and is obtained on operation and fictitious host computer
All virtual machines MAC Address, and to Business Management Platform feed back the second virtual machine MAC Address;
Client software C-1 is obtained after this instruction, just calling system API, obtain it is all run on fictitious host computer H-1 it
On virtual machine virtual machine ID and corresponding MAC Address, in this example, when client software C-1 receives Business Management Platform
After the special instruction that M-2 sends, just the virtual machine information above fictitious host computer H-1 is fed back to Business Management Platform M-2 so that industry
Business management platform M-2 obtains the information that the MAC Address of virtual machine V-2 is MAC-2.
Because either client software C-1 or fictitious host computer H-1 or fictitious host computer management software M-1, now not
The ID for knowing the service customer end software run on virtual machine V-2 is C-2, is exactly herein to solve in this void in this case
Intend the ID matching problems of main frame.And why client software C-1 or fictitious host computer H-1 does not know what is run on virtual machine V-2
Client id is C-2, has been carried out explaining above.
As a result acquisition module, for inquiring about the mapping database, obtains the MAC Address and the second virtual machine MAC ground
The client id that location matches, matching runs on the client software of the second virtual machine.
It is just counter from data base to inquire about after the MAC that Business Management Platform M-2 receives virtual machine V-2 is MAC-2,
Because of client software C-2, when reaching the standard grade, warp-wise Business Management Platform M-2 has reported the information that the MAC of oneself is MAC-2, so
By MAC-2, it is C-2 that Business Management Platform M-2 can be matched and be run on the ID of the client on virtual machine V-2, business pipe
This matching result is deposited standby into matching database by platform M-2, and matching is completed.
In order to illustrate the meaning of this programme, following scene is set:M-1 is fictitious host computer management software, and it does not have peace
The function of full management, and Business Management Platform M-2 is safety management platform, it has abundant management function.In order to reduce coupling
Conjunction property and reduce system complexity, increase system trimming and customizability, M-1 be impossible fully-integrated M-2 it is all
Function.
Pushing module, PUSH message, the push are sent for fictitious host computer management software to the Business Management Platform
Message is used to obtain the safe condition of virtual machine;
In use, M-2 is according to the client software C-2 being arranged on above virtual machine V-2, the safety to virtual machine V-2
State is estimated, and provides marking, and when user wishes just see this marking by M-1, M-2 to M-1 sends
PUSH message, content is exactly the safety marking result got (by client software C-2) above virtual machine V-2.
Marking acquisition module, for according to PUSH message, Business Management Platform match query data base, obtaining the second client
The safety marking of end software;Matching result in M-2 match query data bases, obtains to the marking situation of client software C-2.
Marking returns module, and the safety marking fraction is returned to into the second virtual machine for Business Management Platform;M-2 is obtained
The marking situation of client software C-2 is got, the fraction of marking is sent to into virtual machine V-2.
Therefore, by the method for the present invention, user just only can see the safe marking situation of V-2 on M-1, and without
Individually log in M-2 to check.
For it fails to match or user with specific demand, process provides user-defined function.Business
Management platform M-2 provides editting function on UI interfaces, when user specifies the ID of client software C-2 and virtual machine V-2
It is preferential with user configuring when safe condition is pushed after mapping relations.So as to solve that it fails to match or specific demand etc. is asked
Topic.
To make the object, technical solutions and advantages of the present invention clearer, the present invention is done into one below in conjunction with accompanying drawing
Step ground is described in detail.
Present system structure chart, as shown in Figure 4, including fictitious host computer H-1, fictitious host computer management software M-1, virtually
Machine V-2, its MAC Address is MAC-2, and security client C-1 and C-2 are registered to safety management platform M-2.
As shown in Figure 5, it is not a set of top-down distance to method of the present invention flow process, but some flow processs,
By the data-linkage of data base between flow process, the method does not specify the triggering mode and execution sequence of flow process.
For the flow process 1 for from left to right counting, which define and to send when client is reached the standard grade own MAC address to pipe
Platform M-2.
For flow process 2, when which defining triggering matching operation, specific method.It is the same as those described above, M-2 request C-1, C-1 leads to
It is MAC-2 to cross the MAC for calling system API of H-1 to get V-2.Simultaneously M-2 has now been obtained by the on-line message of C-2
The MAC for having arrived C-2 is MAC-2, according to the constant unduplicated hypothesis of MAC Address before, then the corresponding virtual machines of C-2 are exactly V-
2。
For flow process 3, which define when M-1 asks M-2, during the safe condition of V-2 to be known, M-2 directly inquires about data
It is C-2 that storehouse obtains the corresponding clients of V-2, then inquire about data base to obtain the safety marking of C-2 is 90, then by the safe shape of V-2
Message as state marking is 90 points sends M-1 to, so that M-1 obtains the safe condition of V-2.
Wherein, flow process 1 and flow process 2 define the flow process of matching, and flow process 3 illustrates the use scene of this flow process, be in order to
Readily appreciate.A kind of scene that flow process 3 is defined in which.
In addition, the flow chart is not defined flow process when User Defined is matched, because user-defined excellent
First level is higher, and when user-defined matching is triggered, above-mentioned flow process is no longer performed.
This method is also applied for the situation of multiple stage fictitious host computer and multiple stage virtual machine.
The foregoing description of the disclosed embodiments, enables those skilled in the art to realize or using the present invention.To this
Various modifications of a little embodiments will be apparent for a person skilled in the art, the General Principle defined in the present invention
Can realize in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not be by
It is limited to the embodiments shown herein, but meets consistent with principles disclosed herein and features of novelty most wide
Scope.
Claims (10)
1. client unique mark matching process under a kind of virtualized environment, it is characterised in that:
Second client software is installed on the second virtual machine, second virtual machine has MAC Address, second client
Software to Business Management Platform sends the MAC Address,
The corresponding MAC Address mapping storage of second client software is arrived mapping database by the Business Management Platform,
Auto-matching is carried out, Business Management Platform to the first client software sends special instruction,
First client software receives the special instruction, obtains the MAC of operation and all virtual machines on fictitious host computer
Address, and the MAC Address of the second virtual machine is fed back to Business Management Platform,
The mapping database is inquired about, the client id that the MAC Address and the second virtual machine MAC Address match is obtained,
With the client software for running on the second virtual machine, by matching result storage to matching database.
2. method according to claim 1, it is characterised in that:The MAC Address of the virtual machine is obtained according to virtual machine ID
, virtual machine ID is uniquely corresponding with MAC Address, and the MAC Address of the virtual machine is unique.
3. method according to claim 1, it is characterised in that:The Auto-matching is the Auto-matching of periodic triggers.
4. method according to claim 1, it is characterised in that:Fictitious host computer management software to the Business Management Platform is sent out
PUSH message, the PUSH message is sent to be used to obtain the safe condition of virtual machine;According to PUSH message, Business Management Platform inquiry
Matching database, obtains the safety marking of the second client software;Business Management Platform returns to the safety marking fraction
Second virtual machine.
5. method according to claim 1, it is characterised in that:When it fails to match and/or during self-defined matching, at UI interfaces
Designated virtual machine and the mapping relations of client software, carry out self-defined matching, and the self-defined matching priority is higher than automatic
Matching.
6. client unique mark matching system under a kind of virtualized environment, it is characterised in that include with lower module:
Software installation module, for installing the second client software on the second virtual machine, second virtual machine has MAC ground
Location;
Sending module, the MAC Address is sent for second client software to Business Management Platform;
Mapping memory module, arrives the corresponding MAC Address mapping storage of the second client software for the Business Management Platform
Mapping database;
Instruction sending module, for carrying out during Auto-matching, Business Management Platform to the first client software sends special instruction;
Feedback module, for first client software special instruction is received, and obtains operation and the institute on fictitious host computer
There is the MAC Address of virtual machine, and the MAC Address of the second virtual machine is fed back to Business Management Platform;
As a result acquisition module, for inquiring about the mapping database, obtains the MAC Address and the second virtual machine MAC Address phase
The client id of matching, matching runs on the client software of the second virtual machine, by matching result storage to matching database.
7. system according to claim 6, it is characterised in that:The MAC Address of the virtual machine is obtained according to virtual machine ID
, virtual machine ID is uniquely corresponding with MAC Address, and the MAC Address of the virtual machine is unique.
8. system according to claim 6, it is characterised in that:The Auto-matching is the Auto-matching of periodic triggers.
9. system according to claim 6, it is characterised in that:Also include, pushing module, for fictitious host computer management software
PUSH message is sent to the Business Management Platform, the PUSH message is used to obtain the safe condition of virtual machine;Marking is obtained
Module, for according to PUSH message, Business Management Platform match query data base, obtaining the safety hit of the second client software
Point;Marking returns module, and the safety marking fraction is returned to into the second virtual machine for Business Management Platform.
10. system according to claim 6, it is characterised in that:Also include, custom block, for when it fails to match and/
Or during self-defined matching, in the mapping relations of UI interfaces designated virtual machine and client software, carry out self-defined matching, it is described from
Definition matching priority is higher than Auto-matching.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611170159.3A CN106603744B (en) | 2016-12-16 | 2016-12-16 | Client unique identification matching process and system under a kind of virtualized environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611170159.3A CN106603744B (en) | 2016-12-16 | 2016-12-16 | Client unique identification matching process and system under a kind of virtualized environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106603744A true CN106603744A (en) | 2017-04-26 |
CN106603744B CN106603744B (en) | 2019-09-27 |
Family
ID=58601109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611170159.3A Active CN106603744B (en) | 2016-12-16 | 2016-12-16 | Client unique identification matching process and system under a kind of virtualized environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603744B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102195940A (en) * | 2010-03-12 | 2011-09-21 | 北京路模思科技有限公司 | Virtual-machine-technology-based data security input and submission method and system |
CN103368897A (en) * | 2012-03-26 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method, device and system for transmitting application program |
US8705513B2 (en) * | 2009-12-15 | 2014-04-22 | At&T Intellectual Property I, L.P. | Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks |
US20150149404A1 (en) * | 2013-11-27 | 2015-05-28 | Citrix Systems, Inc. | Collaborative online document editing |
-
2016
- 2016-12-16 CN CN201611170159.3A patent/CN106603744B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8705513B2 (en) * | 2009-12-15 | 2014-04-22 | At&T Intellectual Property I, L.P. | Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks |
CN102195940A (en) * | 2010-03-12 | 2011-09-21 | 北京路模思科技有限公司 | Virtual-machine-technology-based data security input and submission method and system |
CN103368897A (en) * | 2012-03-26 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method, device and system for transmitting application program |
US20150149404A1 (en) * | 2013-11-27 | 2015-05-28 | Citrix Systems, Inc. | Collaborative online document editing |
Also Published As
Publication number | Publication date |
---|---|
CN106603744B (en) | 2019-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107689953B (en) | Multi-tenant cloud computing-oriented container security monitoring method and system | |
WO2018113514A1 (en) | Cdn management system, method and apparatus | |
CN104170323B (en) | Fault handling method and device, system based on network function virtualization | |
CN103685608B (en) | A kind of method and device for automatically configuring secure virtual machine IP address | |
CN102316001B (en) | Virtual network connection configuration realizing method and network equipment | |
WO2019184164A1 (en) | Method for automatically deploying kubernetes worker node, device, terminal apparatus, and readable storage medium | |
CN104009883A (en) | Computer resource centralized remote real-time monitoring system and method | |
US8892582B2 (en) | Method and system for identifying objects of service | |
CN110149409B (en) | Cloud host metadata service management method, system, equipment and storage medium | |
CN103516547B (en) | A kind of network parameter distribution method and device | |
KR100926075B1 (en) | Database access through web application server monitoring apparatus and method thereof | |
CN111488181B (en) | Task scheduling method, device, storage medium and server | |
CN105245371A (en) | Automatic deployment system and method based on ansable | |
CN106170947A (en) | A kind of alarm information processing method, relevant device and system | |
US10754675B2 (en) | Identifying entities in a virtualization environment | |
EP1367768B1 (en) | Method and apparatus for providing multiple vendor support to remotely monitored devices | |
US7302477B2 (en) | Administration tool for gathering information about systems and applications including the feature of high availability | |
CN103207965A (en) | Method and device for License authentication in virtual environment | |
CN105610946A (en) | Docker technology based cloud jump server system | |
US8661128B2 (en) | Server machine and network processing method | |
CN113778918A (en) | USB device management system and management method | |
CN102663298A (en) | Safety online detecting system facing to terminal computers | |
CN113438107A (en) | Cluster node expansion method, device, equipment and storage medium | |
CN103618634A (en) | Method for automatically finding nodes in cluster | |
CN105933467A (en) | Client host information change periodic detection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |