CN106603744A - Virtual-environment client unique identification matching method and system - Google Patents

Virtual-environment client unique identification matching method and system Download PDF

Info

Publication number
CN106603744A
CN106603744A CN201611170159.3A CN201611170159A CN106603744A CN 106603744 A CN106603744 A CN 106603744A CN 201611170159 A CN201611170159 A CN 201611170159A CN 106603744 A CN106603744 A CN 106603744A
Authority
CN
China
Prior art keywords
virtual machine
matching
mac address
management platform
client software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611170159.3A
Other languages
Chinese (zh)
Other versions
CN106603744B (en
Inventor
徐冠群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201611170159.3A priority Critical patent/CN106603744B/en
Publication of CN106603744A publication Critical patent/CN106603744A/en
Application granted granted Critical
Publication of CN106603744B publication Critical patent/CN106603744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping

Abstract

The invention provides a virtual-environment client unique identification matching method and system. According to the method, under common use occasions, on the basis of an MAC address, matching between a client ID and a virtual machine ID can be realized, an excellent matching effect is realized, a user-defined matching mode having higher priority is provided, timely correction is carried out when matching fails, and thereby business linkage between a business management platform and a virtual host machine management platform is realized.

Description

Client unique mark matching process and system under a kind of virtualized environment
Technical field
The present invention relates to the technical field of system architecture, client unique mark under more particularly to a kind of virtualized environment Method of completing the square and system.
Background technology
In the prior art, the business management system of a typical service end-client type, wherein usually containing One management end and several clients (also known as agent side), are communicated, in client by message-oriented middleware (such as MQ) It is registered to during initialization in management platform, management platform distinguishes different clients with different ID.In classical use field Jing Zhong, when client registers are to management platform, management platform can all give the client one ID, to distinguish different clients Hold and be managed, this ID is hereinafter referred to as client id.
As Intel Virtualization Technology development in recent years is day by day ripe, client is no longer often physical machine, but virtual machine, at this Under planting scene, user often has the demand of higher level.In virtualized environment, virtual machine is run on fictitious host computer, often One virtual machine all has the ID of itself as mark, and fictitious host computer distinguishes different virtual machines to enter by this ID Row management, this ID is hereinafter referred to as virtual machine ID.
System model of the prior art is:Client software ID=C-1 is run on fictitious host computer ID=H-1, and objective Family end software I D=C-2 is run on virtual machine ID=V-2, and virtual machine V-2 is also run on fictitious host computer H-1, but It is the different software system of two classes from C-1.Client software C-1 and C-2 is registered to the management platform of certain concrete business simultaneously M-2, is indifferent to herein M-2 and is mounted in where.Fictitious host computer management software M-1 be responsible for fictitious host computer and virtual machine are monitored and Management, and management platform M-2 for being responsible for certain concrete business can be third-party, realize that some customizations, M-1 cannot be realized Function, such as security protection and monitoring, in order to be described below conveniently, the system model is fixed tentatively it and realizes scanning safe condition simultaneously And the function of giving a mark.
For some fictitious host computer management softwares, (it is soft that fictitious host computer management software refers to be managed fictitious host computer Part, such as VMWare Workstation), it is carried out by the API Calls of system bottom come the virtual machine to operation thereon Management, and cannot be communicated by common ICP/IP protocol.And sometimes the use scene of user needs to realize to client The matching of software I D and virtual machine ID, to realize matching of the virtual machine to its business.By taking system model mentioned above as an example:It is empty Intend Host Administration software M-1 and know that fictitious host computer H-1 operates above virtual machine V-2, and based on the reason for above describing, it is simultaneously Do not know the client software C-2 of the operation of face thereon, and M-2 maintains the C-1 that runs on H-1 and runs on V-2 The information of C-2.
In traditional demand, M-1 and M-2 are non-interference, each realize respective systemic-function, but user wishes (the safety marking of each virtual machine is for example checked when the service condition of M-2 is directly inquired about in M-1), setting above is then not enough to Meet such demand.Therefore, how the present invention in M-2 management platforms for realize matchings of the C-2 to V-2, it is proposed that one Plant client matching process and system based on MAC Address under virtualized environment.
The content of the invention
The present invention proposes the client matching process and system under a kind of virtualized environment based on MAC Address, common Under using scene, matching for client id and virtual machine ID can be realized, so as to realize Business Management Platform and fictitious host computer pipe The business linkage of platform.
Wherein, commonly used scene is referred to:After a successfully virtual machine is created in fictitious host computer, fictitious host computer Automatically it is its one Microsoft Loopback Adapter of distribution, and it is within the specific limits unduplicated, i.e., and Microsoft Loopback Adapter has uniqueness. During virtual machine use, this Microsoft Loopback Adapter no longer changes, until the virtual machine is deleted.This is also implied that virtually The MAC Address of main frame is constant in the life cycle of fictitious host computer, and this setting is the basis that this method is realized, and this sets It can be satisfaction to be scheduled in most of practical matters.
Client unique mark matching process under a kind of virtualized environment, it is characterised in that:
Second client software is installed on the second virtual machine, second virtual machine has MAC Address,
Second client software to Business Management Platform sends the MAC Address,
The corresponding MAC Address mapping storage of second client software is arrived mapping database by the Business Management Platform,
Auto-matching is carried out, Business Management Platform to the first client software sends special instruction,
First client software receives the special instruction, obtains the MAC of operation and all virtual machines on fictitious host computer Address, and the MAC Address of the second virtual machine is fed back to Business Management Platform,
The mapping database is inquired about, the client id that the MAC Address and the second virtual machine MAC Address match is obtained, With the client software for running on the second virtual machine.
Wherein, the MAC Address of the virtual machine is obtained according to virtual machine ID, and virtual machine ID is uniquely corresponding with MAC Address.
Wherein, the MAC Address of virtual machine is unique.
Wherein, by matching result storage to matching database.
Wherein, the Auto-matching is the Auto-matching of periodic triggers.
Wherein, fictitious host computer management software sends PUSH message to the Business Management Platform, and the PUSH message is used for Obtain the safe condition of virtual machine;According to PUSH message, Business Management Platform match query data base, the second client is obtained soft The safety marking of part;The safety marking fraction is returned to the second virtual machine by Business Management Platform.
Wherein, when it fails to match and/or during self-defined matching, in the mapping of UI interfaces designated virtual machine and client software Relation, carries out self-defined matching, and the self-defined matching priority is higher than Auto-matching.
Client unique mark matching system under a kind of virtualized environment, it is characterised in that include with lower module:
Software installation module, for installing the second client software on the second virtual machine, second virtual machine has MAC ground Location;Sending module, the MAC Address is sent for second client software to Business Management Platform;
Mapping memory module, arrives the corresponding MAC Address mapping storage of the second client software for the Business Management Platform Mapping database;
Instruction sending module, for carrying out during Auto-matching, Business Management Platform to the first client software sends special instruction;
Feedback module, for first client software special instruction is received, and obtains operation and the institute on fictitious host computer There is the MAC Address of virtual machine, and the MAC Address of the second virtual machine is fed back to Business Management Platform;
As a result acquisition module, for inquiring about the mapping database, obtains the MAC Address and the second virtual machine MAC Address phase The client id of matching, matching runs on the client software of the second virtual machine.
Wherein, the MAC Address of the virtual machine is obtained according to virtual machine ID, and virtual machine ID is uniquely corresponding with MAC Address.
Wherein, the MAC Address of virtual machine is unique.
Wherein, by matching result storage to matching database.
Wherein, the Auto-matching is the Auto-matching of periodic triggers.
Wherein, preferably also include, pushing module, send to the Business Management Platform for fictitious host computer management software PUSH message, the PUSH message is used to obtain the safe condition of virtual machine;Marking acquisition module, for according to PUSH message, Business Management Platform match query data base, obtains the safety marking of the second client software;Marking returns module, for business The safety marking fraction is returned to the second virtual machine by management platform.
Wherein, custom block, for when it fails to match and/or during self-defined matching, UI interfaces designated virtual machine with The mapping relations of client software, carry out self-defined matching, and the self-defined matching priority is higher than Auto-matching.
As known from the above, the invention discloses the method and system that client is matched under a kind of virtualized environment, the present invention Method and system be applied to virtualized environment, matched as unique mark according to MAC Address, reached good matching Effect, and there is provided the setting scheme of the user with higher priority so that can be modified in time when it fails to match.This Invention can also be realized checking secure virtual machine marking situation in fictitious host computer management software, without the need for by individually logging in business Management platform is come the beneficial effect checked.
Description of the drawings
Fig. 1,2 are method of the present invention flow charts;
Fig. 3 is the system flow block diagram of the present invention.
Fig. 4 is the system construction drawing of the present invention
Fig. 5 is the principle flow chart of the present invention
Specific embodiment
Specific embodiment is elaborated as follows:Wherein, the virtual machine ID of first and second virtual machine is respectively V-1, V-2, empty Plan main frame is H-1, and the client id of first and second client software is respectively C-1, C-2, and Business Management Platform is M-2, virtual main Machine management software is M-1.
The invention provides client unique mark matching process under a kind of virtualized environment, method flow such as accompanying drawing 1,2 It is shown,
Step 101, installs the second client software on the second virtual machine, and second virtual machine has MAC Address, the Two client softwares to Business Management Platform sends the MAC Address;
After in virtual machine V-2 client software C-2 installed above, when each virtual machine V-2 starts, client software C- 2 random starts and send the MAC Address MAC-2 of oneself to Business Management Platform M-2.
Step 102, the Business Management Platform is by the corresponding MAC Address mapping storage of the second client software to mapping number According to storehouse;
It is MAC-2 that the corresponding MAC Address of client software C-2 is have recorded in Business Management Platform M-2, and the two mapping is closed System's storage is to mapping database.Business Management Platform M-2 is not relevant for client software C-2 and runs on virtual machine V-2.
Step 103, carries out Auto-matching, and Business Management Platform to the first client software sends special instruction;
When needing to be matched (such as periodic triggers), Business Management Platform M-2 to client software C-1 sends out Send a special instruction.
Step 104, first client software receives the special instruction, obtains all in operation and fictitious host computer The MAC Address of virtual machine, and feed back the MAC Address of the second virtual machine to Business Management Platform.
Client software C-1 is obtained after this instruction, just calling system API, obtain it is all run on fictitious host computer H-1 it On virtual machine virtual machine ID and corresponding MAC Address, in this example, when client software C-1 receives Business Management Platform After the special instruction that M-2 sends, just the virtual machine information above fictitious host computer H-1 is fed back to Business Management Platform M-2 so that industry Business management platform M-2 obtains the information that the MAC Address of virtual machine V-2 is MAC-2.
Because either client software C-1 or fictitious host computer H-1 or fictitious host computer management software M-1, now not The ID for knowing the service customer end software run on virtual machine V-2 is C-2, is exactly herein to solve in this void in this case Intend the ID matching problems of main frame.And why client software C-1 or fictitious host computer H-1 does not know what is run on virtual machine V-2 Client id is C-2, has been carried out explaining above.
Step 105, inquires about the mapping database, what the acquisition MAC Address and the second virtual machine MAC Address matched Client id, matching runs on the client software of the second virtual machine.
It is just counter from data base to inquire about after the MAC that Business Management Platform M-2 receives virtual machine V-2 is MAC-2, Because of client software C-2, when reaching the standard grade, warp-wise Business Management Platform M-2 has reported the information that the MAC of oneself is MAC-2, so By MAC-2, it is C-2 that Business Management Platform M-2 can be matched and be run on the ID of the client on virtual machine V-2, business pipe This matching result is deposited standby into matching database by platform M-2, and matching is completed.
In order to easily facilitate understanding, the meaning for illustrating this matching scheme is continued herein.
In order to illustrate the meaning of this programme, following scene is set:M-1 is fictitious host computer management software, and it does not have peace The function of full management, and Business Management Platform M-2 is safety management platform, it has abundant management function.In order to reduce coupling Conjunction property and reduce system complexity, increase system trimming and customizability, M-1 be impossible fully-integrated M-2 it is all Function.
Step 201, fictitious host computer management software to the Business Management Platform sends PUSH message, and the PUSH message is used In the safe condition for obtaining virtual machine;
In use, M-2 is according to the client software C-2 being arranged on above virtual machine V-2, the safety to virtual machine V-2 State is estimated, and provides marking, and when user wishes just see this marking by M-1, M-2 to M-1 sends PUSH message, content is exactly the safety marking result got (by client software C-2) above virtual machine V-2.
Step 202, according to PUSH message, Business Management Platform match query data base, obtains the second client software Safety marking;Matching result in M-2 match query data bases, obtains to the marking situation of client software C-2.
The safety marking fraction is returned to the second virtual machine by step 203, Business Management Platform;M-2 gets client The marking situation of end software C-2, by the fraction of marking virtual machine V-2 is sent to.
Present invention also offers client unique mark matching system under a kind of virtualized environment, system flow block diagram is for example attached Shown in Fig. 3,
Software installation module, for installing the second client software on the second virtual machine, second virtual machine has MAC Address;Sending module, the MAC Address is sent for second client software to Business Management Platform;
After in virtual machine V-2 client software C-2 installed above, when each virtual machine V-2 starts, client software C- 2 random starts and send the MAC Address MAC-2 of oneself to Business Management Platform M-2.
Mapping memory module, deposits the corresponding MAC Address mapping of the second client software for the Business Management Platform Store up mapping database;
It is MAC-2 that the corresponding MAC Address of client software C-2 is have recorded in Business Management Platform M-2, and the two mapping is closed System's storage is to mapping database.Business Management Platform M-2 is not relevant for client software C-2 and runs on virtual machine V-2.
Instruction sending module, for carrying out during Auto-matching, Business Management Platform sends special to the first client software Instruction;
When needing to be matched (such as periodic triggers), Business Management Platform M-2 to client software C-1 sends out Send a special instruction.
Feedback module, for first client software special instruction is received, and is obtained on operation and fictitious host computer All virtual machines MAC Address, and to Business Management Platform feed back the second virtual machine MAC Address;
Client software C-1 is obtained after this instruction, just calling system API, obtain it is all run on fictitious host computer H-1 it On virtual machine virtual machine ID and corresponding MAC Address, in this example, when client software C-1 receives Business Management Platform After the special instruction that M-2 sends, just the virtual machine information above fictitious host computer H-1 is fed back to Business Management Platform M-2 so that industry Business management platform M-2 obtains the information that the MAC Address of virtual machine V-2 is MAC-2.
Because either client software C-1 or fictitious host computer H-1 or fictitious host computer management software M-1, now not The ID for knowing the service customer end software run on virtual machine V-2 is C-2, is exactly herein to solve in this void in this case Intend the ID matching problems of main frame.And why client software C-1 or fictitious host computer H-1 does not know what is run on virtual machine V-2 Client id is C-2, has been carried out explaining above.
As a result acquisition module, for inquiring about the mapping database, obtains the MAC Address and the second virtual machine MAC ground The client id that location matches, matching runs on the client software of the second virtual machine.
It is just counter from data base to inquire about after the MAC that Business Management Platform M-2 receives virtual machine V-2 is MAC-2, Because of client software C-2, when reaching the standard grade, warp-wise Business Management Platform M-2 has reported the information that the MAC of oneself is MAC-2, so By MAC-2, it is C-2 that Business Management Platform M-2 can be matched and be run on the ID of the client on virtual machine V-2, business pipe This matching result is deposited standby into matching database by platform M-2, and matching is completed.
In order to illustrate the meaning of this programme, following scene is set:M-1 is fictitious host computer management software, and it does not have peace The function of full management, and Business Management Platform M-2 is safety management platform, it has abundant management function.In order to reduce coupling Conjunction property and reduce system complexity, increase system trimming and customizability, M-1 be impossible fully-integrated M-2 it is all Function.
Pushing module, PUSH message, the push are sent for fictitious host computer management software to the Business Management Platform Message is used to obtain the safe condition of virtual machine;
In use, M-2 is according to the client software C-2 being arranged on above virtual machine V-2, the safety to virtual machine V-2 State is estimated, and provides marking, and when user wishes just see this marking by M-1, M-2 to M-1 sends PUSH message, content is exactly the safety marking result got (by client software C-2) above virtual machine V-2.
Marking acquisition module, for according to PUSH message, Business Management Platform match query data base, obtaining the second client The safety marking of end software;Matching result in M-2 match query data bases, obtains to the marking situation of client software C-2.
Marking returns module, and the safety marking fraction is returned to into the second virtual machine for Business Management Platform;M-2 is obtained The marking situation of client software C-2 is got, the fraction of marking is sent to into virtual machine V-2.
Therefore, by the method for the present invention, user just only can see the safe marking situation of V-2 on M-1, and without Individually log in M-2 to check.
For it fails to match or user with specific demand, process provides user-defined function.Business Management platform M-2 provides editting function on UI interfaces, when user specifies the ID of client software C-2 and virtual machine V-2 It is preferential with user configuring when safe condition is pushed after mapping relations.So as to solve that it fails to match or specific demand etc. is asked Topic.
To make the object, technical solutions and advantages of the present invention clearer, the present invention is done into one below in conjunction with accompanying drawing Step ground is described in detail.
Present system structure chart, as shown in Figure 4, including fictitious host computer H-1, fictitious host computer management software M-1, virtually Machine V-2, its MAC Address is MAC-2, and security client C-1 and C-2 are registered to safety management platform M-2.
As shown in Figure 5, it is not a set of top-down distance to method of the present invention flow process, but some flow processs, By the data-linkage of data base between flow process, the method does not specify the triggering mode and execution sequence of flow process.
For the flow process 1 for from left to right counting, which define and to send when client is reached the standard grade own MAC address to pipe Platform M-2.
For flow process 2, when which defining triggering matching operation, specific method.It is the same as those described above, M-2 request C-1, C-1 leads to It is MAC-2 to cross the MAC for calling system API of H-1 to get V-2.Simultaneously M-2 has now been obtained by the on-line message of C-2 The MAC for having arrived C-2 is MAC-2, according to the constant unduplicated hypothesis of MAC Address before, then the corresponding virtual machines of C-2 are exactly V- 2。
For flow process 3, which define when M-1 asks M-2, during the safe condition of V-2 to be known, M-2 directly inquires about data It is C-2 that storehouse obtains the corresponding clients of V-2, then inquire about data base to obtain the safety marking of C-2 is 90, then by the safe shape of V-2 Message as state marking is 90 points sends M-1 to, so that M-1 obtains the safe condition of V-2.
Wherein, flow process 1 and flow process 2 define the flow process of matching, and flow process 3 illustrates the use scene of this flow process, be in order to Readily appreciate.A kind of scene that flow process 3 is defined in which.
In addition, the flow chart is not defined flow process when User Defined is matched, because user-defined excellent First level is higher, and when user-defined matching is triggered, above-mentioned flow process is no longer performed.
This method is also applied for the situation of multiple stage fictitious host computer and multiple stage virtual machine.
The foregoing description of the disclosed embodiments, enables those skilled in the art to realize or using the present invention.To this Various modifications of a little embodiments will be apparent for a person skilled in the art, the General Principle defined in the present invention Can realize in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not be by It is limited to the embodiments shown herein, but meets consistent with principles disclosed herein and features of novelty most wide Scope.

Claims (10)

1. client unique mark matching process under a kind of virtualized environment, it is characterised in that:
Second client software is installed on the second virtual machine, second virtual machine has MAC Address, second client Software to Business Management Platform sends the MAC Address,
The corresponding MAC Address mapping storage of second client software is arrived mapping database by the Business Management Platform,
Auto-matching is carried out, Business Management Platform to the first client software sends special instruction,
First client software receives the special instruction, obtains the MAC of operation and all virtual machines on fictitious host computer Address, and the MAC Address of the second virtual machine is fed back to Business Management Platform,
The mapping database is inquired about, the client id that the MAC Address and the second virtual machine MAC Address match is obtained, With the client software for running on the second virtual machine, by matching result storage to matching database.
2. method according to claim 1, it is characterised in that:The MAC Address of the virtual machine is obtained according to virtual machine ID , virtual machine ID is uniquely corresponding with MAC Address, and the MAC Address of the virtual machine is unique.
3. method according to claim 1, it is characterised in that:The Auto-matching is the Auto-matching of periodic triggers.
4. method according to claim 1, it is characterised in that:Fictitious host computer management software to the Business Management Platform is sent out PUSH message, the PUSH message is sent to be used to obtain the safe condition of virtual machine;According to PUSH message, Business Management Platform inquiry Matching database, obtains the safety marking of the second client software;Business Management Platform returns to the safety marking fraction Second virtual machine.
5. method according to claim 1, it is characterised in that:When it fails to match and/or during self-defined matching, at UI interfaces Designated virtual machine and the mapping relations of client software, carry out self-defined matching, and the self-defined matching priority is higher than automatic Matching.
6. client unique mark matching system under a kind of virtualized environment, it is characterised in that include with lower module:
Software installation module, for installing the second client software on the second virtual machine, second virtual machine has MAC ground Location;
Sending module, the MAC Address is sent for second client software to Business Management Platform;
Mapping memory module, arrives the corresponding MAC Address mapping storage of the second client software for the Business Management Platform Mapping database;
Instruction sending module, for carrying out during Auto-matching, Business Management Platform to the first client software sends special instruction;
Feedback module, for first client software special instruction is received, and obtains operation and the institute on fictitious host computer There is the MAC Address of virtual machine, and the MAC Address of the second virtual machine is fed back to Business Management Platform;
As a result acquisition module, for inquiring about the mapping database, obtains the MAC Address and the second virtual machine MAC Address phase The client id of matching, matching runs on the client software of the second virtual machine, by matching result storage to matching database.
7. system according to claim 6, it is characterised in that:The MAC Address of the virtual machine is obtained according to virtual machine ID , virtual machine ID is uniquely corresponding with MAC Address, and the MAC Address of the virtual machine is unique.
8. system according to claim 6, it is characterised in that:The Auto-matching is the Auto-matching of periodic triggers.
9. system according to claim 6, it is characterised in that:Also include, pushing module, for fictitious host computer management software PUSH message is sent to the Business Management Platform, the PUSH message is used to obtain the safe condition of virtual machine;Marking is obtained Module, for according to PUSH message, Business Management Platform match query data base, obtaining the safety hit of the second client software Point;Marking returns module, and the safety marking fraction is returned to into the second virtual machine for Business Management Platform.
10. system according to claim 6, it is characterised in that:Also include, custom block, for when it fails to match and/ Or during self-defined matching, in the mapping relations of UI interfaces designated virtual machine and client software, carry out self-defined matching, it is described from Definition matching priority is higher than Auto-matching.
CN201611170159.3A 2016-12-16 2016-12-16 Client unique identification matching process and system under a kind of virtualized environment Active CN106603744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611170159.3A CN106603744B (en) 2016-12-16 2016-12-16 Client unique identification matching process and system under a kind of virtualized environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611170159.3A CN106603744B (en) 2016-12-16 2016-12-16 Client unique identification matching process and system under a kind of virtualized environment

Publications (2)

Publication Number Publication Date
CN106603744A true CN106603744A (en) 2017-04-26
CN106603744B CN106603744B (en) 2019-09-27

Family

ID=58601109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611170159.3A Active CN106603744B (en) 2016-12-16 2016-12-16 Client unique identification matching process and system under a kind of virtualized environment

Country Status (1)

Country Link
CN (1) CN106603744B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195940A (en) * 2010-03-12 2011-09-21 北京路模思科技有限公司 Virtual-machine-technology-based data security input and submission method and system
CN103368897A (en) * 2012-03-26 2013-10-23 腾讯科技(深圳)有限公司 Method, device and system for transmitting application program
US8705513B2 (en) * 2009-12-15 2014-04-22 At&T Intellectual Property I, L.P. Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks
US20150149404A1 (en) * 2013-11-27 2015-05-28 Citrix Systems, Inc. Collaborative online document editing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8705513B2 (en) * 2009-12-15 2014-04-22 At&T Intellectual Property I, L.P. Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks
CN102195940A (en) * 2010-03-12 2011-09-21 北京路模思科技有限公司 Virtual-machine-technology-based data security input and submission method and system
CN103368897A (en) * 2012-03-26 2013-10-23 腾讯科技(深圳)有限公司 Method, device and system for transmitting application program
US20150149404A1 (en) * 2013-11-27 2015-05-28 Citrix Systems, Inc. Collaborative online document editing

Also Published As

Publication number Publication date
CN106603744B (en) 2019-09-27

Similar Documents

Publication Publication Date Title
CN107689953B (en) Multi-tenant cloud computing-oriented container security monitoring method and system
WO2018113514A1 (en) Cdn management system, method and apparatus
CN104170323B (en) Fault handling method and device, system based on network function virtualization
CN103685608B (en) A kind of method and device for automatically configuring secure virtual machine IP address
CN102316001B (en) Virtual network connection configuration realizing method and network equipment
WO2019184164A1 (en) Method for automatically deploying kubernetes worker node, device, terminal apparatus, and readable storage medium
CN104009883A (en) Computer resource centralized remote real-time monitoring system and method
US8892582B2 (en) Method and system for identifying objects of service
CN110149409B (en) Cloud host metadata service management method, system, equipment and storage medium
CN103516547B (en) A kind of network parameter distribution method and device
KR100926075B1 (en) Database access through web application server monitoring apparatus and method thereof
CN111488181B (en) Task scheduling method, device, storage medium and server
CN105245371A (en) Automatic deployment system and method based on ansable
CN106170947A (en) A kind of alarm information processing method, relevant device and system
US10754675B2 (en) Identifying entities in a virtualization environment
EP1367768B1 (en) Method and apparatus for providing multiple vendor support to remotely monitored devices
US7302477B2 (en) Administration tool for gathering information about systems and applications including the feature of high availability
CN103207965A (en) Method and device for License authentication in virtual environment
CN105610946A (en) Docker technology based cloud jump server system
US8661128B2 (en) Server machine and network processing method
CN113778918A (en) USB device management system and management method
CN102663298A (en) Safety online detecting system facing to terminal computers
CN113438107A (en) Cluster node expansion method, device, equipment and storage medium
CN103618634A (en) Method for automatically finding nodes in cluster
CN105933467A (en) Client host information change periodic detection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant