CN106790039B - Task flow control method and system of KVM system - Google Patents

Task flow control method and system of KVM system Download PDF

Info

Publication number
CN106790039B
CN106790039B CN201611169630.7A CN201611169630A CN106790039B CN 106790039 B CN106790039 B CN 106790039B CN 201611169630 A CN201611169630 A CN 201611169630A CN 106790039 B CN106790039 B CN 106790039B
Authority
CN
China
Prior art keywords
terminal
application
task flow
information
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611169630.7A
Other languages
Chinese (zh)
Other versions
CN106790039A (en
Inventor
朱小华
陈先志
梁英蓬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vtron Technologies Ltd
Original Assignee
Vtron Technologies Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vtron Technologies Ltd filed Critical Vtron Technologies Ltd
Priority to CN201611169630.7A priority Critical patent/CN106790039B/en
Publication of CN106790039A publication Critical patent/CN106790039A/en
Priority to PCT/CN2017/096493 priority patent/WO2018107780A1/en
Application granted granted Critical
Publication of CN106790039B publication Critical patent/CN106790039B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to a control method and a system of a KVM system, wherein the method comprises the following steps: acquiring the associated information of the currently executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application; after receiving an execution instruction of the task flow, performing authorization verification on the application on the terminal according to the associated information, and logging in the application after the authorization verification is successful; and receiving an operation instruction of the task flow, and controlling the application to execute corresponding operation according to the operation instruction.

Description

Task flow control method and system of KVM system
Technical Field
The invention relates to the technical field of computers, in particular to a task flow control method and system of a KVM system.
Background
KVM is an abbreviation for Keyboard (Keyboard), display (Video), Mouse (Mouse). The core idea of the KVM technology is as follows: through the configuration of proper keyboard, mouse, display, realize the centralized management of system and network and provide manageability, improve system administrator's work efficiency, practice thrift the area of computer lab, reduce the total cost of ownership of network engineering and server system, avoid using the radiation that many displays produced, build healthy environmental protection's computer lab. With the KVM multi-host switching system, one set of KVM can be used to switch between hosts or servers of different operating systems.
Conventional KVM technology has experienced several evolutionary processes, and has been connected by conventional hardware connections through a network, greatly expanding the convenience of control room control. However, as the control room services and applications grow, the drawbacks of the control method become more and more obvious, and users usually need to log in multiple computers, input different user names and passwords for multiple times, and log in different application systems for multiple times in order to complete a closely related task, which results in low operation efficiency.
Disclosure of Invention
Therefore, it is necessary to provide a task flow control method and system for a KVM system to solve the problem of low operation efficiency.
A task flow control method of a KVM system comprises the following steps:
acquiring the associated information of the currently executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application;
after receiving an execution instruction of the task flow, performing authorization verification on the application on the terminal according to the associated information, and logging in the application after the authorization verification is successful;
and receiving an operation instruction of the task flow, and controlling the application to execute corresponding operation according to the operation instruction.
A control system for a KVM system, comprising:
the first acquisition module is used for acquiring the associated information of the currently executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application;
the login module is used for performing authorization verification on the application on the terminal according to the associated information after receiving an execution instruction of the task flow, and logging in the application after the authorization verification is successful;
and the control module is used for receiving an operation instruction of the task flow and controlling the application to execute corresponding operation according to the operation instruction.
According to the task flow control method and system of the KVM system, the information of the terminal and the application related to the currently executed task flow is acquired, after the execution instruction of the task flow is received, the corresponding application on the terminal required by executing the task flow is automatically logged in according to the information, and the application is controlled to execute the corresponding operation according to the operation instruction of the task flow. When a user executes a task, the user does not need to manually input a login account password or manually switch the terminal, and only needs to input an operation instruction and a control instruction related to the task flow, the KVM system can be automatically switched to the corresponding terminal and the corresponding application to execute the operation, so that the operation efficiency is improved.
Drawings
FIG. 1 is a flow chart of a task flow control method for a KVM system according to one embodiment;
FIG. 2 is a block diagram of a KVM system according to one embodiment;
FIG. 3 is a schematic diagram of a task flow control system of a KVM system according to one embodiment.
Detailed Description
The technical solution of the present invention will be explained below with reference to the accompanying drawings.
As shown in FIG. 1, the present invention provides a task flow control method for a KVM system, which comprises the following steps:
s1, acquiring the relevant information of the current executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application;
the task flows to be executed for completing the whole task may be one or more, and the task flow to be executed last time may be set as the task flow currently controlled to be executed. The terminal is a terminal which can be controlled by the KVM host, and preferably, can be an intelligent terminal such as a computer. The number of the terminals may be one or more, and the configuration of the KVM system is shown in fig. 2. The plurality of task flows can be executed by the same terminal or different terminals, and the specific task flow executed by which terminal can be determined according to the actual situation. The identification information is information for identifying the terminal, that is, a unique identification of the terminal, and may be information that can uniquely identify a terminal, such as an IP address of the terminal, a number of the terminal, and the like. The authorization information of the terminal may include a login account and a password of the terminal and/or a login manner of the terminal. The login mode may include domain user login, local user login, and the like. The application is an application program installed on the terminal, and a plurality of task flows can be executed by the same application or different applications. The application may be various applications such as a communication tool, a drawing tool, a browser, a download tool, etc. The authorization information of the application may include a login account and a password of the application and/or a starting mode of the application. The starting mode of the application may include domain user login, local user login, and the like. For example, when logging in an OutLook application, if the domain user logs in, the user name and password do not need to be input again, and if the local user logs in, the user name and password need to be input again.
In an embodiment, in order to facilitate invoking a terminal and an application corresponding to each task flow, the task flow may be associated with identification information of a terminal that executes the task flow, authorization information of the terminal, an application on the terminal related to the task flow, and authorization information of the application in advance to obtain the associated information, and the associated information is stored. During association, a list may be established, where the list may include identification information of task flows (for example, information for uniquely identifying one task flow, such as a serial number or a name of a task flow), identification information of a terminal corresponding to the identification information of the task flow, authorization information of the terminal, an application on the terminal related to the task flow, and authorization information of the application. In one embodiment, assuming that applications required by a certain task flow are installed on a plurality of terminals, the unique identifier of the task flow may be associated with the plurality of terminals on which the corresponding applications are installed. For example, when the application 1 is needed to be used in the task flow 1, and the terminal 1, the terminal 2, and the terminal 3 are all installed with the application 1, the task flow 1 may be associated with the application 1 on the terminal 1 and the terminal 1, the task flow 1 may be associated with the application 1 on the terminal 2 and the terminal 2, and the task flow 1 may be associated with the application 1 on the terminal 3 and the terminal 3. The method has the advantages that when the application on a certain terminal cannot be used or the certain terminal runs slowly, the corresponding task flow can be executed through the standby terminal, and the problem that the execution progress of the whole task is delayed due to the fact that the corresponding task flow cannot be implemented is avoided.
Specific forms can be shown in the following table:
Figure GDA0002231618280000041
if there are multiple available terminals associated with the task flow, the optimal terminal may be selected based on the configuration of each terminal. The operating parameters may include memory occupancy, operating system, processor type, and the like. By the method, the optimal terminal can be selected, and the execution efficiency of the task flow is improved.
In practical cases, there may be a case where a plurality of task flows can be executed in parallel. In this case, the terminal executing the task flow may be selected according to the terminals executing other parallel task flows, so as to avoid conflict with other task flows. For example, although the task flow 1 can be executed by selecting the terminal 1, the terminal 2, and the terminal 3 at the same time, the task flow 2 executed in parallel with the task flow 1 can be executed by selecting only the terminal 2, and in this case, when the terminal for executing the task flow 1 is selected, the terminal 2 can be excluded and the terminal 1 and the terminal 3 can be preferentially selected.
In one embodiment, multiple KVM hosts may be included in the system, each KVM host may control multiple terminals, but terminals controlled by different KVM hosts may overlap. For example, the KVM host 1 may control the terminal 1 and the terminal 2, and the KVM host 2 may control the terminal 2 and the terminal 3. In order to avoid conflict between task flows controlled and executed by different KVM hosts due to occupation of terminals, the method may further receive identification information of the task flows and the terminals executing the task flows, authorization information of the terminals, applications on the terminals related to the task flows and associated information of the authorization information of the applications, which are sent by other KVM hosts, and select the terminal executing the task flow according to the associated information. For example, the task flow 1 controlled by the KVM host 1 may be executed by selecting the terminal 1, the terminal 2, and the terminal 3 at the same time, but the task flow 1 controlled by the KVM host 2 may be executed by selecting only the terminal 2, and at this time, the KVM host 1 may exclude the terminal 2 and preferentially select the terminal 1 and the terminal 3 when selecting to execute the task flow 1. By the method, the conflict with task flows controlled by other KVM hosts in the system can be avoided, and the execution efficiency of the whole system is improved.
Assuming that there are multiple task flows, there is an execution sequence between the task flows in many cases, for example, when executing a task, it is necessary to execute task flow 1, then execute task flow 2, then execute task flow 3, … …, and so on. Therefore, the execution sequence among the task flows can be acquired; after the terminal authorizes the KVM host to log in the application, a switching instruction for the task flow can be received; switching the currently executed task flow to the next task flow according to the execution sequence; and returning to the step of acquiring the associated information of the currently executed task flow. By the method, the next terminal and the corresponding application can be automatically logged when one task flow is finished, manual control for switching is not needed, and the switching process efficiency is higher.
In order to further improve the switching efficiency, a task node may be further set in the task, and the task node may be set according to the execution progress of the task flow, for example, may be set at 90% of the execution progress of the task flow. When the terminal and the corresponding application are switched, the task node can be detected first, and when the task node is detected, various information of the terminal and the application related to the next task flow is read in advance, so that the terminal can be switched to the next terminal more quickly, and the operation efficiency is improved. In an actual situation, each task flow may further include a plurality of sub-flows, and each item of information of the terminal and the application related to the next task flow may be read in advance according to the execution progress of each sub-flow, for example, each item of information of the terminal and the application related to the next task flow may be read in advance when the execution progress of the preset sub-flow or the sub-flow reaches a preset progress threshold (e.g., 90%), so as to switch to the next terminal more quickly, and improve the operation efficiency. For example, if the task flow 1 includes the sub-flow 1, the sub-flow 2, the sub-flow 3, … …, and the sub-flow 10, when the sub-flow 8 is executed, the information of the terminal and the application related to the next task flow may be read in advance, or when the execution progress of the sub-flow is 90% (in the case of 10 task flows, that is, 9 task flows are executed), the information of the terminal and the application related to the next task flow may be read in advance.
And S2, after receiving the execution instruction of the task flow, performing authorization verification on the application on the terminal according to the associated information, and logging in the application after the authorization verification is successful.
Specifically, after receiving an execution instruction of the task flow, the authorization information of the terminal may be sent to the terminal according to the identification information to perform terminal login authorization verification; the terminal authorizes the KVM host to log in after the terminal login authorization verification passes; when the login authorization verification is performed, the authorization information of the terminal can be sent to the terminal according to the identification information to perform the terminal login authorization verification. For example, assuming that the task flow and the related information are associated in advance, the related authorization information may be called according to the associated information, and the authorization information of the terminal may be sent to the terminal according to the identification information (such as an IP address) of the terminal to perform terminal login authorization verification. The authorization verification may be performed in the background of the terminal.
S3, after the KVM host logs in the terminal, sending an application starting instruction to the terminal, and after the application is started, sending the authorization information of the application to the terminal for application login authorization verification; and the terminal authorizes the KVM host to log in the application after the application login authorization verification is passed.
For ease of understanding, the following is given as an example of one implementation:
step S101, establishing a task flow:
adding step 1: a user name and a password for logging in the computer 1, a computer login mode, a starting mode of the application 1, a login account and a password of the application 1, and the like.
An adding step 2: a user name and a password for logging in the computer 2, a computer login mode, a starting mode of the application 2, a login account and a password of the application 1 and the like.
An adding step 3: a user name and a password for logging in the computer 3, a computer login mode, a starting mode of the application 3, a login account and a password of the application 1 and the like.
After the task flow of the user is established, the step S102 is carried out;
step S102 is that the user starts the flow,
entering the step 1, the KVM host reads the information in the step to obtain the user name and the password for logging in the computer 1, the computer login mode, the starting mode of the application 1, the login account number and the password of the application 1 and the like, and sends the user name and the password to the background program of the computer 1, the background program automatically logs in the computer 1 after obtaining the user name and the password of the computer 1, then sends an instruction for starting the application 1, and the user can input the account number and the password of the application 1 after starting the application 1 and logs in the application 1. After finishing, switching to the step 2;
entering the step 2, the KVM host reads the information in the step to obtain the user name and the password for logging in the computer 2, the computer login mode, the starting mode of the application 2, the login account number and the password of the application 2 and the like, and sends the user name and the password to the background program of the computer 2, the background program automatically logs in the computer 2 after obtaining the user name and the password of the computer 2, then sends an instruction for starting the application 2, and the application 2 inputs the account number and the password of the application 2 after being started and logs in the application 2. After finishing, switching to the step 3;
entering step 3, the KVM host reads the information in the step to obtain the user name and password of the login computer 3, the computer login mode, the starting mode of the application 3, the login account and password of the application 3, and the like, and sends the user name and password of the computer 3 to the background program of the computer 3, the background program automatically logs in the computer 3 after obtaining the user name and password of the computer 3, then sends an instruction for starting the application 3, and the application 3 inputs the account and password of the application 3 after being started and logs in the application 3. And finishing the execution of the whole business process.
To take a simplest example, suppose the workflow of the a operator is: flow A.1, sending an email OutLook, flow A.2, compiling an acceptance and payment list (Excel); the workflow of the B operator is: procedure b.1, check PLM configuration, procedure b.2, check SVN. Assume a total of four computers in the control room, OutLook on PC1, Excel on PC2, PLM on PC3, and SVN on PC4, respectively. In a conventional KVM system, the A, B operator must know what applications are installed on each computer and then log onto each computer when they are to be used. This is machine-oriented, and everyone must know what tasks each machine can handle. In the task flow control mode of the workflow-oriented KVM system provided by the present invention, each user only needs to care about his work, for example, for a, only needs to care about sending a mail, and needs to write a balance list, and when he clicks a button for sending a mail, the system automatically helps him to log in to the PC1 and open Outlook, and he does not need to care about which machine Outlook is installed at all. By the method, the operation of the user can be facilitated, and the operation efficiency of the user is improved.
As shown in FIG. 3, the present invention provides a control system for a KVM system, comprising:
a first obtaining module 10, configured to obtain associated information of a currently executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application;
the task flows to be executed for completing the whole task may be one or more, and the task flow to be executed last time may be set as the task flow currently controlled to be executed. The terminal is a terminal which can be controlled by the KVM host, and preferably, can be an intelligent terminal such as a computer. The number of the terminals may be one or more, and the configuration of the KVM system is shown in fig. 2. The plurality of task flows can be executed by the same terminal or different terminals, and the specific task flow executed by which terminal can be determined according to the actual situation. The identification information is information for identifying the terminal, that is, a unique identification of the terminal, and may be information that can uniquely identify a terminal, such as an IP address of the terminal, a number of the terminal, and the like. The authorization information of the terminal may include a login account and a password of the terminal and/or a login manner of the terminal. The login mode may include domain user login, local user login, and the like. The application is an application program installed on the terminal, and a plurality of task flows can be executed by the same application or different applications. The application may be various applications such as a communication tool, a drawing tool, a browser, a download tool, etc. The authorization information of the application may include a login account and a password of the application and/or a starting mode of the application. The starting mode of the application may include domain user login, local user login, and the like. For example, when logging in an OutLook application, if the domain user logs in, the user name and password do not need to be input again, and if the local user logs in, the user name and password need to be input again.
In an embodiment, in order to facilitate invoking a terminal and an application corresponding to each task flow, the task flow may be associated with identification information of a terminal that executes the task flow, authorization information of the terminal, an application on the terminal related to the task flow, and authorization information of the application in advance to obtain the associated information, and the associated information is stored. During association, a list may be established, where the list may include identification information of task flows (for example, information for uniquely identifying one task flow, such as a serial number or a name of a task flow), identification information of a terminal corresponding to the identification information of the task flow, authorization information of the terminal, an application on the terminal related to the task flow, and authorization information of the application. In one embodiment, assuming that applications required by a certain task flow are installed on a plurality of terminals, the unique identifier of the task flow may be associated with the plurality of terminals on which the corresponding applications are installed. For example, when the application 1 is needed to be used in the task flow 1, and the terminal 1, the terminal 2, and the terminal 3 are all installed with the application 1, the task flow 1 may be associated with the application 1 on the terminal 1 and the terminal 1, the task flow 1 may be associated with the application 1 on the terminal 2 and the terminal 2, and the task flow 1 may be associated with the application 1 on the terminal 3 and the terminal 3. The method has the advantages that when the application on a certain terminal cannot be used or the certain terminal runs slowly, the corresponding task flow can be executed through the standby terminal, and the problem that the execution progress of the whole task is delayed due to the fact that the corresponding task flow cannot be implemented is avoided.
Specific forms can be shown in the following table:
Figure GDA0002231618280000081
if there are multiple available terminals associated with the task flow, the optimal terminal may be selected based on the configuration of each terminal. The operating parameters may include memory occupancy, operating system, processor type, and the like. By the method, the optimal terminal can be selected, and the execution efficiency of the task flow is improved.
In practical cases, there may be a case where a plurality of task flows can be executed in parallel. In this case, the terminal executing the task flow may be selected according to the terminals executing other parallel task flows, so as to avoid conflict with other task flows. For example, although the task flow 1 can be executed by selecting the terminal 1, the terminal 2, and the terminal 3 at the same time, the task flow 2 executed in parallel with the task flow 1 can be executed by selecting only the terminal 2, and in this case, when the terminal for executing the task flow 1 is selected, the terminal 2 can be excluded and the terminal 1 and the terminal 3 can be preferentially selected.
In one embodiment, multiple KVM hosts may be included in the system, each KVM host may control multiple terminals, but terminals controlled by different KVM hosts may overlap. For example, the KVM host 1 may control the terminal 1 and the terminal 2, and the KVM host 2 may control the terminal 2 and the terminal 3. In order to avoid conflict between task flows controlled and executed by different KVM hosts due to occupation of terminals, the method may further receive identification information of the task flows and the terminals executing the task flows, authorization information of the terminals, applications on the terminals related to the task flows and associated information of the authorization information of the applications, which are sent by other KVM hosts, and select the terminal executing the task flow according to the associated information. For example, the task flow 1 controlled by the KVM host 1 may be executed by selecting the terminal 1, the terminal 2, and the terminal 3 at the same time, but the task flow 1 controlled by the KVM host 2 may be executed by selecting only the terminal 2, and at this time, the KVM host 1 may exclude the terminal 2 and preferentially select the terminal 1 and the terminal 3 when selecting to execute the task flow 1. By the method, the conflict with task flows controlled by other KVM hosts in the system can be avoided, and the execution efficiency of the whole system is improved.
Assuming that there are multiple task flows, there is an execution sequence between the task flows in many cases, for example, when executing a task, it is necessary to execute task flow 1, then execute task flow 2, then execute task flow 3, … …, and so on. Therefore, the execution sequence among the task flows can be acquired through the second acquisition module; after the terminal authorizes the KVM host to log in the application, receiving a switching instruction of the task flow through a receiving module; the currently executed task flow can be switched to the next task flow through a switching module according to the execution sequence; and returns to perform the function of the first acquisition module. By the method, the next terminal and the corresponding application can be automatically logged when one task flow is finished, manual control for switching is not needed, and the switching process efficiency is higher.
In order to further improve the switching efficiency, a task node may be further set in the task, and the task node may be set according to the execution progress of the task flow, for example, may be set at 90% of the execution progress of the task flow. When the terminal and the corresponding application are switched, the task node can be detected first, and when the task node is detected, various information of the terminal and the application related to the next task flow is read in advance, so that the terminal can be switched to the next terminal more quickly, and the operation efficiency is improved. In an actual situation, each task flow may further include a plurality of sub-flows, and each item of information of the terminal and the application related to the next task flow may be read in advance according to the execution progress of each sub-flow, for example, each item of information of the terminal and the application related to the next task flow may be read in advance when the execution progress of the preset sub-flow or the sub-flow reaches a preset progress threshold (e.g., 90%), so as to switch to the next terminal more quickly, and improve the operation efficiency. For example, if the task flow 1 includes the sub-flow 1, the sub-flow 2, the sub-flow 3, … …, and the sub-flow 10, when the sub-flow 8 is executed, the information of the terminal and the application related to the next task flow may be read in advance, or when the execution progress of the sub-flow is 90% (in the case of 10 task flows, that is, 9 task flows are executed), the information of the terminal and the application related to the next task flow may be read in advance.
The login module 20 is configured to perform authorization verification on the application on the terminal according to the association information after receiving an execution instruction of the task flow, and log in the application after the authorization verification is successful;
specifically, after receiving an execution instruction of the task flow, the authorization information of the terminal may be sent to the terminal according to the identification information to perform terminal login authorization verification; the terminal authorizes the KVM host to log in after the terminal login authorization verification passes; when the login authorization verification is performed, the authorization information of the terminal can be sent to the terminal according to the identification information to perform the terminal login authorization verification. For example, assuming that the task flow and the related information are associated in advance, the related authorization information may be called according to the associated information, and the authorization information of the terminal may be sent to the terminal according to the identification information (such as an IP address) of the terminal to perform terminal login authorization verification. The authorization verification may be performed in the background of the terminal. When the login authorization verification is performed, the authorization information of the terminal can be sent to the terminal according to the identification information to perform the terminal login authorization verification. For example, assuming that the task flow and the related information are associated in advance, the related authorization information may be called according to the associated information, and the authorization information of the terminal may be sent to the terminal according to the identification information (such as an IP address) of the terminal to perform terminal login authorization verification. The authorization verification may be performed in the background of the terminal.
And the control module 30 is configured to receive an operation instruction for the task flow, and control the application to execute a corresponding operation according to the operation instruction.
For ease of understanding, the following is given as an example of one implementation:
step S101, establishing a task flow:
adding step 1: a user name and a password for logging in the computer 1, a computer login mode, a starting mode of the application 1, a login account and a password of the application 1, and the like.
An adding step 2: a user name and a password for logging in the computer 2, a computer login mode, a starting mode of the application 2, a login account and a password of the application 1 and the like.
An adding step 3: a user name and a password for logging in the computer 3, a computer login mode, a starting mode of the application 3, a login account and a password of the application 1 and the like.
After the task flow of the user is established, the step S102 is carried out;
step S102 is that the user starts the flow,
entering the step 1, the KVM host reads the information in the step to obtain the user name and the password for logging in the computer 1, the computer login mode, the starting mode of the application 1, the login account number and the password of the application 1 and the like, and sends the user name and the password to the background program of the computer 1, the background program automatically logs in the computer 1 after obtaining the user name and the password of the computer 1, then sends an instruction for starting the application 1, and the user can input the account number and the password of the application 1 after starting the application 1 and logs in the application 1. After finishing, switching to the step 2;
entering the step 2, the KVM host reads the information in the step to obtain the user name and the password for logging in the computer 2, the computer login mode, the starting mode of the application 2, the login account number and the password of the application 2 and the like, and sends the user name and the password to the background program of the computer 2, the background program automatically logs in the computer 2 after obtaining the user name and the password of the computer 2, then sends an instruction for starting the application 2, and the application 2 inputs the account number and the password of the application 2 after being started and logs in the application 2. After finishing, switching to the step 3;
entering step 3, the KVM host reads the information in the step to obtain the user name and password of the login computer 3, the computer login mode, the starting mode of the application 3, the login account and password of the application 3, and the like, and sends the user name and password of the computer 3 to the background program of the computer 3, the background program automatically logs in the computer 3 after obtaining the user name and password of the computer 3, then sends an instruction for starting the application 3, and the application 3 inputs the account and password of the application 3 after being started and logs in the application 3. And finishing the execution of the whole business process.
To take a simplest example, suppose the workflow of the a operator is: flow A.1, sending an email OutLook, flow A.2, compiling an acceptance and payment list (Excel); the workflow of the B operator is: procedure b.1, check PLM configuration, procedure b.2, check SVN. Assume a total of four computers in the control room, OutLook on PC1, Excel on PC2, PLM on PC3, and SVN on PC4, respectively. In a conventional KVM system, the A, B operator must know what applications are installed on each computer and then log onto each computer when they are to be used. This is machine-oriented, and everyone must know what tasks each machine can handle. In the task flow control mode of the workflow-oriented KVM system provided by the present invention, each user only needs to care about his work, for example, for a, only needs to care about sending a mail, and needs to write a balance list, and when he clicks a button for sending a mail, the system automatically helps him to log in to the PC1 and open Outlook, and he does not need to care about which machine Outlook is installed at all. By the method, the operation of the user can be facilitated, and the operation efficiency of the user is improved.
According to the login control method and system of the KVM system, the information of the terminal and the application related to the task flow currently executed by the KVM host is acquired, and after the execution instruction of the task flow is received, the terminal login authorization verification and the application login authorization verification are correspondingly performed according to the information, so that a user does not need to manually input a login account password or manually switch the terminal, and the operation efficiency is improved.
The technical features and advantages described in the above embodiments of the control method for a KVM system are applicable to the embodiments of the control system for a KVM system, and thus it is stated that the control system for a KVM system of the present invention and the control method for a KVM system of the present invention correspond one to one.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A task flow control method of a KVM system is characterized by comprising the following steps:
acquiring the associated information of the currently executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application;
after receiving an execution instruction of the task flow, performing authorization verification on the application on the terminal according to the associated information, and logging in the application after the authorization verification is successful; the associated information is obtained by associating the task flow with identification information of a terminal executing the task flow, authorization information of the terminal, an application related to the task flow on the terminal and authorization information of the application;
and receiving an operation instruction of the task flow, and controlling the application to execute corresponding operation according to the operation instruction.
2. The task flow control method for KVM system according to claim 1, wherein the step of performing authorization verification on the application on the terminal according to the association information comprises:
sending the authorization information of the terminal to the terminal according to the identification information to carry out terminal login authorization verification; the terminal authorizes the KVM host to log in after the terminal login authorization verification passes;
after the KVM host logs in the terminal, an application starting instruction is sent to the terminal, and after the application is started, the authorization information of the application is sent to the terminal for application login authorization verification; and the terminal authorizes the KVM host to log in the application after the application login authorization verification is passed.
3. The method for task flow control of a KVM system according to claim 1, further comprising the following steps before obtaining the associated information of the currently executed task flow:
associating the task flow with identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application to obtain the associated information;
and storing the associated information.
4. The task flow control method for a KVM system according to claim 1, further comprising the steps of:
acquiring an execution sequence among task flows;
after logging in the application, the method further comprises the following steps:
receiving a switching instruction of the task flow;
switching the currently executed task flow to the next task flow according to the execution sequence;
and returning to the step of acquiring the associated information of the currently executed task flow.
5. The method according to any one of claims 1 to 4, wherein the authorization information of the terminal includes a login account and a password of the terminal and/or a login manner of the terminal.
6. The method according to any one of claims 1 to 4, wherein the authorization information of the application includes a login account and a password of the application and/or a starting manner of the application.
7. A task flow control system for a KVM system, comprising:
the first acquisition module is used for acquiring the associated information of the currently executed task flow; the associated information comprises identification information of a terminal executing the task flow, authorization information of the terminal, application related to the task flow on the terminal and authorization information of the application;
the login module is used for performing authorization verification on the application on the terminal according to the associated information after receiving an execution instruction of the task flow, and logging in the application after the authorization verification is successful; the associated information is obtained by associating the task flow with identification information of a terminal executing the task flow, authorization information of the terminal, an application related to the task flow on the terminal and authorization information of the application;
and the control module is used for receiving an operation instruction of the task flow and controlling the application to execute corresponding operation according to the operation instruction.
8. The task flow control system for a KVM system according to claim 7, further comprising:
the second acquisition module is used for acquiring the execution sequence among the task flows;
the receiving module is used for receiving a switching instruction of the task flow;
the switching module is used for switching the currently executed task flow to the next task flow according to the execution sequence;
and returning to execute the function of the first acquisition module.
9. The task flow control system for KVM system according to any of claims 7 to 8, wherein the authorization information of the terminal includes a login account and password of the terminal and/or a login manner of the terminal.
10. The task flow control system of KVM system according to any of claims 7 to 8, wherein the authorization information of the application comprises the login account and password of the application and/or the starting mode of the application.
CN201611169630.7A 2016-12-16 2016-12-16 Task flow control method and system of KVM system Active CN106790039B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611169630.7A CN106790039B (en) 2016-12-16 2016-12-16 Task flow control method and system of KVM system
PCT/CN2017/096493 WO2018107780A1 (en) 2016-12-16 2017-08-08 Method and system for controlling task flow of kvm system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611169630.7A CN106790039B (en) 2016-12-16 2016-12-16 Task flow control method and system of KVM system

Publications (2)

Publication Number Publication Date
CN106790039A CN106790039A (en) 2017-05-31
CN106790039B true CN106790039B (en) 2020-01-10

Family

ID=58892331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611169630.7A Active CN106790039B (en) 2016-12-16 2016-12-16 Task flow control method and system of KVM system

Country Status (2)

Country Link
CN (1) CN106790039B (en)
WO (1) WO2018107780A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790039B (en) * 2016-12-16 2020-01-10 广东威创视讯科技股份有限公司 Task flow control method and system of KVM system
CN108768999A (en) * 2018-05-24 2018-11-06 南京融倍祺信息科技有限公司 Software KVM management system based on network communication and audio/video coding technology
TWI760614B (en) * 2019-05-17 2022-04-11 佳世達科技股份有限公司 Host login method
CN113411365A (en) * 2020-03-17 2021-09-17 中国移动通信集团山东有限公司 Data processing method and device
CN115150474A (en) * 2022-06-15 2022-10-04 阿里巴巴(中国)有限公司 Information processing method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452376A (en) * 2007-12-06 2009-06-10 宏正自动科技股份有限公司 Methods and systems for client computer managing multiple servers
CN105450765A (en) * 2015-12-03 2016-03-30 广州云新信息技术有限公司 Server KVM remote control method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6901455B2 (en) * 2001-06-29 2005-05-31 Intel Corporation Peripheral sharing device with unified clipboard memory
CN106790039B (en) * 2016-12-16 2020-01-10 广东威创视讯科技股份有限公司 Task flow control method and system of KVM system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452376A (en) * 2007-12-06 2009-06-10 宏正自动科技股份有限公司 Methods and systems for client computer managing multiple servers
CN105450765A (en) * 2015-12-03 2016-03-30 广州云新信息技术有限公司 Server KVM remote control method and device

Also Published As

Publication number Publication date
CN106790039A (en) 2017-05-31
WO2018107780A1 (en) 2018-06-21

Similar Documents

Publication Publication Date Title
CN106790039B (en) Task flow control method and system of KVM system
CA2811020C (en) Virtual resource cost tracking with dedicated implementation resources
US20160057020A1 (en) Dynamic grouping of managed devices
EP2989543B1 (en) Method and device for updating client
CN109862101B (en) Cross-platform application starting method and device, computer equipment and storage medium
EP3529973B1 (en) Management service migration for managed devices
CN106411517A (en) Password resetting method and device
US11245577B2 (en) Template-based onboarding of internet-connectible devices
CN110162994A (en) Authority control method, system, electronic equipment and computer readable storage medium
JP4745965B2 (en) Login method with multiple identifiers for instant messaging system
US10462263B2 (en) Management service migration using web applications
CN106302612A (en) The creation method of account and device
CN110231975A (en) A kind of applied program processing method, device and electronic equipment
US20180088999A1 (en) Method, device, and system
CN105224541A (en) The uniqueness control method of data, information storage means and device
CN107784548B (en) Order processing method and device
WO2015149578A1 (en) Method and system for managing an informational site using a social networking application
CN114422172A (en) Account switching method, device, equipment and storage medium
KR102536935B1 (en) Method and apparatus for managing user profile
JP6423699B2 (en) Work application processing device, work application processing method, and program
CN114745757A (en) Cluster switching method, device, equipment and medium
CN114328026A (en) Virtual disk backup method, device, equipment and medium
CN113810204A (en) Method, device, equipment and storage medium for determining host of online conference
CN105939214B (en) Method and device for realizing network card function
CN104168290A (en) Terminal registration method and register server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant