CN108540463A - A kind of control method and system improving data security - Google Patents
A kind of control method and system improving data security Download PDFInfo
- Publication number
- CN108540463A CN108540463A CN201810257638.1A CN201810257638A CN108540463A CN 108540463 A CN108540463 A CN 108540463A CN 201810257638 A CN201810257638 A CN 201810257638A CN 108540463 A CN108540463 A CN 108540463A
- Authority
- CN
- China
- Prior art keywords
- usb
- mouse
- keyboard
- simulators
- hosts
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/12—Program control for peripheral devices using hardware independent of the central processor, e.g. channel or peripheral processor
- G06F13/122—Program control for peripheral devices using hardware independent of the central processor, e.g. channel or peripheral processor where hardware performs an I/O function other than control of data transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/18—Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The invention discloses a kind of control methods improving data security comprising following steps:System controls the ports USB/PS2 of USB/PS2 simulator host sides connection PC hosts, and the USB/PS2 simulators host side generates virtual USB/PS2 keyboards and virtual USB/PS2 mouses using MCU;System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;System controls USB/PS2 simulator clients and connects true USB/PS2 keyboard and mouses, and completes corresponding data, command interaction;System controls the USB/PS2 simulators host side and only receives the keyboard and mouse input information sent out from the USB/PS2 simulators client, and is converted into corresponding keyboard and mouse signal to PC hosts.And a kind of control system improving data security.It realizes one-way data transfer, thoroughly prevents data from revealing;And USB/PS2 simulation frameworks end is locked to be placed on PC computers and be concentrated in computer room together, prevents hacker's contact and transformation USB/PS2 simulation frameworks terminal circuit and firmware;It is widely used in data transmission field.
Description
Technical field
The present invention relates to file transmission fields, specially improve the control method and system of data security.
Background technology
In the prior art, all computers are positioned in computer room by centralized computer room, by a cable by video and
Usb signal is transferred to user terminal, and USB device is identified and is limited, and USB keyboard mouse is only supported, to realize people
The physical isolation of machine, thus achieve the purpose that prevent data copy.Such product is to USB keyboard mouse protocol using the mode that direct transfers
Transmission, is equivalent to USB line having done extension processing (100 meters of transmission limit).For being familiar with the personnel of USB keyboard mouse protocol,
Still down order can be sent out to USB keyboard mouse device by software, to reach data camouflage, data is caused to divulge a secret
It may.
On the other hand, or by a cable by video and PS2 signal transmissions to user terminal, to realize man-machine object
Reason isolation, thus achieve the purpose that prevent data copy.Such product transmits PS2 keyboard and mouse agreements using the mode of direct transferring,
It is equivalent to and PS2 has been done into extension processing.For being familiar with the personnel of PS2 agreements, still PS2 keyboard and mouses can be sent out by software
Go out down order, to reach data camouflage, the possibility for causing data to divulge a secret.
To sum up, it is necessary to be improved for the technology.
Invention content
In order to solve the above-mentioned technical problem, the object of the present invention is to provide it is a kind of improve data security control method and
System.
The technical solution adopted in the present invention is:
The present invention provides a kind of control method improving data security comprising following steps:
System controls the ports USB/PS2 of USB/PS2 simulator host sides connection PC hosts, the USB/PS2 simulators
Host side generates virtual USB/PS2 keyboards and virtual USB/PS2 mouses using MCU;
System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;
System controls USB/PS2 simulator clients and connects true USB/PS2 keyboard and mouses, and complete corresponding data,
Command interaction;
System controls the USB/PS2 simulators host side and only receives to be sent out from the USB/PS2 simulators client
Keyboard and mouse input information, and corresponding keyboard and mouse signal is converted into PC hosts.
As the improvement of the technical solution, after system detectio is connect to the USB/PS2 simulators host side with PC hosts,
The PC hosts initialize the HID keyboard mouse devices that the USB/PS2 simulators host side is standard.
As the improvement of the technical solution, the system control USB/PS2 keyboard and mouses realize one-way data transfer.
As the improvement of the technical solution, the one-way data content includes head distinguished symbol, is mouse for distinguishing event
Mark event or KeyEvent.
As the improvement of the technical solution, the method includes:Mouse is mobile and sends a frame data to USB/PS2 simulations
Device client;The USB/PS2 simulators client receives mouse data, is packaged and is sent to USB/PS2 simulator hosts
End.
Further, the method includes:The USB/PS2 simulators host side receives data packet and is identified as mouse
Data packet is reduced to standard USB/PS2 mouse datas by instruction, the USB/PS2 simulators host side, and by virtual USB/
PS2 mouse ports are sent to PC hosts.
Further, the PC hosts identification instruction, and carry out corresponding mouse action.
On the other hand, the present invention also provides a kind of control systems improving data security comprising:
Simulator host side control module connects PC master for executing step system control USB/PS2 simulator host sides
The ports USB/PS2 of machine, the USB/PS2 simulators host side using MCU generate virtual USB/PS2 keyboards and virtual USB/
PS2 mouses;
System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;
Simulator client control module is true for executing step system control USB/PS2 simulator clients connection
USB/PS2 keyboard and mouses, and complete corresponding data, command interaction;
System controls the USB/PS2 simulators host side and only receives to be sent out from the USB/PS2 simulators client
Keyboard and mouse input information, and corresponding keyboard and mouse signal is converted into PC hosts.
The beneficial effects of the invention are as follows:The control method and system for the raising data security that this programme provides, pass through control
USB/PS2 keyboard and mouses processed realize one-way data transfer, thoroughly prevent data from revealing;And USB/PS2 simulation frameworks end is counted with PC
Calculation machine, which is locked to be placed on together, to be concentrated in computer room, and hacker's contact and transformation USB/PS2 simulation frameworks terminal circuit and firmware are prevented;It can be with
Realize the transmission of extra long distance, distance limits caused by breaking through USB/PS2 agreements;Space is transformed with IP in it.It can be by solid
The MCU of transmitting terminal and receiving terminal is upgraded to IP packet transport protocols by part, and unrestricted biography may be implemented by multi-stage router
Defeated distance.
Description of the drawings
The specific implementation mode of the present invention is described further below in conjunction with the accompanying drawings:
Fig. 1 is the host side control flow chart of first embodiment of the invention;
Fig. 2 is the client control flow chart of first embodiment of the invention;
Fig. 3 is the control flow chart of first embodiment of the invention;
Fig. 4 is the electric drawings of first embodiment of the invention;
Fig. 5 is the control flow chart of second embodiment of the invention.
Specific implementation mode
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.
The present invention provides a kind of control method improving data security comprising following steps:
System controls the ports USB/PS2 of USB/PS2 simulator host sides connection PC hosts, the USB/PS2 simulators
Host side generates virtual USB/PS2 keyboards and virtual USB/PS2 mouses using MCU;
System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;
System controls USB/PS2 simulator clients and connects true USB/PS2 keyboard and mouses, and complete corresponding data,
Command interaction;
System controls the USB/PS2 simulators host side and only receives to be sent out from the USB/PS2 simulators client
Keyboard and mouse input information, and corresponding keyboard and mouse signal is converted into PC hosts.
As the improvement of the technical solution, after system detectio is connect to the USB/PS2 simulators host side with PC hosts,
The PC hosts initialize the HID keyboard mouse devices that the USB/PS2 simulators host side is standard.
As the improvement of the technical solution, the system control USB/PS2 keyboard and mouses realize one-way data transfer.
As the improvement of the technical solution, the one-way data content includes head distinguished symbol, is mouse for distinguishing event
Mark event or KeyEvent.
As the improvement of the technical solution, the method includes:Mouse is mobile and sends a frame data to USB/PS2 simulations
Device client;The USB/PS2 simulators client receives mouse data, is packaged and is sent to USB/PS2 simulator hosts
End.
Further, the method includes:The USB/PS2 simulators host side receives data packet and is identified as mouse
Data packet is reduced to standard USB/PS2 mouse datas by instruction, the USB/PS2 simulators host side, and by virtual USB/
PS2 mouse ports are sent to PC hosts.
Further, the PC hosts identification instruction, and carry out corresponding mouse action.
On the other hand, the present invention also provides a kind of control systems improving data security comprising:
Simulator host side control module connects PC master for executing step system control USB/PS2 simulator host sides
The ports USB/PS2 of machine, the USB/PS2 simulators host side using MCU generate virtual USB/PS2 keyboards and virtual USB/
PS2 mouses;
System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;
Simulator client control module is true for executing step system control USB/PS2 simulator clients connection
USB/PS2 keyboard and mouses, and complete corresponding data, command interaction;
System controls the USB/PS2 simulators host side and only receives to be sent out from the USB/PS2 simulators client
Keyboard and mouse input information, and corresponding keyboard and mouse signal is converted into PC hosts.
Referring to Fig.1-4, this programme is as first embodiment, using the knot at USB simulation frameworks end and USB simulant-clients
Structure, intermediate transmission media are 5 classes or 6 class cables.USB simulation frameworks end connects the USB port of PC, and USB simulation frameworks end is used
MCU simulates a USB keyboard and mouse, and PC hosts can be identified as a general USB keyboard and mouse, and host and MCU are complete
At the data and command interaction of USB keyboard mouse protocol.USB simulant-clients connect true USB keyboard mouse, USB simulations
The MCU of client and true keyboard and mouse complete the interaction of data and order.USB simulation frameworks end is only received simulates from USB
The keyboard and mouse input information that client is sent, and be converted into corresponding keyboard and mouse signal and give PC hosts, USB simulation frameworks end
Any order and data are not sent to USB simulant-clients, to realize the one-way data transfer of USB keyboard mouse, reaching can
The purpose for preventing data from revealing leaned on.
One-way data transfer format and data transmission are defined as follows:
One, it initializes
" USB simulators host side " is inserted into host, and host identifies simulator, and is initialized as the HID keyboard and mouses of standard
Equipment.
The keyboard and mouse of USB is inserted into " USB simulators client ", " USB simulators client " initializes USB keyboard
And mouse, so that the keyboard and mouse of USB is worked normally.
Two, instruction format
One-way data transfer is carried out according to customized mouse-keyboard data transmission format.One-way data content is known comprising head
Other symbol is mouse event or KeyEvent for distinguishing.Such as 0x55AA is expressed as mouse event;0xAA55 is expressed as
KeyEvent.State descriptors, keyboard state descriptor describe the Right/Left GUI, ALT, Shift, Control of keyboard
The state of equal keys;Mouse state descriptor describes the state in the direction and mouse button of mouse movement.Data descriptor, for describing
The key set code of keyboard and the relative displacement information of mouse.
Three, data transmission
Mouse:
1, mouse is moved to the left, and sends a frame data (low byte is preceding) " 0x00,0x00,0x79,0x18 " to " USB
Simulator client ".
2, " USB simulators client " receives the data of mouse, and be packaged as " 0x55,0xAA, 0x18,0x79,
A data packet of 0x00,0x00 " are sent to " USB simulators host side " by client network interface.
3, " USB simulators host side " receives the data packet, and mouse instructions are identified as by the first two byte.
4, data packet is reduced into the USB mouse data of standard by host side MCU, and is sent out by the USB mouse port of simulation
It is sent to host side.
5, host identifies the instruction, and carries out corresponding mouse action.
Keyboard:
1, keyboard is pressed " a " keys (following below scheme is with the key example), and send Scan Code codes " 0x1C " and arrive " USB moulds
Quasi- device client ".
2, " USB simulators client " handles the data, packaged data be " 0xAA, 0x55,0x00,0x1C, 0x00,
0x00 " (such as " ctrl+a " if Macintosh, then data packet be " 0xAA, 0x55,0x01,0x1C, 0x00,0x00 ", it is at most primary
Three standard keys can be pressed), it is sent to " USB simulators host side " by client network interface.
3, " USB simulators host side " receives the data packet, and keyboard instruction is identified as by the first two byte.
4, the data packet is reduced into the USB keyboard data of standard by MCU, and is sent to by the USB keyboard port of simulation
Host side.
5, host identifies the order, and carries out corresponding input operation.
6, host side instruction can only be sent to " USB simulators host side ", cannot be further continued for sending down, may be implemented to set
For uniaxially to host transmission data.
The advantages of program:
2. the real one-way transmission of USB keyboard mouse, thoroughly prevents data from revealing.
It is concentrated in computer room 2. USB simulation frameworks end and PC computers are locked to be placed on together, prevents hacker's contact and transformation USB moulds
Quasi- host terminal circuit and firmware.
3. the transmission of extra long distance may be implemented, distance limits caused by breaking through usb protocol.This programme USB simulation frameworks
End and USB simulant-clients are one-way transmissions using custom protocol, simplify original transport protocol.It is intermediate
Transmission medium be 5,6 class cables, it is horizontal that the transmission speed of data packet can reach gigabit transmission, therefore can not be straight by USB
The even limitation of agreement, to reach 200 meters of long distance transmission.
4. space is transformed with IP, the MCU of transmitting terminal and receiving terminal can be upgraded into IP packet transport protocols by firmware,
Unrestricted transmission range may be implemented by multi-stage router.
With reference to Fig. 5, as another embodiment, using the structure of transmitting terminal and receiving terminal, intermediate transmission media be 5 classes or
6 class cables.Transmitting terminal connects the ports PS2 of PC, and transmitting terminal simulates a PS2 keyboard and mouse, the main opportunity identifications of PC with MCU
For general a PS2 keyboards and mouse, the data and command interaction of host and MCU completion PS2 agreements.Receiving terminal connection is true
PS2 keyboard and mouses, the MCU of receiving terminal and true keyboard and mouse complete the interaction of data and order.Transmitting terminal only receive from
The keyboard and mouse input information that receiving terminal is sent, and be converted into corresponding keyboard and mouse signal and give PC hosts, transmitting terminal is not to connecing
Receiving end sends order and data, and to realize the one-way data transfer of PS2 keyboard and mouses, reaching reliable prevents data from revealing
Purpose.
This programme advantage:
2. the real one-way transmission of PS2 keyboard and mouses, thoroughly prevents data from revealing.
2. transmitting terminal and PC computers lock together be placed on concentrate computer room in, prevent hacker contact and transformation send terminal circuit and
Firmware.
3. the transmission of extra long distance may be implemented, distance limits caused by breaking through PS2 agreements.This programme transmitting terminal and reception
End is one-way transmission using custom protocol, simplifies original transport protocol.Intermediate transmission medium is 5,6
The transmission speed of class cable, data packet can reach gigabit transmission level.Therefore it can not be limited by the direct-connected agreements of PS2, from
And reach 200 meters of long distance transmission.
4. space is transformed with IP;The MCU of transmitting terminal and receiving terminal can be upgraded into IP packet transport protocols by firmware,
Unrestricted transmission range may be implemented by multi-stage router.
It uses one-way transmission to replace transmitted in both directions, thoroughly prevents the camouflage downlink transfer of data.Transmitting terminal and receiving terminal
Through MCU processing, asynchronous PS2 protocol processes are indeed achieved, therefore breach the transmission range limitation of PS2 agreements.It also may be used
To realize that IP bag datas are handled, and make it possible remote operation.
The control method and system for the raising data security that this programme provides, it is real by controlling USB/PS2 keyboard and mouses
Existing one-way data transfer, thoroughly prevents data from revealing;And USB/PS2 simulation frameworks end locks with PC computers and is placed on concentrator together
In room, prevent hacker's contact and transformation USB/PS2 simulation frameworks terminal circuit and firmware;The transmission of extra long distance may be implemented in it,
Distance limits caused by breaking through USB/PS2 agreements;Space is transformed with IP in it.It can be by firmware by transmitting terminal and receiving terminal
MCU upgrade to IP packet transport protocols, unrestricted transmission range may be implemented by multi-stage router.
It is to be illustrated to the preferable implementation of the present invention, but the invention is not limited to the implementation above
Example, those skilled in the art can also make various equivalent variations or be replaced under the premise of without prejudice to spirit of that invention
It changes, these equivalent deformations or replacement are all contained in the application claim limited range.
Claims (8)
1. a kind of control method improving data security, which is characterized in that it includes the following steps:
System controls the ports USB/PS2 of USB/PS2 simulator host sides connection PC hosts, the USB/PS2 simulators host
End generates virtual USB/PS2 keyboards and virtual USB/PS2 mouses using MCU;
System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;
System controls USB/PS2 simulator clients and connects true USB/PS2 keyboard and mouses, and completes corresponding data, order
Interaction;
System controls the USB/PS2 simulators host side and only receives the keyboard sent out from the USB/PS2 simulators client
Mouse input information, and corresponding keyboard and mouse signal is converted into PC hosts.
2. the control method according to claim 1 for improving data security, it is characterised in that:System detectio is described in
After USB/PS2 simulators host side is connect with PC hosts, it is mark that the PC hosts, which initialize the USB/PS2 simulators host side,
Accurate HID keyboard mouse devices.
3. the control method according to claim 1 or 2 for improving data security, it is characterised in that:The system control
USB/PS2 keyboard and mouses realize one-way data transfer.
4. the control method according to claim 3 for improving data security, it is characterised in that:The one-way data content
Including head distinguished symbol, is mouse event or KeyEvent for distinguishing event.
5. the control method according to claim 4 for improving data security, which is characterized in that the method includes:Mouse
Mark is mobile and sends a frame data to USB/PS2 simulator clients;The USB/PS2 simulators client receives mouse number
According to being packaged and be sent to USB/PS2 simulator host sides.
6. the control method according to claim 5 for improving data security, which is characterized in that the method includes:Institute
It states USB/PS2 simulator host sides to receive data packet and be identified as mouse instructions, the USB/PS2 simulators host side will count
Standard USB/PS2 mouse datas are reduced to according to packet, and PC hosts are sent to by virtual USB/PS2 mouse ports.
7. the control method according to claim 6 for improving data security, which is characterized in that the PC hosts identification refers to
It enables, and carries out corresponding mouse action.
8. a kind of control system improving data security, which is characterized in that it includes:
Simulator host side control module connects PC hosts for executing step system control USB/PS2 simulator host sides
The ports USB/PS2, the USB/PS2 simulators host side generate virtual USB/PS2 keyboards and virtual USB/PS2 mouse using MCU
Mark;
System controls the PC hosts and MCU completes the data of USB/PS2 keyboard and mouse agreements, command interaction;
Simulator client control module connects true USB/ for executing step system control USB/PS2 simulator clients
PS2 keyboard and mouses, and complete corresponding data, command interaction;
System controls the USB/PS2 simulators host side and only receives the keyboard sent out from the USB/PS2 simulators client
Mouse input information, and corresponding keyboard and mouse signal is converted into PC hosts.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810257638.1A CN108540463A (en) | 2018-03-27 | 2018-03-27 | A kind of control method and system improving data security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810257638.1A CN108540463A (en) | 2018-03-27 | 2018-03-27 | A kind of control method and system improving data security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108540463A true CN108540463A (en) | 2018-09-14 |
Family
ID=63485283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810257638.1A Pending CN108540463A (en) | 2018-03-27 | 2018-03-27 | A kind of control method and system improving data security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108540463A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110794971A (en) * | 2018-12-31 | 2020-02-14 | 北京安天网络安全技术有限公司 | Remote control equipment and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020149617A1 (en) * | 2001-03-30 | 2002-10-17 | Becker David F. | Remote collaboration technology design and methodology |
CN1677325A (en) * | 2004-03-31 | 2005-10-05 | 联想(北京)有限公司 | Method and device for two-way communication between virtual PS/2 apparatus and host machine |
CN101059728A (en) * | 2006-04-21 | 2007-10-24 | 宏正自动科技股份有限公司 | Keyboard and mouse operation data recording/reproducing system and method thereof |
CN200993768Y (en) * | 2006-11-28 | 2007-12-19 | 曙光信息产业(北京)有限公司 | IP based digitalized KVM system |
CN101931626A (en) * | 2010-08-25 | 2010-12-29 | 深圳市傲冠软件股份有限公司 | Service terminal realizing safe auditing function in remote control process |
CN101951364A (en) * | 2010-08-25 | 2011-01-19 | 深圳市傲冠软件股份有限公司 | Method and system for realizing security audit function in remote control process |
CN205942670U (en) * | 2016-07-20 | 2017-02-08 | 深圳信息职业技术学院 | Multi -computer auto -change over device |
CN106445182A (en) * | 2016-08-30 | 2017-02-22 | 中铁信安(北京)信息安全技术有限公司 | Safe switch and isolation system and method of keyboard, mouse and screen suitable for dual-computer environment |
-
2018
- 2018-03-27 CN CN201810257638.1A patent/CN108540463A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020149617A1 (en) * | 2001-03-30 | 2002-10-17 | Becker David F. | Remote collaboration technology design and methodology |
CN1677325A (en) * | 2004-03-31 | 2005-10-05 | 联想(北京)有限公司 | Method and device for two-way communication between virtual PS/2 apparatus and host machine |
CN101059728A (en) * | 2006-04-21 | 2007-10-24 | 宏正自动科技股份有限公司 | Keyboard and mouse operation data recording/reproducing system and method thereof |
CN200993768Y (en) * | 2006-11-28 | 2007-12-19 | 曙光信息产业(北京)有限公司 | IP based digitalized KVM system |
CN101931626A (en) * | 2010-08-25 | 2010-12-29 | 深圳市傲冠软件股份有限公司 | Service terminal realizing safe auditing function in remote control process |
CN101951364A (en) * | 2010-08-25 | 2011-01-19 | 深圳市傲冠软件股份有限公司 | Method and system for realizing security audit function in remote control process |
CN205942670U (en) * | 2016-07-20 | 2017-02-08 | 深圳信息职业技术学院 | Multi -computer auto -change over device |
CN106445182A (en) * | 2016-08-30 | 2017-02-22 | 中铁信安(北京)信息安全技术有限公司 | Safe switch and isolation system and method of keyboard, mouse and screen suitable for dual-computer environment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110794971A (en) * | 2018-12-31 | 2020-02-14 | 北京安天网络安全技术有限公司 | Remote control equipment and system |
CN110794971B (en) * | 2018-12-31 | 2023-06-02 | 北京安天网络安全技术有限公司 | Remote control equipment and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106022080B (en) | A kind of data ciphering method based on the cipher card of PCIe interface and the cipher card | |
CN110190876B (en) | Physical layer and virtualized physical layer suitable for EHF contactless communication | |
WO2018066961A1 (en) | Trusted execution environment secure element communication | |
CN102449596B (en) | For the method and system of smart card virtualization | |
EP2710776A1 (en) | Anonymous signalling | |
CN104536411A (en) | System and method for managing intelligent home through remote access service | |
CN105046123B (en) | It is a kind of to realize cipher safety system and its setting method using picture | |
KR101617318B1 (en) | Method and apparatus for inputting data | |
CN1620790A (en) | Device of physical layer adaptive different network transmission link medium and its control method | |
CN112804265B (en) | Unidirectional network gate interface circuit, method and readable storage medium | |
CN108540463A (en) | A kind of control method and system improving data security | |
CN103647826B (en) | Instruction level user permission control method in Telnet mode | |
CN103036897A (en) | Communication method based on long distance desktop connection between thin client-side and server-side | |
CN110572476B (en) | Remote control method, device and equipment | |
CN116069443A (en) | Working method of virtual terminal | |
CN102665055A (en) | Equipment and method for IO remote mapping | |
CN102546327A (en) | Intelligent home appliance service system | |
CN110519205A (en) | Device and method for being interacted to the computer at least two subnets | |
CN103020536A (en) | Terminal equipment | |
CN205249272U (en) | Multistage information encapsulation encryption device | |
CN1138210C (en) | Method and connecting device for initializing set of ISDN adaptor assembly | |
US20220283980A1 (en) | Data transmission method | |
CN109495651A (en) | A kind of TV game control method based on mobile terminal | |
CN103002332A (en) | Method and system for sharing between mobile terminal and set-top box gyroscope | |
CN113904791A (en) | Efficient computer network information safety device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180914 |