CN108965256A - A kind of system and method remotely managing embedded device based on SSH reverse tunnel - Google Patents

A kind of system and method remotely managing embedded device based on SSH reverse tunnel Download PDF

Info

Publication number
CN108965256A
CN108965256A CN201810618913.8A CN201810618913A CN108965256A CN 108965256 A CN108965256 A CN 108965256A CN 201810618913 A CN201810618913 A CN 201810618913A CN 108965256 A CN108965256 A CN 108965256A
Authority
CN
China
Prior art keywords
ssh
server
reverse tunnel
embedded device
ssh reverse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810618913.8A
Other languages
Chinese (zh)
Inventor
冯良斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taizhou Jiji Intellectual Property Operation Co ltd
Original Assignee
Sichuan Fixe All Intelligence Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Fixe All Intelligence Information Technology Co Ltd filed Critical Sichuan Fixe All Intelligence Information Technology Co Ltd
Priority to CN201810618913.8A priority Critical patent/CN108965256A/en
Publication of CN108965256A publication Critical patent/CN108965256A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of systems, method and a kind of embedded device that embedded device is remotely managed based on SSH reverse tunnel.The present invention is based on the systems that SSH reverse tunnel remotely manages embedded device, comprising: communication module is communicated to connect for establishing with server;Receiving module, the instruction issued for receiving server;SSH reverse tunnel establishes module, and the SSH service of embedded device is mapped to server to establish SSH reverse tunnel by the order for being issued according to server;Remote supervision module passes through the operation that SSH reverse tunnel remotely manages embedded device in the port of server for receiving.The method of embedded device, a kind of embedded device are remotely managed based on SSH reverse tunnel the invention also discloses a kind of.Present invention mainly solves the problems of the embedded devices such as remote debugging router difficulty;There is provided it is a kind of can whenever and wherever possible, the method for convenient and efficient remote debugging router device.

Description

A kind of system and method remotely managing embedded device based on SSH reverse tunnel
Technical field
The invention belongs to embedded device remote debuggings and administrative skill field, more particularly to one kind to be based on the reversed tunnel of SSH Road remotely manages the system, method and a kind of embedded device of embedded device.
Background technique
In the exploitation and maintenance process of embedded device, the debugging to functions of the equipments and failure is essential.When Equipment is laid with away or is sold in user hand, in the event of failure problems, technical staff is needed to carry out orientation problem It is checked with debugging;In this case, it is necessary to which technical staff to field adjustable problem passes through the operation of the methods of remote desktop Equipment;The means of this debugging very waste of manpower and cumbersome, while the environment topology that may also destory the scene, cause problem can not Reproduction.
Remote equipment adjustment method generally used now mainly include the following types:
1) PC and embedded device are connect in same local area network, by tools such as QQ, Remote desk process remotely on PC, Then embedded device backstage is logged on by telnet to be debugged.The disadvantages of the method are as follows Field Force is needed to cooperate Operation, can may also change the topological structure of site environment;Poor in timeliness, it is complicated for operation.
2) equipment is operated by management agreement.Embedded device passes through SNMP (Simple Network Management Protocol, Simple Network Management Protocol), MQTT (Message Queuing Telemetry Transport, message queue Telemetering transmission) etc. access cloud management platform, go management platform to issue corresponding order to embedded device and obtain information.This method The order issued is single, and the information content that can be got is few;And can not complete operation router device operating status;Simultaneously under institute The order of hair need to define in advance, and scalability is poor.
3) pass through VPN (Virtual Private Network) technology remote management apparatus;It is installed in embedded device The clients such as VPN, equipment pass through the modes access servers such as dialing;Pass through VPN tunnel telnet embedded device backstage.It should The shortcomings that method is that router and server all need additionally to install VPN software, and router need to run always the software, wastes road By resources such as the memory of device and server, CPU.
A kind of remote desktop management method and system as disclosed in the patent of invention of Publication No. CN106557310A, far Journey desktop management method includes: to obtain currently running application program in client;According to current in the client of acquisition The application program of operation judges whether the client matches with currently used long-range connection mode;If it is determined that the client It is mismatched with currently used long-range connection mode, is then the long-range connection mode of client distribution adaptation, and will be described Client is connect with the server that the long-range connection mode of the adaptation matches.The invention is still real by remote desktop tool Now long-range management, the process that this method foundation remotely connects is complex and more demanding to the technical level of technical staff, and Personnel's cooperation at scene is needed, poor in timeliness is complicated for operation.
Therefore, how to solve the problems, such as that remote debugging embedded device is difficult, become present invention technical problem to be solved.
Summary of the invention
In view of the above problems, the present invention provide one kind can whenever and wherever possible, simply and easily after telnet router administration The method of platform, can be convenient log in remote equipment management backstage check related log information or configuration order etc. operate, it can Complete operation embedded device obtains a large amount of information needed, and resource occupation is few.
To reach above-mentioned technical purpose, the present invention is adopted the following technical scheme that:
A kind of system that embedded device is remotely managed based on SSH reverse tunnel comprising:
Communication module is communicated to connect for establishing with server;
Receiving module, the instruction issued for receiving server;
SSH reverse tunnel establishes module, and the SSH of embedded device is serviced mapping by the order for being issued according to server To server to establish SSH reverse tunnel;
Remote supervision module, it is remote for receiving to carry out embedded device by SSH reverse tunnel in the port of server The operation of thread management.
As a preference of the present invention, described instruction includes at least: opening SSH reverse tunnel.
As a preference of the present invention, the SSH reverse tunnel establishes module by configuring the SSH server-side of embedded device The port that mouth is monitored with server services the SSH that local SSH service maps to server.
As a preference of the present invention, the receiving module is also used to receive the reversed tunnel of the closing SSH that server issues The instruction in road.
As a preference of the present invention, the system also includes: state detection module, for detecting the SSH reverse tunnel It establishes module and establishes whether SSH reverse tunnel succeeds, and the result that will test feeds back to server.
A method of embedded device is remotely managed based on SSH reverse tunnel comprising:
S1, communication connection is established with transmission control protocol server;
S2, the instruction that server issues is received;
Local SSH service is mapped to server to establish SSH reverse tunnel by S3, the order issued according to server;
S4, receive to pass through the operation that SSH reverse tunnel remotely manages embedded device in the port of server.
As a preference of the present invention, the step S3 include: S31, by the SSH serve port that configures embedded device with The port that server is monitored services the SSH that local SSH service maps to server.
As a preference of the present invention, before the step S4 further include:
S5, detection establish whether SSH reverse tunnel succeeds;
S6, the result of the detection is sent to server.
As a preference of the present invention, the method also includes:
S7, the instruction for receiving the closing SSH reverse tunnel that server issues;
S8, the SSH reverse tunnel is closed.
A kind of embedded device comprising: it is described in any of the above embodiments that embedded set remotely is managed based on SSH reverse tunnel Standby system.
Technical solution provided by the invention can include the following benefits:
1, the problem of the present invention overcomes the difficulties of remote debugging embedded device in the prior art, complicated for operation, low efficiency; Mode compared to VPN, occupancy resource is small, easy to operate.
2, embedded device of the present invention establishes SSH reverse tunnel, the PC of any one connection internet with server first It can be serviced by the SSH of server S SH (Secure Shell, safety shell protocol) proxy access router, Suo Youfang It asks the port port A (i.e. SSH service) that the data of the port server port B can all be mapped to router, logs on routing Device management backstage carries out operation debugging.
3, no matter which kind of network embedded device is connected to the present invention, even the embedded device in local area network, as long as Embedded device can be set up with server and connect, and can be achieved with the solution of the present invention.
4, the present invention remotely accesses the management backstage of embedded device by SSH reverse tunnel mode, is passed by the tunnel SSH When transmission of data, data can be encrypted, and ensure that the safety of data.
5, technical solution of the present invention, which realizes, can be convenient the management backstage for logging in remote equipment and checks related log information Or the operation such as configuration order, it can complete operation embedded device gets a large amount of information needed, and the resource occupied is few Purpose.
Detailed description of the invention
Fig. 1 is a kind of system structure that embedded device is remotely managed based on SSH reverse tunnel of the embodiment of the present invention 1 Figure;
Fig. 2 is a kind of system structure that embedded device is remotely managed based on SSH reverse tunnel of the embodiment of the present invention 2 Figure;
Fig. 3 is a kind of method flow that embedded device is remotely managed based on SSH reverse tunnel of the embodiment of the present invention 3 Figure.
Specific embodiment
Referring now to attached drawing hereinafter, the present invention is described in more detail below, shows the embodiment of the present invention in the figure. However, the present invention can be presented as many different forms, and it should not be construed as being limited to specific embodiment presented herein. Exactly, these embodiments are for conveying the scope of the invention to those skilled in the art.
Unless otherwise defined, otherwise, term (including technical and scientific terms) used herein is interpreted as With the identical meaning of the meaning that is generally understood with the technical staff in field belonging to the present invention.Also, it is to be understood that Term used herein be interpreted as having with the consistent meaning of meaning in this specification and related fields, and do not answer It is explained by ideal or excessively formal meaning, unless being clearly specified that herein.
Embodiment 1
Carry out the technical solution that the present invention will be described in detail with reference to the accompanying drawing.
The system that embedded device is remotely managed based on SSH reverse tunnel is present embodiments provided, as shown in Figure 1, comprising: Communication module 100, receiving module 200, SSH reverse tunnel establish module 300, remote supervision module 400, the specific behaviour of this programme It is as follows to make process:
Communication module 100 is communicated to connect for establishing with server.
In the present embodiment, if embedded device is router.
After router electrifying startup, router is connected to network, and the communication module 100 of router passes through TCP (Transmission Control Protocol transmission control protocol) and server establish long connection communication.
Guarantee that router and server communication are normal by TCP.
Receiving module 200, the instruction issued for receiving server.
When needing to carry out remote debugging to router, server is actively to sending instructions under router.
Described instruction includes at least: opening SSH reverse tunnel.
Receiving module 200 is established module 300 with SSH reverse tunnel and is connect, and receiving module 200 receives the unlatching SSH After the instruction of reverse tunnel, described instruction is transmitted to the SSH reverse tunnel and establishes module 300 by receiving module 200.
SSH reverse tunnel establishes module 300, and the order for being issued according to server services the SSH of embedded device Server is mapped to establish SSH reverse tunnel.
The SSH reverse tunnel of router establishes module 300 and local SSH service is mapped on server, establishes one SSH reverse tunnel.
SSH (Secure Shell, safety shell protocol) is the security protocol established on the basis of application layer.SSH is mesh It is preceding relatively reliable, it aims at telnet session and other network services provides the agreement of safety.Can effectively it be prevented using SSH agreement The only information leakage problem in remote management procedures.
Remote supervision module 400 carries out embedded device by SSH reverse tunnel in the port of server for receiving The operation remotely managed.
By the SSH reverse tunnel having had built up, any one is connected to PC (computer) the access service of internet The data of device institute listening port can all be mapped to router, i.e., pc access server monitored port when just quite accessing Router.
It is serviced by the SSH of server S SH proxy access router, logs on router administration backstage, carry out operation tune Examination.It improves PC in the prior art and is directly logged onto router to router administration, complicated for operation, low efficiency, data transmission cost When defect.
In conclusion a kind of system for remotely managing embedded device based on SSH reverse tunnel provided in this embodiment, nothing It is connected to which kind of network by embedded device, even the embedded device in local area network, as long as embedded device can be with service Device sets up connection, can be achieved with long-range control of the PC by the SSH reverse tunnel of foundation to embedded device.The present embodiment is logical The management backstage that SSH reverse tunnel mode remotely accesses embedded device is crossed, when by SSH tunnel data, data can quilt Encryption, ensure that the safety of data.
Embodiment 2
The present embodiment and above-described embodiment 1 are essentially identical, the communication module 100 including embodiment 1, receiving module 200, SSH reverse tunnel establishes module 300, remote supervision module 400, the present embodiment the difference from embodiment 1 is that, the present embodiment is also It include: state detection module 500, as shown in Fig. 2, the specific operation process of the present embodiment is as follows:
Embedded device in the present embodiment is still by taking router as an example.
Receiving module 200 is also used to subscribe to message informing to server, when server, which has, instructs the lower router to hair, Receiving module 200 knows that server has instruction to descend hair router by the message informing subscribed to, and receiving module 200 obtains clothes The instruction that business device will issue.
Such as: when needing telnet to debug router, server, which issues, opens the reversed tunnel instruction of SSH, that is, passes through Receiving module 200 obtains described instruction, and obtains the port (port B) that server is monitored.
After router receives described instruction, dissection process need to be carried out to described instruction.
The SSH reverse tunnel is established module 300 and is supervised by configuring the SSH serve port of embedded device with server The port listened services the SSH that local SSH service maps to server.
For example, the SSH reverse tunnel, which establishes module 300, passes through configuration order: ssh-f-N-R*:portB: Localhost:portA username@server_ip-p 22 services the SSH that local SSH service maps to server.
Wherein, portA is router ssh serve port (default port 22);
Port B is server institute listening port;
Username is the user name of server;
Server_ip is the IP address of server.
Made by " ssh-f-N-R*:portB:localhost:portA username@server_ip-p 22 " order The SSH service for obtaining router is mapped to the SSH service of server, to set up SSH reverse tunnel.
The system also includes state detection module 500, module is established for detecting the SSH reverse tunnel and establishes SSH Whether reverse tunnel succeeds, and the result that will test feeds back to server.
State detection module 500 detects whether SSH reverse tunnel succeeds;
If not setting up success, by the message feedback to server, what router will be received again by that server issues is opened Open the instruction of SSH reverse tunnel;
If being successfully established, by the message feedback to server, server, which receives, to be established SSH reverse tunnel and successfully disappears After breath, the port port B of accessible server is managed the backstage of router.
After router and server are successfully established SSH reverse tunnel, the PC of any access internet can lead to The SSH service of the port the port B access router of access server is crossed, the data of all access ports server port B are all It can be mapped to the port port A (i.e. SSH service) of router, PC can operate road with the management backstage of telnet router By device and obtain diary information.
The receiving module 200 is also used to receive the instruction for the closing SSH reverse tunnel that server issues.
After PC remotely manages router, that is, SSH reverse tunnel is not used, receiving module 200, which receives, closes SSH The instruction of reverse tunnel, and instruction is passed into router, router closes SSH reverse tunnel.
Correspondingly, the present invention also provides a kind of embedded device, the embedded device includes: embodiment 1 and this reality Apply the system that embedded device is remotely managed based on SSH reverse tunnel of example 2.
The specific implementation and workflow of a kind of embedded device of the present invention can refer to embodiment 1 and the present embodiment A kind of detailed description of 2 system that embedded device is remotely managed based on SSH reverse tunnel, details are not described herein.
In conclusion a kind of system for remotely managing embedded device based on SSH reverse tunnel provided in this embodiment, embedding Enter formula equipment and establish SSH reverse tunnel with server first, the PC of any one connection internet can pass through server S SH The SSH of (Secure Shell, safety shell protocol) proxy access router is serviced, all access ports server port B Data can all be mapped to the port port A (i.e. SSH service) of router, log on router administration backstage, carry out operation tune Examination.
Embodiment 3
A kind of method that embedded device is remotely managed based on SSH reverse tunnel is present embodiments provided, as shown in figure 3, Its detailed process may include steps of:
S1, communication connection is established with server.
In the present embodiment, if embedded device is router.
Router and server can not be connected to network after the same network, router electrifying startup, and router is excellent It is selected as establishing long connection communication by TCP (Transmission Control Protocol transmission control protocol) and server.
Guarantee that router and server communication are normal by TCP.
S2, the instruction that server issues is received.
When needing to carry out remote debugging to router, send instructions under external network server active.
Described instruction includes at least: opening SSH reverse tunnel.
Local SSH service is mapped to server to establish SSH reverse tunnel by S3, the order issued according to server.
Local SSH service is mapped on server by router, establishes a SSH reverse tunnel.
SSH (Secure Shell, safety shell protocol) is the security protocol established on the basis of application layer.SSH is mesh It is preceding relatively reliable, it aims at telnet session and other network services provides the agreement of safety.Can effectively it be prevented using SSH agreement The only information leakage problem in remote management procedures.
The end that the step S3 includes: S31, is monitored by the SSH serve port that configures embedded device and server Mouthful, the SSH that local SSH service maps to server is serviced.
For example, passing through configuration order: ssh-f-N-R*:portB:localhost:portA username@server_ Ip-p 22 services the SSH that local SSH service maps to server.
Wherein, portA is router ssh serve port (default port 22);
Port B is server institute listening port;
Username is the user name of server;
Server_ip is the IP address of server.
Made by " ssh-f-N-R*:portB:localhost:portA username@server_ip-p 22 " order The SSH service for obtaining router is mapped to the SSH service of server, to set up SSH reverse tunnel.
Before the step S4 further include:
S5, detection establish whether SSH reverse tunnel succeeds.
S6, the result of the detection is sent to server.
Whether detection SSH reverse tunnel succeeds;
If not setting up success, by the message feedback to server, what router will be received again by that server issues is opened Open the instruction of SSH reverse tunnel;
If being successfully established, by the message feedback to server, server, which receives, to be established SSH reverse tunnel and successfully disappears After breath, the port port B of accessible server is managed the backstage of router.
After router and server are successfully established SSH reverse tunnel, the PC of any access internet can lead to The SSH service of the port the port B access router of access server is crossed, the data of all access ports server port B are all It can be mapped to the port port A (i.e. SSH service) of router, PC can operate road with the management backstage of telnet router By device and obtain diary information.
S4, receive to pass through the operation that SSH reverse tunnel remotely manages embedded device in the port of server.
By the SSH reverse tunnel having had built up, any one is connected to PC (computer) the access service of internet The data of device can all be mapped to router, i.e. PC is when accessing server just quite in access router.
It is serviced by the SSH of server S SH proxy access router, logs on router administration backstage, carry out operation tune Examination.It improves PC in the prior art and is directly logged onto router to router administration, complicated for operation, low efficiency, data transmission cost When defect.
The method also includes:
S7, the instruction for receiving the closing SSH reverse tunnel that server issues.
S8, the SSH reverse tunnel is closed.
After PC remotely manages router, that is, SSH reverse tunnel is not used, receives and close SSH reverse tunnel Instruction, and instruction is passed into router, router closes SSH reverse tunnel.
In conclusion a kind of method for remotely managing embedded device based on SSH reverse tunnel provided in this embodiment, embedding Enter formula equipment and establish SSH reverse tunnel with server first, the PC of any one connection internet can pass through server S SH The SSH of (Secure Shell, safety shell protocol) proxy access router is serviced, all access ports server port B Data can all be mapped to the port port A (i.e. SSH service) of router, log on router administration backstage, carry out operation tune Examination.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to the present invention and disclose Other embodiments.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications are used Way or adaptive change follow the general principles of this disclosure and including the disclosure it is undocumented in the art known in Common sense or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are under The claim in face is pointed out.

Claims (10)

1. a kind of system for remotely managing embedded device based on SSH reverse tunnel characterized by comprising
Communication module is communicated to connect for establishing with server;
Receiving module, the instruction issued for receiving server;
SSH reverse tunnel establishes module, and the SSH service of embedded device is mapped to clothes by the order for being issued according to server Device be engaged in establish SSH reverse tunnel;
Remote supervision module remotely manages embedded device by SSH reverse tunnel in the port of server for receiving The operation of reason.
2. the system according to claim 1 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that Described instruction includes at least: opening SSH reverse tunnel.
3. the system according to claim 1 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that The SSH reverse tunnel establishes the port that module is monitored by the SSH serve port and server that configure embedded device, will Local SSH service maps to the SSH service of server.
4. the system according to claim 1 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that The receiving module is also used to receive the instruction for the closing SSH reverse tunnel that server issues.
5. the system according to claim 1 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that The system also includes state detection module, establishing module for detecting the SSH reverse tunnel and establishing SSH reverse tunnel is No success, and the result that will test feeds back to server.
6. a kind of method for remotely managing embedded device based on SSH reverse tunnel characterized by comprising
S1, communication connection is established with transmission control protocol server;
S2, the instruction that server issues is received;
Local SSH service is mapped to server to establish SSH reverse tunnel by S3, the order issued according to server;
S4, receive to pass through the operation that SSH reverse tunnel remotely manages embedded device in the port of server.
7. the method according to claim 6 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that The port that the step S3 includes: S31, is monitored by the SSH serve port that configures embedded device and server, will be local SSH service map to server SSH service.
8. the method according to claim 7 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that Before the step S4 further include:
S5, detection establish whether SSH reverse tunnel succeeds;
S6, the result of the detection is sent to server.
9. the method according to claim 6 for remotely managing embedded device based on SSH reverse tunnel, which is characterized in that The method also includes:
S7, the instruction for receiving the closing SSH reverse tunnel that server issues;
S8, the SSH reverse tunnel is closed.
10. embedded device characterized by comprising claim 1-5 is described in any item long-range based on SSH reverse tunnel The system for managing embedded device.
CN201810618913.8A 2018-06-15 2018-06-15 A kind of system and method remotely managing embedded device based on SSH reverse tunnel Pending CN108965256A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810618913.8A CN108965256A (en) 2018-06-15 2018-06-15 A kind of system and method remotely managing embedded device based on SSH reverse tunnel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810618913.8A CN108965256A (en) 2018-06-15 2018-06-15 A kind of system and method remotely managing embedded device based on SSH reverse tunnel

Publications (1)

Publication Number Publication Date
CN108965256A true CN108965256A (en) 2018-12-07

Family

ID=64489497

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810618913.8A Pending CN108965256A (en) 2018-06-15 2018-06-15 A kind of system and method remotely managing embedded device based on SSH reverse tunnel

Country Status (1)

Country Link
CN (1) CN108965256A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708158A (en) * 2019-11-06 2020-01-17 积成电子股份有限公司 Method for remotely maintaining charging pile based on SSH reverse tunnel technology
CN111711659A (en) * 2020-05-22 2020-09-25 北京天维信通科技有限公司 Method and device for remotely managing terminal, equipment and storage medium thereof
CN112019477A (en) * 2019-05-29 2020-12-01 上海诺基亚贝尔股份有限公司 Method and device for establishing and managing SSH connection
CN112671907A (en) * 2020-12-24 2021-04-16 深圳市潮流网络技术有限公司 Terminal device debugging method and device, terminal device and storage medium
CN113037605A (en) * 2019-12-25 2021-06-25 西安诺瓦星云科技股份有限公司 Remote state information acquisition method, acquisition device, transmission method and transmission device
CN113259344A (en) * 2021-05-11 2021-08-13 商汤国际私人有限公司 Remote access method and device, electronic equipment and storage medium
CN113872957A (en) * 2021-09-24 2021-12-31 上海幻电信息科技有限公司 Intranet equipment connection method and system based on SSH reverse tunnel
CN113973128A (en) * 2021-09-16 2022-01-25 杭州深渡科技有限公司 Method, system, device and storage medium for remote debugging of equipment
CN114499989A (en) * 2021-12-30 2022-05-13 奇安信科技集团股份有限公司 Security device management method and device
CN114520769A (en) * 2022-01-22 2022-05-20 四川瑞霆智汇科技有限公司 Centralized maintenance method and system based on edge Internet of things agent
CN114629889A (en) * 2022-03-15 2022-06-14 北京天融信网络安全技术有限公司 Method, device, equipment and medium for establishing remote control link
CN117579695A (en) * 2024-01-15 2024-02-20 北京云驰未来科技有限公司 Vehicle remote operation and maintenance system and method for SSH terminal and relay service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050060534A1 (en) * 2003-09-15 2005-03-17 Marvasti Mazda A. Using a random host to tunnel to a remote application
CN103634165A (en) * 2013-12-05 2014-03-12 北京奇虎科技有限公司 Method, terminal device and system for realizing network testing based on reverse proxy
CN104243210A (en) * 2014-09-17 2014-12-24 湖北盛天网络技术股份有限公司 Method and system for remotely having access to administrative web pages of routers
CN106161642A (en) * 2016-07-26 2016-11-23 苏州迈科网络安全技术股份有限公司 Network equipment long-distance management method, platform and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050060534A1 (en) * 2003-09-15 2005-03-17 Marvasti Mazda A. Using a random host to tunnel to a remote application
CN103634165A (en) * 2013-12-05 2014-03-12 北京奇虎科技有限公司 Method, terminal device and system for realizing network testing based on reverse proxy
CN104243210A (en) * 2014-09-17 2014-12-24 湖北盛天网络技术股份有限公司 Method and system for remotely having access to administrative web pages of routers
CN106161642A (en) * 2016-07-26 2016-11-23 苏州迈科网络安全技术股份有限公司 Network equipment long-distance management method, platform and system

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019477B (en) * 2019-05-29 2023-09-05 上海诺基亚贝尔股份有限公司 Method and device for establishing and managing SSH (secure socket connection)
CN112019477A (en) * 2019-05-29 2020-12-01 上海诺基亚贝尔股份有限公司 Method and device for establishing and managing SSH connection
CN110708158A (en) * 2019-11-06 2020-01-17 积成电子股份有限公司 Method for remotely maintaining charging pile based on SSH reverse tunnel technology
CN110708158B (en) * 2019-11-06 2022-06-10 积成电子股份有限公司 Method for remotely maintaining charging pile based on SSH reverse tunnel technology
CN113037605A (en) * 2019-12-25 2021-06-25 西安诺瓦星云科技股份有限公司 Remote state information acquisition method, acquisition device, transmission method and transmission device
CN111711659B (en) * 2020-05-22 2022-03-11 北京天维信通科技有限公司 Method and device for remotely managing terminal, equipment and storage medium thereof
CN111711659A (en) * 2020-05-22 2020-09-25 北京天维信通科技有限公司 Method and device for remotely managing terminal, equipment and storage medium thereof
CN112671907A (en) * 2020-12-24 2021-04-16 深圳市潮流网络技术有限公司 Terminal device debugging method and device, terminal device and storage medium
CN113259344A (en) * 2021-05-11 2021-08-13 商汤国际私人有限公司 Remote access method and device, electronic equipment and storage medium
CN113973128B (en) * 2021-09-16 2024-06-28 杭州深渡科技有限公司 Method, system, device and storage medium for remote debugging of equipment
CN113973128A (en) * 2021-09-16 2022-01-25 杭州深渡科技有限公司 Method, system, device and storage medium for remote debugging of equipment
CN113872957A (en) * 2021-09-24 2021-12-31 上海幻电信息科技有限公司 Intranet equipment connection method and system based on SSH reverse tunnel
CN113872957B (en) * 2021-09-24 2024-08-02 上海幻电信息科技有限公司 Intranet device connection method and system based on SSH reverse tunnel
CN114499989A (en) * 2021-12-30 2022-05-13 奇安信科技集团股份有限公司 Security device management method and device
CN114520769A (en) * 2022-01-22 2022-05-20 四川瑞霆智汇科技有限公司 Centralized maintenance method and system based on edge Internet of things agent
CN114629889A (en) * 2022-03-15 2022-06-14 北京天融信网络安全技术有限公司 Method, device, equipment and medium for establishing remote control link
CN114629889B (en) * 2022-03-15 2024-03-15 北京天融信网络安全技术有限公司 Remote control link establishment method, device, equipment and medium
CN117579695B (en) * 2024-01-15 2024-04-02 北京云驰未来科技有限公司 Vehicle remote operation and maintenance system and method for SSH terminal and relay service
CN117579695A (en) * 2024-01-15 2024-02-20 北京云驰未来科技有限公司 Vehicle remote operation and maintenance system and method for SSH terminal and relay service

Similar Documents

Publication Publication Date Title
CN108965256A (en) A kind of system and method remotely managing embedded device based on SSH reverse tunnel
CN112997463B (en) System and method for server cluster network communication across the public internet
US10484335B2 (en) Secure remote computer network
US8239520B2 (en) Network service operational status monitoring
US20190116095A1 (en) Method and apparatus for managing field device based on cloud server
US7689675B2 (en) System and method for communicating with console ports
CN104243210A (en) Method and system for remotely having access to administrative web pages of routers
CN102597986A (en) Serial port forwarding over secure shell for secure remote management of networked devices
CN109005179A (en) Network security tunnel establishing method based on port controlling
CN104270604A (en) Method, system and device for obtaining real-time video data of IPC
CN103973785A (en) Log reading system based on P2P and method thereof
JP2013162418A (en) Cloud system, gateway device, communication control method, and communication control program
CN108390937A (en) Long-distance monitoring method, device and storage medium
US11647069B2 (en) Secure remote computer network
CN104426732A (en) High-speed transmission tunnel realization method and system
CN112073244A (en) TR069 protocol-based message processing method and system
Kováč et al. Modern internet based production technology
CN103795800A (en) Remote exchanger managing method based on web
CN102801566A (en) Sever cluster unattended remote control
CN115134141A (en) Micro-service container cluster cross-network communication system and communication method thereof
CN114866374A (en) Intelligent home gateway equipment and intelligent home system
Cisco Glossary
Cisco Glossary
CN101170502B (en) A method and system for realizing mutual access between stacking members
KR101206159B1 (en) Management system and method for smart grid network having private ip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190402

Address after: 201616 No. 3666 Sixian Road, Songjiang District, Shanghai

Applicant after: PHICOMM (SHANGHAI) Co.,Ltd.

Address before: 610000 No. 125 Longquan Street Park Road, Longquanyi District, Chengdu City, Sichuan Province

Applicant before: SICHUAN FEIXUN QUANZHI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201102

Address after: 318015 no.2-3167, zone a, Nonggang City, no.2388, Donghuan Avenue, Hongjia street, Jiaojiang District, Taizhou City, Zhejiang Province

Applicant after: Taizhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Applicant before: Phicomm (Shanghai) Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207