CN111049671A - System integration method and device - Google Patents

System integration method and device Download PDF

Info

Publication number
CN111049671A
CN111049671A CN201911087615.1A CN201911087615A CN111049671A CN 111049671 A CN111049671 A CN 111049671A CN 201911087615 A CN201911087615 A CN 201911087615A CN 111049671 A CN111049671 A CN 111049671A
Authority
CN
China
Prior art keywords
server
password
message
configuration
mac address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911087615.1A
Other languages
Chinese (zh)
Inventor
郭兴华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Yishihui Network Technology Co ltd
Original Assignee
Hefei Yishihui Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Yishihui Network Technology Co ltd filed Critical Hefei Yishihui Network Technology Co ltd
Priority to CN201911087615.1A priority Critical patent/CN111049671A/en
Publication of CN111049671A publication Critical patent/CN111049671A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a system integration method and a device, wherein the method comprises the following steps: the configuration server receives a message from the first server and acquires an MAC address, a user name and a password from the message; the configuration server calculates the MAC address according to a pre-stored preset algorithm to generate a password; the configuration server judges whether the generated password is the same as the password carried in the message; and the configuration server logs in the first server by using the user name and the password according to the IP address under the condition that the passwords are the same, and configures the first server. The problem caused by the fact that the added servers need to be manually configured when the servers are added is solved, and the configuration efficiency during system integration is improved.

Description

System integration method and device
Technical Field
The present application relates to the field of system integration, and in particular, to a system integration method and apparatus.
Background
For software systems, there can be generally divided into BS systems and CS systems, which both require a server as a support. In general, the service capability that a server can provide is limited.
With the increasing software scale, the service demand is increasing, and the original server may not provide enough support, in this case, the server needs to be replaced or added, and the increase of the server is called system integration.
When a server is replaced or added, the configuration is generally performed manually, the manual configuration is slow, and the error probability of manual configuration is high.
Aiming at the problems caused by the fact that the added servers need to be configured manually when the servers are added in the related art, no good solution is provided at present.
Disclosure of Invention
The application provides a system integration method and device, which are used for solving the problem caused by the fact that when servers are added, the added servers need to be configured manually.
According to an aspect of the present application, there is provided a system integration method including: the method comprises the steps that a configuration server receives a message from a first server and acquires the MAC address, the user name and the password from the message, wherein the message is sent to a local area network where the first server is located through software installed on the first server, the message carries the IP address and the MAC address of the first server and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a preset algorithm; the configuration server calculates the MAC address according to the pre-stored preset algorithm to generate a password; the configuration server judges whether the generated password is the same as the password carried in the message; and the configuration server logs in the first server by using the user name and the password and configures the first server according to the IP address under the condition that the passwords are the same.
Further, sending the message to the local area network where the first server is located includes: and multicasting or broadcasting the message to the local area network where the first server is located.
Further, the predetermined algorithm is a Hash algorithm.
Further, the method further comprises: and the configuration server sends alarm information to an administrator according to the information of the administrator configured in advance under the condition that the generated password is different from the password carried in the message, wherein the alarm information is used for indicating that an illegal server is connected to the local area network.
According to another aspect of the present application, there is also provided a system integration apparatus provided in a configuration server, the apparatus including: a receiving module, configured to receive a message from a first server, and obtain the MAC address, the user name, and the password from the message, where the message is sent to a local area network where the first server is located through software installed on the first server, the message carries an IP address and an MAC address of the first server, and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a predetermined algorithm; the generating module is used for calculating the MAC address according to the pre-stored preset algorithm to generate a password; the judgment module is used for judging whether the generated password is the same as the password carried in the message or not; and the configuration module is used for logging in the first server by using the user name and the password and configuring the first server according to the IP address under the condition that the passwords are the same.
Further, the message is sent by the first server in the local area network by multicast or broadcast.
Further, the predetermined algorithm is a Hash algorithm.
Further, the configuration module is further configured to send warning information to an administrator according to preconfigured administrator information when the generated password is different from the password carried in the message, where the warning information is used to indicate that an illegal server is connected to the local area network.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above method.
According to another aspect of the present application, there is also provided a processor for executing software, wherein the software is configured to perform the above method.
The method comprises the following steps: the method comprises the steps that a configuration server receives a message from a first server and acquires the MAC address, the user name and the password from the message, wherein the message is sent to a local area network where the first server is located through software installed on the first server, the message carries the IP address and the MAC address of the first server and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a preset algorithm; the configuration server calculates the MAC address according to the pre-stored preset algorithm to generate a password; the configuration server judges whether the generated password is the same as the password carried in the message; and the configuration server logs in the first server by using the user name and the password and configures the first server according to the IP address under the condition that the passwords are the same. The problem caused by the fact that the added servers need to be manually configured when the servers are added is solved, and the configuration efficiency during system integration is improved.
Drawings
Fig. 1 is a flowchart of a system integration method provided according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In this embodiment, a system integration method is provided, and fig. 1 is a flowchart of the system integration method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, a configuration server receives a message from a first server and acquires an MAC address, a user name and a password from the message, wherein the message is sent to a local area network where the first server is located through software installed on the first server, the message carries the IP address and the MAC address of the first server and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a predetermined algorithm;
step S104, the configuration server calculates the MAC address according to a pre-stored preset algorithm to generate a password;
step S106, the configuration server judges whether the generated password is the same as the password carried in the message;
and step S108, the configuration server logs in the first server by using the user name and the password according to the IP address under the condition that the passwords are the same, and configures the first server.
In this step, as a preferred embodiment, the configuration server may send the automation configuration script to the first server and execute the automation configuration script after logging in to the first server. Recorded in the automation configuration script are commands of the software that need to be followed on the first server, the commands being executed in the order of software installation.
Moreover, since the configuration server already obtains information such as the IP address MAC address of the first server, the configuration server may generate configuration information of each installed software using the IP address and MAC address of the first server, and after the software is installed, execute the script and copy the configuration information to a corresponding software directory.
The first server can be configured automatically through the script without human intervention.
As another preferred embodiment, the first server may be used to provide a different service. In this case, the first server may carry the service type provided by the first server in the message when the message is sent by broadcast or multicast.
And when the configuration server configures the first server, selecting the automatic configuration script corresponding to the type and the configuration information of each corresponding installed software according to the service type carried in the message. With this alternative embodiment, the configuration server may provide an auto-configuration service for various types of servers.
When the first server is a machine learning server, after the machine learning platform is automatically configured according to the content, the configuration server can also notify the data server, the data server establishes connection with the first server, obtains the type of the training data required by the first server, and sends the corresponding training data to the first server.
The steps solve the problem caused by manually configuring the added servers when the servers are added, and improve the configuration efficiency when the system is integrated
Preferably, the sending the message to the local area network where the first server is located includes: and multicasting or broadcasting the message to the local area network of the first server.
Preferably, the predetermined algorithm is a Hash algorithm.
Preferably, the method further comprises: and the configuration server sends alarm information to an administrator according to the information of the administrator configured in advance under the condition that the generated password is different from the password carried in the message, wherein the alarm information is used for indicating that the illegal server is connected to the local area network.
As a more preferred embodiment, when the generated password is not the same as the password carried in the message, the configuration server may also log in to the first server using the username and the password carried in the message, and close all connections of the first server except the connection established with the configuration server.
This is safe, the first server cannot contact other servers after closing other network connections, and since the connection between the configuration server and the first server is still maintained, the administrator can log on to the first server through the configuration server and make adjustments to the first server.
As a more preferable processing manner, after the configuration server completes the configuration of the first server, the configuration server may further execute the script to check whether the service that needs to be executed in the first server is normally executed, for example, whether the server in the first server is normally executed may be determined by accessing a port provided by each service. And sending an alarm message to a pre-configured administrator under the condition that the predetermined service does not normally run, wherein the alarm message carries the IP address, the user name and the MAC address of the first server. The administrator can calculate the password of the first server according to the MAC address through corresponding software and log in the first server.
Under the condition that the service which needs to be operated in the first server normally operates, the configuration server can also add information of each service of the first server into the monitoring server, and the monitoring server is used for monitoring whether the service provided by the first server normally operates.
Under the condition that the service which needs to be operated by the first server normally operates, the configuration server can also modify the password of the first server and store the modified password on the configuration server. This process makes the password more secure.
The configuration server may have two configuration servers, and when an error is detected during the configuration process of the first configuration server on the first server, the first configuration server rolls back the configuration performed by the first server, and after the rolling back, notifies the second configuration server, and the second configuration server connects with the first server and performs the configuration.
According to another aspect of the present application, there is also provided a system integration apparatus disposed in a configuration server, the apparatus including: the receiving module is used for receiving a message from a first server and acquiring an MAC address, a user name and a password from the message, wherein the message is sent to a local area network where the first server is located through software installed on the first server, the message carries the IP address and the MAC address of the first server and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a preset algorithm; the generating module is used for calculating the MAC address according to a pre-stored preset algorithm to generate a password; the judgment module is used for judging whether the generated password is the same as the password carried in the message or not; and the configuration module is used for logging in the first server by using the user name and the password and configuring the first server according to the IP address under the condition that the passwords are the same.
Preferably, the message is multicast or broadcast transmitted by the first server over the local area network.
Preferably, the predetermined algorithm is a Hash algorithm.
Preferably, the configuration module is further configured to send alarm information to the administrator according to preconfigured administrator information when the generated password is different from the password carried in the message, where the alarm information is used to indicate that the illegal server is connected to the local area network.
In this embodiment, a memory is provided for storing software for performing the above-described method.
In this embodiment, a processor is provided for executing software for performing the above-described method.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
An embodiment of the present invention provides a storage medium on which a program or software is stored, the program implementing the above method when executed by a processor. The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A system integration method, comprising:
the method comprises the steps that a configuration server receives a message from a first server and acquires the MAC address, the user name and the password from the message, wherein the message is sent to a local area network where the first server is located through software installed on the first server, the message carries the IP address and the MAC address of the first server and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a preset algorithm;
the configuration server calculates the MAC address according to the pre-stored preset algorithm to generate a password;
the configuration server judges whether the generated password is the same as the password carried in the message; and the configuration server logs in the first server by using the user name and the password and configures the first server according to the IP address under the condition that the passwords are the same.
2. The method of claim 1, wherein sending the message to the local area network of the first server comprises:
and multicasting or broadcasting the message to the local area network where the first server is located.
3. A method according to claim 1 or 2, characterized in that the predetermined algorithm is a Hash algorithm.
4. The method according to any one of claims 1 to 3, further comprising: and the configuration server sends alarm information to an administrator according to the information of the administrator configured in advance under the condition that the generated password is different from the password carried in the message, wherein the alarm information is used for indicating that an illegal server is connected to the local area network.
5. A system integration apparatus disposed in a configuration server, the apparatus comprising:
a receiving module, configured to receive a message from a first server, and obtain the MAC address, the user name, and the password from the message, where the message is sent to a local area network where the first server is located through software installed on the first server, the message carries an IP address and an MAC address of the first server, and the user name and the password used for managing the first server, and the password is generated according to the MAC address by using a predetermined algorithm;
the generating module is used for calculating the MAC address according to the pre-stored preset algorithm to generate a password;
the judgment module is used for judging whether the generated password is the same as the password carried in the message or not;
and the configuration module is used for logging in the first server by using the user name and the password and configuring the first server according to the IP address under the condition that the passwords are the same.
6. The apparatus of claim 5, wherein the message is multicast or broadcast sent by the first server over the local area network.
7. The apparatus according to claim 5 or 6, wherein the predetermined algorithm is a Hash algorithm.
8. The apparatus according to any one of claims 5 to 7, wherein the configuration module is further configured to, when the generated password is not the same as the password carried in the message, send an alarm message to an administrator according to preconfigured administrator information, where the alarm message is used to indicate that an illegal server is connected to the local area network.
9. A memory for storing software, wherein the software is configured to perform the method of any one of claims 1 to 4.
10. A processor configured to execute software, wherein the software is configured to perform the method of any one of claims 1 to 4.
CN201911087615.1A 2019-11-08 2019-11-08 System integration method and device Pending CN111049671A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911087615.1A CN111049671A (en) 2019-11-08 2019-11-08 System integration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911087615.1A CN111049671A (en) 2019-11-08 2019-11-08 System integration method and device

Publications (1)

Publication Number Publication Date
CN111049671A true CN111049671A (en) 2020-04-21

Family

ID=70232529

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911087615.1A Pending CN111049671A (en) 2019-11-08 2019-11-08 System integration method and device

Country Status (1)

Country Link
CN (1) CN111049671A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363165A (en) * 2022-01-06 2022-04-15 中国工商银行股份有限公司 Configuration method of electronic equipment, electronic equipment and server

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030225588A1 (en) * 2002-05-31 2003-12-04 Karey Davidson Business method including sales of an intangible product to automobile dealers
CN106685973A (en) * 2016-12-30 2017-05-17 东软集团股份有限公司 Method and device for remembering log in information, log in control method and device
CN108737426A (en) * 2018-05-24 2018-11-02 郑州云海信息技术有限公司 One kind remotely exempting from close login method and system
CN109391615A (en) * 2018-09-27 2019-02-26 深圳互联先锋科技有限公司 A kind of server exempts from close login method and system
CN109684799A (en) * 2018-08-21 2019-04-26 平安普惠企业管理有限公司 Account logon method, entering device, Account Logon equipment and storage medium
CN110071922A (en) * 2019-04-24 2019-07-30 苏州浪潮智能科技有限公司 A kind of method and system of Telnet bulk service device Linux system
CN110209562A (en) * 2019-05-13 2019-09-06 深圳前海微众银行股份有限公司 A kind of log analysis method and Analysis server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030225588A1 (en) * 2002-05-31 2003-12-04 Karey Davidson Business method including sales of an intangible product to automobile dealers
CN106685973A (en) * 2016-12-30 2017-05-17 东软集团股份有限公司 Method and device for remembering log in information, log in control method and device
CN108737426A (en) * 2018-05-24 2018-11-02 郑州云海信息技术有限公司 One kind remotely exempting from close login method and system
CN109684799A (en) * 2018-08-21 2019-04-26 平安普惠企业管理有限公司 Account logon method, entering device, Account Logon equipment and storage medium
CN109391615A (en) * 2018-09-27 2019-02-26 深圳互联先锋科技有限公司 A kind of server exempts from close login method and system
CN110071922A (en) * 2019-04-24 2019-07-30 苏州浪潮智能科技有限公司 A kind of method and system of Telnet bulk service device Linux system
CN110209562A (en) * 2019-05-13 2019-09-06 深圳前海微众银行股份有限公司 A kind of log analysis method and Analysis server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
佚名: ""批量免密登录"", 《HTTPS://BLOG.CSDN.NET/SKANGE/ARTICLE/DETAILS/82051006》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363165A (en) * 2022-01-06 2022-04-15 中国工商银行股份有限公司 Configuration method of electronic equipment, electronic equipment and server
CN114363165B (en) * 2022-01-06 2024-01-30 中国工商银行股份有限公司 Configuration method of electronic equipment, electronic equipment and server

Similar Documents

Publication Publication Date Title
CN108063714B (en) Network request processing method and device
CN106878363B (en) Information processing method, device and system
CN111224920B (en) Method, device, equipment and computer storage medium for preventing illegal login
CN110245031B (en) AI service opening middle platform and method
CN110971571A (en) Website domain name verification method and related device
CN110968560A (en) Log collector configuration method, device and system
CN112700242A (en) Method, device and medium for detecting sensitive information of block chain in advance
CN114465791B (en) Method and device for establishing white list in network management equipment, storage medium and processor
CN111222592B (en) Method and device for acquiring two-dimensional code of equipment
CN114640672A (en) Method, device and system for remotely accessing edge device
CN114363334A (en) Network configuration method, device and equipment for cloud system and cloud desktop virtual machine
CN108541000B (en) Method, medium and device for detecting network connection
CN111049671A (en) System integration method and device
CN106817355B (en) Method and device for controlling webpage permission
CN111490961A (en) Communication connection blocking system, method, device and equipment
CN111491021B (en) License data processing method and device for distributed cluster
CN106912064B (en) Network configuration detection and repair method and device for wireless network
CN110912900B (en) Boundary intelligent security monitoring method, device and equipment based on Internet of things
CN105763508B (en) Data access method and application server
CN111240750B (en) Awakening method and device for target application program
CN111970286A (en) User login method and device and web server
CN113162889A (en) Authentication method and device for route updating information
CN110851822A (en) Network download safety processing method and device
CN112579189A (en) Configuration file updating method and device
CN112436967B (en) Safety processing method and device after industrial internet equipment abnormity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421

RJ01 Rejection of invention patent application after publication