CN113055354A - Method and device for safely operating remote host - Google Patents

Method and device for safely operating remote host Download PDF

Info

Publication number
CN113055354A
CN113055354A CN201911384989.XA CN201911384989A CN113055354A CN 113055354 A CN113055354 A CN 113055354A CN 201911384989 A CN201911384989 A CN 201911384989A CN 113055354 A CN113055354 A CN 113055354A
Authority
CN
China
Prior art keywords
host
camera
operation signal
display
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911384989.XA
Other languages
Chinese (zh)
Inventor
王楠
张晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Uniview Technologies Co Ltd
Original Assignee
Zhejiang Uniview Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Uniview Technologies Co Ltd filed Critical Zhejiang Uniview Technologies Co Ltd
Priority to CN201911384989.XA priority Critical patent/CN113055354A/en
Publication of CN113055354A publication Critical patent/CN113055354A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method and a device for safely operating a remote host, which are characterized in that a picture of a controlled host is captured by a camera connected with the Internet, the picture is displayed on a display of the controlled host, an operation signal for operating on a live picture displayed on a display of a first host is captured, and the operation signal is transmitted to the camera, so that the camera sends the operation signal to the controlled host, and the remote control of the controlled host is realized. The invention can prevent the risk of directly operating the controlled host to obtain the data of the controlled host, utilizes the transparent channel of the camera to transmit the keyboard signal across the Internet, and uses the tail line of the camera to be connected with the PS2 female port of the controlled host, and ensures that the controlled host only receives the keyboard signal and cannot transmit the keyboard signal outwards because of the unidirectional data transmission of PS 2. Remote operation can be carried out on the premise of safety guarantee, and the dilemma that dual-network direct connection is not allowed to carry out remote operation due to safety reasons is solved.

Description

Method and device for safely operating remote host
Technical Field
The invention belongs to the technical field of remote cooperation, and particularly relates to a method and a device for safely operating a remote host.
Background
With the development of internet technology, it has become an indispensable means to use networks for office work and communication. However, data security is also becoming an increasingly important issue. For data security, many units and individuals often limit their own data to intranet transmission (e.g., private network or private network) to avoid illegal access. For example, data in an enterprise, a website in a state institution, etc., a dedicated intranet is provided to protect confidential data, and an extranet cannot normally access data in the intranet.
Due to the data security concerns, data transmission under the internal network to the external or public network is often not allowed. However, when the devices in the intranet require remote maintenance by external personnel, if the devices are directly remotely controlled by remote maintenance software, there is a risk of internal data leakage.
To avoid internal data leakage, maintenance personnel can only reach the field for maintenance support, which is time-consuming and laborious.
Therefore, chinese utility model patent with publication number CN207232963U discloses a remote computer control system with network isolation function, including the control computer under the extranet environment and the controlled computer under the special intranet environment, the control computer is pegged graft and is had video capture card, video capture card passes through the data line and is connected by the video interface of controlled computer, the control computer has simulation keyboard mouse module and power control module through serial interface connection, the output of simulation keyboard mouse module and the keyboard mouse interface connection of controlled computer, the output of power control module is connected with the input electricity of the power key of controlled computer and reset key.
The video acquisition card is connected with the controlled computer, and the analog keyboard and mouse module and the power supply control module are connected with the controlled computer, so that the maintenance purpose is achieved. However, this method adopts a direct connection method, and can only control and operate the controlled computer at the near end, and cannot perform maintenance remotely.
Disclosure of Invention
The present invention provides a method and an apparatus for safely operating a remote host, so as to solve the problem of the prior art that the equipment cannot be remotely maintained.
In order to achieve the purpose, the technical scheme of the invention is as follows:
a method for safely operating a remote host, which is used for remotely controlling a second host positioned in a private network through a public network by a first host, and arranging a camera at the near end of the second host, wherein the camera acquires a live picture of a display of the second host, comprises the following steps:
the first host receives a live picture of a display of the second host collected by the camera and displays the live picture on the display of the first host;
the first host computer operates on a live picture displayed by the local display, captures an operation signal and transmits the operation signal to the camera, so that the camera sends the operation signal to the second host computer, and remote control of the second host computer is realized.
Further, the method for safely operating the remote host further includes:
the first host collects dynamic face information of an operator, the collected dynamic face information is sent to the camera, the camera is compared with the reserved face information of the operator, a dynamic key is generated after the comparison is passed, and the first host can receive live pictures of a display of the second host collected by the camera after the dynamic key is obtained.
Further, the method for safely operating the remote host further includes:
the second host display live view captured by the camera is transmitted in an encrypted manner.
Further, the operation signal is a keyboard and mouse operation signal, the operation signal is transmitted to the camera, specifically, a serial port signal is transmitted to the camera through a transparent channel.
Further, the camera sends the operation signal to the second host, and the operation signal is sent through a serial port tail line-to-PS 2 interface between the camera and the second host.
The application also provides a device of safe operation remote host for realize that first host computer passes through public network remote control and is located the second host computer in the private network, dispose the camera at second host computer near-end, the live picture of second host computer display is gathered to the camera, the device of safe operation remote host includes:
the live receiving module is used for receiving the live picture of the second host display collected by the camera and displaying the live picture on the first host display;
and the operation signal capturing module is used for capturing an operation signal which is operated on a live picture displayed by the display of the first host computer, and transmitting the operation signal to the camera, so that the camera can send the operation signal to the second host computer, and the remote control of the second host computer is realized.
Further, the apparatus for safely operating a remote host further includes:
the verification module is used for acquiring dynamic face information of an operator, sending the acquired dynamic face information to the camera, comparing the camera with the reserved face information of the operator, generating a dynamic key after the comparison is passed, and receiving a live picture of a display of the second host acquired by the camera only after the first host acquires the dynamic key.
Further, the second host display live picture captured by the camera is transmitted in an encrypted manner.
Further, the operation signal is a keyboard and mouse operation signal, the operation signal capturing module transmits the operation signal to the camera, and specifically, the operation signal is transmitted to the camera through a transparent channel by adopting a serial port signal.
Further, the camera sends the operation signal to the second host, and the operation signal is sent through a serial port tail line-to-PS 2 interface between the camera and the second host.
According to the method and the device for safely operating the remote host, the picture of the controlled host is captured through the camera communicated with the Internet, and the operation is performed according to the picture, so that the risk that the controlled host is directly operated to obtain the data of the controlled host can be prevented. According to the method and the device, network direct connection is not needed, remote operation is carried out on the premise of safety guarantee, and the dilemma that the dual-network direct connection is not allowed to carry out the remote operation due to safety reasons is solved.
Drawings
Fig. 1 is a schematic diagram of a network structure according to an embodiment of the present application;
fig. 2 is a flowchart of a method for securely operating a remote host according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for safely operating the remote host can be applied to the application environment shown in fig. 1. The first host computer is used as a control host computer, the second host computer is used as a controlled host computer, the second host computer is positioned in a private network, and a network camera IPC is arranged beside the second host computer. The first host is accessed to the public network, the IPC is accessed to the public network, and the first host and the IPC establish safe connection through the public network to carry out encryption transmission, thereby ensuring the safety of data transmission. The second host is connected with the IPC through a serial port tail line-to-PS 2 interface.
Wherein, the serial port tail line changes PS2 interface is like the RS232 serial port signal and the PS2 keyboard mouse signal conversion line that the chinese utility model patent of CN2702370Y discloses, and RS232 serial port interface and the serial port connection of IPC, the keyboard of PS2 interface and second host computer or mouse input interface connection.
In addition, the development of the prior art shows that a mouse and a keyboard with a USB interface or a wireless interface are available, the application does not exclude the use of the wireless interface or the USB interface to realize the connection between the IPC and the second host, and the application does not limit the connection mode between the second host and the IPC.
In an embodiment of the present application, as shown in fig. 2, a method for safely operating a remote host is used to implement a first host remotely controlling a second host located in a private network through a public network, where a camera is deployed at a near end of the second host, and the camera acquires a live view of a display of the second host, and the method for safely operating the remote host includes:
the first host receives a live picture of a display of the second host collected by the camera and displays the live picture on the display of the first host;
the first host computer operates on a live picture displayed by the local display, captures an operation signal and transmits the operation signal to the camera, so that the camera sends the operation signal to the second host computer, and remote control of the second host computer is realized.
Specifically, the application utilizes IPC connected with the Internet to encrypt and transmit a live picture of a display of a second host to a display of a first host, and the live picture can be displayed in an interface of a client installed on the first host. The camera is arranged at the near end of the second host, and can acquire a live picture of the display of the second host and transmit the live picture to the first host.
The first host accesses to the public network, which may be on the public network or in the private network. Similarly, the camera IPC is also connected to a public network, which may be on the public network or in a private network. The first host and the IPC are connected through a public network, for example, the first host and the camera are connected through a VPN, or a universal network passport, or a management server located in a cloud, and the connection mode between the first host and the camera is not limited in the present application. Establishing a connection between the first host and the camera to receive a live view of the camera is a well-established technique in the art and is not described herein.
After the first host acquires the live picture of the IPC, the live picture is displayed on a display of the first host, for convenience, client software is usually installed on the first host to acquire the live picture of the camera and capture an operation signal input by the first host in a live display window, for example, a PS2 signal of a keyboard or a mouse, the captured operation signal is encapsulated into an IP packet by the client through a transparent channel technology and transmitted to the IPC, and then the IP packet is restored into an original operation signal by the IPC and output to the second host from a serial port tail, so that the operation of the second host is realized.
In one embodiment, the method of securely operating a remote host further comprises:
the first host collects dynamic face information of an operator, the collected dynamic face information is sent to the camera, the camera is compared with the reserved face information of the operator, a dynamic key is generated after the comparison is passed, and the first host can receive live pictures of a display of the second host collected by the camera after the dynamic key is obtained.
The first host side maintainer needs to provide an operator photo for applying for reservation, and can only use equipment under the same local area network of the IPC to log in a background to import a photo of a researcher; before entering an operation interface on the first host, the first host camera is required to obtain a dynamic face, the face picture is returned and then is identified by IPC comparison, and the mode of dynamic face identification comparison avoids the first host from being controlled by others maliciously and remotely; after the identification of the key is passed, a dynamic key is generated, and only the IPC can log in a background to obtain the key by the same local area network equipment and a manager informs an operator of the reservation; the operator can successfully see the live picture and have the operation authority after inputting the dynamic key into the client software on the first host.
In one embodiment, the method of securely operating a remote host further comprises:
the second host display live view captured by the camera is transmitted in an encrypted manner.
The live code stream is encrypted by a specific algorithm in the transmission process, and the client software decodes the code stream and presents a picture after the authentication is passed, so that the code stream is prevented from being hijacked and snooped in the transmission process. After the remote control operation is started, the live pictures of the IPC are always stored in the memory card of the IPC, so that the later evidence obtaining operation content is facilitated.
In one embodiment, the operation signal is a keyboard and mouse operation signal, and the operation signal is transmitted to the camera, specifically, a serial port signal is transmitted to the camera through a transparent channel.
It is easy to understand that the serial port is a communication interface widely used, and it is a mature technical solution to convert the serial port into ethernet for remote data transmission. The prior art can easily realize the bidirectional transparent transmission of the network data packet and the serial port data packet. According to the application, the IP network is used for transparently transmitting serial port data, the serial port can pass through the IP network to directly control or interact data through a transparent channel technology, a captured keyboard and mouse operation PS2 signal is directly transmitted to the IPC through the transparent channel, then the IPC is connected into the second host through a serial port tail line-PS 2 interface, the keyboard and mouse control PS2 signal is sent to the second host, and the effect of remotely operating the second host under the private network is achieved.
It should be noted that what kind of mode is used for transmitting the captured operation signal to the IPC is determined according to the connection mode of the IPC and the second host, and if the IPC is wirelessly connected with the second host, the first host can also realize control by acquiring the keyboard and mouse operation signal, converting the operation signal into an IP data packet, transmitting the IP data packet to the IPC, transmitting the IP data packet to the second host through a wireless signal, and converting the IP data packet into a keyboard and mouse operation PS2 signal by the second host.
According to the technical scheme, the two networks with different security levels are not required to be directly communicated, the display interface of the host is observed through IPC live, the host is connected with the host through the PS2 interface for operation, only keyboard signals are guaranteed to be received by the controlled host due to PS2 unidirectional transmission data, the risk of direct data transmission does not exist, the data security of the host under the network can be guaranteed, and convenience is brought to a remote operator. Meanwhile, the IPC transmits the live code stream of the second host for safe encryption, and live content cannot be played and viewed even if the IPC is hijacked by people under the Internet; before remote operation is initiated, dynamic face verification and closer dynamic key verification need to be carried out, and malicious remote control of a control host and malicious operation by personnel on the Internet are avoided.
In an embodiment, the present application further provides a device for safely operating a remote host, which is used to enable a first host to remotely control a second host located in a private network through a public network. In this embodiment, a camera is deployed at a near end of the second host, the camera captures a live view of a display of the second host, and the apparatus for safely operating the remote host includes:
the live receiving module is used for receiving the live picture of the second host display collected by the camera and displaying the live picture on the first host display;
and the operation signal capturing module is used for capturing an operation signal which is operated on a live picture displayed by the display of the first host computer, and transmitting the operation signal to the camera, so that the camera can send the operation signal to the second host computer, and the remote control of the second host computer is realized.
For specific limitations of a device for safely operating a remote host, reference may be made to the above limitations of a method for safely operating a remote host, which are not described herein again. The various modules in an apparatus for securely operating a remote host described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment of the present device, the device for securely operating a remote host further comprises:
the verification module is used for acquiring dynamic face information of an operator, sending the acquired dynamic face information to the camera, comparing the camera with the reserved face information of the operator, generating a dynamic key after the comparison is passed, and receiving a live picture of a display of the second host acquired by the camera only after the first host acquires the dynamic key.
In another embodiment of the apparatus, the second host display live view captured by the camera is transmitted in an encrypted manner.
In another embodiment of the device, the operation signal is a keyboard and mouse operation signal, and the operation signal capturing module transmits the operation signal to the camera, specifically, a serial port signal is transmitted to the camera through a transparent channel.
And the camera sends the operation signal to the second host, and sends the operation signal through a serial port tail line-to-PS 2 interface between the camera and the second host.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for safely operating a remote host, which is used for remotely controlling a second host positioned in a private network through a public network by a first host, is characterized in that a camera is deployed at the near end of the second host, the camera acquires a live picture of a display of the second host, and the method for safely operating the remote host comprises the following steps:
the first host receives a live picture of a display of the second host collected by the camera and displays the live picture on the display of the first host;
the first host computer operates on a live picture displayed by the local display, captures an operation signal and transmits the operation signal to the camera, so that the camera sends the operation signal to the second host computer, and remote control of the second host computer is realized.
2. The method of securely operating a remote host according to claim 1, further comprising:
the first host collects dynamic face information of an operator, the collected dynamic face information is sent to the camera, the camera is compared with the reserved face information of the operator, a dynamic key is generated after the comparison is passed, and the first host can receive live pictures of a display of the second host collected by the camera after the dynamic key is obtained.
3. The method of securely operating a remote host according to claim 1, further comprising:
the second host display live view captured by the camera is transmitted in an encrypted manner.
4. The method according to claim 1, wherein the operation signal is a keyboard and mouse operation signal, and the operation signal is transmitted to the camera, specifically, a serial port signal is transmitted to the camera through a transparent channel.
5. The method of claim 4, wherein the camera sends the operation signal to the second host via a serial-to-tail PS2 interface between the camera and the second host.
6. An apparatus for safely operating a remote host, for remotely controlling a second host located in a private network through a public network by a first host, wherein a camera is deployed at a near end of the second host, the camera capturing a live view of a display of the second host, the apparatus for safely operating the remote host comprising:
the live receiving module is used for receiving the live picture of the second host display collected by the camera and displaying the live picture on the first host display;
and the operation signal capturing module is used for capturing an operation signal which is operated on a live picture displayed by the display of the first host computer, and transmitting the operation signal to the camera, so that the camera can send the operation signal to the second host computer, and the remote control of the second host computer is realized.
7. The apparatus for securely operating a remote host according to claim 6, further comprising:
the verification module is used for acquiring dynamic face information of an operator, sending the acquired dynamic face information to the camera, comparing the camera with the reserved face information of the operator, generating a dynamic key after the comparison is passed, and receiving a live picture of a display of the second host acquired by the camera only after the first host acquires the dynamic key.
8. An apparatus for securely operating a remote host according to claim 6, wherein the camera captures live views of the second host display for transmission in an encrypted manner.
9. The device of claim 6, wherein the operation signal is a keyboard and mouse operation signal, and the operation signal capturing module transmits the operation signal to the camera, specifically, a serial port signal is transmitted to the camera through a transparent channel.
10. The apparatus of claim 9, wherein the camera sends the operation signal to the second host via a serial-to-usb 2 interface between the camera and the second host.
CN201911384989.XA 2019-12-28 2019-12-28 Method and device for safely operating remote host Pending CN113055354A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911384989.XA CN113055354A (en) 2019-12-28 2019-12-28 Method and device for safely operating remote host

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911384989.XA CN113055354A (en) 2019-12-28 2019-12-28 Method and device for safely operating remote host

Publications (1)

Publication Number Publication Date
CN113055354A true CN113055354A (en) 2021-06-29

Family

ID=76507284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911384989.XA Pending CN113055354A (en) 2019-12-28 2019-12-28 Method and device for safely operating remote host

Country Status (1)

Country Link
CN (1) CN113055354A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685241A (en) * 2012-05-21 2012-09-19 广东威创视讯科技股份有限公司 Remote maintenance system and maintenance method
CN202495042U (en) * 2012-03-12 2012-10-17 江阴广明信息技术有限公司 Remote control system for face recognition computer
CN105338318A (en) * 2015-11-09 2016-02-17 浙江宇视科技有限公司 Monitoring system and remote control method thereof
US20160249106A1 (en) * 2012-09-14 2016-08-25 Appurify, Inc. Remote Control of a Mobile Device
CN207039655U (en) * 2017-07-14 2018-02-23 北京安天网络安全技术有限公司 It is a kind of can remote assistance operation network security emergency disposal device
CN107846462A (en) * 2017-11-03 2018-03-27 北京红云融通技术有限公司 A kind of long-range control method of Medical Devices, system and remote collaboration device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202495042U (en) * 2012-03-12 2012-10-17 江阴广明信息技术有限公司 Remote control system for face recognition computer
CN102685241A (en) * 2012-05-21 2012-09-19 广东威创视讯科技股份有限公司 Remote maintenance system and maintenance method
US20160249106A1 (en) * 2012-09-14 2016-08-25 Appurify, Inc. Remote Control of a Mobile Device
CN105338318A (en) * 2015-11-09 2016-02-17 浙江宇视科技有限公司 Monitoring system and remote control method thereof
CN207039655U (en) * 2017-07-14 2018-02-23 北京安天网络安全技术有限公司 It is a kind of can remote assistance operation network security emergency disposal device
CN107846462A (en) * 2017-11-03 2018-03-27 北京红云融通技术有限公司 A kind of long-range control method of Medical Devices, system and remote collaboration device

Similar Documents

Publication Publication Date Title
CN102842001B (en) System and method for detecting computer security information based on U disc authentication
KR100783446B1 (en) System, apparatus and method for providing data security using the usb device
CN101141348A (en) Intelligent domestic system and safety implementing method
CN101420587A (en) Network video collecting device, network video monitoring system and method
CN212486798U (en) Electric power sensing equipment based on block chain technology
CN104378649A (en) Method and system for encrypting video streams in real time through SM1 cryptographic algorithm
CN112270020B (en) Terminal equipment safety encryption device based on safety chip
CN109472903A (en) A kind of control of bluetooth access control method and its device
CN104035408A (en) RTU (Remote Terminal Unit) controller and communication method with SCADA (Supervisory Control And Data Acquisition) system
CN112153336B (en) Monitoring method and related equipment
CN100547963C (en) Utilize the method and the device of USB secret key inputting/displaying/transmitting user information
CN107566430A (en) A kind of electric power mobile terminal compliance inspection and policy controlling system
CN101291246A (en) Control method for information service system of terminal equipment
CN108184091B (en) Video monitoring equipment deployment method and device
CN201854369U (en) Safe production video monitoring and information management system
CN110390193A (en) A kind of personal computer system and control method with portrait dynamic rights authentication function
KR101498887B1 (en) Remote monitoring and controlling system in environmental qualification laboratory
CN103152328B (en) A kind of conferencing information control system based on wireless network and control method thereof
CN110794971A (en) Remote control equipment and system
CN113055354A (en) Method and device for safely operating remote host
CN116232880A (en) Virtual private network establishment method and system based on security isolation
CN213659528U (en) Multi-feature finger vein biological data recognition device and system
CN205302421U (en) Mobile terminal , gate host computer and entrance guard system of unblanking in entrance guard system of unblanking
CN104252242A (en) Long-range control method and data processing equipment used for realizing same
CN103871177B (en) Remote maintenance method for network billing machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210629