CN113282376A - UKey virtual machine penetration method applied to cloud platform architecture - Google Patents
UKey virtual machine penetration method applied to cloud platform architecture Download PDFInfo
- Publication number
- CN113282376A CN113282376A CN202110828761.6A CN202110828761A CN113282376A CN 113282376 A CN113282376 A CN 113282376A CN 202110828761 A CN202110828761 A CN 202110828761A CN 113282376 A CN113282376 A CN 113282376A
- Authority
- CN
- China
- Prior art keywords
- usb
- virtual
- cloud platform
- data packet
- packet information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4063—Device-to-bus coupling
- G06F13/4068—Electrical coupling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45591—Monitoring or debugging support
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer And Data Communications (AREA)
Abstract
A UKey virtual machine penetration method and a system applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and the method comprises the following steps: the USB bus drive detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting; the USB bus driver transmits the data packet information to a virtual USB driver, and the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel; and the USB virtual center identifies the transmitted USB equipment and the data interaction request thereof according to the data packet information, reads the authentication information in the authentication information request message if the authentication information request message is the authentication information request message, and provides the authentication information for an application program in the cloud platform to use. According to the invention, the hardware USB License is provided for the application software in the virtual machine on the cloud platform to be used by the transparent transmission method, so that the USB License is more convenient to use on different physical machines.
Description
Technical Field
The invention relates to the field of cloud computing, in particular to a method and a system for penetrating a Ukey virtual machine under a cloud platform.
Background
The logical organization in the USB device comprises four layers of equipment, configuration, interfaces and endpoints, and the configuration consists of a plurality of interfaces. Each USB device provides a different combination of functions, one of which is selected during probing and connection.
In the USB protocol, the interface consists of multiple endpoints, each power-down representing a basic function that is the subject of control by the USB device driver. A functionally sophisticated USB device may have multiple interfaces, multiple interfaces in each configuration, and the device interface is a collection of endpoints. For example, a USB speaker may contain an audio interface and interfaces to knobs and buttons. All interfaces in one configuration may be active at the same time, and may be connected by different drivers. Each interface may have a spare interface to provide different quality of service parameters.
Currently, various business software is authorized by License, and authorization by License can be realized by hardware and software, wherein hardware is generally authorized by USB License, and software is generally authorized by a mode of providing files. The existing open source cloud platform is generally developed based on OpenStack for deep customization, can realize the identification of USB storage equipment and the discovery of the content of the USB storage equipment, but cannot identify USB License information and the like, so that hardware USB License cannot be used.
Disclosure of Invention
The technical problem to be solved by the invention is how to provide hardware USB License for application software in a virtual machine on a cloud platform for use, a bottom layer physical machine in a cloud platform framework is connected with USB equipment, the USB License is mounted on the cloud platform virtual machine through a transparent transmission method, the software on the layer of the cloud platform virtual machine can freely use the License, and the problem that the USB equipment is frequently plugged and unplugged by using the USB License on different physical machines at ordinary times is solved.
Specifically, the invention provides a UKey virtual machine penetration method applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and the method comprises the following steps:
s1), the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the virtual center to generate virtual USB configuration information; the virtual USB configuration information includes a virtual USB device connected to a virtual port of the virtual center and a corresponding virtual USB function;
s2) connecting the USB device with the local USB client, detecting and identifying the USB device by the USB bus driver of the local USB client, obtaining the data packet information sent by the USB device, and mounting the device;
s3) the USB bus driver of the USB client transmits the data packet information to a virtual USB driver, and then the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel;
s4) the USB virtual center identifies the transmitted USB equipment according to the data packet information, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
s5), judging the type of the request message, if the request message is an authentication information request message, reading the authentication information in the request message, and providing the authentication information for an application program in the cloud platform for use.
The invention also provides a UKey virtual machine penetration system applied to the cloud platform architecture, which is characterized by comprising the following components:
the system comprises USB equipment, a USB client, a USB virtual center and a data transmission dedicated channel; the USB client comprises a USB bus driver and a virtual USB driver; the USB virtual center comprises a data transmission module, a control module, an upstream USB server, a virtual bus driver and a USB equipment driver;
the USB equipment is connected with a local USB client in a hardware access mode, and the USB client is in communication connection with the USB virtual center through a data transmission dedicated channel;
the USB client is configured to:
after the USB equipment is accessed, the USB bus drive of the USB client detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting;
the USB bus driver transmits data packet information to the virtual USB driver, and the virtual USB driver sends the data packet information to the virtual center through the virtual channel;
the virtual center is configured to:
after a data transmission module of the USB virtual center receives the data packet information, the control module selects an adaptive USB upstream server for the USB equipment according to the data packet information and sends the data packet information to the upstream USB server;
the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and a USB equipment driver of a USB virtual center acquires the analyzed data from the virtual USB bus;
the USB virtual center identifies the transmitted USB equipment according to the analyzed data, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
and judging the type of the request message, reading the authentication information in the request message if the request message is an authentication information request message, and providing the authentication information for an application program in the cloud platform to use.
Drawings
Fig. 1 is a flowchart of a UKey virtual machine penetration method applied to a cloud platform architecture.
Fig. 2 is an architecture diagram of a UKey virtual machine penetration system applied to a cloud platform architecture.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention relates to a UKey virtual machine penetration method applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and the method comprises the following steps:
s1), the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the virtual center to generate virtual USB configuration information; the virtual USB configuration information includes a virtual USB device connected to a virtual port of the virtual center and a corresponding virtual USB function;
the USB devices are instantiated by a virtual USB hub that contains virtualization control logic for managing virtual USB devices that appear as free ports connected to the virtual hub as each virtual USB device is provisioned.
The virtual USB configuration information enumerates the dynamically allocated downstream virtual ports as physical USB ports, where each of these USB ports is associated with a corresponding USB function.
S2) connecting the USB device with the local USB client, detecting and identifying the USB device by the USB bus driver of the local USB client, obtaining the data packet information sent by the USB device, and mounting the device;
firstly, a hardware USB is inserted into a physical machine, the physical machine at the bottom layer of a cloud platform is provided with an operating system, when the connection of a USB device is detected, the operating system can automatically mount the device, find and read information in the USB device, but for License, License information in the USB device needs to be read, and the License information is transmitted. If the License information is not read on the USB equipment, processing according to a common U disk;
and after the data packet information of the USB equipment is obtained, controlling the USB equipment according to the data packet information, wherein the data packet information comprises an attribution user of the USB equipment, virtual machine binding information, an authentication request, an access authority and port information.
Wherein the virtual machine binding information may be a unique ID of the bound virtual machine, the ID being transparent to the virtual machine; the access rights are divided into read-only, read-write and prohibited.
S3) the USB bus driver of the USB client transmits the data packet information to a virtual USB driver, and then the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel;
in the step S3, in step S3,
s31), the USB virtual center comprises a data transmission module, a control module and an upstream USB server, after the data transmission module receives the data packet information, the control module selects an adaptive upstream USB server for the USB device according to the data packet information, and sends the data packet information to the upstream USB server.
S32), the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and the USB equipment driver of the USB virtual center acquires the analyzed data from the virtual USB bus.
The data transmission dedicated channel is a virtual RPC channel.
RPC (remote Procedure Call) -a remote Procedure call, a protocol that requests services from a remote computer program over a network without knowledge of the underlying network technology. That is to say, two servers a and B, one application is deployed on the server a, and it is desired to call the method provided by the application on the server B, because there is no memory space, it cannot be called directly, and it is necessary to express the semantics of the call and to communicate the data of the call through the network.
The RPC protocol assumes the existence of some transport protocol, such as TCP or UDP, for carrying information data between communication procedures. In the OSI network communication model, RPC spans the transport and application layers. RPC makes it easier to develop applications including network distributed multiprogrammers. There are many outstanding RPC frameworks that are open source in the industry, such as Spring Cloud, Dubbo, Thrift, etc.
S4) the USB virtual center identifies the transmitted USB equipment according to the data packet information, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
the USB virtual center identifies the USB equipment transmitted through according to the data packet information, and the method comprises the following steps:
and the USB virtual center identifies the virtual USB equipment connected to the virtual port of the virtual center and the corresponding function thereof according to the analyzed data acquired from the virtual USB bus, and updates the virtual USB configuration information.
The request message comprises the type of the data interaction request, the size of the content of the data interaction request and the content of the data interaction request.
S5), judging the type of the request message, if the request message is an authentication information request message, reading the authentication information in the request message, and providing the authentication information for an application program in the cloud platform for use.
The cloud platform judges the type of the authentication information, if the authentication information is floating authentication, floating authentication is provided for the application software according to the authentication information, and if the authentication information is locking authentication, the floating authentication is provided for the application software according to the authentication number.
The License authorization mechanism ensures that only licenses with legitimate rights can be accessed or information obtained. For the License software, the difference between the floating version and the single version is that the floating version has strong flexibility, the single version must be bound with a fixed machine, and the process of migrating to other machines is complex and is limited by times. The single machine is suitable for single person. If the enterprise is an enterprise, a plurality of development teams are arranged, each team has a respective packaging developer, and if a single edition is used, a plurality of License are purchased according to the number of users; in the case of the License in the floating edition, all developers in all teams can install the InstallShield, and as long as the situation that one person uses the InstallShield at the same time is ensured, the situation is more consistent with the actual use situation, and the packing developers in multiple teams cannot always need to use the InstallShield at the same time. For lock-type authentication, the number of license resources is determined, as is the number of tunnels allocated to the client.
The invention also provides a UKey virtual machine penetration system applied to the cloud platform, which is applied to the cloud platform, and the system architecture is shown in figure 2.
The system comprises USB equipment, a USB client, a USB virtual center and a data transmission dedicated channel; the USB client comprises a USB bus driver and a virtual USB driver; the USB virtual center comprises a data transmission module, a control module, an upstream USB server, a virtual bus driver and a USB equipment driver;
the USB equipment is connected with a local USB client in a hardware access mode, and the USB client is in communication connection with the USB virtual center through a data transmission dedicated channel;
the USB client is configured to:
after the USB equipment is accessed, the USB bus drive of the USB client detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting;
the USB bus driver transmits data packet information to the virtual USB driver, and the virtual USB driver sends the data packet information to the virtual center through the virtual channel;
the virtual center is configured to:
after a data transmission module of the USB virtual center receives the data packet information, the control module selects an adaptive USB upstream server for the USB equipment according to the data packet information and sends the data packet information to the upstream USB server;
the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and a USB equipment driver of a USB virtual center acquires the analyzed data from the virtual USB bus;
the USB virtual center identifies the transmitted USB equipment according to the analyzed data, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
and judging the type of the request message, reading the authentication information in the request message if the request message is an authentication information request message, and providing the authentication information for an application program in the cloud platform to use.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a physical machine Server, or a network cloud Server, etc., and needs to install a Windows or Windows Server operating system) to perform some steps of the method according to various embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and any simple modification, equivalent change and modification made to the above embodiment according to the technical spirit of the present invention are still within the scope of the technical solution of the present invention.
Claims (10)
1. A UKey virtual machine penetration method applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and is characterized by comprising the following steps:
s1), the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the USB virtual center to generate virtual USB configuration information; the virtual USB configuration information includes a virtual USB device connected to a virtual port of the virtual center and a corresponding virtual USB function;
s2) connecting the USB device with the local USB client, detecting and identifying the USB device by the USB bus driver of the local USB client, obtaining the data packet information sent by the USB device, and mounting the device;
s3) the USB bus driver of the USB client transmits the data packet information to a virtual USB driver, and then the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel;
s4) the USB virtual center identifies the transmitted USB equipment according to the data packet information, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
s5), judging the type of the request message, if the request message is an authentication information request message, reading the authentication information in the request message, and providing the authentication information for an application program in the cloud platform for use.
2. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 1,
in step S2, after obtaining the packet information of the USB device, the method further includes:
controlling the USB equipment according to the data packet information; the data packet information comprises the home subscriber of the USB equipment, the binding information of the virtual machine, an authentication request, an access authority and port information.
3. The UKey virtual machine penetration method applied to the cloud platform architecture of claim 1, wherein in the step S3, the virtual USB driver passes the packet information through a data transmission dedicated channel to a USB virtual center, and the method includes:
s31), the USB virtual center comprises a data transmission module, a control module and an upstream USB server, after the data transmission module receives the data packet information, the control module selects an adaptive upstream USB server for the USB device according to the data packet information, and sends the data packet information to the upstream USB server.
4. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 3, wherein in the step S3, the USB bus driver passes the packet information through a channel dedicated to data transmission to a USB virtual center, further comprising:
s32), the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and the USB equipment driver of the USB virtual center acquires the analyzed data from the virtual USB bus.
5. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 3 or 4, wherein in the step S3, the data transmission dedicated channel is a virtual RPC channel.
6. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 4, wherein in the step S4, the virtual center identifies the USB device transmitted through, and includes:
and the USB virtual center identifies the virtual USB equipment connected to the virtual port of the virtual center and the corresponding function thereof according to the analyzed data acquired from the virtual USB bus, and updates the virtual USB configuration information.
7. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 1, wherein in the step S5, the providing the authentication information to the application program in the cloud platform for use includes:
the cloud platform judges the type of the authentication information, if the authentication information is floating authentication, floating authentication is provided for the application software according to the authentication information, and if the authentication information is locking authentication, the floating authentication is provided for the application software according to the authentication number.
8. A UKey virtual machine penetration system applied to a cloud platform architecture, which is characterized by comprising:
the system comprises USB equipment, a USB client, a USB virtual center and a data transmission dedicated channel; the USB client comprises a USB bus driver and a virtual USB driver; the USB virtual center comprises a data transmission module, a control module, an upstream USB server, a virtual bus driver and a USB equipment driver;
the USB equipment is connected with a local USB client in a hardware access mode, and the USB client is in communication connection with the USB virtual center through a data transmission dedicated channel;
the USB client is configured to:
after the USB equipment is accessed, the USB bus drive of the USB client detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting;
the USB bus driver transmits data packet information to the virtual USB driver, and the virtual USB driver sends the data packet information to the virtual center through the virtual channel;
the virtual center is configured to:
after a data transmission module of the USB virtual center receives the data packet information, the control module selects an adaptive USB upstream server for the USB equipment according to the data packet information and sends the data packet information to the upstream USB server;
the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and a USB equipment driver of a USB virtual center acquires the analyzed data from the virtual USB bus;
the USB virtual center identifies the transmitted USB equipment according to the analyzed data, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
and judging the type of the request message, reading the authentication information in the request message if the request message is an authentication information request message, and providing the authentication information for an application program in the cloud platform to use.
9. The UKey virtual machine penetration system of claim 8, wherein:
the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the virtual center to generate virtual USB configuration information; the virtual USB configuration information includes virtual USB devices and corresponding virtual USB functions connected to virtual ports of the virtual center.
10. The UKey virtual machine penetration system according to claim 8, wherein the USB virtual center identifies the USB device that has been transmitted through according to the parsed data obtained from the virtual USB bus, and comprises:
the USB virtual center identifies the virtual USB equipment connected to the virtual port of the virtual center and the corresponding function thereof, and updates the virtual USB configuration information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110828761.6A CN113282376B (en) | 2021-07-22 | 2021-07-22 | UKey virtual machine penetration method applied to cloud platform architecture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110828761.6A CN113282376B (en) | 2021-07-22 | 2021-07-22 | UKey virtual machine penetration method applied to cloud platform architecture |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113282376A true CN113282376A (en) | 2021-08-20 |
CN113282376B CN113282376B (en) | 2021-11-12 |
Family
ID=77287093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110828761.6A Active CN113282376B (en) | 2021-07-22 | 2021-07-22 | UKey virtual machine penetration method applied to cloud platform architecture |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113282376B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114938384A (en) * | 2022-04-25 | 2022-08-23 | 惠州华阳通用电子有限公司 | Virtualization device and method based on area EEA architecture |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103207965A (en) * | 2013-03-13 | 2013-07-17 | 杭州华三通信技术有限公司 | Method and device for License authentication in virtual environment |
CN103902878A (en) * | 2012-12-28 | 2014-07-02 | 杭州华三通信技术有限公司 | License authentication method and device under virtual environment |
CN104125243A (en) * | 2013-04-23 | 2014-10-29 | 浙江大学 | Method of penetrating internal network to remotely connect large-scale virtual machines |
CN105068944A (en) * | 2015-07-20 | 2015-11-18 | 深圳市青葡萄科技有限公司 | High availability method and architecture of universal serial bus (USB) peripherals in virtualization environment |
CN105376278A (en) * | 2014-08-25 | 2016-03-02 | 北京云巢动脉科技有限公司 | Method of realizing control on mobile equipment at different terminal and system thereof |
CN108171039A (en) * | 2017-12-25 | 2018-06-15 | 西安雷风电子科技有限公司 | A kind of safe office procedure based on UKEY |
CN109144752A (en) * | 2018-09-06 | 2019-01-04 | 郑州云海信息技术有限公司 | Access shared USB device method and apparatus |
US20190187690A1 (en) * | 2016-05-09 | 2019-06-20 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data communication over a plurality of data paths |
CN111428206A (en) * | 2019-12-09 | 2020-07-17 | 北京关键科技股份有限公司 | UKey virtual machine penetration technology |
CN111614784A (en) * | 2020-06-01 | 2020-09-01 | 中铁工程服务有限公司 | Edge computing box for heterogeneous data of a worksite |
CN112463454A (en) * | 2020-12-04 | 2021-03-09 | 北京深思数盾科技股份有限公司 | Data recovery method, server, terminal device and storage medium |
CN112596859A (en) * | 2020-12-25 | 2021-04-02 | 创新科技术有限公司 | USB transparent transmission method and device |
-
2021
- 2021-07-22 CN CN202110828761.6A patent/CN113282376B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103902878A (en) * | 2012-12-28 | 2014-07-02 | 杭州华三通信技术有限公司 | License authentication method and device under virtual environment |
CN103207965A (en) * | 2013-03-13 | 2013-07-17 | 杭州华三通信技术有限公司 | Method and device for License authentication in virtual environment |
CN104125243A (en) * | 2013-04-23 | 2014-10-29 | 浙江大学 | Method of penetrating internal network to remotely connect large-scale virtual machines |
CN105376278A (en) * | 2014-08-25 | 2016-03-02 | 北京云巢动脉科技有限公司 | Method of realizing control on mobile equipment at different terminal and system thereof |
CN105068944A (en) * | 2015-07-20 | 2015-11-18 | 深圳市青葡萄科技有限公司 | High availability method and architecture of universal serial bus (USB) peripherals in virtualization environment |
US20190187690A1 (en) * | 2016-05-09 | 2019-06-20 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data communication over a plurality of data paths |
CN108171039A (en) * | 2017-12-25 | 2018-06-15 | 西安雷风电子科技有限公司 | A kind of safe office procedure based on UKEY |
CN109144752A (en) * | 2018-09-06 | 2019-01-04 | 郑州云海信息技术有限公司 | Access shared USB device method and apparatus |
CN111428206A (en) * | 2019-12-09 | 2020-07-17 | 北京关键科技股份有限公司 | UKey virtual machine penetration technology |
CN111614784A (en) * | 2020-06-01 | 2020-09-01 | 中铁工程服务有限公司 | Edge computing box for heterogeneous data of a worksite |
CN112463454A (en) * | 2020-12-04 | 2021-03-09 | 北京深思数盾科技股份有限公司 | Data recovery method, server, terminal device and storage medium |
CN112596859A (en) * | 2020-12-25 | 2021-04-02 | 创新科技术有限公司 | USB transparent transmission method and device |
Non-Patent Citations (1)
Title |
---|
刘欢等: "基于Thin Hypervisor的USB设备访问控制", 《计算机系统应用》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114938384A (en) * | 2022-04-25 | 2022-08-23 | 惠州华阳通用电子有限公司 | Virtualization device and method based on area EEA architecture |
Also Published As
Publication number | Publication date |
---|---|
CN113282376B (en) | 2021-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6782307B2 (en) | Dynamic access to hosted applications | |
US20180276009A1 (en) | Methods and apparatus to manage asset capabilities in a computing environment using a common agent framework | |
US11438421B2 (en) | Accessing resources in a remote access or cloud-based network environment | |
US7793289B1 (en) | System accounting for operating system partitions | |
AU2019229870C1 (en) | Instant virtual application launch | |
US20130104126A1 (en) | System and method for dynamically creating machine images for instantiating virtual machines | |
US10996997B2 (en) | API-based service command invocation | |
CN110998528A (en) | Automatic workflow-based device switching | |
US20070124344A1 (en) | Method, apparatus and program storage device for providing web services-based data replication for Heterogeneous storage systems | |
US9535733B2 (en) | Peer-to-peer streaming and API services for plural applications | |
US20200042578A1 (en) | Document Object Model (DOM) Element Location Platform | |
CN111338641A (en) | Application publishing method and device | |
US20220053001A1 (en) | Methods and apparatus for automatic configuration of a containerized computing namespace | |
US11882154B2 (en) | Template representation of security resources | |
CN113282376B (en) | UKey virtual machine penetration method applied to cloud platform architecture | |
CN114706690B (en) | Method and system for sharing GPU (graphics processing Unit) by Kubernetes container | |
EP3826268B1 (en) | Offline management method and device for cloud desktop, and storage medium | |
US10547506B2 (en) | Determining identities for executing cloud processing and approvers of the executing | |
WO2023016151A1 (en) | Software framework of security application of linux system, and creation method for same | |
CN110113375A (en) | Resource share method and device, system, storage medium | |
CN109635558A (en) | Access control method, device and system | |
JP2023542527A (en) | Software access through heterogeneous encryption | |
CN112667441A (en) | Service module scheduling method, system and storage medium based on fault-tolerant function | |
WO2015008167A2 (en) | A moblie integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof | |
CN113176876B (en) | Data reading and writing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |