CN113282376A - UKey virtual machine penetration method applied to cloud platform architecture - Google Patents

UKey virtual machine penetration method applied to cloud platform architecture Download PDF

Info

Publication number
CN113282376A
CN113282376A CN202110828761.6A CN202110828761A CN113282376A CN 113282376 A CN113282376 A CN 113282376A CN 202110828761 A CN202110828761 A CN 202110828761A CN 113282376 A CN113282376 A CN 113282376A
Authority
CN
China
Prior art keywords
usb
virtual
cloud platform
data packet
packet information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110828761.6A
Other languages
Chinese (zh)
Other versions
CN113282376B (en
Inventor
刘鑫
陈梦晖
张会普
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Keyware Co ltd
Original Assignee
Beijing Keyware Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Keyware Co ltd filed Critical Beijing Keyware Co ltd
Priority to CN202110828761.6A priority Critical patent/CN113282376B/en
Publication of CN113282376A publication Critical patent/CN113282376A/en
Application granted granted Critical
Publication of CN113282376B publication Critical patent/CN113282376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4063Device-to-bus coupling
    • G06F13/4068Electrical coupling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45591Monitoring or debugging support

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)

Abstract

A UKey virtual machine penetration method and a system applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and the method comprises the following steps: the USB bus drive detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting; the USB bus driver transmits the data packet information to a virtual USB driver, and the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel; and the USB virtual center identifies the transmitted USB equipment and the data interaction request thereof according to the data packet information, reads the authentication information in the authentication information request message if the authentication information request message is the authentication information request message, and provides the authentication information for an application program in the cloud platform to use. According to the invention, the hardware USB License is provided for the application software in the virtual machine on the cloud platform to be used by the transparent transmission method, so that the USB License is more convenient to use on different physical machines.

Description

UKey virtual machine penetration method applied to cloud platform architecture
Technical Field
The invention relates to the field of cloud computing, in particular to a method and a system for penetrating a Ukey virtual machine under a cloud platform.
Background
The logical organization in the USB device comprises four layers of equipment, configuration, interfaces and endpoints, and the configuration consists of a plurality of interfaces. Each USB device provides a different combination of functions, one of which is selected during probing and connection.
In the USB protocol, the interface consists of multiple endpoints, each power-down representing a basic function that is the subject of control by the USB device driver. A functionally sophisticated USB device may have multiple interfaces, multiple interfaces in each configuration, and the device interface is a collection of endpoints. For example, a USB speaker may contain an audio interface and interfaces to knobs and buttons. All interfaces in one configuration may be active at the same time, and may be connected by different drivers. Each interface may have a spare interface to provide different quality of service parameters.
Currently, various business software is authorized by License, and authorization by License can be realized by hardware and software, wherein hardware is generally authorized by USB License, and software is generally authorized by a mode of providing files. The existing open source cloud platform is generally developed based on OpenStack for deep customization, can realize the identification of USB storage equipment and the discovery of the content of the USB storage equipment, but cannot identify USB License information and the like, so that hardware USB License cannot be used.
Disclosure of Invention
The technical problem to be solved by the invention is how to provide hardware USB License for application software in a virtual machine on a cloud platform for use, a bottom layer physical machine in a cloud platform framework is connected with USB equipment, the USB License is mounted on the cloud platform virtual machine through a transparent transmission method, the software on the layer of the cloud platform virtual machine can freely use the License, and the problem that the USB equipment is frequently plugged and unplugged by using the USB License on different physical machines at ordinary times is solved.
Specifically, the invention provides a UKey virtual machine penetration method applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and the method comprises the following steps:
s1), the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the virtual center to generate virtual USB configuration information; the virtual USB configuration information includes a virtual USB device connected to a virtual port of the virtual center and a corresponding virtual USB function;
s2) connecting the USB device with the local USB client, detecting and identifying the USB device by the USB bus driver of the local USB client, obtaining the data packet information sent by the USB device, and mounting the device;
s3) the USB bus driver of the USB client transmits the data packet information to a virtual USB driver, and then the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel;
s4) the USB virtual center identifies the transmitted USB equipment according to the data packet information, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
s5), judging the type of the request message, if the request message is an authentication information request message, reading the authentication information in the request message, and providing the authentication information for an application program in the cloud platform for use.
The invention also provides a UKey virtual machine penetration system applied to the cloud platform architecture, which is characterized by comprising the following components:
the system comprises USB equipment, a USB client, a USB virtual center and a data transmission dedicated channel; the USB client comprises a USB bus driver and a virtual USB driver; the USB virtual center comprises a data transmission module, a control module, an upstream USB server, a virtual bus driver and a USB equipment driver;
the USB equipment is connected with a local USB client in a hardware access mode, and the USB client is in communication connection with the USB virtual center through a data transmission dedicated channel;
the USB client is configured to:
after the USB equipment is accessed, the USB bus drive of the USB client detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting;
the USB bus driver transmits data packet information to the virtual USB driver, and the virtual USB driver sends the data packet information to the virtual center through the virtual channel;
the virtual center is configured to:
after a data transmission module of the USB virtual center receives the data packet information, the control module selects an adaptive USB upstream server for the USB equipment according to the data packet information and sends the data packet information to the upstream USB server;
the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and a USB equipment driver of a USB virtual center acquires the analyzed data from the virtual USB bus;
the USB virtual center identifies the transmitted USB equipment according to the analyzed data, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
and judging the type of the request message, reading the authentication information in the request message if the request message is an authentication information request message, and providing the authentication information for an application program in the cloud platform to use.
Drawings
Fig. 1 is a flowchart of a UKey virtual machine penetration method applied to a cloud platform architecture.
Fig. 2 is an architecture diagram of a UKey virtual machine penetration system applied to a cloud platform architecture.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention relates to a UKey virtual machine penetration method applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and the method comprises the following steps:
s1), the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the virtual center to generate virtual USB configuration information; the virtual USB configuration information includes a virtual USB device connected to a virtual port of the virtual center and a corresponding virtual USB function;
the USB devices are instantiated by a virtual USB hub that contains virtualization control logic for managing virtual USB devices that appear as free ports connected to the virtual hub as each virtual USB device is provisioned.
The virtual USB configuration information enumerates the dynamically allocated downstream virtual ports as physical USB ports, where each of these USB ports is associated with a corresponding USB function.
S2) connecting the USB device with the local USB client, detecting and identifying the USB device by the USB bus driver of the local USB client, obtaining the data packet information sent by the USB device, and mounting the device;
firstly, a hardware USB is inserted into a physical machine, the physical machine at the bottom layer of a cloud platform is provided with an operating system, when the connection of a USB device is detected, the operating system can automatically mount the device, find and read information in the USB device, but for License, License information in the USB device needs to be read, and the License information is transmitted. If the License information is not read on the USB equipment, processing according to a common U disk;
and after the data packet information of the USB equipment is obtained, controlling the USB equipment according to the data packet information, wherein the data packet information comprises an attribution user of the USB equipment, virtual machine binding information, an authentication request, an access authority and port information.
Wherein the virtual machine binding information may be a unique ID of the bound virtual machine, the ID being transparent to the virtual machine; the access rights are divided into read-only, read-write and prohibited.
S3) the USB bus driver of the USB client transmits the data packet information to a virtual USB driver, and then the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel;
in the step S3, in step S3,
s31), the USB virtual center comprises a data transmission module, a control module and an upstream USB server, after the data transmission module receives the data packet information, the control module selects an adaptive upstream USB server for the USB device according to the data packet information, and sends the data packet information to the upstream USB server.
S32), the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and the USB equipment driver of the USB virtual center acquires the analyzed data from the virtual USB bus.
The data transmission dedicated channel is a virtual RPC channel.
RPC (remote Procedure Call) -a remote Procedure call, a protocol that requests services from a remote computer program over a network without knowledge of the underlying network technology. That is to say, two servers a and B, one application is deployed on the server a, and it is desired to call the method provided by the application on the server B, because there is no memory space, it cannot be called directly, and it is necessary to express the semantics of the call and to communicate the data of the call through the network.
The RPC protocol assumes the existence of some transport protocol, such as TCP or UDP, for carrying information data between communication procedures. In the OSI network communication model, RPC spans the transport and application layers. RPC makes it easier to develop applications including network distributed multiprogrammers. There are many outstanding RPC frameworks that are open source in the industry, such as Spring Cloud, Dubbo, Thrift, etc.
S4) the USB virtual center identifies the transmitted USB equipment according to the data packet information, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
the USB virtual center identifies the USB equipment transmitted through according to the data packet information, and the method comprises the following steps:
and the USB virtual center identifies the virtual USB equipment connected to the virtual port of the virtual center and the corresponding function thereof according to the analyzed data acquired from the virtual USB bus, and updates the virtual USB configuration information.
The request message comprises the type of the data interaction request, the size of the content of the data interaction request and the content of the data interaction request.
S5), judging the type of the request message, if the request message is an authentication information request message, reading the authentication information in the request message, and providing the authentication information for an application program in the cloud platform for use.
The cloud platform judges the type of the authentication information, if the authentication information is floating authentication, floating authentication is provided for the application software according to the authentication information, and if the authentication information is locking authentication, the floating authentication is provided for the application software according to the authentication number.
The License authorization mechanism ensures that only licenses with legitimate rights can be accessed or information obtained. For the License software, the difference between the floating version and the single version is that the floating version has strong flexibility, the single version must be bound with a fixed machine, and the process of migrating to other machines is complex and is limited by times. The single machine is suitable for single person. If the enterprise is an enterprise, a plurality of development teams are arranged, each team has a respective packaging developer, and if a single edition is used, a plurality of License are purchased according to the number of users; in the case of the License in the floating edition, all developers in all teams can install the InstallShield, and as long as the situation that one person uses the InstallShield at the same time is ensured, the situation is more consistent with the actual use situation, and the packing developers in multiple teams cannot always need to use the InstallShield at the same time. For lock-type authentication, the number of license resources is determined, as is the number of tunnels allocated to the client.
The invention also provides a UKey virtual machine penetration system applied to the cloud platform, which is applied to the cloud platform, and the system architecture is shown in figure 2.
The system comprises USB equipment, a USB client, a USB virtual center and a data transmission dedicated channel; the USB client comprises a USB bus driver and a virtual USB driver; the USB virtual center comprises a data transmission module, a control module, an upstream USB server, a virtual bus driver and a USB equipment driver;
the USB equipment is connected with a local USB client in a hardware access mode, and the USB client is in communication connection with the USB virtual center through a data transmission dedicated channel;
the USB client is configured to:
after the USB equipment is accessed, the USB bus drive of the USB client detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting;
the USB bus driver transmits data packet information to the virtual USB driver, and the virtual USB driver sends the data packet information to the virtual center through the virtual channel;
the virtual center is configured to:
after a data transmission module of the USB virtual center receives the data packet information, the control module selects an adaptive USB upstream server for the USB equipment according to the data packet information and sends the data packet information to the upstream USB server;
the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and a USB equipment driver of a USB virtual center acquires the analyzed data from the virtual USB bus;
the USB virtual center identifies the transmitted USB equipment according to the analyzed data, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
and judging the type of the request message, reading the authentication information in the request message if the request message is an authentication information request message, and providing the authentication information for an application program in the cloud platform to use.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a physical machine Server, or a network cloud Server, etc., and needs to install a Windows or Windows Server operating system) to perform some steps of the method according to various embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and any simple modification, equivalent change and modification made to the above embodiment according to the technical spirit of the present invention are still within the scope of the technical solution of the present invention.

Claims (10)

1. A UKey virtual machine penetration method applied to a cloud platform architecture, wherein the cloud platform architecture comprises a USB client, a USB virtual center and a cloud platform, and is characterized by comprising the following steps:
s1), the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the USB virtual center to generate virtual USB configuration information; the virtual USB configuration information includes a virtual USB device connected to a virtual port of the virtual center and a corresponding virtual USB function;
s2) connecting the USB device with the local USB client, detecting and identifying the USB device by the USB bus driver of the local USB client, obtaining the data packet information sent by the USB device, and mounting the device;
s3) the USB bus driver of the USB client transmits the data packet information to a virtual USB driver, and then the virtual USB driver transmits the data packet information to a USB virtual center through a data transmission special channel;
s4) the USB virtual center identifies the transmitted USB equipment according to the data packet information, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
s5), judging the type of the request message, if the request message is an authentication information request message, reading the authentication information in the request message, and providing the authentication information for an application program in the cloud platform for use.
2. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 1,
in step S2, after obtaining the packet information of the USB device, the method further includes:
controlling the USB equipment according to the data packet information; the data packet information comprises the home subscriber of the USB equipment, the binding information of the virtual machine, an authentication request, an access authority and port information.
3. The UKey virtual machine penetration method applied to the cloud platform architecture of claim 1, wherein in the step S3, the virtual USB driver passes the packet information through a data transmission dedicated channel to a USB virtual center, and the method includes:
s31), the USB virtual center comprises a data transmission module, a control module and an upstream USB server, after the data transmission module receives the data packet information, the control module selects an adaptive upstream USB server for the USB device according to the data packet information, and sends the data packet information to the upstream USB server.
4. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 3, wherein in the step S3, the USB bus driver passes the packet information through a channel dedicated to data transmission to a USB virtual center, further comprising:
s32), the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and the USB equipment driver of the USB virtual center acquires the analyzed data from the virtual USB bus.
5. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 3 or 4, wherein in the step S3, the data transmission dedicated channel is a virtual RPC channel.
6. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 4, wherein in the step S4, the virtual center identifies the USB device transmitted through, and includes:
and the USB virtual center identifies the virtual USB equipment connected to the virtual port of the virtual center and the corresponding function thereof according to the analyzed data acquired from the virtual USB bus, and updates the virtual USB configuration information.
7. The UKey virtual machine penetration method applied to the cloud platform architecture according to claim 1, wherein in the step S5, the providing the authentication information to the application program in the cloud platform for use includes:
the cloud platform judges the type of the authentication information, if the authentication information is floating authentication, floating authentication is provided for the application software according to the authentication information, and if the authentication information is locking authentication, the floating authentication is provided for the application software according to the authentication number.
8. A UKey virtual machine penetration system applied to a cloud platform architecture, which is characterized by comprising:
the system comprises USB equipment, a USB client, a USB virtual center and a data transmission dedicated channel; the USB client comprises a USB bus driver and a virtual USB driver; the USB virtual center comprises a data transmission module, a control module, an upstream USB server, a virtual bus driver and a USB equipment driver;
the USB equipment is connected with a local USB client in a hardware access mode, and the USB client is in communication connection with the USB virtual center through a data transmission dedicated channel;
the USB client is configured to:
after the USB equipment is accessed, the USB bus drive of the USB client detects and identifies the USB equipment, obtains data packet information sent by the USB equipment, and carries out equipment mounting;
the USB bus driver transmits data packet information to the virtual USB driver, and the virtual USB driver sends the data packet information to the virtual center through the virtual channel;
the virtual center is configured to:
after a data transmission module of the USB virtual center receives the data packet information, the control module selects an adaptive USB upstream server for the USB equipment according to the data packet information and sends the data packet information to the upstream USB server;
the USB upstream server analyzes the data packet information, sends the analyzed data to a virtual USB bus driver, and a USB equipment driver of a USB virtual center acquires the analyzed data from the virtual USB bus;
the USB virtual center identifies the transmitted USB equipment according to the analyzed data, identifies the data interaction request of the transmitted USB equipment, classifies the data interaction request and respectively generates corresponding request messages;
and judging the type of the request message, reading the authentication information in the request message if the request message is an authentication information request message, and providing the authentication information for an application program in the cloud platform to use.
9. The UKey virtual machine penetration system of claim 8, wherein:
the server of the virtual center is provided with virtualization software and runs a virtual machine instance; performing virtual function configuration on the virtual center to generate virtual USB configuration information; the virtual USB configuration information includes virtual USB devices and corresponding virtual USB functions connected to virtual ports of the virtual center.
10. The UKey virtual machine penetration system according to claim 8, wherein the USB virtual center identifies the USB device that has been transmitted through according to the parsed data obtained from the virtual USB bus, and comprises:
the USB virtual center identifies the virtual USB equipment connected to the virtual port of the virtual center and the corresponding function thereof, and updates the virtual USB configuration information.
CN202110828761.6A 2021-07-22 2021-07-22 UKey virtual machine penetration method applied to cloud platform architecture Active CN113282376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110828761.6A CN113282376B (en) 2021-07-22 2021-07-22 UKey virtual machine penetration method applied to cloud platform architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110828761.6A CN113282376B (en) 2021-07-22 2021-07-22 UKey virtual machine penetration method applied to cloud platform architecture

Publications (2)

Publication Number Publication Date
CN113282376A true CN113282376A (en) 2021-08-20
CN113282376B CN113282376B (en) 2021-11-12

Family

ID=77287093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110828761.6A Active CN113282376B (en) 2021-07-22 2021-07-22 UKey virtual machine penetration method applied to cloud platform architecture

Country Status (1)

Country Link
CN (1) CN113282376B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938384A (en) * 2022-04-25 2022-08-23 惠州华阳通用电子有限公司 Virtualization device and method based on area EEA architecture

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103207965A (en) * 2013-03-13 2013-07-17 杭州华三通信技术有限公司 Method and device for License authentication in virtual environment
CN103902878A (en) * 2012-12-28 2014-07-02 杭州华三通信技术有限公司 License authentication method and device under virtual environment
CN104125243A (en) * 2013-04-23 2014-10-29 浙江大学 Method of penetrating internal network to remotely connect large-scale virtual machines
CN105068944A (en) * 2015-07-20 2015-11-18 深圳市青葡萄科技有限公司 High availability method and architecture of universal serial bus (USB) peripherals in virtualization environment
CN105376278A (en) * 2014-08-25 2016-03-02 北京云巢动脉科技有限公司 Method of realizing control on mobile equipment at different terminal and system thereof
CN108171039A (en) * 2017-12-25 2018-06-15 西安雷风电子科技有限公司 A kind of safe office procedure based on UKEY
CN109144752A (en) * 2018-09-06 2019-01-04 郑州云海信息技术有限公司 Access shared USB device method and apparatus
US20190187690A1 (en) * 2016-05-09 2019-06-20 Strong Force Iot Portfolio 2016, Llc Systems and methods for data communication over a plurality of data paths
CN111428206A (en) * 2019-12-09 2020-07-17 北京关键科技股份有限公司 UKey virtual machine penetration technology
CN111614784A (en) * 2020-06-01 2020-09-01 中铁工程服务有限公司 Edge computing box for heterogeneous data of a worksite
CN112463454A (en) * 2020-12-04 2021-03-09 北京深思数盾科技股份有限公司 Data recovery method, server, terminal device and storage medium
CN112596859A (en) * 2020-12-25 2021-04-02 创新科技术有限公司 USB transparent transmission method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902878A (en) * 2012-12-28 2014-07-02 杭州华三通信技术有限公司 License authentication method and device under virtual environment
CN103207965A (en) * 2013-03-13 2013-07-17 杭州华三通信技术有限公司 Method and device for License authentication in virtual environment
CN104125243A (en) * 2013-04-23 2014-10-29 浙江大学 Method of penetrating internal network to remotely connect large-scale virtual machines
CN105376278A (en) * 2014-08-25 2016-03-02 北京云巢动脉科技有限公司 Method of realizing control on mobile equipment at different terminal and system thereof
CN105068944A (en) * 2015-07-20 2015-11-18 深圳市青葡萄科技有限公司 High availability method and architecture of universal serial bus (USB) peripherals in virtualization environment
US20190187690A1 (en) * 2016-05-09 2019-06-20 Strong Force Iot Portfolio 2016, Llc Systems and methods for data communication over a plurality of data paths
CN108171039A (en) * 2017-12-25 2018-06-15 西安雷风电子科技有限公司 A kind of safe office procedure based on UKEY
CN109144752A (en) * 2018-09-06 2019-01-04 郑州云海信息技术有限公司 Access shared USB device method and apparatus
CN111428206A (en) * 2019-12-09 2020-07-17 北京关键科技股份有限公司 UKey virtual machine penetration technology
CN111614784A (en) * 2020-06-01 2020-09-01 中铁工程服务有限公司 Edge computing box for heterogeneous data of a worksite
CN112463454A (en) * 2020-12-04 2021-03-09 北京深思数盾科技股份有限公司 Data recovery method, server, terminal device and storage medium
CN112596859A (en) * 2020-12-25 2021-04-02 创新科技术有限公司 USB transparent transmission method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘欢等: "基于Thin Hypervisor的USB设备访问控制", 《计算机系统应用》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938384A (en) * 2022-04-25 2022-08-23 惠州华阳通用电子有限公司 Virtualization device and method based on area EEA architecture

Also Published As

Publication number Publication date
CN113282376B (en) 2021-11-12

Similar Documents

Publication Publication Date Title
JP6782307B2 (en) Dynamic access to hosted applications
US20180276009A1 (en) Methods and apparatus to manage asset capabilities in a computing environment using a common agent framework
US11438421B2 (en) Accessing resources in a remote access or cloud-based network environment
US7793289B1 (en) System accounting for operating system partitions
AU2019229870C1 (en) Instant virtual application launch
US20130104126A1 (en) System and method for dynamically creating machine images for instantiating virtual machines
US10996997B2 (en) API-based service command invocation
CN110998528A (en) Automatic workflow-based device switching
US20070124344A1 (en) Method, apparatus and program storage device for providing web services-based data replication for Heterogeneous storage systems
US9535733B2 (en) Peer-to-peer streaming and API services for plural applications
US20200042578A1 (en) Document Object Model (DOM) Element Location Platform
CN111338641A (en) Application publishing method and device
US20220053001A1 (en) Methods and apparatus for automatic configuration of a containerized computing namespace
US11882154B2 (en) Template representation of security resources
CN113282376B (en) UKey virtual machine penetration method applied to cloud platform architecture
CN114706690B (en) Method and system for sharing GPU (graphics processing Unit) by Kubernetes container
EP3826268B1 (en) Offline management method and device for cloud desktop, and storage medium
US10547506B2 (en) Determining identities for executing cloud processing and approvers of the executing
WO2023016151A1 (en) Software framework of security application of linux system, and creation method for same
CN110113375A (en) Resource share method and device, system, storage medium
CN109635558A (en) Access control method, device and system
JP2023542527A (en) Software access through heterogeneous encryption
CN112667441A (en) Service module scheduling method, system and storage medium based on fault-tolerant function
WO2015008167A2 (en) A moblie integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof
CN113176876B (en) Data reading and writing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant