CN113901414A - Multi-experiment system oriented control trusteeship method controlled by multi-experiment system - Google Patents

Multi-experiment system oriented control trusteeship method controlled by multi-experiment system Download PDF

Info

Publication number
CN113901414A
CN113901414A CN202111277027.1A CN202111277027A CN113901414A CN 113901414 A CN113901414 A CN 113901414A CN 202111277027 A CN202111277027 A CN 202111277027A CN 113901414 A CN113901414 A CN 113901414A
Authority
CN
China
Prior art keywords
control
hosting
remote
experiment
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111277027.1A
Other languages
Chinese (zh)
Other versions
CN113901414B (en
Inventor
佟为明
逄龙
王晓野
林景波
李中伟
金显吉
谭立国
初旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN202111277027.1A priority Critical patent/CN113901414B/en
Publication of CN113901414A publication Critical patent/CN113901414A/en
Application granted granted Critical
Publication of CN113901414B publication Critical patent/CN113901414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a control hosting method for a multi-experiment system and a control hosting method thereof, which comprises the following steps: step S1, the operator of each experimental system requests the control hosting authorization to the experimental system; step S2, each experimental system examines and approves and authorizes the control hosting request; step S3, after the experiment system confirms the authorization, a one-to-one encryption control escrow private network is established; step S4, the hosting control terminal starts remote control software; step S5, the operator issues instructions through the remote instruction agent function and the remote desktop function; step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation; step S7, operation log recording is carried out; and step S8, receiving post audit. The invention can realize the issue of control instructions to a plurality of experimental systems and carry out overall planning remote centralized control.

Description

Multi-experiment system oriented control trusteeship method controlled by multi-experiment system
Technical Field
The invention belongs to the field of remote control, and relates to a multi-experiment system and a control hosting method for controlling the multi-experiment system.
Background
With the deep exploration of human beings on the outer space, deep research is urgently needed in the aspects of space environment effects of spacecraft materials, devices and functional systems thereof and the like. The 'space environment ground simulation device' is a national important scientific and technological infrastructure, a space comprehensive environment ground simulation platform with international leading level is built, and the simulation of main space environment factors and the effect thereof is realized, so that the device is a key means for solving the problems.
In "space environment ground analogue means" national major science and technology infrastructure project, the experimental system is numerous, and each experimental system both can communicate each other and carry out the joint experiment, can independent operation each other again, and some experiments have danger, has the control personnel to be difficult to issue control instruction simultaneously for a plurality of experimental systems in the experimental system is local, carries out global overall control, lacks control operation record scheduling problem.
Disclosure of Invention
In order to facilitate the monitoring personnel to issue control instructions for a plurality of experimental systems simultaneously, carry out overall control and ensure the safety of the monitoring personnel, the invention provides a control hosting method facing to the plurality of experimental systems and the control thereof.
The purpose of the invention is realized by the following technical scheme:
a control hosting method facing a multi-experiment system and control therein comprises the following steps:
step S1, the operator of each experimental system requests the control hosting authorization to the experimental system;
step S2, each experimental system approves and authorizes the control hosting request, and provides a user name, a password, and an account available time, where the control hosting authorization includes: presetting an account mode and an interactive request confirmation mode;
step S3, after the experiment system confirms the authorization, a one-to-one encryption control hosting private network is established among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network;
step S4, the hosting control terminal starts remote control software;
step S5, the operator issues instructions through the remote instruction agent function and the remote desktop function;
step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation;
step S7, performing operation log recording:
(1) the log management and audit function records the operation process from top to bottom in detail according to the operation of the monitoring software of the experimental system and collects other information influenced by the operation process;
(2) recording a complete hosting control operation passing through a remote desktop by using a remote desktop protocol; simultaneously recording the related information of the computer controlled by the hosting in the related time period;
(3) according to the remote instruction proxy operation content, recording hosting control operation in detail, and simultaneously recording the running condition of monitoring software of a corresponding experiment system;
step S8, receiving post audit: and establishing a key activity index according to the hosting control log information, and providing service for user-defined inquiry and hosting control audit.
In the invention, the Network security of the control hosting of the experiment system is improved through a Virtual Private Network (VPN), thereby realizing the complete isolation of the hosting control of each experiment system. The virtual private network includes: general purpose hardware based virtual private networks, proprietary hardware based virtual private networks.
In the invention, the reliability of the control hosting of the experimental system is improved by adopting a master-slave server architecture, wherein a master server and a slave server are provided with the same control hosting system and are synchronized through a data storage volume; when the main server breaks down, the load manager is used for automatically switching, so that single-point faults are avoided, the overall reliability of control hosting is improved, and meanwhile, running environment support is provided for newly added functions.
In the invention, the traceability of all operations in the control hosting process is improved by adding log management and audit functions, graphical interface operations, control program running states, event logs and the like are respectively recorded according to different levels possibly influenced by the control hosting, the records are unified, a database is recorded according to unified time, and the event query and audit functions are provided. The log management includes: a control managed log facing a remote desktop and a control managed log facing a remote instruction agent.
In the invention, the manageability of the control and hosting function of the experimental system is improved by adding the remote instruction agent function, the dependence on a remote desktop is reduced, and the integration with other functions or interfaces is facilitated. The remote command agent function includes: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote control based on remote desktop, and remote control based on IP-KVM.
Compared with the prior art, the invention has the following advantages:
1. the central control system can perform instruction interaction with each monitoring computer through the control hosting pipe, and monitoring personnel can realize remote centralized control of the experimental system and perform overall planning;
2. a one-to-one encryption network is established among the experimental system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network, so that the control hosting networks of all experimental systems are isolated, and the safety guarantee capability under extreme conditions is improved;
3. by adopting a master-slave server framework for controlling the hosting, the reliability of the overall control hosting service is improved;
4. when a remote control instruction is executed, recording graphical interface operation, a control program running state and an event log, and providing a service for checking the whole operation record for an administrator through the operation log content recorded in the early stage, so that the traceability of all operations in the control hosting process is improved;
5. by adding the function of managing and controlling the operation log, the safety and traceability of the monitoring operation of the experimental system are guaranteed, and the problems that the current remote desktop operation and the local operation are difficult to distinguish, the operation lacks records and the like are avoided;
6. the remote command agent function and the remote desktop function are used for controlling the remote control of the hosting in an experimental control mode, and the remote command agent function and the remote desktop function are complementary to each other, so that the manageability of the control hosting operation is improved.
7. The invention can realize the issue of control instructions to a plurality of experimental systems and carry out overall planning remote centralized control.
Drawings
Fig. 1 is a functional block diagram of a control hosting method oriented to a multi-experiment system and a central control thereof.
Fig. 2 is a network topology diagram of a control hosting method oriented to a multi-experiment system and a control hosting method thereof.
FIG. 3 is a specific flowchart of a control hosting method for a multi-experiment system and its central controller.
Detailed Description
The technical solution of the present invention is further described below with reference to the accompanying drawings, but not limited thereto, and any modification or equivalent replacement of the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention shall be covered by the protection scope of the present invention.
The invention provides a multi-experiment system and a control hosting method for the multi-experiment system, wherein the control hosting means that under the condition that the experiment system authorizes the hosting, a central monitoring hall provides remote control service for each experiment system. The control hosting function block diagram is shown in fig. 1 and comprises: the method comprises the steps of control hosting authorization facing each experimental system, remote control over the control hosting of each experimental system, remote control operation authority management of the control hosting, remote control operation log management of the control hosting and remote control operation audit management of the control hosting.
In the present invention, a network topology diagram of a control hosting method for a multi-experiment system and its central control is shown in fig. 2, wherein: the virtual private network is arranged in the control hosting unit and is linked with each experimental subsystem by adopting a multiplexing transmission network; the control hosting master-slave server controls a log and audit function, a verification and authorization management function and a remote instruction agent function in the hosting module; after the terminal passes authorization and identity verification, a virtual private network is established according to a specific experiment system controlled and managed by authorization, a remote instruction is issued through a remote instruction agent or a remote desktop, and log recording and post audit are received; in order to improve the security of controlling the hosting server, a firewall is established between networks linked with the hosting control terminal, and the specific network flow and the access port are controlled and monitored.
As shown in fig. 3, the specific implementation steps of the control hosting method for a multi-experiment system and its central control are as follows:
in step S1, the operator of each experimental system requests the control hosting authority from the experimental system in which the operator is located.
In this step, the user initiates an application request at the client that controls hosting, including the purpose, time range, hosting range, etc. of controlling hosting the application.
And step S2, each experimental system examines and approves the control hosting request and authorizes the control hosting request.
In this step, the local monitoring terminal performs auditing and approval according to the hosting application content and the service requirement, and provides user name, password and account number available time for authorization after approval.
In this step, controlling the hosting authorization includes: and presetting an account mode and an interactive request confirmation mode.
In this step, when authorization is performed in a preset account mode, an authorization account number capable of being remotely accessed is preset in an experimental system according to the requirement of controlling a hosting task, the account number is distributed to an operator of the experimental system in a central monitoring hall, remote login is performed by using the account number, and after the task of controlling the hosting is finished, the account number is logged out by each experimental system.
In this step, when authorization is performed in an interactive request confirmation mode, a remote control request is initiated on a hosting control terminal of a central monitoring hall, a response is waited, after the experiment system receives the request, an authorization confirmation instruction or a rejection instruction is sent to the application after confirmation, after the hosting control terminal receives the authorization instruction, a remote control interface is executed, and when the hosting control terminal receives the rejection instruction, the current operation is terminated.
Step S3, when the experimental system confirms the authorization, the control hosting private network is established.
In the step, in the aspect of network transmission, a multiplexing transmission network is adopted in the control hosting unit and is linked with the control hosting service of each experimental subsystem, one-to-one encryption networks are established among the experimental system monitoring computer, the control hosting master-slave server and the terminal, and network segments are shared independently, so that the control hosting networks of each experimental system are isolated. In the aspect of network interfaces, an application firewall is added to realize the isolation from the monitoring rear end of a terminal operated by a control personnel and an experiment subsystem.
In this step, the virtual private network includes: general purpose hardware-based virtual private networks and proprietary hardware-based virtual private networks. Wherein: the VPN based on general hardware installs VPN software service end (such as OpenVPN system) on general server hardware, installs VPN software client end on relative access node, establishes virtual network by using authorization key, account number and other information, obtains special network segment IP, can directly communicate with other nodes on the network segment, the communication data is transmitted on physical network through encryption. The special hardware-based virtual private network configures parameters of a server side on VPN special hardware equipment (such as a Huacheng VPN gateway and a Juniper VPN gateway), a related access point installs a VPN communication protocol meeting the requirements of the server side, and data can be transmitted on an encryption network after access.
And step S4, the managed control terminal starts the remote control software.
And step S5, the operator issues an instruction through the remote control software.
In this step, the operator provides the service of remote issuing of the control command through the remote command agent function and the remote desktop function. Wherein: the remote instruction agent is executed by providing an agent interface at the hosting control terminal and sending the specific instruction to a remote authorized corresponding experiment system monitoring computer. The remote desktop is used for completely mapping the operating system desktop of the corresponding experiment monitoring computer to the hosting control terminal and operating by taking the desktop as a basic operation unit.
In this step, the remote command agent function includes: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote desktop-based remote control and remote control based on IP-KVM.
In this step, when the experimental system monitoring Software provides a Software Development Kit (SDK) or an Application Programming Interface (API), the remote instruction agent operates these tools through an agent Interface, thereby achieving the purpose of hosting control; meanwhile, in the agent interface, the related operations can be recorded in detail.
In this step, when the experimental system monitoring software does not provide the SDK or API, or only provides the native control interface, the remote instruction agent software may be customized in a simulation operation manner. The information such as parameters, buttons and the like which need to be managed and controlled is input and obtained through a proxy interface which controls the operation of a managed terminal, and then the custom software inputs the obtained data to an experimental system control software interface in a simulation operation mode; in this process, the customization software records the relevant operations in detail.
In this step, when the simulation-based operation is difficult to implement, the operation service can be provided through a remote desktop access protocol provided by the operating system. Currently mainstream operating systems provide RDP protocols, VNC protocols, and the like. The client supporting the protocol is utilized to realize the aim of local remote operation by logging in the server providing the protocol.
In this step, when the control software limits the remote desktop operation, an IP-KVM method may be used to provide the remote operation service; the IP-KVM remote operation maps the keyboard, the image and the mouse of the remote computer to the local through an IP network, and realizes the operation of the remote computer through out-of-band control.
And step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation.
Step S7, operation log recording is performed.
In the step, the log management and audit function records the operation process from top to bottom in detail according to the operation of the experimental system monitoring software, such as input data information, clicked buttons, click time, click sequence and the like; meanwhile, other information affected by the above operation, such as system critical event information, control program running state information, etc., is collected.
In this step, the log management includes: a control managed log facing a remote desktop and a control managed log facing a remote instruction agent.
In the step, a remote desktop protocol is utilized to record the complete hosting control operation passing through the remote desktop; and simultaneously recording relevant information of the computer under the control of the hosting in the relevant time period, such as active application programs, system load, network links and load, disk access load, operating system events and the like.
In the step, the hosting control operation is recorded in detail according to the remote instruction proxy operation content, and specifically comprises parameters, button operation time, button operation sequence and the like; meanwhile, the running conditions of the monitoring software of the corresponding experiment system, such as network port information, disk load information, system load information and the like, are recorded.
And step S8, receiving post audit.
In the step, a key activity index is established according to the hosting control log information, and service is provided for user-defined inquiry and hosting control audit.

Claims (7)

1. A control hosting method oriented to a multi-experiment system and control therein is characterized by comprising the following steps:
step S1, the operator of each experimental system requests the control hosting authorization to the experimental system;
step S2, each experimental system examines and approves and authorizes the control and hosting request, and provides a user name, a password and the available time of an account;
step S3, after the experiment system confirms the authorization, a one-to-one encryption control hosting private network is established among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network;
step S4, the hosting control terminal starts remote control software;
step S5, the operator issues instructions through the remote instruction agent function and the remote desktop function;
step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation;
step S7, performing operation log recording:
(1) the log management and audit function records the operation process from top to bottom in detail according to the operation of the monitoring software of the experimental system and collects other information influenced by the operation process;
(2) recording a complete hosting control operation passing through a remote desktop by using a remote desktop protocol; simultaneously recording the related information of the computer controlled by the hosting in the related time period;
(3) according to the remote instruction proxy operation content, recording hosting control operation in detail, and simultaneously recording the running condition of monitoring software of a corresponding experiment system;
step S8, receiving post audit: and establishing a key activity index according to the hosting control log information, and providing service for user-defined inquiry and hosting control audit.
2. The multi-experiment-oriented system and the control hosting method thereof according to claim 1, wherein in the step S2, the control hosting authorization comprises: and presetting an account mode and an interactive request confirmation mode.
3. The multi-experiment-oriented system and the control hosting method thereof as claimed in claim 2, wherein when the control hosting authority is in a preset account mode, an authorized account number capable of remote access is preset in the experiment system according to the need of a control hosting task, the account number is distributed to an operator of the experiment system in a central monitoring hall, remote login is performed by using the account number, and after the control hosting task is finished, the account number is logged out by each experiment system.
4. The multi-experiment system and the control hosting method thereof as claimed in claim 2, wherein when the control hosting authorization is an interactive request confirmation mode, a remote control request is initiated on a hosting control terminal of a central monitoring hall, a response is waited, after the experiment system receives the request, an authorization confirmation instruction is sent to the application after confirmation, or a rejection instruction is sent, after the hosting control terminal receives the authorization instruction, a remote control interface is executed, and when the hosting control terminal receives the rejection instruction, the current operation is terminated.
5. The multi-experiment-oriented system and the control hosting method thereof according to claim 1, wherein in the step S3, the virtual private network comprises: general purpose hardware-based virtual private networks and proprietary hardware-based virtual private networks.
6. The multi-experiment-oriented system and the control hosting method thereof according to claim 1, wherein in the step S5, the remote command agent function comprises: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote desktop-based remote control and remote control based on IP-KVM.
7. The multi-experiment-oriented system and control hosting method thereof according to claim 1, wherein in the step S7, the log management comprises: a control managed log facing a remote desktop and a control managed log facing a remote instruction agent.
CN202111277027.1A 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control Active CN113901414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111277027.1A CN113901414B (en) 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111277027.1A CN113901414B (en) 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control

Publications (2)

Publication Number Publication Date
CN113901414A true CN113901414A (en) 2022-01-07
CN113901414B CN113901414B (en) 2023-11-21

Family

ID=79027103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111277027.1A Active CN113901414B (en) 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control

Country Status (1)

Country Link
CN (1) CN113901414B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651743A (en) * 2009-09-10 2010-02-17 华耀环宇科技(北京)有限公司 Remote desktop access system facing to mobilephone terminal user
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
GB201316561D0 (en) * 2013-09-18 2013-10-30 Ibm Authorised remote access to an operating system hosted by a virtual machine
CN104753959A (en) * 2015-04-21 2015-07-01 湖北鑫英泰系统技术有限公司 Method and system for intensively operating and controlling several network security devices
CN108933702A (en) * 2018-08-01 2018-12-04 长沙龙生光启新材料科技有限公司 A method of remote service is provided
CN111586021A (en) * 2020-04-30 2020-08-25 河南省云安大数据安全防护产业技术研究院有限公司 Remote office business authorization method, terminal and system
KR20210103640A (en) * 2020-02-14 2021-08-24 김동규 Apparatus for authenticating remote network managment system and method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651743A (en) * 2009-09-10 2010-02-17 华耀环宇科技(北京)有限公司 Remote desktop access system facing to mobilephone terminal user
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
GB201316561D0 (en) * 2013-09-18 2013-10-30 Ibm Authorised remote access to an operating system hosted by a virtual machine
CN104753959A (en) * 2015-04-21 2015-07-01 湖北鑫英泰系统技术有限公司 Method and system for intensively operating and controlling several network security devices
CN108933702A (en) * 2018-08-01 2018-12-04 长沙龙生光启新材料科技有限公司 A method of remote service is provided
KR20210103640A (en) * 2020-02-14 2021-08-24 김동규 Apparatus for authenticating remote network managment system and method thereof
CN111586021A (en) * 2020-04-30 2020-08-25 河南省云安大数据安全防护产业技术研究院有限公司 Remote office business authorization method, terminal and system

Also Published As

Publication number Publication date
CN113901414B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
US20210160145A1 (en) Discovery and Management of Devices
EP1769383B1 (en) System for consolidating out-of-band access to nodes in a data network
CN106411857B (en) A kind of private clound GIS service access control method based on virtual isolation mech isolation test
CN109873834A (en) A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing
CN104615916B (en) Account management method and device, account authority control method and device
CN102857520B (en) Telnet protocol security access system and method for character terminal
WO2013075297A1 (en) Remote real-time monitoring system based on cloud computing
CN107193669A (en) The system and design method of maintenance interface based on mixed cloud or large-scale cluster
CN102045337A (en) Apparatus and methods for managing network resources
US20110055899A1 (en) Secure remote management of network devices with local processing and secure shell for remote distribution of information
WO2007045135A1 (en) A computer management system and the computer management method thereof
CN109981367A (en) Method based on the empty machine paas service management that Intranet penetrates
CN112738200B (en) Convenient operation and maintenance tool and method based on closed public network system
JP2015138525A (en) virtual plant monitoring control device
CN103235558A (en) Intelligent communication terminal for numerical control machine tool
CN112104476B (en) Method and system for automatic intelligent configuration of wide area network networking
KR101974278B1 (en) Remote Control System for Semiconductor Equipment
US11838374B2 (en) Remote network management infrastructure for cloud-based deployments
US8478977B1 (en) Secure auto-migration program
CN113901414B (en) Multi-experiment system and control hosting method for central control
CN111147429B (en) Project research and development environment deployment system
CN209881824U (en) Data center and cloud computing system based on private cloud platform
KR102406905B1 (en) Edge HMI System Based on Computing Using Industrial IoT Platform
CN102387141A (en) Computer and network security audit monitoring system and method
US20220263831A1 (en) Agentless access control system for dynamic calibration of software permissions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant