CN113901414A - Multi-experiment system oriented control trusteeship method controlled by multi-experiment system - Google Patents
Multi-experiment system oriented control trusteeship method controlled by multi-experiment system Download PDFInfo
- Publication number
- CN113901414A CN113901414A CN202111277027.1A CN202111277027A CN113901414A CN 113901414 A CN113901414 A CN 113901414A CN 202111277027 A CN202111277027 A CN 202111277027A CN 113901414 A CN113901414 A CN 113901414A
- Authority
- CN
- China
- Prior art keywords
- control
- hosting
- remote
- experiment
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000002474 experimental method Methods 0.000 title claims abstract description 40
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000013475 authorization Methods 0.000 claims abstract description 24
- 238000012544 monitoring process Methods 0.000 claims abstract description 22
- 238000012550 audit Methods 0.000 claims abstract description 15
- 238000007726 management method Methods 0.000 claims description 11
- 238000012790 confirmation Methods 0.000 claims description 9
- 238000004088 simulation Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 8
- 230000000694 effects Effects 0.000 claims description 5
- 230000002452 interceptive effect Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 2
- 238000013439 planning Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241000282414 Homo sapiens Species 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
- G06F16/1815—Journaling file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a control hosting method for a multi-experiment system and a control hosting method thereof, which comprises the following steps: step S1, the operator of each experimental system requests the control hosting authorization to the experimental system; step S2, each experimental system examines and approves and authorizes the control hosting request; step S3, after the experiment system confirms the authorization, a one-to-one encryption control escrow private network is established; step S4, the hosting control terminal starts remote control software; step S5, the operator issues instructions through the remote instruction agent function and the remote desktop function; step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation; step S7, operation log recording is carried out; and step S8, receiving post audit. The invention can realize the issue of control instructions to a plurality of experimental systems and carry out overall planning remote centralized control.
Description
Technical Field
The invention belongs to the field of remote control, and relates to a multi-experiment system and a control hosting method for controlling the multi-experiment system.
Background
With the deep exploration of human beings on the outer space, deep research is urgently needed in the aspects of space environment effects of spacecraft materials, devices and functional systems thereof and the like. The 'space environment ground simulation device' is a national important scientific and technological infrastructure, a space comprehensive environment ground simulation platform with international leading level is built, and the simulation of main space environment factors and the effect thereof is realized, so that the device is a key means for solving the problems.
In "space environment ground analogue means" national major science and technology infrastructure project, the experimental system is numerous, and each experimental system both can communicate each other and carry out the joint experiment, can independent operation each other again, and some experiments have danger, has the control personnel to be difficult to issue control instruction simultaneously for a plurality of experimental systems in the experimental system is local, carries out global overall control, lacks control operation record scheduling problem.
Disclosure of Invention
In order to facilitate the monitoring personnel to issue control instructions for a plurality of experimental systems simultaneously, carry out overall control and ensure the safety of the monitoring personnel, the invention provides a control hosting method facing to the plurality of experimental systems and the control thereof.
The purpose of the invention is realized by the following technical scheme:
a control hosting method facing a multi-experiment system and control therein comprises the following steps:
step S1, the operator of each experimental system requests the control hosting authorization to the experimental system;
step S2, each experimental system approves and authorizes the control hosting request, and provides a user name, a password, and an account available time, where the control hosting authorization includes: presetting an account mode and an interactive request confirmation mode;
step S3, after the experiment system confirms the authorization, a one-to-one encryption control hosting private network is established among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network;
step S4, the hosting control terminal starts remote control software;
step S5, the operator issues instructions through the remote instruction agent function and the remote desktop function;
step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation;
step S7, performing operation log recording:
(1) the log management and audit function records the operation process from top to bottom in detail according to the operation of the monitoring software of the experimental system and collects other information influenced by the operation process;
(2) recording a complete hosting control operation passing through a remote desktop by using a remote desktop protocol; simultaneously recording the related information of the computer controlled by the hosting in the related time period;
(3) according to the remote instruction proxy operation content, recording hosting control operation in detail, and simultaneously recording the running condition of monitoring software of a corresponding experiment system;
step S8, receiving post audit: and establishing a key activity index according to the hosting control log information, and providing service for user-defined inquiry and hosting control audit.
In the invention, the Network security of the control hosting of the experiment system is improved through a Virtual Private Network (VPN), thereby realizing the complete isolation of the hosting control of each experiment system. The virtual private network includes: general purpose hardware based virtual private networks, proprietary hardware based virtual private networks.
In the invention, the reliability of the control hosting of the experimental system is improved by adopting a master-slave server architecture, wherein a master server and a slave server are provided with the same control hosting system and are synchronized through a data storage volume; when the main server breaks down, the load manager is used for automatically switching, so that single-point faults are avoided, the overall reliability of control hosting is improved, and meanwhile, running environment support is provided for newly added functions.
In the invention, the traceability of all operations in the control hosting process is improved by adding log management and audit functions, graphical interface operations, control program running states, event logs and the like are respectively recorded according to different levels possibly influenced by the control hosting, the records are unified, a database is recorded according to unified time, and the event query and audit functions are provided. The log management includes: a control managed log facing a remote desktop and a control managed log facing a remote instruction agent.
In the invention, the manageability of the control and hosting function of the experimental system is improved by adding the remote instruction agent function, the dependence on a remote desktop is reduced, and the integration with other functions or interfaces is facilitated. The remote command agent function includes: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote control based on remote desktop, and remote control based on IP-KVM.
Compared with the prior art, the invention has the following advantages:
1. the central control system can perform instruction interaction with each monitoring computer through the control hosting pipe, and monitoring personnel can realize remote centralized control of the experimental system and perform overall planning;
2. a one-to-one encryption network is established among the experimental system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network, so that the control hosting networks of all experimental systems are isolated, and the safety guarantee capability under extreme conditions is improved;
3. by adopting a master-slave server framework for controlling the hosting, the reliability of the overall control hosting service is improved;
4. when a remote control instruction is executed, recording graphical interface operation, a control program running state and an event log, and providing a service for checking the whole operation record for an administrator through the operation log content recorded in the early stage, so that the traceability of all operations in the control hosting process is improved;
5. by adding the function of managing and controlling the operation log, the safety and traceability of the monitoring operation of the experimental system are guaranteed, and the problems that the current remote desktop operation and the local operation are difficult to distinguish, the operation lacks records and the like are avoided;
6. the remote command agent function and the remote desktop function are used for controlling the remote control of the hosting in an experimental control mode, and the remote command agent function and the remote desktop function are complementary to each other, so that the manageability of the control hosting operation is improved.
7. The invention can realize the issue of control instructions to a plurality of experimental systems and carry out overall planning remote centralized control.
Drawings
Fig. 1 is a functional block diagram of a control hosting method oriented to a multi-experiment system and a central control thereof.
Fig. 2 is a network topology diagram of a control hosting method oriented to a multi-experiment system and a control hosting method thereof.
FIG. 3 is a specific flowchart of a control hosting method for a multi-experiment system and its central controller.
Detailed Description
The technical solution of the present invention is further described below with reference to the accompanying drawings, but not limited thereto, and any modification or equivalent replacement of the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention shall be covered by the protection scope of the present invention.
The invention provides a multi-experiment system and a control hosting method for the multi-experiment system, wherein the control hosting means that under the condition that the experiment system authorizes the hosting, a central monitoring hall provides remote control service for each experiment system. The control hosting function block diagram is shown in fig. 1 and comprises: the method comprises the steps of control hosting authorization facing each experimental system, remote control over the control hosting of each experimental system, remote control operation authority management of the control hosting, remote control operation log management of the control hosting and remote control operation audit management of the control hosting.
In the present invention, a network topology diagram of a control hosting method for a multi-experiment system and its central control is shown in fig. 2, wherein: the virtual private network is arranged in the control hosting unit and is linked with each experimental subsystem by adopting a multiplexing transmission network; the control hosting master-slave server controls a log and audit function, a verification and authorization management function and a remote instruction agent function in the hosting module; after the terminal passes authorization and identity verification, a virtual private network is established according to a specific experiment system controlled and managed by authorization, a remote instruction is issued through a remote instruction agent or a remote desktop, and log recording and post audit are received; in order to improve the security of controlling the hosting server, a firewall is established between networks linked with the hosting control terminal, and the specific network flow and the access port are controlled and monitored.
As shown in fig. 3, the specific implementation steps of the control hosting method for a multi-experiment system and its central control are as follows:
in step S1, the operator of each experimental system requests the control hosting authority from the experimental system in which the operator is located.
In this step, the user initiates an application request at the client that controls hosting, including the purpose, time range, hosting range, etc. of controlling hosting the application.
And step S2, each experimental system examines and approves the control hosting request and authorizes the control hosting request.
In this step, the local monitoring terminal performs auditing and approval according to the hosting application content and the service requirement, and provides user name, password and account number available time for authorization after approval.
In this step, controlling the hosting authorization includes: and presetting an account mode and an interactive request confirmation mode.
In this step, when authorization is performed in a preset account mode, an authorization account number capable of being remotely accessed is preset in an experimental system according to the requirement of controlling a hosting task, the account number is distributed to an operator of the experimental system in a central monitoring hall, remote login is performed by using the account number, and after the task of controlling the hosting is finished, the account number is logged out by each experimental system.
In this step, when authorization is performed in an interactive request confirmation mode, a remote control request is initiated on a hosting control terminal of a central monitoring hall, a response is waited, after the experiment system receives the request, an authorization confirmation instruction or a rejection instruction is sent to the application after confirmation, after the hosting control terminal receives the authorization instruction, a remote control interface is executed, and when the hosting control terminal receives the rejection instruction, the current operation is terminated.
Step S3, when the experimental system confirms the authorization, the control hosting private network is established.
In the step, in the aspect of network transmission, a multiplexing transmission network is adopted in the control hosting unit and is linked with the control hosting service of each experimental subsystem, one-to-one encryption networks are established among the experimental system monitoring computer, the control hosting master-slave server and the terminal, and network segments are shared independently, so that the control hosting networks of each experimental system are isolated. In the aspect of network interfaces, an application firewall is added to realize the isolation from the monitoring rear end of a terminal operated by a control personnel and an experiment subsystem.
In this step, the virtual private network includes: general purpose hardware-based virtual private networks and proprietary hardware-based virtual private networks. Wherein: the VPN based on general hardware installs VPN software service end (such as OpenVPN system) on general server hardware, installs VPN software client end on relative access node, establishes virtual network by using authorization key, account number and other information, obtains special network segment IP, can directly communicate with other nodes on the network segment, the communication data is transmitted on physical network through encryption. The special hardware-based virtual private network configures parameters of a server side on VPN special hardware equipment (such as a Huacheng VPN gateway and a Juniper VPN gateway), a related access point installs a VPN communication protocol meeting the requirements of the server side, and data can be transmitted on an encryption network after access.
And step S4, the managed control terminal starts the remote control software.
And step S5, the operator issues an instruction through the remote control software.
In this step, the operator provides the service of remote issuing of the control command through the remote command agent function and the remote desktop function. Wherein: the remote instruction agent is executed by providing an agent interface at the hosting control terminal and sending the specific instruction to a remote authorized corresponding experiment system monitoring computer. The remote desktop is used for completely mapping the operating system desktop of the corresponding experiment monitoring computer to the hosting control terminal and operating by taking the desktop as a basic operation unit.
In this step, the remote command agent function includes: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote desktop-based remote control and remote control based on IP-KVM.
In this step, when the experimental system monitoring Software provides a Software Development Kit (SDK) or an Application Programming Interface (API), the remote instruction agent operates these tools through an agent Interface, thereby achieving the purpose of hosting control; meanwhile, in the agent interface, the related operations can be recorded in detail.
In this step, when the experimental system monitoring software does not provide the SDK or API, or only provides the native control interface, the remote instruction agent software may be customized in a simulation operation manner. The information such as parameters, buttons and the like which need to be managed and controlled is input and obtained through a proxy interface which controls the operation of a managed terminal, and then the custom software inputs the obtained data to an experimental system control software interface in a simulation operation mode; in this process, the customization software records the relevant operations in detail.
In this step, when the simulation-based operation is difficult to implement, the operation service can be provided through a remote desktop access protocol provided by the operating system. Currently mainstream operating systems provide RDP protocols, VNC protocols, and the like. The client supporting the protocol is utilized to realize the aim of local remote operation by logging in the server providing the protocol.
In this step, when the control software limits the remote desktop operation, an IP-KVM method may be used to provide the remote operation service; the IP-KVM remote operation maps the keyboard, the image and the mouse of the remote computer to the local through an IP network, and realizes the operation of the remote computer through out-of-band control.
And step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation.
Step S7, operation log recording is performed.
In the step, the log management and audit function records the operation process from top to bottom in detail according to the operation of the experimental system monitoring software, such as input data information, clicked buttons, click time, click sequence and the like; meanwhile, other information affected by the above operation, such as system critical event information, control program running state information, etc., is collected.
In this step, the log management includes: a control managed log facing a remote desktop and a control managed log facing a remote instruction agent.
In the step, a remote desktop protocol is utilized to record the complete hosting control operation passing through the remote desktop; and simultaneously recording relevant information of the computer under the control of the hosting in the relevant time period, such as active application programs, system load, network links and load, disk access load, operating system events and the like.
In the step, the hosting control operation is recorded in detail according to the remote instruction proxy operation content, and specifically comprises parameters, button operation time, button operation sequence and the like; meanwhile, the running conditions of the monitoring software of the corresponding experiment system, such as network port information, disk load information, system load information and the like, are recorded.
And step S8, receiving post audit.
In the step, a key activity index is established according to the hosting control log information, and service is provided for user-defined inquiry and hosting control audit.
Claims (7)
1. A control hosting method oriented to a multi-experiment system and control therein is characterized by comprising the following steps:
step S1, the operator of each experimental system requests the control hosting authorization to the experimental system;
step S2, each experimental system examines and approves and authorizes the control and hosting request, and provides a user name, a password and the available time of an account;
step S3, after the experiment system confirms the authorization, a one-to-one encryption control hosting private network is established among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network;
step S4, the hosting control terminal starts remote control software;
step S5, the operator issues instructions through the remote instruction agent function and the remote desktop function;
step S6, the monitoring equipment receives the remote control instruction to perform corresponding operation;
step S7, performing operation log recording:
(1) the log management and audit function records the operation process from top to bottom in detail according to the operation of the monitoring software of the experimental system and collects other information influenced by the operation process;
(2) recording a complete hosting control operation passing through a remote desktop by using a remote desktop protocol; simultaneously recording the related information of the computer controlled by the hosting in the related time period;
(3) according to the remote instruction proxy operation content, recording hosting control operation in detail, and simultaneously recording the running condition of monitoring software of a corresponding experiment system;
step S8, receiving post audit: and establishing a key activity index according to the hosting control log information, and providing service for user-defined inquiry and hosting control audit.
2. The multi-experiment-oriented system and the control hosting method thereof according to claim 1, wherein in the step S2, the control hosting authorization comprises: and presetting an account mode and an interactive request confirmation mode.
3. The multi-experiment-oriented system and the control hosting method thereof as claimed in claim 2, wherein when the control hosting authority is in a preset account mode, an authorized account number capable of remote access is preset in the experiment system according to the need of a control hosting task, the account number is distributed to an operator of the experiment system in a central monitoring hall, remote login is performed by using the account number, and after the control hosting task is finished, the account number is logged out by each experiment system.
4. The multi-experiment system and the control hosting method thereof as claimed in claim 2, wherein when the control hosting authorization is an interactive request confirmation mode, a remote control request is initiated on a hosting control terminal of a central monitoring hall, a response is waited, after the experiment system receives the request, an authorization confirmation instruction is sent to the application after confirmation, or a rejection instruction is sent, after the hosting control terminal receives the authorization instruction, a remote control interface is executed, and when the hosting control terminal receives the rejection instruction, the current operation is terminated.
5. The multi-experiment-oriented system and the control hosting method thereof according to claim 1, wherein in the step S3, the virtual private network comprises: general purpose hardware-based virtual private networks and proprietary hardware-based virtual private networks.
6. The multi-experiment-oriented system and the control hosting method thereof according to claim 1, wherein in the step S5, the remote command agent function comprises: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote desktop-based remote control and remote control based on IP-KVM.
7. The multi-experiment-oriented system and control hosting method thereof according to claim 1, wherein in the step S7, the log management comprises: a control managed log facing a remote desktop and a control managed log facing a remote instruction agent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111277027.1A CN113901414B (en) | 2021-10-30 | 2021-10-30 | Multi-experiment system and control hosting method for central control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111277027.1A CN113901414B (en) | 2021-10-30 | 2021-10-30 | Multi-experiment system and control hosting method for central control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113901414A true CN113901414A (en) | 2022-01-07 |
CN113901414B CN113901414B (en) | 2023-11-21 |
Family
ID=79027103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111277027.1A Active CN113901414B (en) | 2021-10-30 | 2021-10-30 | Multi-experiment system and control hosting method for central control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113901414B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101651743A (en) * | 2009-09-10 | 2010-02-17 | 华耀环宇科技(北京)有限公司 | Remote desktop access system facing to mobilephone terminal user |
CN102571773A (en) * | 2011-12-27 | 2012-07-11 | 浙江省电力公司 | Information security comprehensive audit system and method |
GB201316561D0 (en) * | 2013-09-18 | 2013-10-30 | Ibm | Authorised remote access to an operating system hosted by a virtual machine |
CN104753959A (en) * | 2015-04-21 | 2015-07-01 | 湖北鑫英泰系统技术有限公司 | Method and system for intensively operating and controlling several network security devices |
CN108933702A (en) * | 2018-08-01 | 2018-12-04 | 长沙龙生光启新材料科技有限公司 | A method of remote service is provided |
CN111586021A (en) * | 2020-04-30 | 2020-08-25 | 河南省云安大数据安全防护产业技术研究院有限公司 | Remote office business authorization method, terminal and system |
KR20210103640A (en) * | 2020-02-14 | 2021-08-24 | 김동규 | Apparatus for authenticating remote network managment system and method thereof |
-
2021
- 2021-10-30 CN CN202111277027.1A patent/CN113901414B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101651743A (en) * | 2009-09-10 | 2010-02-17 | 华耀环宇科技(北京)有限公司 | Remote desktop access system facing to mobilephone terminal user |
CN102571773A (en) * | 2011-12-27 | 2012-07-11 | 浙江省电力公司 | Information security comprehensive audit system and method |
GB201316561D0 (en) * | 2013-09-18 | 2013-10-30 | Ibm | Authorised remote access to an operating system hosted by a virtual machine |
CN104753959A (en) * | 2015-04-21 | 2015-07-01 | 湖北鑫英泰系统技术有限公司 | Method and system for intensively operating and controlling several network security devices |
CN108933702A (en) * | 2018-08-01 | 2018-12-04 | 长沙龙生光启新材料科技有限公司 | A method of remote service is provided |
KR20210103640A (en) * | 2020-02-14 | 2021-08-24 | 김동규 | Apparatus for authenticating remote network managment system and method thereof |
CN111586021A (en) * | 2020-04-30 | 2020-08-25 | 河南省云安大数据安全防护产业技术研究院有限公司 | Remote office business authorization method, terminal and system |
Also Published As
Publication number | Publication date |
---|---|
CN113901414B (en) | 2023-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210160145A1 (en) | Discovery and Management of Devices | |
EP1769383B1 (en) | System for consolidating out-of-band access to nodes in a data network | |
CN106411857B (en) | A kind of private clound GIS service access control method based on virtual isolation mech isolation test | |
CN109873834A (en) | A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing | |
CN104615916B (en) | Account management method and device, account authority control method and device | |
CN102857520B (en) | Telnet protocol security access system and method for character terminal | |
WO2013075297A1 (en) | Remote real-time monitoring system based on cloud computing | |
CN107193669A (en) | The system and design method of maintenance interface based on mixed cloud or large-scale cluster | |
CN102045337A (en) | Apparatus and methods for managing network resources | |
US20110055899A1 (en) | Secure remote management of network devices with local processing and secure shell for remote distribution of information | |
WO2007045135A1 (en) | A computer management system and the computer management method thereof | |
CN109981367A (en) | Method based on the empty machine paas service management that Intranet penetrates | |
CN112738200B (en) | Convenient operation and maintenance tool and method based on closed public network system | |
JP2015138525A (en) | virtual plant monitoring control device | |
CN103235558A (en) | Intelligent communication terminal for numerical control machine tool | |
CN112104476B (en) | Method and system for automatic intelligent configuration of wide area network networking | |
KR101974278B1 (en) | Remote Control System for Semiconductor Equipment | |
US11838374B2 (en) | Remote network management infrastructure for cloud-based deployments | |
US8478977B1 (en) | Secure auto-migration program | |
CN113901414B (en) | Multi-experiment system and control hosting method for central control | |
CN111147429B (en) | Project research and development environment deployment system | |
CN209881824U (en) | Data center and cloud computing system based on private cloud platform | |
KR102406905B1 (en) | Edge HMI System Based on Computing Using Industrial IoT Platform | |
CN102387141A (en) | Computer and network security audit monitoring system and method | |
US20220263831A1 (en) | Agentless access control system for dynamic calibration of software permissions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |