CN117714513A - Method and system for controlling target equipment based on cloud server - Google Patents

Method and system for controlling target equipment based on cloud server Download PDF

Info

Publication number
CN117714513A
CN117714513A CN202410168602.1A CN202410168602A CN117714513A CN 117714513 A CN117714513 A CN 117714513A CN 202410168602 A CN202410168602 A CN 202410168602A CN 117714513 A CN117714513 A CN 117714513A
Authority
CN
China
Prior art keywords
cloud server
target equipment
ssh
target
operation instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410168602.1A
Other languages
Chinese (zh)
Other versions
CN117714513B (en
Inventor
钟严军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yunchi Future Technology Co ltd
Original Assignee
Beijing Yunchi Future Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yunchi Future Technology Co ltd filed Critical Beijing Yunchi Future Technology Co ltd
Priority to CN202410168602.1A priority Critical patent/CN117714513B/en
Publication of CN117714513A publication Critical patent/CN117714513A/en
Application granted granted Critical
Publication of CN117714513B publication Critical patent/CN117714513B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The application provides a method and a system for controlling target equipment based on a cloud server, and belongs to the technical field of computer network and system management. The method comprises the following steps: establishing SSH communication connection between the cloud and the target equipment; uploading an operation instruction for controlling the target equipment to a cloud end, and transparently transmitting the operation instruction to the target equipment through the cloud end; after the target equipment receives the operation instruction transmitted by the cloud, the operation instruction is executed through the target equipment, so that the operation control is carried out on the target equipment. According to the method and the device, the instructions are transmitted to the device through the cloud, so that safety is guaranteed, and meanwhile, the efficiency of device management is improved.

Description

Method and system for controlling target equipment based on cloud server
Technical Field
The application relates to the technical field of computer network and system management, in particular to a method and a system for controlling target equipment based on a cloud server.
Background
In the prior art, aiming at the management and control of equipment, the equipment needs to be managed and controlled through physical access equipment, so that certain safety problems exist in data transmission, unauthorized access to the equipment is easy to occur, information data is easy to leak, and the equipment cannot be managed and controlled simultaneously due to the fact that the equipment is accessed through the physical access equipment, the efficiency is low, and human errors are increased and the loss of equipment and cost is caused by the fact that management control is performed through an administrator.
Disclosure of Invention
Aiming at the problems, the application provides a method for controlling target equipment based on a cloud server, which comprises the following steps:
establishing SSH communication connection between a cloud server and target equipment;
uploading an operation instruction for controlling the target equipment to the cloud server;
the cloud server transparently transmits the operation instruction to the target equipment through the SSH communication connection;
after the target equipment receives the operation instruction transmitted by the cloud server, the operation instruction is executed to perform operation control on the target equipment.
Optionally, establishing the SSH communication connection between the cloud server and the target device includes:
configuring connection parameters for SSH communication connection for the cloud server through SSH server software installed in the cloud server, and configuring authorization authentication information for the equipment through SSH server software installed in the target equipment;
respectively carrying out identity authentication on the cloud server and the target equipment through the connection parameters and the authorization authentication information;
and if the authentication is passed, establishing SSH communication connection between the cloud server and the target equipment.
Optionally, the connection parameters include, but are not limited to, at least any one of the following: the port number of the cloud server and the identity verification mode of the cloud server.
Optionally, performing identity authentication on the cloud server and the target device includes:
and carrying out identity authentication on the cloud server and the target equipment through an SSH protocol.
Optionally, performing identity authentication on the cloud server and the target device through an SSH protocol includes:
encrypting connection parameters configured for the cloud server and identity information of the cloud server by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the cloud server, transmitting the encrypted identity data of the cloud server to SSH server software installed on target equipment, decrypting the encrypted identity data of the cloud server by the SSH server software installed on the target equipment based on an RSA decryption algorithm to obtain decrypted identity data of the cloud server, and verifying the identity information in the identity data by an identity verification mode in the decrypted identity data of the cloud server;
and encrypting the authentication information authorized for the equipment and the identity information of the target equipment by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the target equipment, transmitting the encrypted identity data of the target equipment to SSH server software installed on the cloud server, decrypting the encrypted identity data of the target equipment by the SSH server software installed on the cloud server based on an RSA decryption algorithm to obtain decrypted identity data of the target equipment, and verifying the authentication information and the identity information in the identity data of the target equipment by using an identity authentication mode in connection parameters configured by the cloud server.
Optionally, performing identity authentication on the cloud server and the target device, further includes: and the identity authentication of the cloud server and the identity authentication of the target equipment pass through the authentication, and SSH communication connection between the cloud server and the target equipment is allowed to be established.
Optionally, the method further comprises:
and feeding back an execution result of the operation instruction executed by the target equipment to a cloud server.
Optionally, the method further comprises:
and reading an execution result to determine the efficiency and accuracy of the operation control of the target equipment, adjusting the operation instruction according to the efficiency and accuracy to update the operation instruction, transmitting the updated operation instruction to the target equipment through the cloud server, and executing the updated operation instruction through the target equipment to perform operation control on the target equipment.
Optionally, the method further comprises:
according to the control operation task of the target equipment, a script is compiled and generated or an automation tool is developed, and an operation instruction is automatically generated and uploaded to a cloud server through the compiled script or automation tool so as to control the target equipment or control the target equipment regularly.
Optionally, the target device is an operating system device, where the operating system device at least includes: linux operating system equipment.
In still another aspect, the present application further provides a system for controlling a target device based on a cloud server, including:
the communication connection unit is used for establishing SSH communication connection between the cloud server and the target equipment;
the transparent command unit is used for uploading an operation command for controlling the target equipment to a cloud server, and transmitting the operation command to the target equipment through the cloud server;
and the operation control unit is used for executing the operation instruction through the target equipment after the target equipment receives the operation instruction transmitted by the cloud, so as to perform operation control on the target equipment.
Compared with the prior art, the beneficial effects of this application are:
the application provides a method for controlling target equipment based on a cloud server, which comprises the following steps: establishing SSH communication connection between a cloud server and target equipment; uploading an operation instruction for controlling the target equipment to a cloud server, and transmitting the operation instruction to the target equipment through the cloud server; after the target equipment receives the operation instruction transmitted by the cloud server, the operation instruction is executed through the target equipment, so that the operation control is carried out on the target equipment. According to the method and the device, the instructions are transmitted to the device through the cloud, so that safety is guaranteed, and meanwhile, the efficiency of device management is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following description will briefly explain the drawings used in the embodiments of the present application, and it is obvious that the drawings described below are only specific embodiments of the present application, and that a person skilled in the art may obtain other embodiments according to the following drawings without inventive effort.
FIG. 1 is a schematic flow chart of embodiment 1 of the method of the present application;
FIG. 2 is a schematic flow chart of embodiment 2 of the method of the present application;
FIG. 3 is a schematic diagram of the method of embodiment 2 of the present application;
FIG. 4 is a schematic structural diagram of embodiment 3 of the system of the present application;
fig. 5 is a schematic structural diagram of embodiment 4 of the system of the present application.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Detailed Description
The exemplary embodiments of the present application will now be described with reference to the accompanying drawings, however, the present application may be embodied in many different forms and is not limited to the examples described herein, which are provided to fully and completely disclose the present application and fully convey the scope of the application to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings are not intended to be limiting of the present application. In the drawings, like elements/components are referred to by like reference numerals.
Unless otherwise indicated, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. In addition, it will be understood that terms defined in commonly used dictionaries should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
In embodiments 1-4 of the present invention, linux operating system devices are used as target devices, and are specifically described below.
Example 1:
the application proposes a method s100 for controlling a target device based on a cloud server, as shown in fig. 1, including:
step S101, establishing SSH communication connection between a cloud end and target equipment;
step s102, uploading an operation instruction for controlling the target device to a cloud, and transmitting the operation instruction to the target device through the cloud;
step s103, after the target device receives the operation instruction transmitted by the cloud, executing the operation instruction by the target device, so as to perform operation control on the target device.
The method for establishing SSH communication connection between the cloud and the target equipment comprises the following steps:
respectively installing SSH server software on a cloud server and target equipment, configuring connection parameters for SSH communication connection for the cloud server through the SSH server software installed on the cloud server, and authorizing authentication information for the equipment through the SSH server software installed on the target equipment;
and carrying out identity authentication on the cloud server and the target equipment through connection parameters configured for the cloud server and authentication information authorized for the equipment, and establishing SSH communication connection between the cloud and the target equipment after the authentication is passed.
Wherein, the connection parameters include: port number and authentication means.
The identity authentication of the cloud server and the target equipment comprises the following steps:
and carrying out identity authentication on the cloud server and the target equipment through an SSH protocol.
Identity authentication is performed on the cloud server and the target device through an SSH protocol, and the method comprises the following steps:
encrypting connection parameters configured for the cloud server and identity information of the cloud server by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the cloud server, transmitting the encrypted identity data of the cloud server to SSH server software installed on target equipment, decrypting the encrypted identity data of the cloud server by the SSH server software installed on the target equipment based on an RSA decryption algorithm to obtain decrypted identity data of the cloud server, and verifying the identity information in the identity data by an identity verification mode in the decrypted identity data of the cloud server;
and encrypting the authentication information authorized for the equipment and the identity information of the target equipment by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the target equipment, transmitting the encrypted identity data of the target equipment to SSH server software installed on the cloud server, decrypting the encrypted identity data of the target equipment by the SSH server software installed on the cloud server based on an RSA decryption algorithm to obtain decrypted identity data of the target equipment, and verifying the authentication information and the identity information in the identity data of the target equipment by using an identity authentication mode in connection parameters configured by the cloud server.
The identity authentication of the cloud server and the target device further comprises: and the identity authentication of the cloud server and the identity authentication of the target equipment pass through the authentication, and SSH communication connection between the cloud and the target equipment is allowed to be established.
Wherein the method further comprises:
and feeding back an execution result of the operation instruction executed by the target equipment to the cloud.
Wherein the method further comprises:
and reading an execution result to determine the efficiency and accuracy of the operation control of the target equipment, adjusting the operation instruction according to the efficiency and accuracy to update the operation instruction, transmitting the updated operation instruction to the target equipment through the cloud, and executing the updated operation instruction through the target equipment to perform operation control on the target equipment.
Wherein the method further comprises:
according to the control operation task of the target equipment, a script is compiled and generated or an automation tool is developed, and an operation instruction is automatically generated and uploaded to the cloud through the compiled script or automation tool so as to control the target equipment or control the target equipment regularly.
Example 2:
the application provides a method s200 for controlling a target device based on a cloud server, as shown in fig. 2, including:
step s201, establishing SSH communication connection between a cloud and a target device;
step s202, uploading an operation instruction for controlling the target device to a cloud, and transparently transmitting the operation instruction to the target device through the cloud;
step s203, after the target device receives the operation instruction transmitted by the cloud, executing the operation instruction by the target device, so as to perform operation control on the target device.
The principle implemented in steps s201-s203, as shown in fig. 3, specifically includes:
and SSH (Secure Shell) connection is established, and the operation instruction is transmitted to the target terminal equipment from the cloud server.
And executing the transparent operation instruction on the target terminal equipment, and feeding back an execution result to the cloud server.
And communication and authentication are carried out through an SSH protocol, so that encryption and security of data in the transmission process are ensured.
Wherein, the SSH protocol adopts RSA encryption algorithm to encrypt data.
The communication between the cloud server and the target terminal equipment is performed through a public network.
Wherein:
the SSH connection establishment method specifically comprises the following steps:
and installing SSH server software on the cloud server, and configuring corresponding SSH connection parameters including port numbers, authentication modes and the like.
And installing SSH client software on the target terminal equipment, and establishing SSH connection with the cloud server by using authentication information authorized by an administrator.
The transmission operation instruction specifically comprises the following steps:
on the cloud server, an administrator inputs operation instructions to be executed by using a graphical interface or a command line interface.
And the cloud server packages the operation instruction and transmits the operation instruction to the target terminal equipment through the established SSH connection.
Executing operation instructions, specifically including:
after receiving the transparent operation instruction, the target terminal equipment analyzes and executes the instruction through an SSH protocol.
And the terminal equipment executes the instruction and feeds back an execution result to the cloud server.
In the communication process, the SSH protocol encrypts the data, and the confidentiality and the integrity of the data in the transmission process are protected. And in the identity verification stage, an RSA encryption algorithm is used for verifying identities of the cloud server and the terminal equipment, so that the legitimacy of the two communication parties is ensured.
The method has the following technical characteristics:
remote management and control: by establishing SSH connection and transparent transmission operation instructions, remote management and control of terminal equipment distributed in different geographic positions are realized. The administrator can operate the terminal device anytime and anywhere without direct physical contact.
Safety and reliability: and the SSH protocol is used for communication and authentication, so that encryption and security of data in the transmission process are ensured. And in the authentication stage, an RSA encryption algorithm is adopted, so that the legitimacy of both communication parties is ensured, and unauthorized access and information leakage are prevented.
Flexible and efficient: and the batch operation and the automatic task execution are supported, and an administrator can write a script or an automatic tool to realize the timing task and the periodic maintenance. Meanwhile, the method can send the instructions to a plurality of terminal devices at the same time, and improves the operation efficiency.
Cross-platform support: the method is not only suitable for terminal equipment, but also can be extended to other operating systems and equipment, such as Windows, mac and the like. So that the administrator can perform unified management and control in the cross-platform environment.
Example 3:
the present application further provides a first system 300 for controlling a target device based on a cloud server, as shown in fig. 4, including:
the first communication connection unit 301 is configured to establish SSH communication connection between the cloud and the target device;
the transparent command unit one 302 is configured to upload an operation command for controlling the target device to a cloud end, and transparent transmit the operation command to the target device through the cloud end;
and the first operation control unit 303 is configured to execute the operation instruction through the target device after the target device receives the operation instruction transmitted by the cloud, so as to perform operation control on the target device.
The method for establishing SSH communication connection between the cloud and the target equipment comprises the following steps:
respectively installing SSH server software on a cloud server and target equipment, configuring connection parameters for SSH communication connection for the cloud server through the SSH server software installed on the cloud server, and authorizing authentication information for the equipment through the SSH server software installed on the target equipment;
and carrying out identity authentication on the cloud server and the target equipment through connection parameters configured for the cloud server and authentication information authorized for the equipment, and establishing SSH communication connection between the cloud and the target equipment after the authentication is passed.
Wherein, the connection parameters include: port number and authentication means.
The identity authentication of the cloud server and the target equipment comprises the following steps:
and carrying out identity authentication on the cloud server and the target equipment through an SSH protocol.
Identity authentication is performed on the cloud server and the target device through an SSH protocol, and the method comprises the following steps:
encrypting connection parameters configured for the cloud server and identity information of the cloud server by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the cloud server, transmitting the encrypted identity data of the cloud server to SSH server software installed on target equipment, decrypting the encrypted identity data of the cloud server by the SSH server software installed on the target equipment based on an RSA decryption algorithm to obtain decrypted identity data of the cloud server, and verifying the identity information in the identity data by an identity verification mode in the decrypted identity data of the cloud server;
and encrypting the authentication information authorized for the equipment and the identity information of the target equipment by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the target equipment, transmitting the encrypted identity data of the target equipment to SSH server software installed on the cloud server, decrypting the encrypted identity data of the target equipment by the SSH server software installed on the cloud server based on an RSA decryption algorithm to obtain decrypted identity data of the target equipment, and verifying the authentication information and the identity information in the identity data of the target equipment by using an identity authentication mode in connection parameters configured by the cloud server.
The identity authentication of the cloud server and the target device further comprises: and the identity authentication of the cloud server and the identity authentication of the target equipment pass through the authentication, and SSH communication connection between the cloud and the target equipment is allowed to be established.
And feeding back an execution result of the operation instruction executed by the target equipment to the cloud.
And the cloud end is used for reading the execution result to determine the efficiency and accuracy of the operation control of the target equipment, adjusting the operation instruction according to the efficiency and accuracy to update the operation instruction, transmitting the updated operation instruction to the target equipment through the cloud end, and executing the updated operation instruction through the target equipment to perform operation control on the target equipment.
According to the control operation task of the target equipment, a script is compiled and generated or an automation tool is developed, and an operation instruction is automatically generated and uploaded to the cloud through the compiled script or automation tool so as to control the target equipment or control the target equipment regularly.
Example 4:
the application further provides a second system 400 for controlling the target device based on the cloud server, as shown in fig. 5, including:
the second communication connection unit 401 is configured to establish SSH communication connection between the cloud and the target device;
a pass-through command unit two 402, configured to upload an operation instruction for controlling the target device to a cloud, and pass-through the operation instruction to the target device through the cloud;
and the second operation control unit 403 is configured to execute the operation instruction through the target device after the target device receives the operation instruction transmitted by the cloud, so as to perform operation control on the target device.
The principle implemented in example 4 of the present application is as follows:
and SSH (Secure Shell) connection is established, and the operation instruction is transmitted to the target terminal equipment from the cloud server.
And executing the transparent operation instruction on the target terminal equipment, and feeding back an execution result to the cloud server.
And communication and authentication are carried out through an SSH protocol, so that encryption and security of data in the transmission process are ensured.
Wherein, the SSH protocol adopts RSA encryption algorithm to encrypt data.
The communication between the cloud server and the target terminal equipment is performed through a public network.
Wherein:
the SSH connection establishment method specifically comprises the following steps:
and installing SSH server software on the cloud server, and configuring corresponding SSH connection parameters including port numbers, authentication modes and the like.
And installing SSH client software on the target terminal equipment, and establishing SSH connection with the cloud server by using authentication information authorized by an administrator.
The transmission operation instruction specifically comprises the following steps:
on the cloud server, an administrator inputs operation instructions to be executed by using a graphical interface or a command line interface.
And the cloud server packages the operation instruction and transmits the operation instruction to the target terminal equipment through the established SSH connection.
Executing operation instructions, specifically including:
after receiving the transparent operation instruction, the target terminal equipment analyzes and executes the instruction through an SSH protocol.
And the terminal equipment executes the instruction and feeds back an execution result to the cloud server.
In the communication process, the SSH protocol encrypts the data, and the confidentiality and the integrity of the data in the transmission process are protected. And in the identity verification stage, an RSA encryption algorithm is used for verifying identities of the cloud server and the terminal equipment, so that the legitimacy of the two communication parties is ensured.
According to the method and the device, the instructions are transmitted to the device through the cloud, so that safety is guaranteed, and meanwhile, the efficiency of device management is improved.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The solutions in the embodiments of the present application may be implemented in various computer languages, for example, object-oriented programming language Java, and an transliterated scripting language JavaScript, etc.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (10)

1. A method for controlling a target device based on a cloud server, the method comprising:
establishing SSH communication connection between a cloud server and target equipment;
uploading an operation instruction for controlling the target equipment to the cloud server;
the cloud server transparently transmits the operation instruction to the target equipment through the SSH communication connection;
after the target equipment receives the operation instruction transmitted by the cloud server, the operation instruction is executed through the target equipment, so that the operation control is carried out on the target equipment.
2. The method of claim 1, wherein establishing the SSH communication connection of the cloud server with the target device comprises:
configuring connection parameters for the SSH communication connection for the cloud server through SSH server software installed in the cloud server, and configuring authorization authentication information for the target device through SSH server software installed in the target device;
respectively carrying out identity authentication on the cloud server and the target equipment through the connection parameters and the authorization authentication information;
and if the authentication is passed, establishing SSH communication connection between the cloud server and the target equipment.
3. The method according to claim 2, wherein the connection parameters include, but are not limited to, at least any one of the following: the port number of the cloud server and the identity verification mode of the cloud server.
4. The method of claim 2, wherein the authenticating the cloud server and the target device comprises:
identity authentication is carried out on the cloud server and the target equipment through an SSH protocol;
the step of performing identity authentication on the cloud server and the target device through the SSH protocol includes:
encrypting connection parameters configured for the cloud server and identity information of the cloud server by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the cloud server, transmitting the encrypted identity data of the cloud server to SSH server software installed on the target equipment, decrypting the encrypted identity data of the cloud server by the SSH server software installed on the target equipment based on an RSA decryption algorithm to obtain decrypted identity data of the cloud server, and verifying the identity information in the identity data by an identity verification mode in the decrypted identity data of the cloud server;
and encrypting the authentication information authorized for the equipment and the identity information of the target equipment by adopting an RSA encryption algorithm through an SSH protocol to obtain encrypted identity data of the target equipment, transmitting the encrypted identity data of the target equipment to SSH server software installed on the cloud server, decrypting the encrypted identity data of the target equipment by the SSH server software installed on the cloud server based on an RSA decryption algorithm to obtain decrypted identity data of the target equipment, and verifying the authentication information and the identity information in the identity data of the target equipment by using an identity authentication mode in connection parameters configured by the cloud server.
5. The method of claim 2, wherein the authenticating the cloud server and the target device further comprises: and the identity authentication of the cloud server and the identity authentication of the target equipment pass through the authentication, and SSH communication connection between the cloud server and the target equipment is allowed to be established.
6. The method according to claim 1, wherein the method further comprises:
and feeding back an execution result of the operation instruction executed by the target equipment to the cloud server.
7. The method of claim 6, wherein the method further comprises:
and determining the efficiency and accuracy of the operation control of the target equipment by reading the execution result, adjusting the operation instruction according to the efficiency and accuracy to update the operation instruction, transmitting the updated operation instruction to the target equipment through the cloud server, and executing the updated operation instruction through the target equipment to perform operation control on the target equipment.
8. The method according to claim 1, wherein the method further comprises:
according to the control operation task of the target equipment, writing a generation script or developing an automation tool, automatically generating an operation instruction through the written script or the automation tool, and uploading the operation instruction to the cloud server so as to control the target equipment or periodically control the target equipment.
9. The method of claim 1, wherein the target device is an operating system device, the operating system device comprising at least: linux operating system equipment.
10. A system for controlling a target device based on a cloud server, the system comprising:
the communication connection unit is used for establishing SSH communication connection between the cloud server and the target equipment;
the transparent command unit is used for uploading an operation command for controlling the target equipment to the cloud server, and the operation command is transmitted to the target equipment through the cloud server;
and the operation control unit is used for executing the operation instruction through the target equipment after the target equipment receives the operation instruction transmitted by the cloud server, so as to perform operation control on the target equipment.
CN202410168602.1A 2024-02-06 2024-02-06 Method and system for controlling target equipment based on cloud server Active CN117714513B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410168602.1A CN117714513B (en) 2024-02-06 2024-02-06 Method and system for controlling target equipment based on cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410168602.1A CN117714513B (en) 2024-02-06 2024-02-06 Method and system for controlling target equipment based on cloud server

Publications (2)

Publication Number Publication Date
CN117714513A true CN117714513A (en) 2024-03-15
CN117714513B CN117714513B (en) 2024-04-26

Family

ID=90144733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410168602.1A Active CN117714513B (en) 2024-02-06 2024-02-06 Method and system for controlling target equipment based on cloud server

Country Status (1)

Country Link
CN (1) CN117714513B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189285A1 (en) * 2007-02-06 2008-08-07 Rowley Peter A Attribute level access control
US20120151074A1 (en) * 2010-12-10 2012-06-14 Microsoft Corporation Targeted data transfer between operational domains
CN104243210A (en) * 2014-09-17 2014-12-24 湖北盛天网络技术股份有限公司 Method and system for remotely having access to administrative web pages of routers
CN109561054A (en) * 2017-09-26 2019-04-02 华为技术有限公司 A kind of data transmission method, controller and access device
CN112559993A (en) * 2020-12-24 2021-03-26 RealMe重庆移动通信有限公司 Identity authentication method, device and system and electronic equipment
CN112738200A (en) * 2020-12-25 2021-04-30 肯特智能技术(深圳)股份有限公司 Convenient operation and maintenance tool and method based on closed public network system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189285A1 (en) * 2007-02-06 2008-08-07 Rowley Peter A Attribute level access control
US20120151074A1 (en) * 2010-12-10 2012-06-14 Microsoft Corporation Targeted data transfer between operational domains
CN104243210A (en) * 2014-09-17 2014-12-24 湖北盛天网络技术股份有限公司 Method and system for remotely having access to administrative web pages of routers
CN109561054A (en) * 2017-09-26 2019-04-02 华为技术有限公司 A kind of data transmission method, controller and access device
CN112559993A (en) * 2020-12-24 2021-03-26 RealMe重庆移动通信有限公司 Identity authentication method, device and system and electronic equipment
CN112738200A (en) * 2020-12-25 2021-04-30 肯特智能技术(深圳)股份有限公司 Convenient operation and maintenance tool and method based on closed public network system

Also Published As

Publication number Publication date
CN117714513B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
US11870915B2 (en) Unified programming environment for programmable devices
CN100380274C (en) Method and system for backup and restore of a context encryption key
US11481483B2 (en) Machine learning training method, controller, device, server, terminal and medium
CN110532735B (en) Firmware upgrading method
US20200162247A1 (en) Secure firmware transfer from a server to a primary platform
US9252946B2 (en) Method and system to securely migrate and provision virtual machine images and content
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
US20200259667A1 (en) Distributed management system for remote devices and methods thereof
US20220014389A1 (en) Secure Ids Certificate Verification for a Primary Platform
US11334345B2 (en) Differential firmware update generation
WO2022073264A1 (en) Systems and methods for secure and fast machine learning inference in trusted execution environment
KR102013983B1 (en) Method and server for authenticating an application integrity
US20160164673A1 (en) Method for changing an authentication key
CN103077018A (en) Control method and system for device interface based on Android system
CN117714513B (en) Method and system for controlling target equipment based on cloud server
KR102125047B1 (en) Key Management and Operation Method for Improving Security of Distribution Intelligence System
KR20140089703A (en) Method and apparatus for security of mobile data
CN104580181A (en) Device and method for data encryption and encryption accelerator engine
CN113468559B (en) Firmware verification method and system
EP3817276A1 (en) Apparatus and method for data security
CN116707805B (en) Cloud-based method and system for replacing IOT equipment key
CN112054890B (en) Screen configuration file export and import method and device and broadcasting control equipment
CN117955678A (en) Encryption transmission method, device, equipment and storage medium for data
KR20210071813A (en) Data sharing between trusted execution environments
EP2958265B1 (en) Revocation of a root certificate stored in a device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant