CN1319327C - Server safety operation guarantec method - Google Patents

Server safety operation guarantec method Download PDF

Info

Publication number
CN1319327C
CN1319327C CNB2004100372532A CN200410037253A CN1319327C CN 1319327 C CN1319327 C CN 1319327C CN B2004100372532 A CNB2004100372532 A CN B2004100372532A CN 200410037253 A CN200410037253 A CN 200410037253A CN 1319327 C CN1319327 C CN 1319327C
Authority
CN
China
Prior art keywords
data
client controller
server
communicator
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2004100372532A
Other languages
Chinese (zh)
Other versions
CN1649310A (en
Inventor
吴士忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lanhai Huaye Engineering Technology Co ltd
Original Assignee
YIXING SHIJI DIGITAL APPLICATION DEVELOPMENT Co Ltd BEIJING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YIXING SHIJI DIGITAL APPLICATION DEVELOPMENT Co Ltd BEIJING filed Critical YIXING SHIJI DIGITAL APPLICATION DEVELOPMENT Co Ltd BEIJING
Priority to CNB2004100372532A priority Critical patent/CN1319327C/en
Publication of CN1649310A publication Critical patent/CN1649310A/en
Application granted granted Critical
Publication of CN1319327C publication Critical patent/CN1319327C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a safe operation guarantee method for a server. The server receives and accepts a request from a customer end so as to get an IP address and a port number; the server judges if the customer end is legal, otherwise, the server closes connection and continues monitoring; if the customer end is legal, the server checks if the customer end establishes connection; if the IP is connected, the connection is closed and the server continues monitoring; if the IP is not connected, a communicator is set up to communicate with the customer end and the server continues monitoring; in the communicator, if the data of the customer end is not received in a certain time, the communicator is closed; if the data is received in a stated time, the server judge if the data is the agreed information, otherwise the communicator is destroyed; if the data is legal, the server continues waiting for receiving the data; if the legal data from the customer end is not received in 10 seconds, the communicator is destroyed. The method has the advantages of real time, accuracy and safety and guarantees server safety in a public network.

Description

Server security operational support method
Technical field
The present invention relates to a kind of safe operation support method, be meant a kind of server security operational support method especially.In local area network (LAN) that is made of server, controller, database, Surveillance center, property center or the control system that constitutes by public network, server is the transport hub at contact controller, Surveillance center, property center.Therefore ensure the server security operation, in The whole control system, occupy consequence.
Background technology
At present, in existing local area network (LAN) that is made of server, controller, Surveillance center, property center or the control system that constitutes by public network, the support method that does not still have the support method of the safe operation of setting up or safe operation is unsound.Its weak point is that safe operation does not have guarantee, can not satisfy in good time, monitor accurately needs.
Summary of the invention
The objective of the invention is to avoid above-mentioned weak point of the prior art and a kind of server security operational support method is provided.In local area network that utilization is made of server, controller, Surveillance center, property center or the control system that constitutes by public network, in order to realize the safe operation of server, we have developed server security operational support method.
Purpose of the present invention can reach by following measure: a kind of support method of server security operation is characterized in that:
(1) communication server inquires the IP address of all legitimate client side controllers from database when starting, and is kept in the internal memory;
(2) after the normal startup of server, monitoring the port of appointment always;
(3) server is received the connection request that certain client controller sends to Service-Port;
(4) accept connection request, from communication, obtain the IP address and the port numbers of client controller, compare and see with the list of legal controller in the internal memory whether the port of client is the port of appointment; If the address of client controller is not that the address or the port of the client controller of appointment is not the port of appointment, then close connection this time, directly return, continue monitoring service device port;
(5) if whether then check the address of this client controller to set up with server is connected, if connection has been set up in the address of this client controller, then close connection this time, directly return, continue monitoring service device port;
(6), then create the communicator of and this client controller communication if this controller did not connect;
(7) after communicator is created, wait for immediately receiving the data that the client controller sends up,, then destroy communicator if in official hour, do not receive the data that the client controller sends up.
(8) if in official hour, receive the data that the client controller sends up, judge then whether these data are to receive the data that the client controller sends up for the first time, if receive the data that the client controller sends up for the first time: then judge whether it is the log-on message that passes through the appointment of encrypting, if the log-on message of the appointment that process is encrypted, then put this client controller of a flag bit sign and connect, safeguard this communicator and continue to wait for the reception data; If not the log-on message that passes through the appointment of encrypting, then destroy communicator;
(9) if not for the first time receiving the data that the client controller sends up, judge whether it is the data of appointing, if the data of appointing deal with data then, and continue to wait for and receive data; If not the data of appointing, then directly should wrap data and lose, continue to wait for the reception data;
(10), think that then the client controller breaks, and destroys communicator if do not receive the data of waiting for reception in 10 seconds; If receive in 10 seconds and wait for the data that receive, then return above-mentioned (8) and go on foot to judge whether it is to receive the data that the client controller sends up for the first time, and do corresponding processing according to above-mentioned steps.
The present invention has following advantage compared to existing technology:
But the needs of monitoring are satisfied in the safeguards system safe operation in good time, accurately;
Improved the overall performance of system, the estate management center of having realized living is supervised regional supervision purpose to sub-district, Surveillance center to society;
On public network, developed server security operational support method, realize that on the public network of broadband monitoring has obtained breakthrough, make the application of broadband public network also can utilize present technique to realize that multinomial product utilization broadband public network realizes monitoring purposes to measuring controlling party to development.
Description of drawings
Fig. 1 server security operational support method logical flow chart.
Embodiment
In local area network that is made of server, controller, database, Surveillance center, property center or the control system that constitutes by public network, in order to realize the safe operation of server, we have developed server security operational support method.
Below in conjunction with Fig. 1 server security operational support method logical flow chart, its server security operational support method is described step by step:
(1) communication server inquires the IP address of all legitimate client side controllers from database when starting, and is kept in the internal memory;
(2) after the normal startup of server, monitoring the port of appointment always;
(3) server is received the connection request that certain client controller sends to Service-Port;
(4) accept connection request, from communication, obtain the IP address and the port numbers of client controller, compare and see with the list of legal controller in the internal memory whether the port of client is the port of appointment; If the address of client controller is not that the address or the port of the client controller of appointment is not the port of appointment, then close connection this time, directly return, continue monitoring service device port;
(5) if whether then check the address of this client controller to set up with server is connected, if connection has been set up in the address of this client controller, then close connection this time, directly return, continue monitoring service device port;
(6), then create the communicator of and this client controller communication if this controller did not connect;
(7) after communicator is created, wait for immediately receiving the data that the client controller sends up,, then destroy communicator if in official hour, do not receive the data that the client controller sends up.
(8) if in official hour, receive the data that the transmission of client controller comes up, judge then whether these data are to receive the data that the client controller sends up for the first time, if receive the data that the client controller sends up for the first time: then judge whether it is the log-on message that passes through the appointment of encrypting, if the log-on message of the appointment that process is encrypted, then put this client controller of a flag bit sign and connect, safeguard this communicator and continue to wait for the reception data; If not the log-on message that passes through the appointment of encrypting, then destroy communicator;
(9) if not for the first time receiving the data that the client controller sends up, judge whether it is the data of appointing, if the data of appointing deal with data then, and continue to wait for and receive data; If not the data of appointing, then directly should wrap data and lose, continue to wait for the reception data;
(10), think that then the client controller breaks, and destroys communicator if do not receive the data of waiting for reception in 10 seconds; If receive in 10 seconds and wait for the data that receive, then return above-mentioned (8) and go on foot to judge whether it is to receive the data that the client controller sends up for the first time, and do corresponding processing according to above-mentioned steps.
This server security operational support method can satisfy the needs of monitoring in good time, accurately; On public network, developed server security operational support method, made the application of broadband public network can be to measuring controlling party to development.

Claims (1)

1, a kind of support method of server security operation is characterized in that:
(1) communication server inquires the IP address of all legitimate client side controllers from database when starting, and is kept in the internal memory;
(2) after the normal startup of server, monitoring the port of appointment always;
(3) server is received the connection request that certain client controller sends to Service-Port;
(4) accept connection request, from communication, obtain the IP address and the port numbers of client controller, compare and see with the list of legal controller in the internal memory whether the port of client is the port of appointment; If the address of client controller is not that the address or the port of the client controller of appointment is not the port of appointment, then close connection this time, directly return, continue monitoring service device port;
(5) if whether then check the address of this client controller to set up with server is connected, if connection has been set up in the address of this client controller, then close connection this time, directly return, continue monitoring service device port;
(6), then create the communicator of and this client controller communication if this client controller did not connect;
(7) after communicator is created, wait for immediately receiving the data that the client controller sends up,, then destroy communicator if in official hour, do not receive the data that the client controller sends up;
(8) if in official hour, receive the data that the client controller sends up, judge whether these data are to receive the data that the client controller sends up for the first time, if receive the data that the client controller sends up for the first time: then judge whether it is the log-on message that passes through the appointment of encrypting, if the log-on message of the appointment that process is encrypted, then put this client controller of a flag bit sign and connect, safeguard this communicator and continue to wait for the reception data; If not the log-on message that passes through the appointment of encrypting, then destroy communicator;
(9) if not for the first time receiving the data that the client controller sends up, judge whether it is the data of appointing, if the data of appointing deal with data then, and continue to wait for and receive data; If not the data of appointing, then directly should wrap data and lose, continue to wait for the reception data;
(10), think that then the client controller breaks, and destroys communicator if do not receive the data of waiting for reception in 10 seconds; If receive in 10 seconds and wait for the data that receive, then return above-mentioned (8) and go on foot to judge whether it is the data of receiving the client controller for the first time, and do corresponding processing according to above-mentioned steps.
CNB2004100372532A 2004-04-30 2004-04-30 Server safety operation guarantec method Expired - Lifetime CN1319327C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100372532A CN1319327C (en) 2004-04-30 2004-04-30 Server safety operation guarantec method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100372532A CN1319327C (en) 2004-04-30 2004-04-30 Server safety operation guarantec method

Publications (2)

Publication Number Publication Date
CN1649310A CN1649310A (en) 2005-08-03
CN1319327C true CN1319327C (en) 2007-05-30

Family

ID=34868530

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100372532A Expired - Lifetime CN1319327C (en) 2004-04-30 2004-04-30 Server safety operation guarantec method

Country Status (1)

Country Link
CN (1) CN1319327C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5153219B2 (en) * 2007-06-14 2013-02-27 グローリー株式会社 Money handling machine and money handling machine system
CN101079903B (en) * 2007-06-21 2011-01-19 中国工商银行股份有限公司 Method and system based on remote login of user terminal
CN101202965B (en) * 2007-12-10 2011-04-06 中兴通讯股份有限公司 Method for transmitting safe point-to-point short message facing to connectionless
CN102882836A (en) * 2011-07-15 2013-01-16 深圳市汇川控制技术有限公司 Method and system for server to safely access Internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020108058A1 (en) * 2001-02-08 2002-08-08 Sony Corporation And Sony Electronics Inc. Anti-theft system for computers and other electronic devices
WO2003032603A2 (en) * 2001-10-09 2003-04-17 Koninklijke Philips Electronics N.V. Ip hopping for secure data transfer
CN1421771A (en) * 2001-11-27 2003-06-04 四川安盟科技有限责任公司 Guard system to defend network invansion of unkown attack trick effectively
CN1434661A (en) * 2003-01-30 2003-08-06 武汉奥发科技工程有限公司 Method for multi-stage monitor and mobile monitor of GPS/mobile telephone location
US20030149796A1 (en) * 2002-01-04 2003-08-07 Emerson Theodore F. Method and apparatus for creating a secure embedded I/O processor for a remote server management controller

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020108058A1 (en) * 2001-02-08 2002-08-08 Sony Corporation And Sony Electronics Inc. Anti-theft system for computers and other electronic devices
WO2003032603A2 (en) * 2001-10-09 2003-04-17 Koninklijke Philips Electronics N.V. Ip hopping for secure data transfer
CN1421771A (en) * 2001-11-27 2003-06-04 四川安盟科技有限责任公司 Guard system to defend network invansion of unkown attack trick effectively
US20030149796A1 (en) * 2002-01-04 2003-08-07 Emerson Theodore F. Method and apparatus for creating a secure embedded I/O processor for a remote server management controller
CN1434661A (en) * 2003-01-30 2003-08-06 武汉奥发科技工程有限公司 Method for multi-stage monitor and mobile monitor of GPS/mobile telephone location

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Intranet/Internet中的Web服务器安全机制 樊成勇 杨峰,计算机安全,第6期 2003 *

Also Published As

Publication number Publication date
CN1649310A (en) 2005-08-03

Similar Documents

Publication Publication Date Title
CN109922160B (en) Terminal secure access method, device and system based on power Internet of things
US6970917B1 (en) System and method for remote control and management of wireless devices
CN103391216B (en) A kind of illegal external connection is reported to the police and blocking-up method
EP1130875B1 (en) A home gateway with a data backup service
TWI428787B (en) Theft management system and method
US20050188096A1 (en) Media streaming home network system and method for operating the same
CN111490981B (en) Access management method and device, bastion machine and readable storage medium
US20020073211A1 (en) System and method for securely communicating between application servers and webservers
CN100590595C (en) Information processing device and process control method
US20160295410A1 (en) Security gateway for a regional/home network
CN101675640A (en) self-initiated end-to-end monitoring for authentication gateway
US20060123120A1 (en) Methods for establishing and validating sessions
WO2010121542A1 (en) Home gateway-based anti-virus method and device thereof
CN1319327C (en) Server safety operation guarantec method
CN111726328B (en) Method, system and related device for remotely accessing a first device
CN107566396A (en) A kind of method based on dynamic password enhancing server VPN protocol securitys
US20030079141A1 (en) Method for securing the authenticity of hardware and software in a networked system
JP2003258795A (en) Computer aggregate operating method, implementation system therefor, and processing program therefor
CN102404114A (en) Monitoring method and system both for Web service
CN101227277B (en) Method and system for implementing safety of end to end based on WAP1.2 gateway
CN107800715A (en) A kind of portal authentication method and access device
KR20200098181A (en) Network security system by integrated security network card
WO2011153731A1 (en) Method and system for managing and controlling wired terminal, and access server
CN101827090B (en) External user login and backup system
US20240348687A1 (en) Cloud-based roadway equipment management platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100028 Beijing City, Chaoyang District No. 77 East Building No. 5

Patentee after: BEIJING LANHAI HUAYE ENGINEERING TECHNOLOGY CO.,LTD.

Address before: 100028 Beijing City, Chaoyang District No. 77 East Building No. 5

Patentee before: YIXING SHIJI DIGITAL APPLIC DE

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20070530