WO2016200232A1 - Système et procédé destinés à un serveur à distance en cas de défaillance d'un serveur de rétablissement - Google Patents

Système et procédé destinés à un serveur à distance en cas de défaillance d'un serveur de rétablissement Download PDF

Info

Publication number
WO2016200232A1
WO2016200232A1 PCT/KR2016/006237 KR2016006237W WO2016200232A1 WO 2016200232 A1 WO2016200232 A1 WO 2016200232A1 KR 2016006237 W KR2016006237 W KR 2016006237W WO 2016200232 A1 WO2016200232 A1 WO 2016200232A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
recovery
remote
failure
manager
Prior art date
Application number
PCT/KR2016/006237
Other languages
English (en)
Korean (ko)
Inventor
김창영
장태수
Original Assignee
주식회사 이노아이엔씨
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 이노아이엔씨 filed Critical 주식회사 이노아이엔씨
Publication of WO2016200232A1 publication Critical patent/WO2016200232A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

Definitions

  • the present invention relates to a system and method for recovering a remote server in the event of a server failure, and more particularly, to a system and method for recovering a remote server in case of a server failure capable of automatic recovery according to a recovery scenario input to a manager server, and a program for implementing the same.
  • DDoS Distributed Denial of Service
  • DDoS Distributed Denial of Service
  • It is also known as a distributed denial of service or distributed denial of service attack. It is a hacking method that attacks specific sites by distributing several attackers and operating them at the same time. It is a method of injecting tools for a service attack on multiple computers and simultaneously flooding a huge amount of packets that cannot be handled by the target computer system, thereby degrading network performance or paralyzing the system.
  • DDoS attacks do not penetrate specific computers and delete or steal data, but rather prevent the target server from receiving other legitimate signals. To put it simply, it's a way to paralyze your computer by causing a large number of connections.
  • a hacker can inject tools for attacking a service on multiple computers and flood the network with massive amounts of packets that cannot be handled by the target system's computer system. As a result, overloading the system will result in a loss of access for normal customers.
  • Korean Patent No. 10-0734110 discloses a server error recovery method in the TCP stage.
  • the present invention is to solve the problems of the prior art, a server failure to maintain a smooth flow of work by performing a quick recovery in accordance with a preset recovery scenario with a simple operation when a server failure due to a disaster such as DDoS attack To provide a remote server recovery system and method for the purpose.
  • the present invention provides a remote server recovery system in case of server failure, the backup server 100 is installed agent program; A preset recovery scenario is inputted and receives a status information of the corresponding backup server 100 from an agent program installed in the backup server 100; And a remote management terminal 300 for monitoring and controlling the backup server 100 through socket communication with the manager server 200 by using a server port approved by a server manager.
  • the terminal 300 accesses the manager server 200 to monitor the backup server 100, and the remote management terminal 300 requests a recovery to the backup server 100, the manager server 200.
  • the agent program is characterized in that developed in Java (JAVA).
  • the socket communication is characterized in that the TCP / IP (Transfer Control Protocol / Internet Protocol) or UDP (User Datagram Protocol).
  • TCP / IP Transfer Control Protocol / Internet Protocol
  • UDP User Datagram Protocol
  • the present invention is in the form of a program executed by arithmetic processing means including a computer, in the case of a server failure remote server recovery method using a remote server recovery system in case of server failure, the manager server 200 receives the recovery scenario Recovery scenario input step (S10); The manager server 200 performs the authentication procedure based on the unique identification information input from the remote management terminal 300, and uses the server port (Port) approved by the remote management terminal 300 and the server administrator is completed authentication A socket communication step of performing socket communication (S20); A monitoring step (S30) in which the manager server 200 receives the state information through an agent program installed in the backup server 100 and transmits the state information to the remote management terminal 300; And a server recovery step of recovering the backup server 100 according to the recovery scenario received in the recovery scenario input step S10 when the manager server 200 receives a server recovery request from the remote management terminal 300.
  • a method for recovering a remote server in case of server failure including).
  • the socket communication is characterized in that the TCP / IP (Transfer Control Protocol / Internet Protocol) or UDP (User Datagram Protocol).
  • TCP / IP Transfer Control Protocol / Internet Protocol
  • UDP User Datagram Protocol
  • the agent program is characterized in that developed in Java (JAVA).
  • the unique identification information is a specific IP, public certificate, ID (ID) and password (password), Access Control List (ACL), MAC address (MAC (media access control)) at least one selected from an address, an International Mobile Station Equipment Identity (IMEI), a User Device IDentification (UDID), a Universally Unique IDentifier (UUID), and a telephone number. It is done.
  • the server recovery step (S40) transmits a recovery progress status result of the manager server 200 to restore the backup server 100 according to the recovery scenario to the remote management terminal (300). Characterized in that.
  • the present invention also provides a computer-readable recording medium storing a program for implementing a remote server recovery method in case of server failure.
  • the present invention provides a program stored in a computer-readable recording medium for implementing a remote server recovery method in the event of server failure.
  • the remote server recovery system and method in the event of a server failure of the present invention it is possible to perform a quick recovery according to a preset recovery scenario by a simple operation and maintain a smooth flow of work.
  • the manager server can double the security when connecting to the backup server from the outside, and in the event of a server failure due to a sudden disaster disaster, it is possible to quickly recover the server from a long distance.
  • Simple operation also prevents overload of each server, reducing customization time and manpower cost.
  • FIG. 1 is a block diagram of a remote server recovery system in case of server failure according to an embodiment of the present invention.
  • FIGS. 1 and 2 are data flow diagrams for explaining FIGS. 1 and 2.
  • FIG. 4 is a flowchart illustrating a method for recovering a remote server in the event of a server failure according to an embodiment of the present invention.
  • FIG. 1 is a block diagram of a remote server recovery system in case of server failure according to an embodiment of the present invention
  • FIGS. 2 to 3 are data flow diagrams for explaining FIG. 1
  • FIG. 4 is according to an embodiment of the present invention. Flowchart of remote server recovery method in case of server failure.
  • 'Disaster disaster' is a term used to mean a series of things that prevent a server from functioning.For example, e-mail detonation, logic bombs, DDoS attacks, other cyber terrorism, power outages, etc. Yes.
  • the present invention provides a remote server recovery system in case of server failure, the backup server 100, the agent program is installed; A preset recovery scenario is inputted and receives a status information of the corresponding backup server 100 from an agent program installed in the backup server 100; And a remote management terminal 300 for monitoring and controlling the backup server 100 through socket communication with the manager server 200 by using a server port approved by a server manager.
  • the terminal 300 accesses the manager server 200 to monitor the backup server 100, and the remote management terminal 300 requests a recovery to the backup server 100, the manager server 200.
  • the present invention relates to a remote server recovery system in case of a server failure, wherein the backup server 100 is remotely restored based on a recovery scenario.
  • the backup server 100 is a server that the administrator monitors for normal operation, and installs an agent program to monitor and control (manage) remotely in a situation where the administrator is difficult to monitor.
  • access information for accessing the backup server 100 is required. However, when such access information is exposed to the outside, a risk such as hacking may occur.
  • the access of the backup server 100 through the access information has a risk. To prevent this, it is to install an agent program that can communicate with the manager server (200).
  • the manager server 200 receives a preset recovery scenario and receives state information of the backup server 100 from an agent program installed in the backup server 100.
  • the manager server 200 may communicate with the backup server 100 through an agent program installed in the backup server 100.
  • a manager server 200 acting as an intermediary.
  • the agent program may be characterized in that it is developed in JAVA.
  • Java is an object-oriented language, and we can't talk about object-oriented languages in detail here, but a simple example is inheritance. Child objects inherit from the parent object. If a child object inherits from a parent object, it means that the data and methods of the parent object are available. Therefore, when developing software, there are many advantages in terms of recycling.
  • Java is a language originally designed for use in network distributed processing environments. As the network environment is an environment where security aspects are emphasized more than other environments, Java is focused on security. Java has a structure that does not allow viruses to penetrate and can restrict data access in memory. If you do not allow access, access to the data structures or data of the application is not possible. That is, it is strong in security.
  • a network consists of a variety of computers, different platforms (for example, operating systems such as Windows NT, Solaris, and Macintosh OSs) and a variety of hardware.
  • Java compiles Java code source to produce byte code, which can be executed on any platform because it is interpreted by Java interpreters installed on various platforms. So even a new machine can interpret bytecode if it only has a Java interpreter installed.
  • Java is a highly secure object-oriented programming language, and the compiled code is provided as a class for use in other operating systems. It is more efficient and supports distributed environments while taking advantage of the object-oriented advantages of the C ++ language.
  • the socket communication may be characterized in that the TCP / IP (Transfer Control Protocol / Internet Protocol) or UDP (User Datagram Protocol).
  • TCP / IP Transfer Control Protocol / Internet Protocol
  • UDP User Datagram Protocol
  • TCP / IP is a network transport protocol that can be used to transfer data between computers running different operating systems.
  • TCP is a protocol for dividing and packaging transmission data into certain units
  • IP is a protocol for directly transmitting and receiving data. All computers on the Internet follow the protocol established by the Internet Standards Committee.
  • the Internet standard protocol is TCP / IP.
  • a protocol is simply a device for completely sending data from one computer to another.
  • first IP forwards data to the destination through the network by referring to headers with the origin and destination addresses. However, in the process, data may be mistransmitted or damaged, and data may not be transmitted in the order in which they are sent. It is TCP that makes up for this drawback.
  • TCP is responsible for notifying that a problem has occurred and resending the data accordingly.
  • the host receiving the data always receives the data in order without any error.
  • UDP stands for user datagram protocol. It is a communication protocol that unilaterally transmits data on the Internet without going through a signal to send or receive information when sending or receiving information to each other on the Internet.
  • the sending side is a protocol designed to make sure that the receiving side has not received or received the data.
  • TCP Transmission Control Protocol
  • a communication protocol designed to allow the sending and receiving of information to automatically communicate with a central computer server at the same time as pressing the Internet icon. For example, when sending and receiving e-mails, 'receipt confirmation' shows whether the other party has read or not read the e-mail because the sending and receiving parties can exchange data with each other.
  • the transmitting and receiving side exchanges data with each other, and TCP is used.
  • the receiving side transmits data only regardless of whether the receiving side is UDP. That is, UDP is a method in which data is unilaterally transmitted from a transmitting side without going through a connection procedure with a receiving side. Such a service is called an unrelated service, and the communication protocol of the unrelated service is UDP.
  • UDP is not responsible for receiving data. This means that the sender sent the information, but the sender does not need to care about whether the information arrived at the receiver in time or the information contents were reversed. It's also less reliable than TCP, but much faster.
  • the remote management terminal 300 monitors and controls the backup server 100 through socket communication with the manager server 200 using a server port approved by a server administrator.
  • the remote management terminal 300 refers to a general terminal (computer, mobile device, smart device, etc.) that can be wired or wirelessly connected to the Internet.
  • access control lists which are preset security rules inside the firewall.
  • the firewall denies all access and then allows / permits only the access that you want to allow.
  • the passage of data through a network is called a "port," which basically blocks all about 65,000 communication ports and leaves only certain ports open to allow access. That is, if you provide a web service (http) for homepage operation, you should allow 80 ports, and if you provide an FTP service (ftp), allow 20/21 ports.
  • http web service
  • ftp FTP service
  • the method for recovering a remote server in the event of a server failure in accordance with an embodiment of the present invention is in the form of a program executed by arithmetic processing means including a computer.
  • the recovery scenario input step (S10) the socket communication step (S20), the monitoring step (S30) and the server recovery step (S40).
  • the manager server 200 receives the recovery scenario.
  • the recovery scenario refers to a procedure for restoring a backup server when a problem occurs in the backup server 100.
  • data backup-data restoration-server rebooting-reinstalling the operating program-running and setting the operating program.
  • Such a recovery scenario may be set in a large number according to a kind of problem situation that may occur in the backup server 100.
  • the server will recover if only the program is executed after rebooting. If a problem occurs due to a DDoS attack, the server will block the port where the DDoS attack came from, block the IP where the DDoS attack came from, After restoring, you can recover the server by taking actions such as opening the port to its original state.
  • Socket communication step (S20) is the manager server 200 performs the authentication procedure based on the unique identification information input from the remote management terminal 300, the authentication is completed by the remote management terminal 300 and the server administrator is completed Socket communication is performed using the server port.
  • the socket communication may be characterized as TCP / IP (Transfer Control Protocol / Internet Protocol) or UDP (User Datagram Protocol).
  • TCP / IP Transfer Control Protocol / Internet Protocol
  • UDP User Datagram Protocol
  • the unique identification information is a specific IP, public certificate, ID (ID) and password (password), Access Control List (ACL), MAC address (MAC (media access control) address), international mobile device identification code (IMEI, International Mobile Station Equipment Identity), Unique Identification Number (UDID: User Device IDentification), Universally Unique ID (UUID: It may be characterized in that at least one selected from the telephone number.
  • the network firewall allows or blocks the packets coming in through the network according to the security rules (ACL, Access Control List, and Access Control List) previously set by the administrator.
  • this packet control function is located between the internal network and the external network (Internet). Firewalls can be deployed as needed to enhance security.
  • the firewall's access control list is usually printed in an intuitive format that is easy for administrators to configure and set up, and the results are immediately visible when security rules are applied.
  • access control lists and firewall settings require considerable knowledge and experience related to security, they should be done accurately and systematically by security experts.
  • membership authentication can be performed using a specific IP, public certificate, ID and password, and MAC address.
  • MAC media access control
  • IMEI International Mobile Station Equipment Identity
  • UID User Device IDentification
  • UUID Universally Unique IDentifier
  • telephone Membership authentication can be performed using a number.
  • a MAC (media access control) address is an address of a network device in the MAC layer in a network structure, and is usually stored in a ROM of a network card.
  • a unique device identification number is an identifier for identifying a user's device. It's kind of a serial number.
  • UUID Universally Unique IDentifier
  • UUID is a 128-bit number used to identify an object or entity on the Internet. It is almost the only usable identifier that is constructed through a combination of space and time (up to about 3400) and is used for a variety of purposes, from extremely short objects to permanent object identification. There is no registration procedure for a certification authority, but only a unique identification number for a universal single identifier generation program is required. For example, storing a Mac address of a product in a specific server may cause a problem such as leakage of personal information, and thus may be used as an identifier for replacing and storing the Mac address.
  • unique identification information has been described above, and one device may have a plurality of unique identification information.
  • the mobile phone may have a plurality of unique identification information, such as an identifier (UDID) of the mobile device itself, a Mac address for the Wi-Fi chip, and a Mac address for the Bluetooth chip.
  • UDID identifier
  • the manager server 200 receives state information through an agent program installed in the backup server 100, and transmits the state information to the remote management terminal 300.
  • the status of the backup server 100 can be checked (monitored) using the remote management terminal 300.
  • the agent program may be characterized in that it is developed in JAVA.
  • the monitoring step (S30) is also possible to check the current state of the backup server 100 in real time from the time when the remote management terminal 300 is connected to the manager server, As shown in FIG. 3, the manager server 200 constantly stores the state information received from the agent program of the backup server 100, and provides status information for each event at the request of the remote management terminal 300. It is also possible.
  • the server recovery step (S40) when the manager server 200 receives the server recovery request from the remote management terminal 300, the backup server 100 is restored according to the recovery scenario input in the recovery scenario input step (S10). do.
  • abnormal state information may be transmitted to the manager server 200. Therefore, it is preferable to restore the backup server 100 when receiving a server recovery request from the remote terminal 300.
  • the manager server 200 may determine whether the backup server 100 is abnormal based on the state information of the backup server 100, and restore the backup server 100.
  • the server recovery step (S40) may be characterized in that the manager server 200 transmits a recovery progress status result of restoring the backup server 100 to the remote management terminal 300 according to the recovery scenario. .
  • a computer-readable recording medium storing a program for implementing a method for recovering a remote server in case of a server failure and a method for recovering a remote server in case of a server failure
  • the program stored in the computer-readable recording medium for implementation may also be implemented.
  • the method for recovering a remote server in the case of the above-described server failure may be provided by being included in a recording medium that can be read through a computer by program of instructions for implementing the same. will be.
  • the computer-readable recording medium may include program instructions, data files, data structures, etc. alone or in combination.
  • the program instructions recorded on the computer-readable recording medium may be those specially designed and configured for the present invention, or may be known and available to those skilled in computer software.
  • Examples of such computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tapes, optical media such as CD-ROMs and DVDs, and floptical disks.
  • the computer-readable recording medium may be a transmission medium such as an optical or metal wire, a waveguide, or the like including a carrier wave for transmitting a signal specifying a program command, a data structure, or the like.
  • Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
  • the hardware device may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
  • remote server recovery system and method in case of server failure of the present invention, it is possible to maintain a smooth flow of work by performing a quick recovery according to a preset recovery scenario with a simple operation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)

Abstract

La présente invention concerne un système et un procédé destinés à un serveur distant de rétablissement dans le cas d'une défaillance de serveur, et plus particulièrement un système et un procédé pour un serveur distant de rétablissement dans le cas d'une défaillance de serveur, un support d'enregistrement sur lequel un programme permettant de mettre en œuvre le système et le procédé sont enregistrés, et un programme informatique, stocké dans le support, permettant de mettre en œuvre le système et le procédé. La présente invention permet, au moyen d'une simple manipulation, un rétablissement rapide à mettre en œuvre conformément à un scénario de rétablissement entré dans un serveur de gestionnaire lorsqu'une défaillance de serveur se produit, ce qui permet un flux de travail lisse à maintenir.
PCT/KR2016/006237 2015-06-09 2016-06-13 Système et procédé destinés à un serveur à distance en cas de défaillance d'un serveur de rétablissement WO2016200232A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020150081172A KR101592323B1 (ko) 2015-06-09 2015-06-09 서버 장애 시 원격 서버 복구 시스템 및 방법
KR10-2015-0081172 2015-06-09

Publications (1)

Publication Number Publication Date
WO2016200232A1 true WO2016200232A1 (fr) 2016-12-15

Family

ID=55353740

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2016/006237 WO2016200232A1 (fr) 2015-06-09 2016-06-13 Système et procédé destinés à un serveur à distance en cas de défaillance d'un serveur de rétablissement

Country Status (2)

Country Link
KR (1) KR101592323B1 (fr)
WO (1) WO2016200232A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111258857A (zh) * 2020-02-21 2020-06-09 山东超越数控电子股份有限公司 一种服务器状态监测方法及系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102124189B1 (ko) * 2020-03-02 2020-06-17 주식회사 솔텍크 서버 다운 모니터링 시스템 및 그 시스템의 구동방법
KR20220168264A (ko) 2021-06-16 2022-12-23 주식회사 데일리팜 적응적 전환 모드를 이용한 워치독 시스템

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040047209A (ko) * 2002-11-29 2004-06-05 (주)소프트위드솔루션 네트워크 상의 컴퓨터 시스템의 자동 복구 방법 및 이를구현하기 위한 컴퓨터 시스템의 자동 복구 시스템
KR100470176B1 (ko) * 2002-12-31 2005-02-05 김호빈 지능형 이동 에이전트를 실행시키기 위한 플랫폼 제공시스템
JP2008217735A (ja) * 2007-03-08 2008-09-18 Nec Corp 障害解析システム、方法、及び、プログラム
KR20080097254A (ko) * 2007-01-26 2008-11-05 삼성에스디에스 주식회사 통합관리 시스템 환경에서의 장애 및 성능정보 통합모니터링 방법 및 그 시스템
KR101082669B1 (ko) * 2009-11-13 2011-11-15 한양대학교 산학협력단 엑티브엑스 소켓 컴포넌트 대체를 위한 웹 서버 및 통신 서버 그리고 상기 웹 서버에서의 서비스 제공 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040047209A (ko) * 2002-11-29 2004-06-05 (주)소프트위드솔루션 네트워크 상의 컴퓨터 시스템의 자동 복구 방법 및 이를구현하기 위한 컴퓨터 시스템의 자동 복구 시스템
KR100470176B1 (ko) * 2002-12-31 2005-02-05 김호빈 지능형 이동 에이전트를 실행시키기 위한 플랫폼 제공시스템
KR20080097254A (ko) * 2007-01-26 2008-11-05 삼성에스디에스 주식회사 통합관리 시스템 환경에서의 장애 및 성능정보 통합모니터링 방법 및 그 시스템
JP2008217735A (ja) * 2007-03-08 2008-09-18 Nec Corp 障害解析システム、方法、及び、プログラム
KR101082669B1 (ko) * 2009-11-13 2011-11-15 한양대학교 산학협력단 엑티브엑스 소켓 컴포넌트 대체를 위한 웹 서버 및 통신 서버 그리고 상기 웹 서버에서의 서비스 제공 방법

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111258857A (zh) * 2020-02-21 2020-06-09 山东超越数控电子股份有限公司 一种服务器状态监测方法及系统

Also Published As

Publication number Publication date
KR101592323B1 (ko) 2016-02-05

Similar Documents

Publication Publication Date Title
US20070101422A1 (en) Automated network blocking method and system
Marin et al. An in-depth look into SDN topology discovery mechanisms: Novel attacks and practical countermeasures
WO2010062045A2 (fr) Système de sécurité et procédé pour système de communication sans fil
WO2019231135A1 (fr) Système de détection d'intrusion et de protection de véhicule
US11252183B1 (en) System and method for ransomware lateral movement protection in on-prem and cloud data center environments
KR20140022975A (ko) 캡차를 기반으로 하는 트래픽 제어 장치 및 그 방법
WO2017034072A1 (fr) Système de sécurité de réseau et procédé de sécurité
WO2021112494A1 (fr) Système et procédé de détection et de réponse de type gestion basée sur des points d'extrémité
WO2022235007A1 (fr) Système de commande d'accès au réseau basé sur un dispositif de commande, et son procédé
WO2016190663A1 (fr) Procédé de gestion de sécurité et dispositif de gestion de sécurité dans un système de réseau domestique
WO2016200232A1 (fr) Système et procédé destinés à un serveur à distance en cas de défaillance d'un serveur de rétablissement
CN113645213A (zh) 一种基于vpn技术的多终端网络管理监控系统
WO2014157826A1 (fr) Système et procédé de blocage d'attaque de code malveillant basé sur dispositif intelligent
Han et al. State-aware network access management for software-defined networks
US20050076236A1 (en) Method and system for responding to network intrusions
WO2019045424A1 (fr) Procédé de déchiffrement de couche de prise de sécurité destinée à la sécurité
WO2024029658A1 (fr) Système de contrôle d'accès dans un réseau et procédé associé
WO2021107493A1 (fr) Système de surveillance d'image ayant une capacité de configuration d'environnement d'utilisation de caméra à sécurité renforcée
KR20180028742A (ko) 모드 변경이 가능한 양방향 통신 장치 및 방법
WO2018056582A1 (fr) Procédé d'inspection de paquet à l'aide d'une communication ssl
EP4181431A1 (fr) Procédé et appareil de transmission de service, dispositif de réseau, et support d'enregistrement
KR20220070875A (ko) Sdn/nfv 기반의 스마트홈 네트워크 시스템
WO2021060641A1 (fr) Procédé d'exclusion, au moyen d'un appareil de décodage de couche de connexion sécurisée, d'un site inaccessible
CN115622808B (zh) 安全隔离的方法、电子设备、计算机可读介质
Zhao et al. Collaborative 5g multiaccess computing security: Threats, protection requirements and scenarios

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16807872

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16807872

Country of ref document: EP

Kind code of ref document: A1