CN113901414B - Multi-experiment system and control hosting method for central control - Google Patents

Multi-experiment system and control hosting method for central control Download PDF

Info

Publication number
CN113901414B
CN113901414B CN202111277027.1A CN202111277027A CN113901414B CN 113901414 B CN113901414 B CN 113901414B CN 202111277027 A CN202111277027 A CN 202111277027A CN 113901414 B CN113901414 B CN 113901414B
Authority
CN
China
Prior art keywords
control
hosting
remote
instruction
experiment system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111277027.1A
Other languages
Chinese (zh)
Other versions
CN113901414A (en
Inventor
佟为明
逄龙
王晓野
林景波
李中伟
金显吉
谭立国
初旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN202111277027.1A priority Critical patent/CN113901414B/en
Publication of CN113901414A publication Critical patent/CN113901414A/en
Application granted granted Critical
Publication of CN113901414B publication Critical patent/CN113901414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a control hosting method oriented to a multi-experiment system and a central control, which comprises the following steps: step S1, operators of all experimental systems request control hosting authorization from the experimental system where the operators are located; step S2, each experimental system examines and approves and authorizes the control hosting request; step S3, after the experiment system confirms the authorization, establishing a one-to-one encryption control hosting special network; s4, the hosting control terminal starts remote control software; s5, an operator issues an instruction through a remote instruction agency function and a remote desktop function; s6, the monitoring equipment receives a remote control instruction to perform corresponding operation; s7, performing operation log recording; and S8, receiving a later audit. The invention can issue control instructions to a plurality of experimental systems and perform global overall remote centralized control.

Description

Multi-experiment system and control hosting method for central control
Technical Field
The invention belongs to the field of remote control, and relates to a multi-experiment system-oriented control hosting method and a central control hosting method.
Background
As human exploration of space continues to go deep, there is a need for intensive research in the space environmental effects of aerospace materials, devices and their functional systems. The 'space environment ground simulation device' is a national major scientific and technological infrastructure, builds a space comprehensive environment ground simulation platform with an international leading level, realizes the simulation of space main environment factors and effects thereof, and is a key means for solving the problems.
In the national major scientific and technological infrastructure project of a 'space environment ground simulation device', experimental systems are numerous, each experimental system can be mutually communicated to perform combined experiments and can also independently run, some experiments have dangerousness, and the problems that monitoring staff can hardly issue control instructions for a plurality of experimental systems at the same time in the local of the experimental systems to perform overall control, control operation records are lacked and the like exist.
Disclosure of Invention
In order to facilitate a monitoring person to issue control instructions for a plurality of experimental systems simultaneously to perform overall control and ensure the safety of the monitoring person, the invention provides a control hosting method for a plurality of experimental systems and central control.
The invention aims at realizing the following technical scheme:
a control hosting method for a multi-experiment system and a central control thereof comprises the following steps:
step S1, operators of all experimental systems request control hosting authorization from the experimental system where the operators are located;
step S2, each experimental system examines and authorizes the control hosting request and provides the user name, the password and the account available time, wherein the control hosting authorization comprises the following steps: presetting an account mode and an interactive request confirmation mode;
step S3, after the experiment system confirms the authorization, a one-to-one encryption control hosting special network is established among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual special network;
s4, the hosting control terminal starts remote control software;
s5, an operator issues an instruction through a remote instruction agency function and a remote desktop function;
s6, the monitoring equipment receives a remote control instruction to perform corresponding operation;
step S7, performing operation log record:
(1) The log management and auditing function records the operation process in detail from top to bottom according to the operation of the experimental system monitoring software, and collects other information influenced by the operation process;
(2) Recording complete hosting control operation through a remote desktop by utilizing a remote desktop protocol; simultaneously recording related information of a computer controlled by a trusted management in a related time period;
(3) According to remote instruction agent operation content, the hosting control operation is recorded in detail, and meanwhile, the running condition of the corresponding experimental system monitoring software is recorded;
step S8, receiving a later audit: and establishing a key activity index according to the managed control log information, and providing services for user-defined inquiry and managed control audit.
In the invention, the network security of the experimental system control hosting is improved through the virtual private network (Virtual Private Network, VPN), so that the hosting control of each experimental system is completely isolated. The virtual private network includes: a virtual private network based on general-purpose hardware, a virtual private network based on proprietary hardware.
In the invention, the reliability of experimental system control hosting is improved by adopting a master-slave server architecture, wherein a master server and a slave server are installed and deployed to control hosting systems which are the same, and the control hosting systems are synchronized through a data storage roll; when the main server fails, the load manager is utilized to automatically switch, so that single-point failure is avoided, the overall reliability of control hosting is improved, and meanwhile, operation environment support is provided for newly added functions.
In the invention, the traceability of all operations in the control hosting process is improved by adding the log management and audit functions, the graphic interface operations, the running states of control programs, event logs and the like are respectively recorded according to different layers possibly influenced by the control hosting, the log is uniformly recorded, and the event inquiry and audit functions are provided according to a uniform time record database. The log management includes: remote desktop oriented control hosting logs, remote instruction agent oriented control hosting logs.
In the invention, the manageability of the experimental system control hosting function is improved by adding the remote instruction agency function, the dependence on a remote desktop is reduced, and the integration with other functions or interfaces is facilitated. The remote instruction proxy function includes: remote instruction agent based on experimental system monitoring software interface, remote instruction agent based on simulation operation, remote control based on remote desktop, remote control based on IP-KVM.
Compared with the prior art, the invention has the following advantages:
1. the central control system can interact with instructions of all monitoring computers through the control hosts, and monitoring personnel can realize remote centralized control of the experimental system and simultaneously carry out global overall planning;
2. establishing a one-to-one encryption network among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual private network, so as to isolate the control hosting network of each experiment system, and improve the safety guarantee capability under extreme conditions;
3. by adopting a control hosting master-slave server architecture, the reliability of the whole control hosting service is improved;
4. when a remote control instruction is executed, the operation of a graphical interface, the running state of a control program and an event log are recorded, and an operation audit provides a service for checking the whole operation record for an administrator through the content of the operation log recorded in the earlier stage, so that the traceability of all operations in the control hosting process is improved;
5. by adding the managed control operation log function, the safety and traceability of the monitoring operation of the experimental system are ensured, and the problems that the current remote desktop operation is difficult to distinguish from the local operation, the operation lacks record and the like are avoided;
6. the remote instruction agent function and the remote desktop function are used for experimental control of the managed remote control, and the two complement each other to improve manageability of the managed operation.
7. The invention can issue control instructions to a plurality of experimental systems and perform global overall remote centralized control.
Drawings
FIG. 1 is a functional block diagram of a control hosting method for a multiple experiment system and its central control.
Fig. 2 is a network topology diagram of a control hosting method for multiple experimental systems and central control thereof.
FIG. 3 is a specific flow chart of a control hosting method for multiple experimental systems and central control thereof.
Detailed Description
The following description of the present invention is provided with reference to the accompanying drawings, but is not limited to the following description, and any modifications or equivalent substitutions of the present invention should be included in the scope of the present invention without departing from the spirit and scope of the present invention.
The invention provides a control hosting method for multiple experimental systems and central control thereof, wherein the control hosting refers to providing remote control service for each experimental system in a central monitoring hall under the condition that the experimental systems authorize hosting. As shown in fig. 1, the control hosting functional block diagram includes: the control hosting authorization for each experimental system, the remote control of the control hosting for each experimental system, the remote control operation authority management of the control hosting, the remote control operation log management of the control hosting and the remote control operation audit management of the control hosting.
In the invention, a network topology diagram of a control hosting method for a multi-experiment system and a central control is shown in fig. 2, wherein: the virtual private network is in the control hosting unit and is linked with each experimental subsystem by adopting a multiplexing transmission network; the control host master-slave server controls the log and audit function, the verification and authorization management function and the remote instruction proxy function in the host module; after the terminal passes the authorization and verifies the identity, a virtual private network is established according to a specific experimental system controlled and managed by the authorization, a remote instruction is issued through a remote instruction agency or a remote Cheng Zhuomian, and log records and later audits are accepted at the same time; in order to improve the security of controlling the hosting server, a firewall is established between networks linked with the hosting control terminal, and specific network traffic and access ports are controlled and monitored.
As shown in fig. 3, the specific implementation steps of the control hosting method for the multi-experiment system and the central control thereof are as follows:
step S1, operators of all experimental systems request control hosting authorization from the experimental system where the operators are located.
In this step, the user initiates an application request at the client controlling the hosting, including the purpose of controlling the hosting application, the time range, the hosting range, and the like.
And S2, each experimental system examines and approves the control hosting request and authorizes the control hosting request.
In the step, the local monitoring terminal performs auditing and approval according to the service requirement and provides the user name, the password and the account available time authorization after approval according to the hosting application content.
In this step, controlling the escrow authorization includes: an account mode and an interactive request confirmation mode are preset.
In the step, when the authorization is performed by adopting a preset account mode, an authorized account number which can be accessed remotely is preset in the experimental system according to the requirement of the control hosting task, the account number is distributed to the operators of the experimental system in the central monitoring hall, the account number is used for logging in remotely, and after the control hosting task is finished, the account number is logged out by each experimental system.
In this step, when the authorization is performed by adopting the interactive request confirmation mode, a remote control request is initiated on the hosting control terminal of the central monitoring hall, a response is waited, after the request is received by the experimental system, an authorization confirmation instruction is sent to the application after confirmation, or a rejection instruction is sent, after the hosting control terminal receives the authorization instruction, a remote control interface is executed, and when the hosting control terminal receives the rejection instruction, the current operation is terminated.
And step S3, after the experiment system confirms the authorization, a control hosting special network is established.
In the step, in terms of network transmission, a multiplexing transmission network is adopted in the control hosting unit and is linked with the control hosting service of each experimental subsystem, a one-to-one encryption network is established among the monitoring computer of the experimental system, the master-slave server of the control hosting and the terminal, and a network segment is shared independently, so that the control hosting network of each experimental system is isolated. In the aspect of network interfaces, an application firewall is added, and isolation between the terminal operated by a control person and the monitoring rear end of the experiment subsystem is realized.
In this step, the virtual private network includes: a virtual private network based on general-purpose hardware and a virtual private network based on proprietary hardware. Wherein: the VPN software server (such as OpenVPN system) is installed on the universal server hardware by the virtual private network based on the universal hardware, the VPN software client is installed on the related access node, the virtual network is established by using information such as an authorization key, an account number and the like, the private network segment IP is obtained, direct communication can be realized between the virtual private network and other nodes on the network segment, and the communication data is transmitted on the physical network through encryption. The VPN based on special hardware configures server parameters in VPN special hardware devices (such as VPN gateway and JuniperVPN gateway), the related access point installs VPN communication protocol meeting the requirement of server, and data can be transmitted on the encrypted network after access.
And S4, the hosting control terminal starts remote control software.
And S5, an operator issues an instruction through remote control software.
In this step, the operator provides a service for remotely issuing the control instruction through the remote instruction proxy function and the remote desktop function. Wherein: the remote instruction agent is executed by providing an agent interface at the hosting control terminal and sending specific instructions to the remote authorized corresponding experiment system monitoring computer. The remote desktop is used for completely mapping an operating system desktop of the corresponding experiment monitoring computer to the hosting control terminal, and the desktop is used as a basic control unit for operation.
In this step, the remote instruction proxy function includes: remote command agents based on experimental system monitoring software interfaces, remote command agents based on analog operations, remote manipulations based on remote desktops, and remote manipulations based on IP-KVM.
In the step, when the experimental system monitoring software provides a software development kit (Software Develop Kit, SDK) or an application programming interface (Application Interface, API), the remote instruction agent operates the tools through the agent interface, so as to realize the purpose of hosting control; meanwhile, in the proxy interface, the related operations may be recorded in detail.
In this step, when the experimental system monitoring software does not provide the SDK or the API, and only provides the local control interface, the remote instruction proxy software may be customized by adopting a simulation operation manner. Providing input for information such as parameters, buttons and the like which need to be managed and controlled through a proxy interface which controls the operation of a managed terminal, and then inputting the obtained data to an experimental system control software interface by the customized software in a mode of simulation operation; during this process, the customization software details the relevant operations.
In this step, when it is difficult to implement based on the simulation operation, the manipulation service may be provided through a remote desktop access protocol provided by the operating system. Currently mainstream operating systems provide RDP protocols, VNC protocols, and the like. The purpose of local remote operation is achieved by logging into a server providing the protocol by using a client supporting the protocol.
In the step, when the control software limits the remote desktop operation, the remote operation service can be provided by adopting an IP-KVM mode; the IP-KVM remote operation is to map the keyboard, image and mouse of the remote computer to the local through the IP network, and realize the operation of the remote computer through out-of-band control.
And S6, the monitoring equipment receives the remote control instruction to perform corresponding operation.
And S7, performing operation log recording.
In this step, the log management and audit function operates the top-down detailed recording operation process according to the experimental system monitoring software, for example, input data information, clicked buttons, clicked time, clicked order, etc.; at the same time, other information affected by the above operations, such as system critical event information, control program running state information, etc., are collected.
In this step, log management includes: remote desktop oriented control hosting logs, remote instruction agent oriented control hosting logs.
In the step, a remote desktop protocol is utilized to record complete hosting control operation through a remote desktop; while recording the relevant information of the managed computer, such as active applications, system loads, network links and loads, disk access loads, operating system events, etc., during the associated time period.
In the step, according to remote instruction agent operation content, the hosting control operation is recorded in detail, wherein the hosting control operation specifically comprises parameters, button operation time, button operation sequence and the like; meanwhile, the running condition of the corresponding experimental system monitoring software, such as network port information, disk load information, system load information and the like, is recorded.
And S8, receiving a later audit.
In the step, a key activity index is established according to the managed control log information, and services are provided for user-defined inquiry and managed control audit.

Claims (6)

1. A control hosting method for a multi-experiment system and a central control is characterized by comprising the following steps:
step S1, operators of all experimental systems request control hosting authorization from the experimental system where the operators are located;
step S2, each experimental system examines and authorizes the control hosting request and provides the user name, the password and the account available time;
step S3, after the experiment system confirms the authorization, a one-to-one encryption control hosting special network is established among the experiment system monitoring computer, the control hosting master-slave server and the terminal by utilizing the virtual special network;
s4, the hosting control terminal starts remote control software;
step S5, an operator issues instructions through a remote instruction agency function and a remote desktop function, wherein the remote instruction agency function comprises: remote command agent based on experimental system monitoring software interface, remote command agent based on simulation operation, remote control based on remote desktop and remote control based on IP-KVM:
when the experimental system monitoring software provides a software development kit or an application programming interface, the remote instruction agent operates the tools through the agent interface, so that the purpose of hosting control is realized; meanwhile, in the proxy interface, the related operation is recorded in detail;
when the experimental system monitoring software does not provide an SDK or an API and only provides a local control interface, customizing remote instruction proxy software in a simulated operation mode;
providing a manipulation service through a remote desktop access protocol provided by an operating system when the simulation-based operation is difficult to implement;
when the control software limits the remote desktop operation, an IP-KVM mode is adopted to provide remote operation service;
s6, the monitoring equipment receives a remote control instruction to perform corresponding operation;
step S7, performing operation log record:
(1) The log management and auditing function records the operation process in detail from top to bottom according to the operation of the experimental system monitoring software, and collects other information influenced by the operation process;
(2) Recording complete hosting control operation through a remote desktop by utilizing a remote desktop protocol; simultaneously recording related information of a computer controlled by a trusted management in a related time period;
(3) According to remote instruction agent operation content, the hosting control operation is recorded in detail, and meanwhile, the running condition of the corresponding experimental system monitoring software is recorded;
step S8, receiving a later audit: and establishing a key activity index according to the managed control log information, and providing services for user-defined inquiry and managed control audit.
2. The multi-experiment system and control hosting method for controlling the same as in claim 1, wherein in step S2, the control hosting authorization includes: an account mode and an interactive request confirmation mode are preset.
3. The multi-experiment system and the control hosting method for the central monitoring hall according to claim 2, wherein when the control hosting authorization is a preset account mode, an authorized account number which can be accessed remotely is preset in the experiment system according to the requirement of the control hosting task, the account number is distributed to the experiment system operators in the central monitoring hall, the account number is used for logging in remotely, and after the control hosting task is finished, the account number is logged out by each experiment system.
4. The multi-experiment system oriented and control hosting method of the central control lobby is characterized in that when the control hosting authorization is in an interactive request confirmation mode, a remote control request is initiated on a hosting control terminal of the central monitoring lobby, a response is waited, after the experiment system receives the request, an authorization confirmation instruction is sent to the request after confirmation, or a rejection instruction is sent, after the hosting control terminal receives the authorization instruction, a remote control interface is executed, and when the hosting control terminal receives the rejection instruction, the current operation is terminated.
5. The multi-experiment system and control hosting method for controlling the same as in claim 1, wherein in step S3, the virtual private network comprises: a virtual private network based on general-purpose hardware and a virtual private network based on proprietary hardware.
6. The multi-experiment system and control hosting method for controlling the same as in claim 1, wherein in step S7, log management includes: remote desktop oriented control hosting logs, remote instruction agent oriented control hosting logs.
CN202111277027.1A 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control Active CN113901414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111277027.1A CN113901414B (en) 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111277027.1A CN113901414B (en) 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control

Publications (2)

Publication Number Publication Date
CN113901414A CN113901414A (en) 2022-01-07
CN113901414B true CN113901414B (en) 2023-11-21

Family

ID=79027103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111277027.1A Active CN113901414B (en) 2021-10-30 2021-10-30 Multi-experiment system and control hosting method for central control

Country Status (1)

Country Link
CN (1) CN113901414B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651743A (en) * 2009-09-10 2010-02-17 华耀环宇科技(北京)有限公司 Remote desktop access system facing to mobilephone terminal user
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
GB201316561D0 (en) * 2013-09-18 2013-10-30 Ibm Authorised remote access to an operating system hosted by a virtual machine
CN104753959A (en) * 2015-04-21 2015-07-01 湖北鑫英泰***技术有限公司 Method and system for intensively operating and controlling several network security devices
CN108933702A (en) * 2018-08-01 2018-12-04 长沙龙生光启新材料科技有限公司 A method of remote service is provided
CN111586021A (en) * 2020-04-30 2020-08-25 河南省云安大数据安全防护产业技术研究院有限公司 Remote office business authorization method, terminal and system
KR20210103640A (en) * 2020-02-14 2021-08-24 김동규 Apparatus for authenticating remote network managment system and method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651743A (en) * 2009-09-10 2010-02-17 华耀环宇科技(北京)有限公司 Remote desktop access system facing to mobilephone terminal user
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
GB201316561D0 (en) * 2013-09-18 2013-10-30 Ibm Authorised remote access to an operating system hosted by a virtual machine
CN104753959A (en) * 2015-04-21 2015-07-01 湖北鑫英泰***技术有限公司 Method and system for intensively operating and controlling several network security devices
CN108933702A (en) * 2018-08-01 2018-12-04 长沙龙生光启新材料科技有限公司 A method of remote service is provided
KR20210103640A (en) * 2020-02-14 2021-08-24 김동규 Apparatus for authenticating remote network managment system and method thereof
CN111586021A (en) * 2020-04-30 2020-08-25 河南省云安大数据安全防护产业技术研究院有限公司 Remote office business authorization method, terminal and system

Also Published As

Publication number Publication date
CN113901414A (en) 2022-01-07

Similar Documents

Publication Publication Date Title
CN103189846B (en) The management of the data network of computing environment
US7478152B2 (en) System and method for consolidating, securing and automating out-of-band access to nodes in a data network
CN113691416B (en) Distributed layered deployment network target range management platform
CN106411857B (en) A kind of private clound GIS service access control method based on virtual isolation mech isolation test
CN109873834A (en) A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing
US8566459B2 (en) Systems and methods for integrated console management interface
CN102857520B (en) Telnet protocol security access system and method for character terminal
WO2015140908A1 (en) Management system, gateway apparatus, server apparatus, management method, gateway method, management process execution method, and program
CN102045337A (en) Apparatus and methods for managing network resources
WO2007024458A2 (en) Universal out-of-band gateway
JP6013508B2 (en) Relay device, relay method, and program
CN112738200B (en) Convenient operation and maintenance tool and method based on closed public network system
US20080201465A1 (en) Centralized Monitoring of Distributed Systems
KR101974278B1 (en) Remote Control System for Semiconductor Equipment
CN113901414B (en) Multi-experiment system and control hosting method for central control
CN111147429B (en) Project research and development environment deployment system
US20150304237A1 (en) Methods and systems for managing access to a location indicated by a link in a remote access system
CN117527840A (en) All-purpose card management platform system for resident service
KR20080060010A (en) System for controlling total access based on user terminal and method thereof
CN101263466A (en) Providing consistent application aware firewall traversal
CN111490924A (en) Portable remote network routing system and establishing method thereof
WO2010080193A1 (en) Method and system for secure distributed computing
JP2001067318A (en) User/password batch control system
George et al. A case study of implementing cybersecurity best practices for electrical infrastructure in a refinery
CN109901475A (en) A kind of bare metal automatic control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant