Method and system for realizing security audit function in remote control process

A security auditing and remote control technology, applied in the information field to avoid remote transmission of entity data and improve security

Inactive Publication Date: 2011-01-19
深圳市傲冠软件股份有限公司
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide an improved method and system for realizing the security au...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing security audit function in remote control process
  • Method and system for realizing security audit function in remote control process
  • Method and system for realizing security audit function in remote control process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0033] The invention aims at proposing a method for realizing the safety audit function in the remote control process, which is used to realize the safety and auditability of the remote access control from the external network to the internal network. The invention ensures that the equipment and data of the internal network will not be exposed to the external network. During the whole service process, the service terminal does not need to access the internal network, and only needs to pass through a dedicated video transmission line, and the operator and the controlled The servers transmit interactive information such as mouse, keyboard, and screen display changes. During the whole process, no actual business data flows to the client. What the clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for realizing security audit function in the remote control process. The method comprises the following steps that: a service terminal receives a service request from an operator, performs authentication, allocates a corresponding controlled server for the operator according to a management strategy, activates video transmission connection between the corresponding controlled server and the service terminal, and establishes a security encrypted link between the service terminal and an operator client; the service terminal provides a control console for the operator for managing the input and output of the corresponding controlled server; and when the operator operates and controls the corresponding controlled server, the system shoots screen image information in the operating process of the operator in real time and records keyboard and mouse control events. The control session of each controlled server is shot, and the keyboard and mouse control events are recorded, so a user can conveniently check and retrieve each historical session record through the service terminal at any time so as to facilitate audit backtracking.

Description

technical field [0001] The present invention relates to the field of information technology, and more specifically, relates to a method and system for realizing a security audit function in a remote control process. Background technique [0002] Today, if a network is connected to the Internet, users of that network can access and communicate with the outside world. But at the same time, the outside world can also access and interact with the network. For security reasons, an intermediary system can be inserted between the network and the Internet to erect a security barrier. The function of this barrier is to block threats and intrusions to the network from the outside through the network, and provide the only checkpoint to guard the security and audit of the network. Therefore, this barrier is called "firewall". A firewall is a router or a computer located between an intranet or a Web site and the Internet, also known as a bastion host. [0003] The traditional bastion ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/46
Inventor 颜亦军郭继东李俊廖坚强
Owner 深圳市傲冠软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products