Remote monitoring method and system based on embedded Linux system and storage medium

A remote monitoring and embedded technology, applied in the field of Linux systems, can solve the problems of low security performance of automated terminal equipment, and achieve the effect of protecting data and program security and saving costs

Active Publication Date: 2020-05-15
SHENZHEN CLOU ELECTRONICS
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing automated terminal equipment products usually do not monitor user commands verified by login account passwords. The history command in the bash environment can only record commands typed in from the console, and will not record commands executed by applications through the system interface. Therefore, by executing illegal codes, product data and applications can be tampered with at will, resulting in low security performance of automated terminal equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote monitoring method and system based on embedded Linux system and storage medium
  • Remote monitoring method and system based on embedded Linux system and storage medium
  • Remote monitoring method and system based on embedded Linux system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0076] Embodiment two: refer to image 3 , step S2 is specifically:

[0077] S21. Initialize the blacklist device list and associate the IO interface management function of the blacklist device list to the system IO interface;

[0078] S22. Register and create a whitelist device list.

[0079] After the blacklist module is started, first initialize the blacklist device list to initialize the devices in the blacklist, and then associate the IO interface management function of the blacklist device list to the system IO interface according to the blacklist device list. Associate the IO interface management function to the system IO interface to register and create a whitelist device list, and then end the process of loading and initializing the blacklist module. Create a blacklist device list and a whitelist device list to prevent others from tampering with product data and applications by executing illegal codes using other devices.

[0080] refer to Figure 4 , after the bl...

Embodiment 3

[0104] Embodiment three: refer to Figure 7 , the embodiment of the present invention discloses a remote monitoring system based on an embedded Linux system, comprising: a blacklist module 100, a background monitoring module 200 and a main control module 300;

[0105] The main control module 300 loads the blacklist module 100 and the background monitoring module 200 to start the background monitoring module 200; the blacklist module 100 is used to initialize and register to create a whitelist device list or a blacklist device list, and associate IO according to the blacklist device list Interface management function to system IO interface; Blacklist module 100 is also used to judge the order type of described IO interface management function to update the blacklist in the blacklist device list or control the opening and closing of background monitoring module 200; Background monitoring module 200, used to save the system default call interface list, and replace the system call...

Embodiment 4

[0107] Embodiment 4: The embodiment of the present invention discloses a computer-readable storage medium, the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make the computer execute the embedded-based Remote monitoring method of Linux system.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote monitoring method and system based on an embedded Linux system and a storage medium. The method comprises the steps that a main control module starts a blacklist module and a background monitoring module; the blacklist module initializes and registers to create a white list device list or a blacklist device list, and associates an IO interface management function of the blacklist device list to a system IO interface; the blacklist module judges the command type of the IO interface management function so as to update a blacklist or control the opening and closing of the background monitoring module; the background monitoring module replaces the system calling interface according to the white or black list equipment list; the background monitoring module acquires a new user instruction and judges whether the user instruction belongs to a blacklist to execute the user instruction or ignore the user instruction; and the background monitoring module outputscorresponding formatted log information according to the operation on the user instruction. By monitoring the user instruction in real time and through a blacklist and whitelist filtering mechanism, if the user instruction conforms to the blacklist, the instruction is ignored, and the safety of data and programs can be effectively ensured.

Description

technical field [0001] The invention relates to the technical field of Linux systems, in particular to a remote monitoring method, system and storage medium based on an embedded Linux system. Background technique [0002] Automation terminal equipment products generally run on the Linux system. After purchasing the product, users can log in to the equipment maintenance platform through access to 232, Ethernet, USB and other interfaces, and then execute any command operation. Then, as long as the user obtains the login account and password, he can log in to the equipment maintenance platform for operation. [0003] Existing automated terminal equipment products usually do not monitor user commands verified by login account passwords. The history command in the bash environment can only record commands typed in from the console, and will not record commands executed by applications through the system interface. Therefore, product data and application programs can be tampered ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/55
CPCG06F21/44G06F21/552Y02P90/02
Inventor 刘志兴闫垚锋陈卫刚
Owner SHENZHEN CLOU ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products