Netinfo Security ›› 2016, Vol. 16 ›› Issue (7): 29-34.doi: 10.3969/j.issn.1671-1122.2016.07.005

• Orginal Article • Previous Articles     Next Articles

Research and Design of Remote Control System of Host Resources

Jian ZHAO1, Chang ZHANG1, Xiangdong WEN2   

  1. 1. The PLA Information Engineering University, Zhengzhou Henan 450000, China
    2. Shaanxi Academy of Governance, Xi’an Shaanxi 710068, China
  • Received:2016-04-01 Online:2016-07-20 Published:2020-05-13

Abstract:

Nowadays, the security and controllability of the host resources are getting more attention. Especially when the host is out of control, how to ensure the sensitive information to be security by the remote control system is a problem which should be solved. After analyzed current research situation of remote control and secure deletion of the host files, a remote control system of host resources is designed, and the system architecture and workflow are proposed. The realization method of the hardware platform based on a remote communication module and the control software including control instruction transmission, security authentication, and host resources control and so on. Finally, the system functions are tested and analyzed. The remote control system is designed based on mobile communication module and control agent software. The communication module will be put in the protected computer, and the agent software run in it. The manager controls the protected computer by the command message. To enhance the security of the system, only these command messages which are identified can be carried out, in order to delete the sensitive information, shut down the endpoint and so on. The experiments show that the system can improve the management of the protected computer, and reduce the security risk when the computer is out of control.

Key words: host resource, remote control, management agent, identity authentication

CLC Number: