201108111 六、發明說明· 【發明所屬之技術領域】 本發明關於一種遠端操控系統,特別是關於一種遠端操控 系統及提供使用者客製化憑證與簽名之方法。 【先前技術】 請參考第1圖,係一般網頁需要使用者使用憑證或簽名的 簡單流程之說明圖。簽名是嵌入軟體内的程式碼,用以供使用 者判斷安全性或是表明軟體發行者身分的工具。憑證一般是由 可信賴之第三方機構(例如:Verisign)針對發行者簽名所頒發之 認證,以證明此簽名屬實及此軟體在簽名後未被竄改。同時, 當使用者存取網頁伺服器所提供之網頁時’若網頁之呈現需要 對使用者之電腦具有更多操控之權限時’便需要對此簽名或憑 證進行確認。此簽名或憑證亦是使用者允許網頁伺服器能否對 使用者電腦進行進一步執行具多操控權程式的判斷依據手段 之一。例如:微軟(Microsoft)公司的 Active X client program 或 者昇陽(Sun Microsystems)公司的 Java client program。Active X 控制項是用於網際網路上的小型程式,有時候稱為「附加元 件」。透過容許動晝,ActiveX控制項可增強使用者的瀏覽體 驗,或者,可協助使用者處理如在“Microsoft Update”安裝” 安全更新”等工作。部分網站需要使用者先安裝ActiveX控制 項,才能查看網頁或在其上執行某些工作。劉覽此類網站時, 微軟公司的Internet Explorer會先詢問使用者是否要安裝 ActiveX控制項。不幸的是,ActiveX控制項類似於任何其他 程式,它們可能被濫用。其可能會導致電腦無法正常運作,在 未獲得同意下收集使用者的劉覽習慣和個人資訊,或提供使用 者不想要的内容,如快顯廣告。同時ActiveX控制項可能容許 201108111 某些不良的網站將其用於惡意目的。 如第1圖所示,電腦10為使用者操控’網頁資料係儲存 在一網頁伺服器20内,兩者透過網路30連接。於使用者欲瀏 覽網頁時,首先,步驟1:使用者操控電㈣1〇係透過網路3〇 存取網頁伺服器20。接著,當使用者對伺服器2〇存取如八⑷” X client program 或 Java client program 時,因安全理由或者是 伺服器需要對操控電腦1G取得更進—步的操控權時,步驟2: 電腦10之作業系統或網頁瀏覽器會提醒電腦1〇之使用者,如 第2圖所示’需要憑證或m能進行下—步存取動作。步 驟3:使用者需確認、下載並安裝憑證。步驟4:進行存取或 叩隹逖鈿網路型多電腦切換器操控系統架構(OUp KVM system)下’遠端操控裝置會提供使用者端程式給操控電 腦利用,操控電腦安裝此使用者端程式後才能透過網路以網頁 形式對被控電腦進行存取及操控。然 包含微軟公司的AetiveXH. + -制心私式可此BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to a remote control system, and more particularly to a remote control system and a method for providing a user customized document and signature. [Prior Art] Please refer to Fig. 1, which is an explanatory diagram of a simple process in which a general web page requires a user to use a voucher or a signature. A signature is a code embedded in a software that is used by the user to determine security or to indicate the identity of the software publisher. A voucher is generally a certificate issued by a trusted third party (eg, Verisign) against the issuer's signature to prove that the signature is true and that the software has not been tampered with after the signature. At the same time, when the user accesses the webpage provided by the web server, if the webpage needs to have more control over the user's computer, the signature or credential needs to be confirmed. The signature or the voucher is also one of the means by which the user allows the web server to perform further control on the user's computer. For example: Microsoft's Active X client program or Sun Microsystems' Java client program. Active X controls are small programs used on the Internet, sometimes called "add-on components." ActiveX controls enhance the user's browsing experience through permissions, or they can assist users with tasks such as installing "Security Updates" in "Microsoft Update." Some websites require users to install ActiveX controls before they can view or perform certain tasks on them. When viewing such a website, Microsoft Internet Explorer will first ask the user whether to install ActiveX controls. Unfortunately, ActiveX controls are similar to any other program and they can be abused. It may cause the computer to malfunction, collect the user's browsing habits and personal information without consent, or provide content that the user does not want, such as advertising. At the same time, ActiveX controls may allow 201108111 some bad websites to use them for malicious purposes. As shown in Fig. 1, the computer 10 is controlled by the user. The webpage data is stored in a web server 20, and the two are connected via the network 30. When the user wants to browse the webpage, first, step 1: the user controls the power (4) to access the web server 20 through the network 3〇. Then, when the user accesses the server 2 or the X client program or the Java client program, for security reasons or if the server needs to obtain more advanced control of the computer 1G, step 2: The operating system or web browser of the computer 10 will remind the user of the computer, as shown in Figure 2, 'requires the voucher or m to perform the next-step access action. Step 3: The user needs to confirm, download and install the voucher Step 4: Access or network-type KVM switch system architecture (OUp KVM system) under the 'remote control device will provide the user-side program for the control computer to use, control the computer to install this user After the end program, the controlled computer can be accessed and manipulated via the web. However, Microsoft's AetiveXH. + - system private can be used.
㈣ACtlVe X chent㈣嶋或者昇陽公司的_ 糸統之“商所編寫’預載於遠端操控裝置中,供使用者 所使用之電腦存取使用,因此碼供〒供使用者 系姑#义t w 、, 心°丘(Certlflcate)亦均為遠端操控 用者會Γ到當使用者端程式需要確認憑證或簽名時,使 也或荟义#第2圖所不之警告對話方塊,所需確認之馮 ===遠端操控系統之製造商所有,對使用者而言,; b7成某些使用上之疑慮。如使用者欲使用自有之 憑證對使用者端程式進行簽名,則必須具;資J 程技術及相關知識,其程序亦備資訊工 電腦切換器為架構的遠端其进会 在目刖現有以網路型多 a卞㈣糾官亦不被允許。 201108111 【發明内容】 本發明之一主要目的在於提供一遠端操控系統,遠端操控 系統之使用者能以簡單且安全之方式,使用自有之憑證及利用 該憑證對遠端操控系統之使用者端程式進行簽名。 本發明之又一目的在於提供使用者在遠端操控系統中,客 製化使用者端程式憑證與簽名之方法。 依據本發明,遠端操控系統係用於使第一電腦 經由網路控制至少-被控電腦。本發明之遠端操控系 端操控裝置及第-使用者端程式。遠端操控裝置㈣於前述至 少一被控電腦。第一使用者端程式設置於第—電腦,第一使用 者端程式為使时提供-使用者介面,使第_制者對自遠端 操控裝置下載之第—使用者端程式進行憑證結合或簽名而得 到第二使用者端程式’且第一使用者端程式將第三使用者端程 式經由網路上傳至_操控裝置儲存。上傳之第三使用者端程 式可供使用第-電腦或第二電腦之第二使用者下載,以操 端操控裝置。 ' 本發明亦提供使用者在遠端操控系統中,使用渴μ (certificate)與客製化簽名(signature)之方法 ^ 含下列步驟·· 貨乃之方法包 面; 於第一電腦執行該第一使用者端程式,其提供一 使用者介 透過該使用者介面選擇一憑證; 自該遠端操控裝置下载一第二$ 腦; 用者端程式至該第—電 將該憑證結合於該第二使用者端程 該苐一使用者端程式客製化簽名, 對 j弟一使用者端程式,·以 201108111 及 上傳該第二使用者端程式至該遠端操控裝置中儲存以供 後續使用。 【實施方式】 土月/考第3圖,係本發明遠端操控系統之說明圖。本發明 之遠端操控系統包含遠端操控裝置1〇〇以及第一使用者端程 式遠端操控裝置1〇〇與第一電腦2〇2及第二電腦2〇4間係透 過祠路300連接。遠端操控裝置可包含網路介面裝置4〇〇 Φ及多電腦切換器500(此多電腦切換器500不具有網路介面)’透 過夕電細切換器500連接被控電腦5〇1〜5〇4,使第一電腦 及/或第二電腦204能經由網路3〇〇及遠端操控裝置ι〇〇,控制 理複數台被控電腦5〇1〜5〇4。此網路介面裝置之硬體 架構可由宏正自動科技股份有限公司所提供之CN6000或是 CN8000所貫現。或者是,在另一實施例中此遠端操控裝置 100係為一具有網路介面之多電腦切換第— 電腦202或第二電腦2〇4能經由網路3〇〇及遠端操控裝置 • 控制被控電腦501〜504。又或者是,此遠端操控裝置1〇〇直接 連接被控電腦501〜504之其中之一(例如501),使第一電腦2〇2 或第二電腦204能經由網路300及遠端操控裝置1〇〇控制及管 理被控電腦501。此遠端操控裝置1〇〇之硬體架構可由宏正自 動科技股份有限公司所提供之KN9108、KN9116、KN2108、 KN2116、KN4132、KH1508i 或是 KH1516i 所實現。 前述第一使用者端程式係由使用第一電腦2〇2之使用者自 遠端操控裝置100或是某一伺服器(未顯示)所下載。第一使用 者端程式可包含 java client pr〇gram 或 Active χ client program。使用者能利用瀏覽器啟動第一使用者端程式,透過第 201108111 一使用者端程式對被控電腦501〜5〇4進行操控。第一使用者端 程式亦使第-電腦202與此遠端操控裝置⑽或網路介面裝置 400可進行網路通訊。 «月併參考第3圖至第6圖。帛4圖係本發明提供使用者 在遠端操控系統中使用客製化憑證(cmificate)之方法流程圖。 使用第-電^ 202之使用者已具有其公司或個人所有之憑證 (certificate),且已儲存在第—電腦2〇2或是其他健存裝置(例如 一網路磁碟機)内。則根據本發明之-實施例,首线用者下載 並執行第-使用者端程式,如第6圖所示,在下載此第一使用 者端程式時’網頁劉覽器會彈出—警告對話f咖她又 Warning),此警告對話窗主要是提醒使用者注意此程式之發行 者,並要求使用者選擇是否繼續安裝此程式(可選擇永遠安裝/ 拒絕安裝/每:欠都㈣),此時絲式發行者㈣為此遠端操控 裝置100之製造商。此第-使用者端程式提供了—使用者介面 (User Interface) ’對於使用者而言,此使用者介面可類似於一 微軟作業系統之檔案總管(Start/My ―师㈣㈣。⑷,使用者 可由其中選擇-檔案作為憑證之來源。使用者僅需透過前述使 用者介面選取已儲存在第一電腦2〇2内之前述自有憑證 (certificate),之後本發明之使用者即可自遠端操控裝置⑽或 是網路介面裝置400下载一第二使用者端程式至第一電腦勘 一此第一使用者端程式與第一使用者端程式可能完全相 同,因為此時第一使用者端程式正被第一電腦202之作業系統 使用中所以無法進行簽名。使用者可將前述自有之憑證 (certificate)結合於第二使用者端程式,得到一第三使用者=程 式。接著’可將第三使用者端程式上傳至遠端操控裝置1〇〇或 是網路介面裝置400以供下次下載使用。或者是,可將第三使 201108111 用者端程式上傳至前述下載第—使用者端程式之伺服器,之後 第-使用者可自此伺服器下载第三使用者端程式,並且第二使 用者可由此伺服⑤進仃對遠端操控裝置⑽或是網路介面裝置 400之登入。在第-使用者或第二使用者下載此第三使用者端 程式時,肖請覽器可能仍會彈出—警告對話窗伽吻(4) ACtlVe X chent (4) 升 or 升 之 之 编写 编写 编写 编写 编写 编写 编写 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预 预, Certlflcate is also the remote control user will find the warning dialog box when the user program needs to confirm the voucher or signature, or the warning dialog box of Figure 2. Feng === The manufacturer of the remote control system is owned by the user, b7 becomes a certain use doubt. If the user wants to use the own certificate to sign the user program, it must have The technology and related knowledge of the program, the program is also equipped with the information computer switcher for the remote end of the architecture. The meeting is not allowed in the existing network-type multi-a (four) correction. 201108111 [Summary] One of the main objects of the present invention is to provide a remote control system in which a user of the remote control system can use its own credentials and use the credentials to sign the user program of the remote control system in a simple and secure manner. . this invention Yet another object is to provide a method for a user to customize a client-side program credential and signature in a remote control system. According to the present invention, a remote control system is used to cause a first computer to be at least controlled via a network control The remote control device and the first-user program of the present invention. The remote control device (4) is at least one of the controlled computers. The first user program is set on the first computer, the first user terminal The program provides a user interface for enabling the first user to program the first user program by combining or signing the first user program downloaded from the remote control device. The third user program is uploaded to the _ control device via the network. The uploaded third user program can be downloaded by the second user of the first computer or the second computer to control the device. The invention also provides a method for the user to use a certificate and a signature in the remote control system, including the following steps: the method of the goods is carried out; a first user terminal program, wherein a user selects a credential through the user interface; downloads a second $ brain from the remote control device; and the user end program connects the voucher to the first The second user terminal is configured to customize the signature of the user program, and the user program is used by the user terminal, and the second user program is uploaded to the remote control device for subsequent use. [Embodiment] The earth moon/test 3 is an explanatory diagram of the remote control system of the present invention. The remote control system of the present invention comprises a remote control device 1 and a first user terminal remote control The device 1 is connected to the first computer 2〇2 and the second computer 2〇4 via the bypass circuit 300. The remote control device may include a network interface device 4〇〇Φ and a KVM switch 500 (the KVM switch 500 does not have a network interface). The U-switch switch 500 is connected to the controlled computer 5〇1~5. 〇4, the first computer and/or the second computer 204 can control the plurality of controlled computers 5〇1~5〇4 via the network 3〇〇 and the remote control device 〇〇. The hardware architecture of this network interface device can be achieved by CN6000 or CN8000 provided by Acer Automation Technology Co., Ltd. Alternatively, in another embodiment, the remote control device 100 is a multi-computer switch with a network interface. The computer 202 or the second computer 2〇4 can be connected via the network 3 and the remote control device. The controlled computers 501 to 504 are controlled. Or alternatively, the remote control device 1 is directly connected to one of the controlled computers 501 504 504 (for example, 501), so that the first computer 2 〇 2 or the second computer 204 can be controlled via the network 300 and the remote end The device 1 controls and manages the controlled computer 501. The hardware architecture of the remote control device can be implemented by KN9108, KN9116, KN2108, KN2116, KN4132, KH1508i or KH1516i provided by Acer Automation Technology Co., Ltd. The first user terminal program is downloaded from the remote control device 100 or a server (not shown) by the user using the first computer 2〇2. The first user-side program can include a java client pr〇gram or an Active χ client program. The user can start the first user program by using the browser, and control the controlled computers 501~5〇4 through a user program of 201108111. The first user program also enables the first computer 202 to communicate with the remote control device (10) or the network interface device 400. «Month and refer to Figure 3 to Figure 6. The present invention provides a flow chart of a method for a user to use a customized credential in a remote control system. The user who uses the first power 202 has a certificate owned by his company or individual and has been stored in the first computer 2〇2 or other health storage device (for example, a network disk drive). According to the embodiment of the present invention, the first-line user downloads and executes the first-user program, as shown in FIG. 6, when the first user-side program is downloaded, the web browser pops up - a warning dialog f, she is also Warning), this warning dialog window is mainly to remind users to pay attention to the publisher of this program, and ask the user to choose whether to continue to install this program (optional to always install / refuse to install / every: owe (four)), this The silk-type issuer (4) is the manufacturer of the remote control device 100. The user-side program provides a User Interface. For the user, the user interface can be similar to the file manager of a Microsoft operating system (Start/My - Teacher (4) (4). (4), User The user can select the file as the source of the voucher. The user only needs to select the aforementioned certificate stored in the first computer 2〇2 through the user interface, and then the user of the present invention can be remotely located. The control device (10) or the network interface device 400 downloads a second user program to the first computer. The first user program may be identical to the first user program because the first user terminal The program is being used by the operating system of the first computer 202 so that the signature cannot be performed. The user can combine the above-mentioned own certificate (certificate) with the second user program to obtain a third user=program. Then Upload the third user program to the remote control device 1 or the network interface device 400 for the next download. Alternatively, the third enable 201108111 user terminal Uploading to the server for downloading the first user program, after which the user can download the third user program from the server, and the second user can thereby access the remote control device (10) or Is the login of the network interface device 400. When the third user program is downloaded by the first user or the second user, the Xiao browser may still pop up - warning dialog window
Wammg) ’此警告對話窗主要是提醒使用者注意此程式之發行 者並要求使用者選擇是否繼續安裝此程式(可選擇永遠安裝/Wammg) 'This warning dialog window is mainly to remind users to pay attention to the publisher of this program and ask the user to choose whether to continue to install this program (optional forever installed /
拒絕安裝/每次都詢問“此時之㈣發行者已經被改為此 第一使用者。 本發明之方法係具有後台執行之屬性,是以前述之處理過 程中,透過本發明之使用者介面,使用者錢具備相關資訊工 程知識及技術,即可讓遠端操控系統使用自有之憑證 (⑽出她)完成簽名過程。並且,當使用第二電腦綱之另一 使用者(第二使用者)’欲利用劉覽器,對被控電腦501〜504進 行操控時,所啟動的即為網路介面裝置4〇〇提供之第三使用者 端程式’亦即已具備自有憑證…邮她)之使用者端程式,如 此第二使用者將可放心地允許此第三使用者端程式在第二電 腦204上執行。本發明有關客製化憑證(certificate)方法流程之 詳細步驟描述如下: 步驟210,於第一電腦2〇2執行第一使用者端程式,提供 使用者介面; 步驟220,透過使用者介面選擇第一電腦具有之憑證 (certificate); 步驟230,自網路介面裝置400下載第二使用者端程式至 第一電腦202 ; 步驟240 ’將憑證(certificate)結合於第二使用者端程式, 201108111 得到第三使用者端程式; 步驟250,上傳第三使用者端程式至網路介面裝置4〇〇 ; 步驟260,重新啟動網路介面裝置4〇〇,第一使用者端程 式可被第三使用者端程式所替換;以及 步驟270,之後,本發明之網路介面裝置4〇〇即可供另一 使用者在第-電腦2〇2或第二電腦斯下載並執行具有憑證 (certificate)之第三使用者端程式。 於步驟230中’第二使用者端程式的來源並非僅限於網路 介面裝置400,透過網路自製造商之網頁下載亦可。此外,步 驟260中,重新啟動網路介面裝置4〇〇係為實際操作之方式之 -,並非本發明之方法所必需之動作。如同在個人電腦中安裝 新軟體程式一般,可視本發明客製化憑證(certificate)之方法於 遠端操控系統中之重要程度而認定是否需要重新啟動。並且, 亦可不進行前述以第二使用者端程式替換第—使用者端程式 之動作’仍然保留第一使用者端程式,作為網路介面裝置彻 值田第一使用者端程式尚未上傳至網路介面裝置4〇〇 山别網路;,面裝置伽提供第一使用者端程式或第二使用者 端程式供使用者下载’當第三㈣者端程式已經上傳至網路介 面裝置40G之後,網路介面裝置彻便提供第三使用者端程式 供使用者下載。 山引述第一使用者端程式、第二使用者端程式及第三使用 ° 弋白可包含 java c!ient pr〇gram 或 Active X client ΡΓ〇β·。如第一使用者端程式包含hva client program時,自 網路介面裝置彻下載之第二❹相程式可為χ client program,反之亦然。 月併參考第3圖、第4圖以及第5圖〇第5圖係本發明 201108111 客製化遠端操控系統簽名之方法流程圖。使用第一電腦2〇2之 使用者已具有其公司或個人所有之憑證(certifica⑷,且已赌存 在第-電腦202 α。則根據本發明,使用者不僅能結合憑證 (certificate)於第-使用者端程式,更能㈣前述自有之渴鐵 (Wat6) 第二使用者端程式進行簽名(signature),^ -第二使用者端程式。此簽名過程會使㈣難公司所提供之 簽名軟體或是工具,但是使用者不需過度參與。同樣地,本發 明之方法係具有後#執行之屬性,Μ透過本發明之使用者介 [使用者無須具備相關資訊工程知識及技術,即能客製化遠 端操控系”先之簽名(Slgnature)。有關本發明客製化簽名 (signature)方法之步驟詳細描述如下: 於第一電腦202執行第一使用者端程式,提供 ’透過使用者介面選擇一憑證; ,自網路介面裝置_下載第:使转端程式至 步驟310 使用者介面; 步驟320 步驟330 第一電腦202 ; 步驟州,利用憑證,對第二使用者端程式客製 (signature),得到第三使用者端程式; 步驟350 ’第二使用者端程式上傳至網路介面裝置彻. 步驟360,重新啟動網路介面裝置4〇〇, ’ 式可被第三使用者端程式所替m $者^ 步驟370,該第一電腦2〇2 呈右、 飞弟一電腦2〇4下載並執行 j簽名㈣義叫之第三使用者端程式。當使用第二電腦綱 被#雷^m 冑用者之後欲利用劉覽器,對 被控電知501〜504進行操控時,所啟叙 提供m用^ 為網路介面裝置400 ’、一 知程式,亦即已具備自有簽名(signat―之 201108111 使用者端程式。由於此自有簽名係由使用者自行提供,並非遠 端操控系統製造商所提供,所以使用者在使用上會感覺比較安 心。在本發明之較佳實施例中,步驟34〇之簽名過程可藉由微 軟a司所^供之簽名工具Signt〇〇i或是Keyt〇〇i(適用於】心3) 達成,這些簽名工具可以對檔案進行數位簽名,驗證檔案中的 簽名以及為檔案加上時間戳記(time stamp),但是亦可以其他任 何適虽之簽名工具達成。前述之第一使用者端程式會在背景執 行此簽名工具以完成簽名,所以使用者不需過度參與。Refuse to install/request every time "At this time (4) the issuer has been changed to this first user. The method of the present invention has the property of background execution, which is the user interface through the present invention during the aforementioned processing. The user has the relevant information engineering knowledge and technology to enable the remote control system to use its own credentials ((10) to complete her signature process. And, when using another user of the second computer program (second use) "When you want to use the browser to control the controlled computers 501~504, the third user program that is launched by the network interface device 4" is already provided with its own credentials... The user-side program of the user, so that the second user can safely allow the third client program to execute on the second computer 204. The detailed steps of the process of the customized method of the present invention are described below. Step 210: Perform a first user terminal program on the first computer 2〇2 to provide a user interface; Step 220, select a certificate (certificate) that the first computer has through the user interface; Step 230 Downloading the second user terminal program from the network interface device 400 to the first computer 202; Step 240 'Combining the certificate with the second user program, 201108111, obtaining the third user program; Step 250, uploading a third client program to the network interface device 4; Step 260, restarting the network interface device 4, the first user program can be replaced by the third user program; and step 270, after The network interface device 4 of the present invention can be used by another user to download and execute a third user program with a certificate at the first computer 2 or the second computer. In step 230, The source of the second user program is not limited to the network interface device 400, and can be downloaded from the manufacturer's webpage through the network. In addition, in step 260, the network interface device 4 is restarted. In the way, it is not the action necessary for the method of the present invention. As in the case of installing a new software program in a personal computer, the method of customizing the certificate of the present invention can be used in the remote control system. To determine the degree of need to restart, and also to replace the first user-side program with the second user-side program, the first user-side program is still retained as the network interface device. A user program has not been uploaded to the network interface device 4; the device device provides a first user program or a second user program for the user to download 'as a third (four) client program After being uploaded to the network interface device 40G, the network interface device provides a third user terminal program for the user to download. The first user program, the second user program, and the third use are described. Can include java c!ient pr〇gram or Active X client ΡΓ〇β·. If the first client program includes the hva client program, the second phase program downloaded from the network interface device can be the client program and vice versa. Referring to Figure 3, Figure 4, and Figure 5, Figure 5 is a flow chart of the method for customizing the remote control system signature of the present invention. The user using the first computer 2〇2 already has a certificate owned by his company or individual (certifica(4), and the gambling exists in the first computer 202 α. According to the present invention, the user can not only combine the certificate with the first use. The program is more capable of (4) the aforementioned self-owned thirsty iron (Wat6) second user-side program signature (signature), ^ - second user-side program. This signature process will make (4) the signature software provided by the company. Or the tool, but the user does not need to participate excessively. Similarly, the method of the present invention has the attributes of the implementation of the present invention, and the user of the present invention is provided by the user [the user does not need to have relevant information engineering knowledge and technology, that is, the guest can The remote control system is first signed (Slgnature). The steps of the customized signature method of the present invention are described in detail as follows: The first computer 202 executes the first user program to provide a 'pass user interface'. Selecting a voucher; from the web interface device _ downloading the first step: causing the redirection program to step 310 the user interface; step 320 step 330 the first computer 202; step state, using the voucher, The second user program signature (signature), the third user program is obtained; step 350 'the second user program is uploaded to the network interface device. Step 360, restart the network interface device 4, ' The third user program can be replaced by the third user program. Step 370, the first computer 2〇2 is right, the flying brother is a computer 2〇4 downloads and executes the j signature (four) the third user program When using the second computer program to be used by #雷^m 者 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲 欲Knowing the program, that is, it has its own signature (signat-201108111 user-side program. Since this self-signed signature is provided by the user, it is not provided by the remote control system manufacturer, so the user will feel it in use. In a preferred embodiment of the present invention, the signature process of step 34 can be achieved by the signature tool Signt〇〇i or Keyt〇〇i (for "heart 3") provided by Microsoft Division A. These signature tools can digitally sign files and verify them. The signature in the file and the time stamp for the file, but can also be achieved by any other suitable signature tool. The first user program described above will execute the signature tool in the background to complete the signature, so the user No need to participate excessively.
亦如則述,步驟360中,重新啟動網路介面裝置4〇〇係為 實際操作之方式之-,並非必需之動作。如同在個人電腦中安 裝=軟體程式-般,可視本發明客製化簽名㈣仙叫之方法 於遠端操控系統中之重要程度而認定是否需要重新啟動。並 且’亦可不進行前述替換之動作,保留第一使用者端程式,作 為網路介面裝置彻之預設值。第-使用者端程式、第二使用 者端程式及第三使用者端程式皆可為:avadientp叫麵或 X client program。如第一使用者端程式為了讓化加As also mentioned, in step 360, restarting the network interface device 4 is the actual operation mode, and is not an essential action. As in the case of installing a software program in a personal computer, it is possible to determine whether a restart is required by the method of customizing the signature (4) of the present invention in the remote control system. Moreover, the first user terminal program may be retained as a preset value of the network interface device without performing the foregoing replacement operation. The first-user program, the second user-side program, and the third client program can all be: avadant called or X client program. Such as the first user-side program in order to make the addition
時,自網路介面裝置4〇〇下载之第二使用者端程式可 為 Act1Ve X Client program,反之亦然。 «本發明已就較佳實施例揭露如上,然其並非用以限 I本發明所屬技術領域巾具有通常知識者,在不脫離 ^月之精神和範_,當可作各種之變更㈣飾。因此,本 月之保護範圍當視後附之中請專利範圍所界定者為準。 【圖式簡單說明】 ^圖係-般網頁需使用者使用憑證或簽名之說明圖。 證對話方塊圖。 … 醒使用者確認是否接受之憑 12 201108111 第3圖係本發明遠端操控系統之系統關係說明圖。 第4圖係本發明提供使用者在遠端操控系統中使用客製化 憑證(certificate)之方法流程圖。 第5圖係本發明客製化遠端操控系統簽名之方法流程圖。 第6圖係下載使用者端程式時,網頁瀏覽器會彈出之一警 告對話窗。 【主要元件符號說明】 10 電腦The second client program downloaded from the network interface device 4 can be the Act1Ve X Client program and vice versa. The present invention has been disclosed above with respect to the preferred embodiments, and it is not intended to limit the scope of the invention to those skilled in the art, and various modifications may be made without departing from the spirit and scope of the invention. Therefore, the scope of protection for this month is subject to the definition of patent scope in the attached section. [Simple description of the diagram] ^Graphic-like webpage requires the user to use the explanatory diagram of the voucher or signature. Card dialog box. ... wake up the user to confirm whether or not to accept it. 12 201108111 Fig. 3 is a system relationship diagram of the remote control system of the present invention. Figure 4 is a flow diagram of a method of providing a user with a customized certificate in a remote control system. Figure 5 is a flow chart of the method for authorizing the remote control system signature of the present invention. In Figure 6, when downloading the client program, a web browser will pop up a warning dialog window. [Main component symbol description] 10 computer
20 網頁伺服器 30 網路 100 遠端操控系統 202 第一電腦 204 第二電腦 300 網路 400 網路介面裝置 500 多電腦切換器 501、502、503、504 被控電腦 1320 Web Server 30 Network 100 Remote Control System 202 First Computer 204 Second Computer 300 Network 400 Network Interface Device 500 KVM Switch 501, 502, 503, 504 Controlled Computer 13