Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and system for logging into a unix-like virtual container

A virtual container and browser technology, applied in the field of cloud computing, can solve problems such as inability to obtain Unix-like virtual container information, and inability to transmit script commands.

Active Publication Date: 2018-03-23
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the network of the Unix-like virtual container is isolated from the outside world, the outside world cannot directly log in to the Unix-like virtual container, script commands cannot be transmitted to the Unix-like virtual container, and information in the Unix-like virtual container cannot be obtained.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for logging into a unix-like virtual container
  • A method, device and system for logging into a unix-like virtual container
  • A method, device and system for logging into a unix-like virtual container

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0029] In view of the fact that the network of the Unix-like virtual container is isolated from the outside world, in the embodiment of the present invention, log in to the host (host) running the Unix virtual container, and establish a correspondence between the Unix-like virtual container and the ports on the host Relationship, to establish a connection between the Unix-like virtual container and the corresponding host port, so that the script command received by the host port and from outside the host can be sent to the Unix-like virtual container running on the host to achieve login Unix-like virtual containers.

[0030] figure 1 It is a flowchart of a method for logging into a Unix-like virtual container according to an embodiment of the present invention. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method, device and system for logging into a Unix-like virtual container. The method includes: establishing a corresponding relationship between a Unix-like virtual container and a port on a host machine running the Unix-like virtual container; establishing a transparent pipeline between the Unix-like virtual container and the corresponding host port, and establishing the transparent pipeline through the transparent pipeline. A first connection between the host port and the Unix-like virtual container; the host port receives the script command and sends the script command to the Unix-like virtual container according to the first connection. Log in to the Unix-like virtual container through the connection between the host port and the Unix-like virtual container. It can also ensure the information security of Unix-like virtual containers, and improve access efficiency through asynchronous access.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of cloud computing, and more specifically, relate to a method, device and system for logging into a Unix-like virtual container. Background technique [0002] Cloud computing primarily involves the augmentation, usage, and delivery of Internet-based services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. The birth of cloud computing means that computing power can also be circulated as a commodity through the Internet. Cloud computing in a narrow sense involves the delivery and use of IT infrastructure, which refers to obtaining the required resources through the network in an on-demand and easy-to-expand manner; This service can be related to IT, software and Internet, or other services. [0003] Cloud computing platforms can basically be divided into three categories: storage-based cloud platforms that focus on data sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCG06F9/00G06F2221/2101G06F9/547G06F2209/549G06F9/544G06F21/53G06F21/6218H04L67/02H04L65/40G06F21/00H04L67/141G06F21/54
Inventor 祝百万黄杰陆可曾砺锋
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More