Method and device for visiting server operation system

A technology for accessing servers and operating systems, applied in the field of accessing server operating systems, can solve problems such as server operating system security threats, and achieve the effect of improving security and ensuring correctness

Inactive Publication Date: 2017-05-31
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the user name and password are illegally obtained by other pe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for visiting server operation system
  • Method and device for visiting server operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] Next, a method for accessing a server operating system provided by an embodiment of the present invention is described in detail. figure 1 A flow chart of a method for accessing a server opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for visiting a server operation system and a device for visiting the server operation system; a safety verification device is installed in a server operation system, and contact information of an administrator is prestored in the safety verification device; after receiving the first login request sent by the client for visiting the server operation system, the first login request carries with a user name and a password; the user name and the password in the first login request are verified; after passing the verification, the verification code is sent to the corresponding device of the contact information according to the contact information of the administrator; after receiving the second login request sent by the client for re-visiting the operation system, the second login request carries with the user name, the password and the verification code; the user name, the password and the verification code carried in the second login request are verified; if the verification is successful, it is allowed to visit the server operation system. Through the safety verification twice, the safety of visiting the server operation system by the administrator is effectively promoted.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for accessing a server operating system. Background technique [0002] When servers are in use, they are deployed in batches in the computer room in most cases. Due to the large number, the traditional stand-alone management method is obviously not suitable for managing them. Usually administrators can use remote control to manage the server. With the popularization and application of computer technology and the rapid development of network technology, information security has become a serious issue of widespread concern in various fields of society. As the cornerstone of information security, the security of the operating system has naturally become a research hotspot in the academic circles. [0003] In the traditional way, the administrator can enter the management interface of the server by entering the user name and password on the Secure Shell (SSH) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/0815
Inventor 张国磊
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products