Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for establishing a secure channel in a cluster

A security channel and cluster technology, which is applied in security communication devices, digital transmission systems, electrical components, etc., can solve the problems of large workload, low efficiency, and complex security channel establishment procedures, and simplify the security channel establishment process. , the effect of improving efficiency and reducing complexity

Active Publication Date: 2020-06-02
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] It can be seen that the existing method of establishing a secure channel in the cluster has the problems of complex key management and secure channel establishment process, heavy workload and low efficiency in establishing a secure channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for establishing a secure channel in a cluster
  • A method and device for establishing a secure channel in a cluster
  • A method and device for establishing a secure channel in a cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0085] The first embodiment of the present application provides a method for establishing a secure channel in a cluster, and its flow chart is as follows figure 1 As shown, this embodiment includes the following steps:

[0086] Step S101, obtaining a request for establishing a secure channel for each designated user space in a designated cluster.

[0087] Get this request when it is necessary to establish a secure communication channel between different userspaces within a computer cluster. The user space may be a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method for establishing a secure channel in a cluster, which is characterized in that it includes the following steps: obtaining a request for establishing a secure channel between specified user spaces in a specified cluster; generating a password for the secure channel corresponding to the request A key pair, the key pair includes a public key and a private key; the key required by each specified user space is transmitted to each specified user space in a form corresponding to the corresponding user space; the corresponding key of the key is The key corresponding to the form is stored in each designated user space; and the key is used to establish a safe channel between the designated user spaces. The method provided by this application can reduce the complexity of establishing a secure channel and improve the efficiency of establishing a secure channel; transmitting the key in a form corresponding to the user space can simplify the workload of establishing a secure channel in the cluster. The effect of improving the efficiency of establishing a safe channel is achieved.

Description

technical field [0001] The present application relates to a method for establishing a secure channel, in particular to a method and device for establishing a secure channel in a cluster, a method and a device for deploying a docker container configured with a secure channel, and a startup belt Method and apparatus for docker containers with secure channel configuration. Background technique [0002] Clusters usually contain different user spaces, including containers (such as docker containers), virtual machines, and physical machines. Different user spaces or the same user space need to communicate and exchange information. In order to ensure information security, different A secure channel is established between different user spaces or between the same user spaces for information exchange, and the security channel usually uses asymmetric encryption to ensure the security of information. [0003] The asymmetrically encrypted secure channel includes a source end and a dest...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/06H04L63/18H04L63/20H04L9/40
Inventor 秦海博
Owner ALIBABA GRP HLDG LTD