Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for implementing secure networking in a cloud environment

A cloud environment, security group technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as complex implementation

Active Publication Date: 2021-04-30
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, based on the cloud environment, if you want to deploy a network, you usually design a network topology first, and then log in to each server for deployment, which is very complicated to implement.
The current networking method, design and deployment are completely independent, and later maintenance also needs to be carried out separately

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for implementing secure networking in a cloud environment
  • Method and device for implementing secure networking in a cloud environment
  • Method and device for implementing secure networking in a cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of the application clearer, the embodiments of the application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0052] In a typical configuration of the present application, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0053] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0054] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method and device for realizing secure networking in a cloud environment, including: obtaining each network device to be networked in the networking window; network connection information and / or security rule information between them. The technical solution provided by this application realizes the WYSIWYG visual design and deployment of the network equipment in the cloud environment by using the Open API interface provided by the network equipment in the cloud environment in a visualized manner. That is to say, the design and deployment of the network are realized on the visual page at the same time, and the design and deployment do not need to be carried out independently, and there is no need to log in to each server for deployment, which simply and quickly realizes the network in the cloud environment.

Description

technical field [0001] The present application relates to cloud technology, in particular to a method and device for realizing secure networking in a cloud environment. Background technique [0002] Currently, in a cloud-based environment, if you want to deploy a network, you usually design a network topology first, and then log in to each server for deployment, which is very complicated to implement. In the current networking mode, design and deployment are completely independent, and subsequent maintenance also needs to be carried out separately. Contents of the invention [0003] In order to solve the above technical problems, the present application provides a method and device for implementing secure networking in a cloud environment, which can simply and quickly implement networking in a cloud environment. [0004] In order to achieve the purpose of this application, this application provides a method for implementing secure networking in a cloud environment, includ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/14H04L41/22H04L63/20H04L67/1001
Inventor 李阳段亚雄
Owner ALIBABA GRP HLDG LTD