Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer system security management method and device

A computer system and security management technology, applied in the field of computer system security management methods and devices, can solve problems such as a large number of human resources, complex structure, unrealistic, etc., and achieve the effects of improving management efficiency, simple management, and saving management resources

Active Publication Date: 2021-04-13
YIDU CLOUD (BEIJING) TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the large number of servers in the big data platform of hybrid cloud, and the network structure includes private cloud and public cloud, bring challenges to the security of the system
[0004] As mentioned above, on the one hand, due to the huge number of servers, a large amount of human resources are required to maintain account passwords and authority authorization on a single machine, which is obviously unrealistic; on the other hand, since the network structure includes private clouds and public The structure is complex, and the traditional security-guaranteed intrusion detection system can no longer fully detect the intrusion behavior, which reduces the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system security management method and device
  • Computer system security management method and device
  • Computer system security management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045]An example embodiment will now be described more fully with reference to the accompanying drawings. However, the example embodiments can be implemented in a variety of forms, and is not to be construed as being limited to the embodiments set forth herein; in contrast, the present disclosure will be fully and complete, and the concept of example embodiments is fully communicated A technician in the art. The same reference numerals are denoted by the same reference numerals, therefore will omit their repeated description thereof.

[0046]Furthermore, the features, structures, or characteristics described may be incorporated in one or more embodiments in any suitable manner. In the following description, there is provided a number of specific details to give a sufficient understanding of the embodiments of the present disclosure. However, those skilled in the art will appreciate that there may be one or more of the present disclosure without one or more of the specific details, or o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a computer system security management method and device. An open source directory service is used to establish a unified account management system. The unified account management system includes a configuration file. When the corresponding authority is registered in the configuration file, the authority corresponding to the server account is authorized to the server corresponding to the server account. It realizes the unified management of server accounts and centralized authorization of server permissions, which makes server management simpler and more flexible, improves management efficiency, and saves management resources.

Description

Technical field[0001]The present invention relates to the field of computer security management, and more particularly to a computer system security management method and apparatus.Background technique[0002]With the development and application of public clouds and private clouds, cloud computing technology is gradually mature, and the concept of hybrid clouds came into being. Mixed cloud mode is generally composed of two or more clouds (can be private or public clouds). Its core advantage is that by using virtualization techniques, it is possible to operate business without having to pay huge capital overhead, and with the development of the business can change the size of the IT infrastructure, there is no need to worry about overcapacity or insufficient equipment. .[0003]Data analysis of large data platforms based on hybrid clouds brings huge economic benefits. However, the number of large data platform servers in hybrid clouds is large, and the network structure contains private ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L63/0884H04L63/101
Inventor 刘袁君张勤
Owner YIDU CLOUD (BEIJING) TECH CO LTD