Unlock instant, AI-driven research and patent intelligence for your innovation.

A server and security authentication method

A server and authentication data technology, applied in the field of communications, can solve the problems of small monitoring scale, inability to achieve larger scale, and high security risks of monitoring solutions

Active Publication Date: 2021-05-07
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The centralized monitoring solution has high security risks, and the monitoring scale is small (currently the largest is usually about 1,000) and cannot reach a larger scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A server and security authentication method
  • A server and security authentication method
  • A server and security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present invention will be described below with reference to the accompanying drawings in the embodiments of the present invention.

[0033]The terms "first", "second", "third" and "fourth" in the specification and claims of the present application and the drawings are used to distinguish different objects, rather than to describe a specific order . Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.

[0034] Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a server and a security authentication method. The server may include: a management node and at least one instance node, the management node is used to manage the at least one instance node, and the at least one instance node includes The first instance node, wherein the management node sends the first authentication data to the first instance node through the SSH channel, so as to store the first authentication data in the first instance node; the management node sends the first authentication data to the first instance node The first instance node sends a first connection request, the first connection request carries the first authentication data; the first instance node judges the first authentication data in the first connection request and the stored first authentication Whether the data is consistent; if consistent, the first instance node establishes a first connection with the management node. By adopting the application, the security of the process of monitoring the status of large-scale instances by management in the cloud database server can be guaranteed.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a server and a security authentication method. Background technique [0002] The rapid development of Internet technology and the popularity of various input terminals such as mobile phones, tablets, and smart TVs have led to explosive growth of Internet data. Faced with massive amounts of data, how to store massive amounts of data in a more stable and rapid manner, and dig out valuable information from it, has become a new classroom for many companies. The emergence of cloud storage has brought new opportunities for the rapid development of data mining. [0003] Cloud database service is a very important part of cloud storage. Among them, the relational database service (Relational Database Service, RDS) in the cloud database service is a stable, reliable, and elastically scalable online database service. monitoring and analysis functions. In fact, RDS is to hand over...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/168H04L63/205
Inventor 肖玲峰何雄辉
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More