Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data protection method and device, electronic equipment and readable storage medium

A data protection and login credential technology, applied in the field of communication, can solve security problems, operation and maintenance accidents can not quickly find the cause of the accident, and the person responsible for the accident, server data is vulnerable to attack or stolen, etc., to ensure security , the effect of ensuring safety

Active Publication Date: 2019-03-29
上海格物致远网络科技有限公司
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, for operation and maintenance personnel to remotely log in to the server to perform related maintenance operations, the operation and maintenance terminal usually logs in directly to the access server or uses plaintext transmission of data, user account, and password to log in. These methods all store security issues, and server data is very Vulnerable to attacks or theft, and when an operation and maintenance accident occurs, the cause of the accident and the person responsible for the accident cannot be quickly found

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device, electronic equipment and readable storage medium
  • Data protection method and device, electronic equipment and readable storage medium
  • Data protection method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the embodiments of the present invention will now be described in detail with reference to the accompanying drawings.

[0049] see figure 1 and figure 2 . The data protection method of this embodiment includes the following steps:

[0050] Step S101 , the proxy receives a login server request sent by a terminal, and the login server request carries login credentials.

[0051] In this step, the login credential carried in the login server request is a credential for the terminal to remotely log in to the server, which means that the terminal carrying the login credential is an authorized user. It should be noted here that the login credentials carried by the terminal are obtained through kerberos authentication. Before the terminal sends a request to log in to the server, it needs to perform an initialization opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data protection method and device, electronic equipment and a readable storage medium. The method includes: receiving a server login request, which is sent by a terminal, bya proxy, wherein the login server request carries login credentials; determining a list of servers, which can be logged in, of the terminal by a management center according to the server login request, and returning the list of the servers, which can be logged in, to the terminal; adopting a preset authentication manner to authenticate the terminal by the proxy when a target server login requestsent by the terminal is received; and preventing the terminal from logging in a target server when terminal authentication is unsuccessful. Through the above manner, the method prevents terminals, which are illegal or have no authorized authority, from logging in the servers, and ensures security of server data. In addition, the method can carry out real-time monitoring and auditing on all operations of terminals on the servers. The security of the server data is guaranteed, and operation and maintenance accident causes and related responsible persons can also be quickly determined.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to a data protection method, device, electronic equipment and readable storage medium. Background technique [0002] The bastion host is used as a proxy server to be set between the operation and maintenance terminal and the server. When the maintenance personnel of the operation and maintenance terminal need to maintain the server, they need to log in to the bastion host first, then log in to the server to be maintained from the bastion host, and finally perform related maintenance. [0003] In today's information age, the internal data of each enterprise, especially some sensitive data, needs to be stored accordingly or the clusters that can obtain these sensitive data should be protected, and all remote logins should be centralized manage. [0004] At present, for operation and maintenance personnel to remotely log in to the server to perform related main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0281H04L63/0815H04L67/143H04L67/56
Inventor 颜伟志
Owner 上海格物致远网络科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More