Unlock instant, AI-driven research and patent intelligence for your innovation.

Agent deployment method and system based on secure transmission protocol

A secure transmission protocol and automatic deployment technology, applied in the agent deployment method and system field based on the secure transmission protocol, can solve security risks and other problems, and achieve the effect of ensuring security, authority and security

Active Publication Date: 2019-09-24
CHENGDU DBAPP SECURITY
View PDF20 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention also discloses an Agent deployment system based on a secure transmission protocol. The invention realizes the safe deployment of Agents and the replay of the deployment process. Many parties know that when the company personnel deploy files to the server, the original process is not Human monitoring, the present invention realizes monitoring and transparency; this process and the system can be audited and played back, which solves the hidden safety problems existing in many companies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent deployment method and system based on secure transmission protocol
  • Agent deployment method and system based on secure transmission protocol
  • Agent deployment method and system based on secure transmission protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] An Agent deployment method based on a secure transport protocol. Before deployment, it is detected whether the Agent service is enabled on the server. If the Agent is not deployed on the server, when the user deploys the Agent, the system automatically generates a public key and sends it to the server together with the Agent. The key is saved to the system; if the Agent has been deployed on the server, the system will automatically generate a public-private key pair, where the private key is saved to the system and the public key is sent to the server. The present invention deploys the Agent on the server, can directly obtain the information of the server, and does not need operation and maintenance personnel to continuously send commands to the server.

Embodiment 2

[0027] This embodiment is optimized on the basis of embodiment 1, such as image 3 As shown, the deployment action is recorded by the background audit module and generates an audit file for future viewing. When the same server is authorized to be deployed by multiple different users, if a user has already deployed Agent on the server, the status table will record the server IP and MAC address of the deployed Agent; check the server through the status table before deployment Whether to enable the Agent service.

[0028] The agent encrypts the server's information and transmits it to the system through a secure transmission channel, and the whole process of the system decrypting the content and transmitting it to the user through the secure channel between the system and the user is recorded by the audit module in the background. The system uses the protocol transmission channel to deploy the Agent to the target server. The system administrator authorizes the server's Agent de...

Embodiment 3

[0033] An Agent deployment system based on a secure transport protocol, such as figure 1 As shown, it includes a rights management module, an automatic deployment module, a background audit module, and an Agent interaction module. The automatic deployment module includes a deployment status table, and the automatic deployment module is used to deploy the Agent to the server; the Agent interaction module is used to receive The server information returned by the Agent; the background audit module is respectively connected with the automatic deployment module and the Agent interaction module.

[0034] like figure 2As shown, the automatic deployment module includes a verification module, a database, a deployment module, and a query module; the verification module is used to verify whether the host deploys Agent, and the database is used to return the deployment information to the verification module; the deployment module passes The secure transmission protocol deploys the Agent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Agent deployment method and system based on a secure transmission protocol, and the method comprises the steps of enabling a system to automatically generate a public key and send the public key and an Agent to a server when a user deploys the Agent if the Agent is not deployed on the server, and saving a private key in a system; and if the Agent is deployed on the server, enabling the system to automatically generate a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server. The deployment system comprises an authority management module, an automatic deployment module, a background auditing module and an Agent interaction module. According to the invention, the Agent is safely deployed, the replayable and multi-party awareness of the deployment process are realized, when the company personnel deploy files to the server, the original process is not monitored by people, but according to the present invention, the monitoring and transparency are realized; the system can be audited and replayed during the process, and the problem of potential safety hazards existing in many companies is solved.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to an Agent deployment method and system based on a secure transmission protocol. Background technique [0002] The information system application process audit is a set of supervision system that is independent of the information system when the information system is running. The system can audit and monitor the user's information system usage behavior to ensure that the application process of the information system complies with relevant industry norms. [0003] As an intelligent software entity, Agent is suitable for a distributed environment, can directly interact with the information system environment, obtain multi-level and multi-angle audit information in a timely manner, and can automatically encapsulate heterogeneous data. Multiple intelligent agents cooperate to complete distributed audit analysis tasks, effectively reducing the transmissi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/12H04L63/0442
Inventor 张舒婷刘韬范渊吴永越郑学新
Owner CHENGDU DBAPP SECURITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More