A method and system for deploying an agent based on a secure transport protocol
A secure transmission protocol and automatic deployment technology, applied in the agent deployment method and system field based on the secure transmission protocol, can solve security risks and other problems, and achieve the effect of ensuring security, authority and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] An Agent deployment method based on a secure transport protocol. Before deployment, it is detected whether the Agent service is enabled on the server. If the Agent is not deployed on the server, when the user deploys the Agent, the system automatically generates a public key and sends it to the server together with the Agent. The key is saved to the system; if the Agent has been deployed on the server, the system will automatically generate a public-private key pair, where the private key is saved to the system and the public key is sent to the server. The present invention deploys the Agent on the server, can directly obtain the information of the server, and does not need operation and maintenance personnel to continuously send commands to the server.
Embodiment 2
[0027] This embodiment is optimized on the basis of embodiment 1, such as image 3 As shown, the deployment action is recorded by the background audit module and generates an audit file for future viewing. When the same server is authorized to be deployed by multiple different users, if a user has already deployed Agent on the server, the status table will record the server IP and MAC address of the deployed Agent; check the server through the status table before deployment Whether to enable the Agent service.
[0028] The agent encrypts the server's information and transmits it to the system through a secure transmission channel, and the whole process of the system decrypting the content and transmitting it to the user through the secure channel between the system and the user is recorded by the audit module in the background. The system uses the protocol transmission channel to deploy the Agent to the target server. The system administrator authorizes the server's Agent de...
Embodiment 3
[0033] An Agent deployment system based on a secure transport protocol, such as figure 1 As shown, it includes a rights management module, an automatic deployment module, a background audit module, and an Agent interaction module. The automatic deployment module includes a deployment status table, and the automatic deployment module is used to deploy the Agent to the server; the Agent interaction module is used to receive The server information returned by the Agent; the background audit module is respectively connected with the automatic deployment module and the Agent interaction module.
[0034] Such as figure 2As shown, the automatic deployment module includes a verification module, a database, a deployment module, and a query module; the verification module is used to verify whether the host deploys Agent, and the database is used to return the deployment information to the verification module; the deployment module passes The secure transmission protocol deploys the Ag...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



