Remote login method, device and system

A technology of remote login and bastion machine, applied in the computer field, can solve problems such as weak password strength, achieve strong password strength and improve security

Inactive Publication Date: 2019-10-18
ALIBABA GRP HLDG LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a remote login method, device and system to at least solve the technical problem in the prior art that the login credentials of the cloud server are artificially set by the administrator, resulting in weak password strength

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote login method, device and system
  • Remote login method, device and system
  • Remote login method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] According to an embodiment of the present application, an embodiment of a remote login system is also provided, figure 1 It is a schematic diagram of a remote login system according to Embodiment 1 of the present application, combined with figure 1 As shown, the system includes:

[0034] The access terminal 10 is used to determine the target cloud server to be logged in.

[0035] Specifically, the above-mentioned access terminal may be a terminal used by the user to access the target cloud server, and the access terminal needs to determine the target cloud server to log in to the cloud bastion machine, so that the cloud bastion machine can establish communication with the target cloud server. After the cloud bastion machine establishes communication with the target cloud server, it can forward the access data of the access terminal to the target cloud server, and forward the response result returned by the target cloud server to the access terminal, thus realizing the ...

Embodiment 2

[0064] According to the embodiment of the present application, a method embodiment of a remote login method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0065] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. image 3 A hardware structural block diagram of a computer terminal (or mobile device) for realizing the remote login method is shown. like image 3 As shown, the computer terminal 30 (or mobile device 30) may include one or more (shown by 302a, 302b, ..., 302n in the figure) processor 302 (the processor 302 may include but not limited ...

Embodiment 3

[0096] This application provides Figure 5 The remote login method shown. Figure 5 It is a flow chart of a remote login method according to Embodiment 3 of the present application.

[0097] In step S51, the target cloud server receives the public key in the key pair distributed by the cloud bastion host, wherein the key pair includes a public key and a private key corresponding to the public key, and the target cloud server is the cloud server to be logged in by the access terminal.

[0098] Specifically, the access terminal selects the target cloud server by logging into the cloud bastion host.

[0099] In the above step S51, the cloud bastion host distributes the public key to the target cloud server, and the private key of the target cloud server is saved by the cloud bastion host.

[0100]In an optional embodiment, when the cloud server registers with the cloud bastion machine, the cloud bastion machine will generate a key pair for the cloud server, including a public k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote login method, a device and a system. The system comprises an access terminal used for determining a target cloud server to be logged in; a cloud bastion host which isconnected with the access terminal, wherein a key pair of the target cloud server is stored in the cloud bastion host, the key pair comprises a public key and a private key corresponding to the publickey, and the cloud bastion host is used for performing signature by using the private key in the key pair; and the target cloud server which is connected with the cloud bastion host, stores a publickey of the key pair, and is used for performing signature verification on the signature by using the public key of the key pair, and establishes communication with the cloud bastion host under the condition that the signature verification is passed. The technical problem that in the prior art, the login credential of the cloud server is manually set by an administrator, and consequently the password strength is low is solved.

Description

technical field [0001] The present invention relates to the computer field, in particular to a remote login method, device and system. Background technique [0002] In various scenarios such as remote office and remote maintenance, remote login to the cloud server is required. In the prior art, the method of remote login is usually that the administrator sets the login credentials of the cloud server and distributes them to the operation and maintenance personnel, and the operation and maintenance personnel log in to the cloud server through the login credentials. In this remote login method, the operator holds the login credentials of the cloud server distributed by the administrator, and the administrator holds the login credentials of all cloud servers. [0003] The above login method can meet the user's remote login needs, but there are still many defects, including the following points: (1) The login credentials of the cloud server are set by the administrator, which c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/10H04L67/141
Inventor 林龙
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products