Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automatic deployment method for improving remote login safety of elastic cloud host

A remote login and automatic deployment technology, applied in the field of cloud hosts, can solve problems such as time-consuming, labor-intensive, repetitive labor, and easy to be attacked, and achieve the effects of wide application, improved security, and strong scalability

Inactive Publication Date: 2020-04-21
UNICLOUD (NANJING) DIGITAL TECH CO LTD
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the security of these cloud hosts is not improved, once they are opened to the public network environment, they are extremely easy to be attacked
In addition, when a cloud host in the intranet is invaded, the security of other cloud hosts cannot be guaranteed
In order to provide users with a safe and reliable remote login environment, cloud host administrators or cloud host users need to separately strengthen the security of each newly created cloud host, so that the mutual login between cloud hosts is isolated, and a large number of repeated labor, time consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic deployment method for improving remote login safety of elastic cloud host
  • Automatic deployment method for improving remote login safety of elastic cloud host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solution of the present invention will be explained more clearly and completely through the description of preferred embodiments of the present invention in conjunction with the accompanying drawings.

[0022] Such as figure 1 As shown, an automatic deployment method for improving the remote login security of an elastic cloud host in the preferred embodiment of the present invention includes the following steps:

[0023] S1: The remote automatic deployment starts, and the PC initiates a login request to the system. The remote access processing module in the system checks whether the requested port is open and makes a judgment. If yes, enter the next step; otherwise, discard the data packet and end the request;

[0024] S2: The remote access processing module checks whether the IP of the PC is in the white list, and judges, if yes, enters the next step, otherwise discards the data packet and ends the request;

[0025] S3: The remote access processing modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The automatic deployment method for improving the remote login safety of the elastic cloud host comprises the following steps that S1, a PC end initiates a login request to a system, a remote access processing module checks whether a port is open or not, if yes, the next step is executed, If not, a data packet is discarded, and the request is ended; S2, the remote access processing module checks whether the IP of the PC end is in a white list or not, if yes, the next step is executed, otherwise, the data packet is discarded, and the request is ended; s3, the remote access processing module informs the PC that the available authentication protocol is only the secret key; s4, the PC terminal sends the user name and the secret key, and the remote access processing module checks whether the private key and the public key are paired or not and carries out judgment; s501, pairing the private key with the public key, and establishing connection between the PC terminal and the cloud host; andS502, if the private key is not matched with the public key, the remote access processing module informs the PC of login failure and returns to the step S4. According to the method, safety reinforcement is triggered every time a new cloud host is created successfully, the application is wide, and the expansibility is high.

Description

technical field [0001] The invention relates to an automatic deployment method for improving the remote login security of an elastic cloud host, and belongs to the technical field of cloud hosts. Background technique [0002] Elastic cloud host is a cloud computing service that can be obtained on demand and flexibly configured. It can help users create a stable, highly reliable, efficient and low-cost application deployment environment. Most of these environments are generated through different Linux system images, such as Centos, Ubuntu, etc. When installing these images, the lightest minimal mode will be used to reduce unnecessary overhead. Finally, users can access them through remote tools such as Xshell and SecureCRT These cloud hosts. [0003] If the security of these cloud hosts is not improved, once they are opened to the public network environment, they will be extremely easy to be attacked. In addition, when a cloud host in the intranet is invaded, the security o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/10H04L63/20H04L67/08
Inventor 过嗣源徐磊周梦琪
Owner UNICLOUD (NANJING) DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products