Verification method and device of login request, storage medium and electronic equipment
A login request and verification method technology, applied in the field of cloud services, can solve problems such as poor disaster recovery capability, undiscovered solutions, single point of failure, etc., to improve stability and security, avoid performance limitations, and achieve good security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] The method embodiment provided by Embodiment 1 of the present invention may be executed in a cloud server, a login server, a cluster server or similar devices. Taking running on a cloud server as an example, figure 1 It is a hardware structure block diagram of a cloud server according to an embodiment of the present invention. Such as figure 1 As shown, the cloud server can include one or more ( figure 1 Only one is shown in the figure) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned cloud server also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned cloud server. For example, cloud ...
Embodiment 2
[0065] In this embodiment, a device for verifying a login request is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0066] Figure 4 is a structural block diagram of a verification device for a login request according to an embodiment of the present invention, such as Figure 4 As shown, the device includes: a receiving module 40, a searching module 42, and a verification module 44, wherein,
[0067] The receiving module 40 is configured to receive a login request from a secure shell protocol SSH client, wherein the login request is used to ...
Embodiment 3
[0078] The embodiment of the present application also provides an electronic device, Figure 5 is a structural diagram of an electronic device according to an embodiment of the present invention, such as Figure 5 As shown, it includes a processor 51, a communication interface 52, a memory 53 and a communication bus 54, wherein the processor 51, the communication interface 52, and the memory 53 complete mutual communication through the communication bus 54, and the memory 53 is used to store computer programs; The processor 51 is configured to implement the following steps when executing the program stored on the memory 83: receiving a login request from a secure shell protocol SSH client, wherein the login request is used to request to log in to the target business service; according to the login A request is made to search for a matching target pod instance in multiple pod instances, wherein the target pod instance includes two containers corresponding to the SSH login agent...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com