Verification method and device of login request, storage medium and electronic equipment

A login request and verification method technology, applied in the field of cloud services, can solve problems such as poor disaster recovery capability, undiscovered solutions, single point of failure, etc., to improve stability and security, avoid performance limitations, and achieve good security Effect

Active Publication Date: 2021-06-25
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The SSH login agent in the related technology is a centralized deployment model, all services are served through a proxy service, which has the following disadvantages: multi-tenant security risks, all tenants enter the corresponding SSH login proxy service For service nodes, once the centralized proxy node has a risk of vulnerability, the login information of all tenants will have security risks; single point of failure, due to the centralized deployment method, if the service is unavailable, all users will not be able to log in to the service Moderate, poor disaster tolerance
Service code intrusion, since the service communicates directly with the SSH login agent, to achieve password-free login, it is necessary to add relevant function support to the corresponding service, which cannot be non-intrusive and cannot seamlessly access other services, and the service needs to be modified. Realization, completely non-intrusive way of code redundancy is lower
[0004] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device of login request, storage medium and electronic equipment
  • Verification method and device of login request, storage medium and electronic equipment
  • Verification method and device of login request, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] The method embodiment provided by Embodiment 1 of the present invention may be executed in a cloud server, a login server, a cluster server or similar devices. Taking running on a cloud server as an example, figure 1 It is a hardware structure block diagram of a cloud server according to an embodiment of the present invention. Such as figure 1 As shown, the cloud server can include one or more ( figure 1 Only one is shown in the figure) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned cloud server also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned cloud server. For example, cloud ...

Embodiment 2

[0065] In this embodiment, a device for verifying a login request is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0066] Figure 4 is a structural block diagram of a verification device for a login request according to an embodiment of the present invention, such as Figure 4 As shown, the device includes: a receiving module 40, a searching module 42, and a verification module 44, wherein,

[0067] The receiving module 40 is configured to receive a login request from a secure shell protocol SSH client, wherein the login request is used to ...

Embodiment 3

[0078] The embodiment of the present application also provides an electronic device, Figure 5 is a structural diagram of an electronic device according to an embodiment of the present invention, such as Figure 5 As shown, it includes a processor 51, a communication interface 52, a memory 53 and a communication bus 54, wherein the processor 51, the communication interface 52, and the memory 53 complete mutual communication through the communication bus 54, and the memory 53 is used to store computer programs; The processor 51 is configured to implement the following steps when executing the program stored on the memory 83: receiving a login request from a secure shell protocol SSH client, wherein the login request is used to request to log in to the target business service; according to the login A request is made to search for a matching target pod instance in multiple pod instances, wherein the target pod instance includes two containers corresponding to the SSH login agent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login request verification method and device, a storage medium and electronic equipment, and belongs to the field of cloud services. The method comprises the following steps: receiving a login request from a secure shell protocol (SSH) client, wherein the login request is used for requesting to log in a target business service; searching a matched target pod instance in multiple pod instances according to the login request, wherein the target pod instance comprises two containers which respectively correspond to an SSH login agent and the target business service; and verifying the login request by adopting the target pod instance. According to the method and the device, the performance limitation of a single point of failure and single proxy service is avoided, each business service is an independent SSH login proxy, isolation among multiple users can be realized, better security is provided, the technical problems of high login security and failure rate caused by centralized deployment of the SSH login proxy in related technologies are solved, and the stability and the security of the SSH login proxy are improved.

Description

technical field [0001] The present invention relates to the field of cloud services, in particular to a method and device for verifying a login request, a storage medium, and an electronic device. Background technique [0002] In related technologies, SSH (Secure Shell, secure shell protocol) is a relatively reliable protocol that provides security for remote login sessions and other network services. Using SSH can effectively prevent information leakage in the remote management process. Logging in to the container through SSH often occurs during development. However, because the current container (pod) is stateless, the IP address will change frequently due to events such as container restart and rescheduling. This problem is solved by adding an agent. The user logs in through the SSH client. First, Arrive at the gateway of the cluster, then enter the SSH login agent through the gateway, parse the user's login information in the SSH login agent, and then proxy to the corre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0884H04L63/083H04L67/10
Inventor 孙海洲
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products