CN110071922A - A kind of method and system of Telnet bulk service device Linux system - Google Patents
A kind of method and system of Telnet bulk service device Linux system Download PDFInfo
- Publication number
- CN110071922A CN110071922A CN201910332035.8A CN201910332035A CN110071922A CN 110071922 A CN110071922 A CN 110071922A CN 201910332035 A CN201910332035 A CN 201910332035A CN 110071922 A CN110071922 A CN 110071922A
- Authority
- CN
- China
- Prior art keywords
- host side
- test host
- character string
- module
- telnet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention relates to server the field of test technology, provide a kind of method and system of Telnet bulk service device Linux system, and method includes: to generate a pair of secret keys in test host side;Public key batch duplicating is waited in deployment services device end to each;It tests host side and sends connection request to each server end to be disposed;Each waits for that deployment services device end generates a random string, and encrypts, and encrypted character string is sent to test host side;Test host side is decrypted the character string received using private key is generated, and the character string that decryption obtains is sent to to deployment services device end;Front and back character string is compared to deployment services device end, if the two unanimously if opening exempt from password login permission, to realize batch while carry out multiple servers Telnet, it avoids being manually entered cumbersome, easy to operate, practicability is stronger, reduces the error rate being manually entered, the testing time is shortened, testing efficiency is improved.
Description
Technical field
The invention belongs to server the field of test technology more particularly to a kind of Telnet bulk service device Linux systems
Method and system.
Background technique
Server needs to carry out batch deployment and configuration to more than ten up to a hundred servers in manufacture production process.?
During bulk service device deployment configuration, needs frequently to log in each server and is configured accordingly and deployment operation,
It is cumbersome.
For the process for frequently logging on each server and being disposed and being configured, ansible or puppet can be used
The login of bulk service device is carried out Deng automation operation and maintenance tools, but itself ansible or puppet etc. automates operation and maintenance tools
Running environment and process are complex, apply and mismatch in the deployment of server, ineffective.
Summary of the invention
For the defects in the prior art, the present invention provides a kind of sides of Telnet bulk service device Linux system
Method, it is intended to the existing middle login that bulk service device is carried out using the automation operation and maintenance tools such as ansible or puppet is solved, but
Ansible or puppet etc. automates operation and maintenance tools running environment and process is complex, applies in the deployment of server not
Matching, ineffective problem.
The technical solution provided by the present invention is: a kind of method of Telnet bulk service device Linux system, the side
Method includes the following steps:
In test host side, control operation key generates instruction, generates a pair of secret keys;
Public key batch duplicating in the pair of key of generation is waited in deployment services device end to each;
The test host side sends connection request to each server end to be disposed, and includes in the connection request
One pre-generated test host side message file;
Deployment services device end is waited at each, receives and parses through the test host side message file, generates a random words
Symbol string, and the random string is encrypted using the public key of duplication in place, encrypted character string is sent to
The test host side;
The test host side is decrypted the character string received using private key is generated, and decryption is obtained
Character string is sent to described to deployment services device end;
It is described that the character string received is compared with the character string of generation to deployment services device end, if the two one
It causes then to exempt from password login permission to test host side opening.
As an improvement scheme, the key generate instruction be ssh-keygen-t rsa [- P "] [- f'~/
.ssh/id_rsa'。
As an improvement scheme, executing the public key batch duplicating in the pair of key by generation to every
One when the step in deployment services device end, the method also includes following step:
Automatically enter the password for logging in each server end.
As an improvement scheme, the method also includes following step:
Test host side message file is generated in the test host side, the test host side message file includes IP letter
Breath, username information and encrypted message.
As an improvement scheme, it is described test host side, control operation key generate instruction, generate a pair of secret keys
The step of before further include following step:
In the test host side, each is logged in by shh log in means and waits for deployment services device end, and judges that login is
No success;
It is unsuccessful to deployment services device end installation shh log in means client logging in when determining to log in unsuccessful.
Another object of the present invention is to provide a kind of system of Telnet bulk service device Linux system, the systems
System includes:
Key production module, in test host side, control operation key to generate instruction, generates a pair of secret keys;
Public key batch duplicating module, for the public key batch duplicating in the pair of key generated to be waited for portion to each
It affixes one's name in server end;
Connection request sending module is built in the test host side, for each server end to be disposed
Connection request is sent, includes a pre-generated test host side message file in the connection request;
Random string generation module receives and parses through the test host for waiting for deployment services device end at each
Client information file generates a random string;
Character string encrypting module, for being encrypted using the public key of duplication in place to the random string;
Encrypted characters string sending module, for the encrypted random string of character string encrypting module to be sent to institute
State test host side;
Character string deciphering module, for the character string received to be decrypted using generation private key;
Character string sending module is decrypted, the character string for obtaining decryption is sent to described to deployment services device end;
Contrast judgement module, the character string for receiving are compared with the character string of generation;
Permission opens module, the character of the character string and generation for receiving when contrast judgement module judgement
String is consistent then to exempt from password login permission to test host side opening.
As an improvement scheme, the key generate instruction be ssh-keygen-t rsa [- P "] [- f'~/
.ssh/id_rsa'。
As an improvement scheme, the system also includes:
Password automatically enters module, for automatically entering the password for logging in each server end.
As an improvement scheme, the system also includes:
Host side message file generation module is tested, for generating test host client information text in the test host side
Part, the test host side message file includes IP information, username information and encrypted message.
As an improvement scheme, the system also includes:
Test module is logged in, for each being logged in by shh log in means and waiting for deployment services in the test host side
Device end, and judge to log in and whether succeed;
Log in means installs module, is used for when determining to log in unsuccessful, unsuccessful to deployment services device end logging in
Shh log in means client is installed.
In embodiments of the present invention, a pair of secret keys is generated in test host side;Public key batch duplicating is waited for into portion to each
It affixes one's name in server end;It tests host side and sends connection request to each server end to be disposed;Each waits for deployment services
Device end generates a random string, and encrypts, and encrypted character string is sent to test host side;It tests host side and uses life
The character string received is decrypted at private key, and the character string that decryption obtains is sent to to deployment services device end;To
The character string received is compared with the character string of generation for deployment services device end, if the two unanimously if to test host side open
It puts and exempts from password login permission, to realize batch while carry out multiple servers Telnet, avoid being manually entered cumbersome, behaviour
Make simply, practicability is stronger, reduces the error rate being manually entered, shortens the testing time, improves testing efficiency.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element
Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is the implementation flow chart of the method for Telnet bulk service device Linux system provided by the invention;
Fig. 2 is the system structure diagram of Telnet bulk service device Linux system provided by the invention.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for
Clearly illustrate of the invention, technical solution, therefore be only used as example, and cannot be used as a limitation and limit protection model of the invention
It encloses.
Fig. 1 is the implementation flow chart of the method for Telnet bulk service device Linux system provided by the invention, specific
Include the following steps:
In step s101, in test host side, control operation key generates instruction, generates a pair of secret keys.
Wherein, it is that [- f'~/.ssh/id_rsa', exists ssh-keygen-t rsa [- P "] at this time that key, which generates instruction,
.ssh the key-value pair id_rsa, id_rsa.pub of private key and public key can be generated under catalogue.
In step s 102, the public key batch duplicating in the pair of key of generation is waited for into deployment services device to each
In end.
The batch duplicating of the public key instructs are as follows:
ssh-copy-id[-i indetify_file][user@host_ip]。
In step s 103, test host side sends connection request, the connection to each server end to be disposed
Include a pre-generated test host side message file in request.
In step S104, deployment services device end is waited at each, receives and parses through the test host side message file,
A random string is generated, and the random string is encrypted using the public key of duplication in place, it will be encrypted
Character string is sent to the test host side.
In step s105, test host side is decrypted the character string received using private key is generated, and will
Obtained character string is decrypted to be sent to described to deployment services device end.
In step s 106, compare to character string of the deployment services device end to the character string and generation that receive
It is right, if the two unanimously if to the test host side opening exempt from password login permission.
It then disregards when the two is inconsistent, i.e., under the premise of no permission, cannot log in deployment services device.
Following step is also needed to be implemented before executing above-mentioned steps S101:
Test host side message file is generated in the test host side, the test host side message file includes IP letter
Breath, username information and encrypted message.
In embodiments of the present invention, the public key batch duplicating in the pair of key by generation is being executed to each
It is a when the step in deployment services device end, the method also includes following step:
Automatically enter the password for logging in each server end, concrete implementation code content are as follows:
In embodiments of the present invention, following step is also needed to be implemented before executing above-mentioned steps S101:
In the test host side, each is logged in by shh log in means and waits for deployment services device end, and judges that login is
No success;
It is unsuccessful to deployment services device end installation shh log in means client logging in when determining to log in unsuccessful.
In this embodiment, ssh this as safety remote login tools, by the favor of users.SSH is
The abbreviation of Secure Shell is formulated by the network group (Network Working Group) of IETF;SSH is to establish
Security protocol on the basis of application layer.SSH be it is relatively reliable at present, aim at telnet session and other network services and safety be provided
The agreement of property.The information leakage problem in remote management procedures can be effectively prevented using SSH agreement.SSH is initially UNIX system
A program on system is rapidly spread to other operating platforms again later.SSH can make up the leakage in network when proper use of
Hole.Ssh client is suitable for kinds of platform.Nearly all unix platform-include HP-UX, Linux, AIX, Solaris,
Digital UNIX, Irix and other platforms, can all run SSH.
Therefore, need to input password login manually when logging in Linux OS for ssh long-range under small-/medium-sized Intranet environment, provide
It is a kind of practical method, the LinuxOS for exempting from password ssh Telnet test lead may be implemented, preset test environment reaches
When to tens machine servers, ssh exempt from it is close log in pushing tool as cooperation pssh, utilize the power of Pssh, will
Ip is placed in some file and calls directly this document when using pssh, can reach automatically dispose, configuration, management
Purpose.
Fig. 2 shows the structural block diagram of the system of Telnet bulk service device Linux system provided by the invention, in order to
Convenient for explanation, part related to the embodiment of the present invention is only gived in figure.
The system of Telnet bulk service device Linux system includes:
Key production module 11, in test host side, control operation key to generate instruction, generates a pair of secret keys;
Public key batch duplicating module 12, for waiting the public key batch duplicating in the pair of key generated to each
In deployment services device end;
Connection request sending module 13 is built in the test host side, for each server to be disposed
End sends connection request, includes a pre-generated test host side message file in the connection request;
Random string generation module 14 receives and parses through the test master for waiting for deployment services device end at each
Generator terminal message file generates a random string;
Character string encrypting module 15, for being encrypted using the public key of duplication in place to the random string;
Encrypted characters string sending module 16, for the encrypted random string of character string encrypting module to be sent to
The test host side;
Character string deciphering module 17, for the character string received to be decrypted using generation private key;
Character string sending module 18 is decrypted, the character string for obtaining decryption is sent to described to deployment services device
End;
Contrast judgement module 19, the character string for receiving are compared with the character string of generation;
Permission opens module 20, the word of the character string and generation for receiving when contrast judgement module judgement
Symbol string is consistent then to exempt from password login permission to test host side opening.
Wherein, the system also includes:
Password automatically enters module 21, for automatically entering the password for logging in each server end;
Host side message file generation module 22 is tested, for generating test host client information text in the test host side
Part, the test host side message file includes IP information, username information and encrypted message;
Test module 23 is logged in, for each being logged in by shh log in means and waiting disposing clothes in the test host side
Business device end, and judge to log in and whether succeed;
Log in means installs module 24, is used for when determining to log in unsuccessful, unsuccessful to deployment services device logging in
End installation shh log in means client.
Wherein, the function of above-mentioned modules is as recorded in above method embodiment, and details are not described herein.
In embodiments of the present invention, a pair of secret keys is generated in test host side;Public key batch duplicating is waited for into portion to each
It affixes one's name in server end;It tests host side and sends connection request to each server end to be disposed;Each waits for deployment services
Device end generates a random string, and encrypts, and encrypted character string is sent to test host side;It tests host side and uses life
The character string received is decrypted at private key, and the character string that decryption obtains is sent to to deployment services device end;To
The character string received is compared with the character string of generation for deployment services device end, if the two unanimously if to test host side open
It puts and exempts from password login permission, to realize batch while carry out multiple servers Telnet, avoid being manually entered cumbersome, behaviour
Make simply, practicability is stronger, reduces the error rate being manually entered, shortens the testing time, improves testing efficiency.
The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;Although referring to aforementioned each reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified, or equivalent substitution of some or all of the technical features;And
These are modified or replaceed, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution,
It should all cover within the scope of the claims and the description of the invention.
Claims (10)
1. a kind of method of Telnet bulk service device Linux system, which is characterized in that the method includes the following steps:
In test host side, control operation key generates instruction, generates a pair of secret keys;
Public key batch duplicating in the pair of key of generation is waited in deployment services device end to each;
The test host side sends connection request to each server end to be disposed, and includes one pre- in the connection request
The test host side message file first generated;
Deployment services device end is waited at each, receives and parses through the test host side message file, generates a random string,
And the random string is encrypted using the public key of duplication in place, encrypted character string is sent to the survey
Try host side;
The character that the test host side is decrypted the character string received, and decryption is obtained using private key is generated
String is sent to described to deployment services device end;
It is described that the character string received is compared with the character string of generation to deployment services device end, if the two unanimously if
Password login permission is exempted to test host side opening.
2. the method for Telnet bulk service device Linux system according to claim 1, which is characterized in that described close
It is ssh-keygen-t rsa [- P "] [- f'~/.ssh/id_rsa' that key, which generates instruction,.
3. the method for Telnet bulk service device Linux system according to claim 2, which is characterized in that executing
Public key batch duplicating in the pair of key by generation to each when the step in deployment services device end, it is described
Method further includes following step:
Automatically enter the password for logging in each server end.
4. the method for Telnet bulk service device Linux system according to claim 3, which is characterized in that the side
Method further includes following step:
The test host side generate test host side message file, the test host side message file include IP information,
Username information and encrypted message.
5. the method for Telnet bulk service device Linux system according to claim 4, which is characterized in that it is described
Host side is tested, it further includes following step that control, which is run before key generates the step of instructing, generating a pair of secret keys:
In the test host side, each is logged in by shh log in means and waits for deployment services device end, and judge log in whether at
Function;
It is unsuccessful to deployment services device end installation shh log in means client logging in when determining to log in unsuccessful.
6. a kind of system of Telnet bulk service device Linux system, which is characterized in that the system comprises:
Key production module, in test host side, control operation key to generate instruction, generates a pair of secret keys;
Public key batch duplicating module, for waiting the public key batch duplicating in the pair of key generated to each to dispose clothes
It is engaged in device end;
Connection request sending module is built in the test host side, for sending to each server end to be disposed
Connection request includes a pre-generated test host side message file in the connection request;
Random string generation module receives and parses through the test host side letter for waiting for deployment services device end at each
File is ceased, a random string is generated;
Character string encrypting module, for being encrypted using the public key of duplication in place to the random string;
Encrypted characters string sending module, for the encrypted random string of character string encrypting module to be sent to the survey
Try host side;
Character string deciphering module, for the character string received to be decrypted using generation private key;
Character string sending module is decrypted, the character string for obtaining decryption is sent to described to deployment services device end;
Contrast judgement module, the character string for receiving are compared with the character string of generation;
Permission opens module, the character string one of the character string and generation for receiving when contrast judgement module judgement
It causes then to exempt from password login permission to test host side opening.
7. the system of Telnet bulk service device Linux system according to claim 1, which is characterized in that described close
It is ssh-keygen-t rsa [- P "] [- f'~/.ssh/id_rsa' that key, which generates instruction,.
8. the system of Telnet bulk service device Linux system according to claim 7, which is characterized in that the system
System further include:
Password automatically enters module, for automatically entering the password for logging in each server end.
9. the system of Telnet bulk service device Linux system according to claim 8, which is characterized in that the system
System further include:
Host side message file generation module is tested, for generating test host side message file, institute in the test host side
Stating test host side message file includes IP information, username information and encrypted message.
10. the system of Telnet bulk service device Linux system according to claim 9, which is characterized in that the system
System further include:
Test module is logged in, for each being logged in by shh log in means and waiting for deployment services device in the test host side
End, and judge to log in and whether succeed;
Log in means installation module, is used for when determining to log in unsuccessful, unsuccessful to the installation of deployment services device end logging in
Shh log in means client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910332035.8A CN110071922A (en) | 2019-04-24 | 2019-04-24 | A kind of method and system of Telnet bulk service device Linux system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910332035.8A CN110071922A (en) | 2019-04-24 | 2019-04-24 | A kind of method and system of Telnet bulk service device Linux system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110071922A true CN110071922A (en) | 2019-07-30 |
Family
ID=67368636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910332035.8A Pending CN110071922A (en) | 2019-04-24 | 2019-04-24 | A kind of method and system of Telnet bulk service device Linux system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110071922A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110708158A (en) * | 2019-11-06 | 2020-01-17 | 积成电子股份有限公司 | Method for remotely maintaining charging pile based on SSH reverse tunnel technology |
CN111049671A (en) * | 2019-11-08 | 2020-04-21 | 合肥宜拾惠网络科技有限公司 | System integration method and device |
CN112637138A (en) * | 2020-12-07 | 2021-04-09 | 吉林亿联银行股份有限公司 | Method and related device for realizing multi-server secret-free login |
CN114338633A (en) * | 2021-12-27 | 2022-04-12 | 济南超级计算技术研究院 | Method and system for remotely connecting Linux server |
CN116996219A (en) * | 2023-09-27 | 2023-11-03 | 天津卓朗昆仑云软件技术有限公司 | Key interaction method, system and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130067229A1 (en) * | 2011-09-09 | 2013-03-14 | Stoneware, Inc. | Method and apparatus for key sharing over remote desktop protocol |
CN103701919A (en) * | 2013-12-31 | 2014-04-02 | 曙光云计算技术有限公司 | Remote login method and system |
CN104954189A (en) * | 2015-07-07 | 2015-09-30 | 上海斐讯数据通信技术有限公司 | Automatic server cluster detecting method and system |
US20160241558A1 (en) * | 2015-02-13 | 2016-08-18 | International Business Machines Corporation | Automatic Key Management Using Enterprise User Identity Management |
CN106131092A (en) * | 2016-08-31 | 2016-11-16 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and device of telnet server |
CN108737426A (en) * | 2018-05-24 | 2018-11-02 | 郑州云海信息技术有限公司 | One kind remotely exempting from close login method and system |
-
2019
- 2019-04-24 CN CN201910332035.8A patent/CN110071922A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130067229A1 (en) * | 2011-09-09 | 2013-03-14 | Stoneware, Inc. | Method and apparatus for key sharing over remote desktop protocol |
CN103701919A (en) * | 2013-12-31 | 2014-04-02 | 曙光云计算技术有限公司 | Remote login method and system |
US20160241558A1 (en) * | 2015-02-13 | 2016-08-18 | International Business Machines Corporation | Automatic Key Management Using Enterprise User Identity Management |
CN104954189A (en) * | 2015-07-07 | 2015-09-30 | 上海斐讯数据通信技术有限公司 | Automatic server cluster detecting method and system |
CN106131092A (en) * | 2016-08-31 | 2016-11-16 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and device of telnet server |
CN108737426A (en) * | 2018-05-24 | 2018-11-02 | 郑州云海信息技术有限公司 | One kind remotely exempting from close login method and system |
Non-Patent Citations (1)
Title |
---|
陈泽茂: "《信息系统安全》", 30 April 2014, 武汉大学出版社 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110708158A (en) * | 2019-11-06 | 2020-01-17 | 积成电子股份有限公司 | Method for remotely maintaining charging pile based on SSH reverse tunnel technology |
CN110708158B (en) * | 2019-11-06 | 2022-06-10 | 积成电子股份有限公司 | Method for remotely maintaining charging pile based on SSH reverse tunnel technology |
CN111049671A (en) * | 2019-11-08 | 2020-04-21 | 合肥宜拾惠网络科技有限公司 | System integration method and device |
CN112637138A (en) * | 2020-12-07 | 2021-04-09 | 吉林亿联银行股份有限公司 | Method and related device for realizing multi-server secret-free login |
CN114338633A (en) * | 2021-12-27 | 2022-04-12 | 济南超级计算技术研究院 | Method and system for remotely connecting Linux server |
CN114338633B (en) * | 2021-12-27 | 2023-11-10 | 济南超级计算技术研究院 | Method and system for remotely connecting Linux server |
CN116996219A (en) * | 2023-09-27 | 2023-11-03 | 天津卓朗昆仑云软件技术有限公司 | Key interaction method, system and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110071922A (en) | A kind of method and system of Telnet bulk service device Linux system | |
WO2022206349A1 (en) | Information verification method, related apparatus, device, and storage medium | |
US11483143B2 (en) | Enhanced monitoring and protection of enterprise data | |
CN106533807B (en) | A kind of method and system of remote upgrade terminal device | |
CN101051904B (en) | Method for landing by account number cipher for protecting network application sequence | |
CN107040513B (en) | Trusted access authentication processing method, user terminal and server | |
EP1906584B1 (en) | Method, system and device for game data transmission | |
CN105024819A (en) | Multifactor authentication method and system based on mobile terminal | |
EP3222025B1 (en) | Method for controlling access to a production system of a computer system not connected to an information system of said computer system | |
CN109670325B (en) | Device and method for encrypting and decrypting configuration file | |
WO2005055514A1 (en) | Methods, systems and computer program products for automatic rekeying in an authentication environment | |
CN112468571B (en) | Intranet and extranet data synchronization method and device, electronic equipment and storage medium | |
CN104717224B (en) | A kind of login method and device | |
CN108111497A (en) | Video camera and server inter-authentication method and device | |
CN103095731A (en) | REST security system based on signature mechanism | |
CN112436936B (en) | Cloud storage method and system with quantum encryption function | |
CN105119894A (en) | Communication system and communication method based on hardware safety module | |
CN104767766A (en) | Web Service interface verification method, Web Service server and client side | |
CN109257387A (en) | Method and apparatus for disconnection reconnecting | |
WO2010119427A2 (en) | Method and system for deployment of software applications to mobile computing devices | |
CN104270346B (en) | The methods, devices and systems of two-way authentication | |
CN107342963A (en) | A kind of secure virtual machine control method, system and the network equipment | |
CN103856938A (en) | Encryption and decryption method, system and device | |
CN108989302B (en) | OPC proxy connection system and connection method based on secret key | |
EP3171543B1 (en) | Local information acquisition method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190730 |