CN110071922A - A kind of method and system of Telnet bulk service device Linux system - Google Patents

A kind of method and system of Telnet bulk service device Linux system Download PDF

Info

Publication number
CN110071922A
CN110071922A CN201910332035.8A CN201910332035A CN110071922A CN 110071922 A CN110071922 A CN 110071922A CN 201910332035 A CN201910332035 A CN 201910332035A CN 110071922 A CN110071922 A CN 110071922A
Authority
CN
China
Prior art keywords
host side
test host
character string
module
telnet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910332035.8A
Other languages
Chinese (zh)
Inventor
黄锦盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910332035.8A priority Critical patent/CN110071922A/en
Publication of CN110071922A publication Critical patent/CN110071922A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to server the field of test technology, provide a kind of method and system of Telnet bulk service device Linux system, and method includes: to generate a pair of secret keys in test host side;Public key batch duplicating is waited in deployment services device end to each;It tests host side and sends connection request to each server end to be disposed;Each waits for that deployment services device end generates a random string, and encrypts, and encrypted character string is sent to test host side;Test host side is decrypted the character string received using private key is generated, and the character string that decryption obtains is sent to to deployment services device end;Front and back character string is compared to deployment services device end, if the two unanimously if opening exempt from password login permission, to realize batch while carry out multiple servers Telnet, it avoids being manually entered cumbersome, easy to operate, practicability is stronger, reduces the error rate being manually entered, the testing time is shortened, testing efficiency is improved.

Description

A kind of method and system of Telnet bulk service device Linux system
Technical field
The invention belongs to server the field of test technology more particularly to a kind of Telnet bulk service device Linux systems Method and system.
Background technique
Server needs to carry out batch deployment and configuration to more than ten up to a hundred servers in manufacture production process.? During bulk service device deployment configuration, needs frequently to log in each server and is configured accordingly and deployment operation, It is cumbersome.
For the process for frequently logging on each server and being disposed and being configured, ansible or puppet can be used The login of bulk service device is carried out Deng automation operation and maintenance tools, but itself ansible or puppet etc. automates operation and maintenance tools Running environment and process are complex, apply and mismatch in the deployment of server, ineffective.
Summary of the invention
For the defects in the prior art, the present invention provides a kind of sides of Telnet bulk service device Linux system Method, it is intended to the existing middle login that bulk service device is carried out using the automation operation and maintenance tools such as ansible or puppet is solved, but Ansible or puppet etc. automates operation and maintenance tools running environment and process is complex, applies in the deployment of server not Matching, ineffective problem.
The technical solution provided by the present invention is: a kind of method of Telnet bulk service device Linux system, the side Method includes the following steps:
In test host side, control operation key generates instruction, generates a pair of secret keys;
Public key batch duplicating in the pair of key of generation is waited in deployment services device end to each;
The test host side sends connection request to each server end to be disposed, and includes in the connection request One pre-generated test host side message file;
Deployment services device end is waited at each, receives and parses through the test host side message file, generates a random words Symbol string, and the random string is encrypted using the public key of duplication in place, encrypted character string is sent to The test host side;
The test host side is decrypted the character string received using private key is generated, and decryption is obtained Character string is sent to described to deployment services device end;
It is described that the character string received is compared with the character string of generation to deployment services device end, if the two one It causes then to exempt from password login permission to test host side opening.
As an improvement scheme, the key generate instruction be ssh-keygen-t rsa [- P "] [- f'~/ .ssh/id_rsa'。
As an improvement scheme, executing the public key batch duplicating in the pair of key by generation to every One when the step in deployment services device end, the method also includes following step:
Automatically enter the password for logging in each server end.
As an improvement scheme, the method also includes following step:
Test host side message file is generated in the test host side, the test host side message file includes IP letter Breath, username information and encrypted message.
As an improvement scheme, it is described test host side, control operation key generate instruction, generate a pair of secret keys The step of before further include following step:
In the test host side, each is logged in by shh log in means and waits for deployment services device end, and judges that login is No success;
It is unsuccessful to deployment services device end installation shh log in means client logging in when determining to log in unsuccessful.
Another object of the present invention is to provide a kind of system of Telnet bulk service device Linux system, the systems System includes:
Key production module, in test host side, control operation key to generate instruction, generates a pair of secret keys;
Public key batch duplicating module, for the public key batch duplicating in the pair of key generated to be waited for portion to each It affixes one's name in server end;
Connection request sending module is built in the test host side, for each server end to be disposed Connection request is sent, includes a pre-generated test host side message file in the connection request;
Random string generation module receives and parses through the test host for waiting for deployment services device end at each Client information file generates a random string;
Character string encrypting module, for being encrypted using the public key of duplication in place to the random string;
Encrypted characters string sending module, for the encrypted random string of character string encrypting module to be sent to institute State test host side;
Character string deciphering module, for the character string received to be decrypted using generation private key;
Character string sending module is decrypted, the character string for obtaining decryption is sent to described to deployment services device end;
Contrast judgement module, the character string for receiving are compared with the character string of generation;
Permission opens module, the character of the character string and generation for receiving when contrast judgement module judgement String is consistent then to exempt from password login permission to test host side opening.
As an improvement scheme, the key generate instruction be ssh-keygen-t rsa [- P "] [- f'~/ .ssh/id_rsa'。
As an improvement scheme, the system also includes:
Password automatically enters module, for automatically entering the password for logging in each server end.
As an improvement scheme, the system also includes:
Host side message file generation module is tested, for generating test host client information text in the test host side Part, the test host side message file includes IP information, username information and encrypted message.
As an improvement scheme, the system also includes:
Test module is logged in, for each being logged in by shh log in means and waiting for deployment services in the test host side Device end, and judge to log in and whether succeed;
Log in means installs module, is used for when determining to log in unsuccessful, unsuccessful to deployment services device end logging in Shh log in means client is installed.
In embodiments of the present invention, a pair of secret keys is generated in test host side;Public key batch duplicating is waited for into portion to each It affixes one's name in server end;It tests host side and sends connection request to each server end to be disposed;Each waits for deployment services Device end generates a random string, and encrypts, and encrypted character string is sent to test host side;It tests host side and uses life The character string received is decrypted at private key, and the character string that decryption obtains is sent to to deployment services device end;To The character string received is compared with the character string of generation for deployment services device end, if the two unanimously if to test host side open It puts and exempts from password login permission, to realize batch while carry out multiple servers Telnet, avoid being manually entered cumbersome, behaviour Make simply, practicability is stronger, reduces the error rate being manually entered, shortens the testing time, improves testing efficiency.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is the implementation flow chart of the method for Telnet bulk service device Linux system provided by the invention;
Fig. 2 is the system structure diagram of Telnet bulk service device Linux system provided by the invention.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for Clearly illustrate of the invention, technical solution, therefore be only used as example, and cannot be used as a limitation and limit protection model of the invention It encloses.
Fig. 1 is the implementation flow chart of the method for Telnet bulk service device Linux system provided by the invention, specific Include the following steps:
In step s101, in test host side, control operation key generates instruction, generates a pair of secret keys.
Wherein, it is that [- f'~/.ssh/id_rsa', exists ssh-keygen-t rsa [- P "] at this time that key, which generates instruction, .ssh the key-value pair id_rsa, id_rsa.pub of private key and public key can be generated under catalogue.
In step s 102, the public key batch duplicating in the pair of key of generation is waited for into deployment services device to each In end.
The batch duplicating of the public key instructs are as follows:
ssh-copy-id[-i indetify_file][user@host_ip]。
In step s 103, test host side sends connection request, the connection to each server end to be disposed Include a pre-generated test host side message file in request.
In step S104, deployment services device end is waited at each, receives and parses through the test host side message file, A random string is generated, and the random string is encrypted using the public key of duplication in place, it will be encrypted Character string is sent to the test host side.
In step s105, test host side is decrypted the character string received using private key is generated, and will Obtained character string is decrypted to be sent to described to deployment services device end.
In step s 106, compare to character string of the deployment services device end to the character string and generation that receive It is right, if the two unanimously if to the test host side opening exempt from password login permission.
It then disregards when the two is inconsistent, i.e., under the premise of no permission, cannot log in deployment services device.
Following step is also needed to be implemented before executing above-mentioned steps S101:
Test host side message file is generated in the test host side, the test host side message file includes IP letter Breath, username information and encrypted message.
In embodiments of the present invention, the public key batch duplicating in the pair of key by generation is being executed to each It is a when the step in deployment services device end, the method also includes following step:
Automatically enter the password for logging in each server end, concrete implementation code content are as follows:
In embodiments of the present invention, following step is also needed to be implemented before executing above-mentioned steps S101:
In the test host side, each is logged in by shh log in means and waits for deployment services device end, and judges that login is No success;
It is unsuccessful to deployment services device end installation shh log in means client logging in when determining to log in unsuccessful.
In this embodiment, ssh this as safety remote login tools, by the favor of users.SSH is The abbreviation of Secure Shell is formulated by the network group (Network Working Group) of IETF;SSH is to establish Security protocol on the basis of application layer.SSH be it is relatively reliable at present, aim at telnet session and other network services and safety be provided The agreement of property.The information leakage problem in remote management procedures can be effectively prevented using SSH agreement.SSH is initially UNIX system A program on system is rapidly spread to other operating platforms again later.SSH can make up the leakage in network when proper use of Hole.Ssh client is suitable for kinds of platform.Nearly all unix platform-include HP-UX, Linux, AIX, Solaris, Digital UNIX, Irix and other platforms, can all run SSH.
Therefore, need to input password login manually when logging in Linux OS for ssh long-range under small-/medium-sized Intranet environment, provide It is a kind of practical method, the LinuxOS for exempting from password ssh Telnet test lead may be implemented, preset test environment reaches When to tens machine servers, ssh exempt from it is close log in pushing tool as cooperation pssh, utilize the power of Pssh, will Ip is placed in some file and calls directly this document when using pssh, can reach automatically dispose, configuration, management Purpose.
Fig. 2 shows the structural block diagram of the system of Telnet bulk service device Linux system provided by the invention, in order to Convenient for explanation, part related to the embodiment of the present invention is only gived in figure.
The system of Telnet bulk service device Linux system includes:
Key production module 11, in test host side, control operation key to generate instruction, generates a pair of secret keys;
Public key batch duplicating module 12, for waiting the public key batch duplicating in the pair of key generated to each In deployment services device end;
Connection request sending module 13 is built in the test host side, for each server to be disposed End sends connection request, includes a pre-generated test host side message file in the connection request;
Random string generation module 14 receives and parses through the test master for waiting for deployment services device end at each Generator terminal message file generates a random string;
Character string encrypting module 15, for being encrypted using the public key of duplication in place to the random string;
Encrypted characters string sending module 16, for the encrypted random string of character string encrypting module to be sent to The test host side;
Character string deciphering module 17, for the character string received to be decrypted using generation private key;
Character string sending module 18 is decrypted, the character string for obtaining decryption is sent to described to deployment services device End;
Contrast judgement module 19, the character string for receiving are compared with the character string of generation;
Permission opens module 20, the word of the character string and generation for receiving when contrast judgement module judgement Symbol string is consistent then to exempt from password login permission to test host side opening.
Wherein, the system also includes:
Password automatically enters module 21, for automatically entering the password for logging in each server end;
Host side message file generation module 22 is tested, for generating test host client information text in the test host side Part, the test host side message file includes IP information, username information and encrypted message;
Test module 23 is logged in, for each being logged in by shh log in means and waiting disposing clothes in the test host side Business device end, and judge to log in and whether succeed;
Log in means installs module 24, is used for when determining to log in unsuccessful, unsuccessful to deployment services device logging in End installation shh log in means client.
Wherein, the function of above-mentioned modules is as recorded in above method embodiment, and details are not described herein.
In embodiments of the present invention, a pair of secret keys is generated in test host side;Public key batch duplicating is waited for into portion to each It affixes one's name in server end;It tests host side and sends connection request to each server end to be disposed;Each waits for deployment services Device end generates a random string, and encrypts, and encrypted character string is sent to test host side;It tests host side and uses life The character string received is decrypted at private key, and the character string that decryption obtains is sent to to deployment services device end;To The character string received is compared with the character string of generation for deployment services device end, if the two unanimously if to test host side open It puts and exempts from password login permission, to realize batch while carry out multiple servers Telnet, avoid being manually entered cumbersome, behaviour Make simply, practicability is stronger, reduces the error rate being manually entered, shortens the testing time, improves testing efficiency.
The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;Although referring to aforementioned each reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified, or equivalent substitution of some or all of the technical features;And These are modified or replaceed, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution, It should all cover within the scope of the claims and the description of the invention.

Claims (10)

1. a kind of method of Telnet bulk service device Linux system, which is characterized in that the method includes the following steps:
In test host side, control operation key generates instruction, generates a pair of secret keys;
Public key batch duplicating in the pair of key of generation is waited in deployment services device end to each;
The test host side sends connection request to each server end to be disposed, and includes one pre- in the connection request The test host side message file first generated;
Deployment services device end is waited at each, receives and parses through the test host side message file, generates a random string, And the random string is encrypted using the public key of duplication in place, encrypted character string is sent to the survey Try host side;
The character that the test host side is decrypted the character string received, and decryption is obtained using private key is generated String is sent to described to deployment services device end;
It is described that the character string received is compared with the character string of generation to deployment services device end, if the two unanimously if Password login permission is exempted to test host side opening.
2. the method for Telnet bulk service device Linux system according to claim 1, which is characterized in that described close It is ssh-keygen-t rsa [- P "] [- f'~/.ssh/id_rsa' that key, which generates instruction,.
3. the method for Telnet bulk service device Linux system according to claim 2, which is characterized in that executing Public key batch duplicating in the pair of key by generation to each when the step in deployment services device end, it is described Method further includes following step:
Automatically enter the password for logging in each server end.
4. the method for Telnet bulk service device Linux system according to claim 3, which is characterized in that the side Method further includes following step:
The test host side generate test host side message file, the test host side message file include IP information, Username information and encrypted message.
5. the method for Telnet bulk service device Linux system according to claim 4, which is characterized in that it is described Host side is tested, it further includes following step that control, which is run before key generates the step of instructing, generating a pair of secret keys:
In the test host side, each is logged in by shh log in means and waits for deployment services device end, and judge log in whether at Function;
It is unsuccessful to deployment services device end installation shh log in means client logging in when determining to log in unsuccessful.
6. a kind of system of Telnet bulk service device Linux system, which is characterized in that the system comprises:
Key production module, in test host side, control operation key to generate instruction, generates a pair of secret keys;
Public key batch duplicating module, for waiting the public key batch duplicating in the pair of key generated to each to dispose clothes It is engaged in device end;
Connection request sending module is built in the test host side, for sending to each server end to be disposed Connection request includes a pre-generated test host side message file in the connection request;
Random string generation module receives and parses through the test host side letter for waiting for deployment services device end at each File is ceased, a random string is generated;
Character string encrypting module, for being encrypted using the public key of duplication in place to the random string;
Encrypted characters string sending module, for the encrypted random string of character string encrypting module to be sent to the survey Try host side;
Character string deciphering module, for the character string received to be decrypted using generation private key;
Character string sending module is decrypted, the character string for obtaining decryption is sent to described to deployment services device end;
Contrast judgement module, the character string for receiving are compared with the character string of generation;
Permission opens module, the character string one of the character string and generation for receiving when contrast judgement module judgement It causes then to exempt from password login permission to test host side opening.
7. the system of Telnet bulk service device Linux system according to claim 1, which is characterized in that described close It is ssh-keygen-t rsa [- P "] [- f'~/.ssh/id_rsa' that key, which generates instruction,.
8. the system of Telnet bulk service device Linux system according to claim 7, which is characterized in that the system System further include:
Password automatically enters module, for automatically entering the password for logging in each server end.
9. the system of Telnet bulk service device Linux system according to claim 8, which is characterized in that the system System further include:
Host side message file generation module is tested, for generating test host side message file, institute in the test host side Stating test host side message file includes IP information, username information and encrypted message.
10. the system of Telnet bulk service device Linux system according to claim 9, which is characterized in that the system System further include:
Test module is logged in, for each being logged in by shh log in means and waiting for deployment services device in the test host side End, and judge to log in and whether succeed;
Log in means installation module, is used for when determining to log in unsuccessful, unsuccessful to the installation of deployment services device end logging in Shh log in means client.
CN201910332035.8A 2019-04-24 2019-04-24 A kind of method and system of Telnet bulk service device Linux system Pending CN110071922A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910332035.8A CN110071922A (en) 2019-04-24 2019-04-24 A kind of method and system of Telnet bulk service device Linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910332035.8A CN110071922A (en) 2019-04-24 2019-04-24 A kind of method and system of Telnet bulk service device Linux system

Publications (1)

Publication Number Publication Date
CN110071922A true CN110071922A (en) 2019-07-30

Family

ID=67368636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910332035.8A Pending CN110071922A (en) 2019-04-24 2019-04-24 A kind of method and system of Telnet bulk service device Linux system

Country Status (1)

Country Link
CN (1) CN110071922A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708158A (en) * 2019-11-06 2020-01-17 积成电子股份有限公司 Method for remotely maintaining charging pile based on SSH reverse tunnel technology
CN111049671A (en) * 2019-11-08 2020-04-21 合肥宜拾惠网络科技有限公司 System integration method and device
CN112637138A (en) * 2020-12-07 2021-04-09 吉林亿联银行股份有限公司 Method and related device for realizing multi-server secret-free login
CN114338633A (en) * 2021-12-27 2022-04-12 济南超级计算技术研究院 Method and system for remotely connecting Linux server
CN116996219A (en) * 2023-09-27 2023-11-03 天津卓朗昆仑云软件技术有限公司 Key interaction method, system and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130067229A1 (en) * 2011-09-09 2013-03-14 Stoneware, Inc. Method and apparatus for key sharing over remote desktop protocol
CN103701919A (en) * 2013-12-31 2014-04-02 曙光云计算技术有限公司 Remote login method and system
CN104954189A (en) * 2015-07-07 2015-09-30 上海斐讯数据通信技术有限公司 Automatic server cluster detecting method and system
US20160241558A1 (en) * 2015-02-13 2016-08-18 International Business Machines Corporation Automatic Key Management Using Enterprise User Identity Management
CN106131092A (en) * 2016-08-31 2016-11-16 天脉聚源(北京)传媒科技有限公司 A kind of method and device of telnet server
CN108737426A (en) * 2018-05-24 2018-11-02 郑州云海信息技术有限公司 One kind remotely exempting from close login method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130067229A1 (en) * 2011-09-09 2013-03-14 Stoneware, Inc. Method and apparatus for key sharing over remote desktop protocol
CN103701919A (en) * 2013-12-31 2014-04-02 曙光云计算技术有限公司 Remote login method and system
US20160241558A1 (en) * 2015-02-13 2016-08-18 International Business Machines Corporation Automatic Key Management Using Enterprise User Identity Management
CN104954189A (en) * 2015-07-07 2015-09-30 上海斐讯数据通信技术有限公司 Automatic server cluster detecting method and system
CN106131092A (en) * 2016-08-31 2016-11-16 天脉聚源(北京)传媒科技有限公司 A kind of method and device of telnet server
CN108737426A (en) * 2018-05-24 2018-11-02 郑州云海信息技术有限公司 One kind remotely exempting from close login method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈泽茂: "《信息系统安全》", 30 April 2014, 武汉大学出版社 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708158A (en) * 2019-11-06 2020-01-17 积成电子股份有限公司 Method for remotely maintaining charging pile based on SSH reverse tunnel technology
CN110708158B (en) * 2019-11-06 2022-06-10 积成电子股份有限公司 Method for remotely maintaining charging pile based on SSH reverse tunnel technology
CN111049671A (en) * 2019-11-08 2020-04-21 合肥宜拾惠网络科技有限公司 System integration method and device
CN112637138A (en) * 2020-12-07 2021-04-09 吉林亿联银行股份有限公司 Method and related device for realizing multi-server secret-free login
CN114338633A (en) * 2021-12-27 2022-04-12 济南超级计算技术研究院 Method and system for remotely connecting Linux server
CN114338633B (en) * 2021-12-27 2023-11-10 济南超级计算技术研究院 Method and system for remotely connecting Linux server
CN116996219A (en) * 2023-09-27 2023-11-03 天津卓朗昆仑云软件技术有限公司 Key interaction method, system and electronic equipment

Similar Documents

Publication Publication Date Title
CN110071922A (en) A kind of method and system of Telnet bulk service device Linux system
WO2022206349A1 (en) Information verification method, related apparatus, device, and storage medium
US11483143B2 (en) Enhanced monitoring and protection of enterprise data
CN106533807B (en) A kind of method and system of remote upgrade terminal device
CN101051904B (en) Method for landing by account number cipher for protecting network application sequence
CN107040513B (en) Trusted access authentication processing method, user terminal and server
EP1906584B1 (en) Method, system and device for game data transmission
CN105024819A (en) Multifactor authentication method and system based on mobile terminal
EP3222025B1 (en) Method for controlling access to a production system of a computer system not connected to an information system of said computer system
CN109670325B (en) Device and method for encrypting and decrypting configuration file
WO2005055514A1 (en) Methods, systems and computer program products for automatic rekeying in an authentication environment
CN112468571B (en) Intranet and extranet data synchronization method and device, electronic equipment and storage medium
CN104717224B (en) A kind of login method and device
CN108111497A (en) Video camera and server inter-authentication method and device
CN103095731A (en) REST security system based on signature mechanism
CN112436936B (en) Cloud storage method and system with quantum encryption function
CN105119894A (en) Communication system and communication method based on hardware safety module
CN104767766A (en) Web Service interface verification method, Web Service server and client side
CN109257387A (en) Method and apparatus for disconnection reconnecting
WO2010119427A2 (en) Method and system for deployment of software applications to mobile computing devices
CN104270346B (en) The methods, devices and systems of two-way authentication
CN107342963A (en) A kind of secure virtual machine control method, system and the network equipment
CN103856938A (en) Encryption and decryption method, system and device
CN108989302B (en) OPC proxy connection system and connection method based on secret key
EP3171543B1 (en) Local information acquisition method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190730