CN110471744A - Password amending method, device, equipment and computer readable storage medium - Google Patents

Password amending method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110471744A
CN110471744A CN201910772453.9A CN201910772453A CN110471744A CN 110471744 A CN110471744 A CN 110471744A CN 201910772453 A CN201910772453 A CN 201910772453A CN 110471744 A CN110471744 A CN 110471744A
Authority
CN
China
Prior art keywords
virtual machine
information
encrypted message
system disk
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910772453.9A
Other languages
Chinese (zh)
Other versions
CN110471744B (en
Inventor
闫晓峰
方晨曦
何育松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capitalonline Data Service Co Ltd
Original Assignee
Capitalonline Data Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Capitalonline Data Service Co Ltd filed Critical Capitalonline Data Service Co Ltd
Priority to CN201910772453.9A priority Critical patent/CN110471744B/en
Publication of CN110471744A publication Critical patent/CN110471744A/en
Application granted granted Critical
Publication of CN110471744B publication Critical patent/CN110471744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Abstract

The embodiment of the present invention proposes password amending method, device, equipment and computer readable storage medium, wherein method includes: to receive Modify password request, the information of first virtual machine of the Modify password request including password to be modified and modified encrypted message;According to the information of first virtual machine, determine that the first virtual machine and the second virtual machine, second virtual machine and first virtual machine are located in same cluster;By the system disk carry of first virtual machine in second virtual machine;The information of first virtual machine and the modified encrypted message are sent to the modification for the encrypted message that second virtual machine, the information of first virtual machine and the modified encrypted message are completed to store the system disk for second virtual machine.In the case that this method may not need the first virtual machine of starting, realizes and the password of the first virtual machine is modified, reduce the influence to other business procedure of the first virtual machine.

Description

Password amending method, device, equipment and computer readable storage medium
Technical field
The present invention relates to field of computer technology more particularly to a kind of password amending method, device, equipment and computer can Read storage medium.
Background technique
In cloud environment, user can usually forget Password, it is therefore desirable to reset password.But user can sometimes start The operation that Modify password is carried out after virtual machine executes the operation of Modify password since the business procedure of client at this time may start The business of user may be had an impact, be caused damages to user.
Summary of the invention
The embodiment of the present invention provides password amending method, device, equipment and computer readable storage medium, at least to solve The above technical problem in the prior art.
In a first aspect, the embodiment of the invention provides a kind of password amending methods, comprising:
Modify password request is received, the Modify password request includes the information of the first virtual machine of password to be modified and repairs Encrypted message after changing;
According to the information of first virtual machine, determine the first virtual machine and the second virtual machine, second virtual machine and First virtual machine is located in same cluster;
By the system disk carry of first virtual machine in second virtual machine;
The information of first virtual machine and the modified encrypted message are sent to second virtual machine, it is described The information of first virtual machine and the modified encrypted message are completed to store the system disk for second virtual machine Encrypted message modification.
In one embodiment, the Modify password request further include: the data center information of first virtual machine;
The information according to first virtual machine, before determining the first virtual machine and the second virtual machine, further includes: root According to the data center information of first virtual machine, the data center being connected to where first virtual machine;
The information according to first virtual machine, determines the first virtual machine and the second virtual machine, comprising: in the number According in center, according to the information of first virtual machine, first virtual machine and second virtual machine are determined.
In one embodiment, the information of first virtual machine includes: the name information of first virtual machine;
First virtual machine is determined according to the information of first virtual machine, comprising: according to first virtual machine Name information determines first virtual machine;
It includes: by the title of first virtual machine that the information of first virtual machine, which is sent to second virtual machine, Information is sent to second virtual machine.
In one embodiment, the information of first virtual machine includes: the cluster name where first virtual machine Claim;
Second virtual machine is determined according to the information of first virtual machine, comprising: according to the first virtual machine institute Cluster name, determine second virtual machine.
In one embodiment, cluster name phase of the title of second virtual machine where with first virtual machine Together.
In one embodiment, the system disk carry by first virtual machine is in second virtual machine Before, further includes:
In the state that first virtual machine is in shutdown, in the hardware device of first virtual machine, institute is determined State the system disk of the first virtual machine.
Second aspect, the embodiment of the invention provides a kind of password amending methods, comprising:
Receive the first virtual machine information and modified encrypted message;
According to the information of first virtual machine, in the disk of carry, the system disk of first virtual machine is determined;
According to the modified encrypted message, the message in cipher stored in the system disk of first virtual machine is modified Breath.
In one embodiment, described according to the modified encrypted message, modification first virtual machine is The encrypted message of system disk, comprising: the NameSpace for establishing the system disk of first virtual machine, in the NameSpace In, according to the modified encrypted message, modify the encrypted message of the system disk of first virtual machine.
The third aspect, the embodiment of the invention provides a kind of passwords to modify device, comprising:
Request receiving module, for receiving Modify password request, Modify password request includes the of password to be modified The information of one virtual machine and modified encrypted message;
Virtual machine determining module determines the first virtual machine and second virtually for the information according to first virtual machine Machine, second virtual machine and first virtual machine are located in same cluster;
Carry module, for by the system disk carry of first virtual machine in second virtual machine;
Information sending module, for the information of first virtual machine and the modified encrypted message to be sent to institute The second virtual machine, the information of first virtual machine and the modified encrypted message are stated for second virtual machine completion pair The modification of the encrypted message of the system disk storage.
In one embodiment, the Modify password request further include: the data center information of first virtual machine;
Described device further include:
Data center's link block is connected to described first for the data center information according to first virtual machine Data center where virtual machine;
The virtual machine determining module, for according to the information of first virtual machine, determining in the data center First virtual machine and second virtual machine.
In one embodiment, the virtual machine determining module is used for the name information according to first virtual machine, Determine first virtual machine;
The information sending module, for the name information of first virtual machine to be sent to second virtual machine.
In one embodiment, the information of first virtual machine includes: the cluster name where first virtual machine Claim;
The virtual machine determining module, for determining described second according to the cluster name where first virtual machine Virtual machine.
In one embodiment, further includes: the first system disk determining module, being used for will be described in the carry module The system disk carry of first virtual machine is before second virtual machine, in the state that first virtual machine is in shutdown, In the hardware device of first virtual machine, the system disk of first virtual machine is determined.
Fourth aspect, the embodiment of the invention provides a kind of passwords to modify device, comprising:
Receiving module, for receive the first virtual machine information and modified encrypted message;
Carry system disk determining module in the disk of carry, is determined for the information according to first virtual machine The system disk of first virtual machine;
Modified module, in the system disk for modifying first virtual machine according to the modified encrypted message The encrypted message of storage.
In one embodiment, the modified module, comprising:
NameSpace determines submodule, the NameSpace of the system disk for establishing first virtual machine;
Password modifies submodule, in the NameSpace, according to the modified encrypted message, described in modification The encrypted message of the system disk of first virtual machine.
5th aspect, the embodiment of the invention provides a kind of passwords to modify equipment, and the function of the password modification equipment can Corresponding software realization can also be executed by hardware by hardware realization.The hardware or software include one or more Module corresponding with above-mentioned function.
It is described to deposit including processor and memory in the structure of the password modification equipment in a possible design Reservoir supports the password modification equipment to execute password amending method provided by the embodiment of above-mentioned first aspect for storing Program, the processor is configured to for executing the program stored in the memory.The password modification equipment may be used also To include communication interface, it is used for and other equipment or communication.
6th aspect, the embodiment of the invention provides a kind of passwords to modify equipment, and the function of the password modification equipment can Corresponding software realization can also be executed by hardware by hardware realization.The hardware or software include one or more Module corresponding with above-mentioned function.
It is described to deposit including processor and memory in the structure of the password modification equipment in a possible design Reservoir supports the password modification equipment to execute password amending method provided by the embodiment of above-mentioned second aspect for storing Program, the processor is configured to for executing the program stored in the memory.The password modification equipment may be used also To include communication interface, it is used for and other equipment or communication.
7th aspect, the embodiment of the invention provides a kind of computer readable storage mediums, for storing password modification dress Set computer software instructions used comprising for executing program involved in password amending method in above-described embodiment.
A technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that by the first of password to be modified Second virtual machine of the system disk carry of virtual machine in same cluster, is realized by the second virtual machine in carry disk Encrypted message modification, the password of the first virtual machine is modified to realize, may not need the first virtual machine of starting, is reduced pair The influence of other business procedure of first virtual machine.
Above-mentioned general introduction is merely to illustrate that the purpose of book, it is not intended to be limited in any way.Except foregoing description Schematical aspect, except embodiment and feature, by reference to attached drawing and the following detailed description, the present invention is further Aspect, embodiment and feature, which will be, to be readily apparent that.
Detailed description of the invention
In the accompanying drawings, unless specified otherwise herein, otherwise indicate the same or similar through the identical appended drawing reference of multiple attached drawings Component or element.What these attached drawings were not necessarily to scale.It should be understood that these attached drawings depict only according to the present invention Disclosed some embodiments, and should not serve to limit the scope of the present invention.
Fig. 1 shows a kind of a kind of flow chart of embodiment of the password amending method provided according to embodiments of the present invention;
Fig. 2 shows a kind of processes of embodiment of another password amending method provided according to embodiments of the present invention Figure;
Fig. 3 shows a kind of a kind of structural frames of embodiment of password modification device provided according to embodiments of the present invention Figure;
Fig. 4 shows a kind of structural frames of embodiment of another password modification device provided according to embodiments of the present invention Figure;
Fig. 5 shows a kind of embodiment of the modified module 43 of the password modification device provided according to embodiments of the present invention Structural block diagram;
Fig. 6 shows a kind of structural block diagram of embodiment of the password modification equipment provided according to embodiments of the present invention.
Specific embodiment
Hereinafter, certain exemplary embodiments are simply just described.As one skilled in the art will recognize that Like that, without departing from the spirit or scope of the present invention, described embodiment can be modified by various different modes. Therefore, attached drawing and description are considered essentially illustrative rather than restrictive.
Fig. 1 shows a kind of flow chart of the password amending method provided according to embodiments of the present invention.Referring to Fig. 1, this method Include:
S11, Modify password request is received, Modify password request includes the information of the first virtual machine of password to be modified and repairs Encrypted message after changing;
S12, according to the information of the first virtual machine, determine the first virtual machine and the second virtual machine, the second virtual machine and first Virtual machine is located in same cluster;
S13, by the system disk carry of the first virtual machine in the second virtual machine;
S14, the information of the first virtual machine and modified encrypted message are sent to the second virtual machine, the first virtual machine The modification for the encrypted message that information and modified encrypted message are completed to store system disk for the second virtual machine.
This method passes through the second void by the system disk carry of the first virtual machine of password to be modified in same cluster Quasi- machine, the modification to the encrypted message in carry disk is realized by the second virtual machine, to realize to the first virtual machine Password modification may not need the first virtual machine of starting, reduce the influence to other business procedure of the first virtual machine.
It should be noted that the system disk of two virtual machines in same cluster is subordinate to different void in virtualization level Machine, but in physical layer, the bottom physical equipment resource that two systems disk uses is the same, so the two generates association.
In general, carry refers to the meter made on storage equipment (such as hard disk, CD-ROM or shared resource) by operating system The process that calculation machine file and catalogue are accessed for user by the file system of computer.In general, when calculating organ When machine, each carry storage once unloads experience, to ensure that the data of all queuings are written into, and guarantees that medium is above The integrality of part system structure.
Such as in (SuSE) Linux OS, carry (mount) is an order under Linux, it can mount subregion To under a file of Linux, to subregion and the catalogue be connected, as long as therefore accessing this file, phase When in the access subregion.Carry has been not limited solely to Linux at present, and carry can also be used in Windows system.
In one embodiment, the Modify password in step S11 requests the request inputted from user.Specifically, Before the first virtual machine is inactive, the password for receiving the first virtual machine of modified encrypted message and modification that user is inputted refers to It enables, generates Modify password request.
In one embodiment, the password of step S11 can be the setting up password of virtual machine, it is understood that be user The password of virtual machine is logged in, or is interpreted as password corresponding to the virtual machine account of user.
In one embodiment, the Modify password request in step S11 further include: the data center of the first virtual machine believes Breath.
Before step S12, further includes: according to the data center information of the first virtual machine, be connected to where the first virtual machine Data center.One data center may include multiple clusters.
Step S12, comprising: in the data center, according to the information of the first virtual machine, determine the first virtual machine and the second void Quasi- machine.
In one embodiment, the information of the first virtual machine of step S12 includes: the name information of the first virtual machine. The first virtual machine is determined according to the information of the first virtual machine in step S12, comprising: according to the name information of the first virtual machine, really Fixed first virtual machine.It includes: by the name of the first virtual machine that the information of the first virtual machine, which is sent to the second virtual machine, in step S14 Information is claimed to be sent to the second virtual machine.
In one embodiment, the information of the first virtual machine of step S12 includes: the cluster name where the first virtual machine Claim.The second virtual machine is determined according to the information of the first virtual machine in step S12, comprising: the cluster where the first virtual machine Title determines the second virtual machine.
In one embodiment, the title of the second virtual machine is identical as the cluster name where the first virtual machine.
In one embodiment, before step S13, further includes:
In the state that the first virtual machine is in shutdown, in the hardware device of the first virtual machine, the first virtual machine is determined System disk.In a kind of example, the hardware device in the first virtual machine is traversed, obtains the system disk of the first virtual machine. Above embodiment ensure that the modification of the password of the first virtual machine is avoided in the state that the first virtual machine is in shutdown Influence to other business procedure being currently running of the first virtual machine.
In one embodiment, step S13, comprising: determine the first configuration parameter of the second virtual machine, the first configuration ginseng Number resets the system disk of the second virtual machine for the second virtual machine, so that the system disk carry of the first virtual machine is in second On virtual machine.The first resetting configuration task is generated according to the first configuration parameter, issues the first resetting configuration task to second virtual In machine.
In above embodiment, the system disk of the system disk of the first virtual machine and the second virtual machine is in virtualization level It is subordinate to different empty machines, and in physical layer, since the first virtual machine and the second virtual machine are same cluster, two systems disk The bottom physical equipment resource used is the same, so the two generates association.That is, to system magnetic in the second virtual machine Disk carries out the operation such as configuration modification, equally will affect the system disk on the first virtual machine.Therefore above embodiment, passes through group The system disk that configuration parameter resets the second virtual machine is knitted, can be realized the system disk carry of the first virtual machine in the second void On quasi- machine.
It in one embodiment, can also include: connection data center, and in the data center really before step S14 Fixed second virtual machine, in the predefined paths of the second virtual machine, the second virtual machine of deposit completes the password stored to system disk Program involved in the modification of information.In other embodiments, the second virtual machine completes the message in cipher stored to system disk Program involved in the modification of breath may be to pre-deposit.
Wherein, the mode of connection data center and determining second virtual machine is referred to the embodiment of above-mentioned steps S12. After the information of the first virtual machine and modified encrypted message are sent to the second virtual machine by step S14, starting second is virtual Machine completes the modification of the encrypted message stored to system disk.
In one embodiment, in step S14, the second virtual machine can construct an isolation behaviour by NameSpace Make under environment, in the NameSpace, modifies to the encrypted message of the system disk of the first virtual machine.It can reach in this way To the purpose of static Modify password, and other processes will not be bothered.
In one embodiment, the second virtual machine can be realized by the corresponding system command of NameSpace one Under a isolated operation environment, modify to the encrypted message of the system disk of the first virtual machine.
It should be noted that NameSpace (namespace), also referred to as " name space ", " name space ".NameSpace is It can be used for operating system nucleus and carry out a kind of package isolation method to global system resource, so that in different NameSpaces Process possesses independent global system resource, and the system resource changed in a NameSpace only will affect in current namespace Process, the process in other names space is not influenced.It can make just to feel at all between different processes by NameSpace Feel the presence less than other side, can thus allow the process in NameSpace to generate illusion, it is believed that oneself to place oneself in the midst of an independence System in, to achieve the purpose that isolation.
Based on the technical characterstic of above-mentioned NameSpace, file system isolation mech isolation test is realized.Specifically, the present embodiment, first Password can be carried out to other virtual machines in same cluster by first providing the second virtual machine, and first password to be modified is empty The system disk of quasi- machine is mounted to the second virtual machine.In the second virtual machine, using system command, system disk be placed into every The password of system disk is modified from executing in operating environment.
In one embodiment, after step S14, further includes: whether the second virtual machine of detection is completed to the first virtual machine System disk encrypted message modification, after the completion of determination, release the first virtual machine system disk in the second virtual machine On carry, by the system disk carry of the first virtual machine return the first virtual machine.
A kind of example releases carry of the system disk of the first virtual machine on the second virtual machine, comprising: traversal second is empty The hardware device of quasi- machine, determines the system disk of the first virtual machine;Determine the second configuration parameter of the second virtual machine, the second configuration Parameter resets the system disk of the second virtual machine for the second virtual machine, to release the system disk of the first virtual machine in the second void Carry on quasi- machine;The second resetting configuration task is generated according to the second configuration parameter, issues the second resetting configuration task to second In virtual machine.
In one embodiment, step S14 can also include: and generate password modification to execute instruction, and be sent to second Virtual machine, password modification execute instruction the modification that the encrypted message stored to system disk is executed for triggering the second virtual machine.
In one embodiment, after step S14, in addition to releasing the system disk of the first virtual machine in the second virtual machine On carry, further includes: specified file data are deleted.Specified file data may include relevant to the system disk of carry File, and file relevant to the execution institute of modification of encrypted message for working as the secondary system disk to the first virtual machine.
The present embodiment can be adapted for various types of virtual machines of cloud environment, for example, kvm virtual machine and vmware it is virtual Machine etc..
Fig. 2 shows provide a kind of flow chart of password amending method according to embodiments of the present invention.Referring to fig. 2, the device Include:
S21, the information for receiving the first virtual machine and modified encrypted message;
S22, according to the information of the first virtual machine, in the disk of carry, determine the system disk of the first virtual machine;
S23, according to modified encrypted message, modify the encrypted message stored in the system disk of the first virtual machine.
Above-described embodiment can apply to the second virtual machine, the second virtual machine for the first virtual machine in the cluster one empty Quasi- machine.
In one embodiment, in step S21, the information for receiving the first virtual machine includes the title letter of the first virtual machine It ceases, in step S22, according to the name information of the first virtual machine, in the disk of carry, determines the system magnetic of the first virtual machine Disk.
In one embodiment, step S22 includes: and ought receive password modification to execute instruction, according to the first virtual machine Information determine the system disk of the first virtual machine in the disk of carry.
It in one embodiment, include: the system interface for scanning the second virtual machine in step S22, to search carry Disk;In the disk of carry, according to the name information of the first virtual machine, the system disk of the first virtual machine is determined.
In one embodiment, step S23, comprising: the NameSpace for establishing the system disk of the first virtual machine is being ordered In the name space, according to modified encrypted message, the encrypted message of the system disk of the first virtual machine is modified.After step S23, Further include: system disk is removed into NameSpace.The detailed content of NameSpace is referred to corresponding content in an embodiment, Details are not described herein again.
Fig. 3 shows a kind of structural block diagram of password modification device provided according to embodiments of the present invention.Referring to Fig. 3, the dress It sets and includes:
Request receiving module 31, for receiving Modify password request, Modify password request includes the first of password to be modified The information of virtual machine and modified encrypted message;
Virtual machine determining module 32 determines the first virtual machine and the second virtual machine for the information according to the first virtual machine, Second virtual machine and the first virtual machine are located in same cluster;
Carry module 33, for by the system disk carry of the first virtual machine in the second virtual machine;
Information sending module 34, it is virtual for the information of the first virtual machine and modified encrypted message to be sent to second Machine, the information of the first virtual machine and modified encrypted message complete the encrypted message stored to system disk for the second virtual machine Modification.
In one embodiment, Modify password is requested further include: the data center information of the first virtual machine.
Device further include: data center's link block is connected to for the data center information according to the first virtual machine Data center where one virtual machine.
Virtual machine determining module 32, in the data center, according to the information of the first virtual machine, determining the first virtual machine And second virtual machine.
In one embodiment, virtual machine determining module 32 is used for according to the name information of the first virtual machine, determines the One virtual machine.Information sending module 34, for the name information of the first virtual machine to be sent to the second virtual machine.
In one embodiment, the information of the first virtual machine includes: the cluster name where the first virtual machine.Virtual machine Determining module 32, for determining the second virtual machine according to the cluster name where the first virtual machine.
In one embodiment, further includes: the first system disk determining module, for virtual by first in carry module The system disk carry of machine is before the second virtual machine, in the state that the first virtual machine is in shutdown, in the hard of the first virtual machine In part equipment, the system disk of the first virtual machine is determined.
In one embodiment, further includes: carry relation broken module, for detecting whether the second virtual machine is completed pair The modification of the encrypted message of the system disk of first virtual machine;After the completion of determination, the system disk for releasing the first virtual machine exists Carry on second virtual machine;The system disk carry of first virtual machine is returned into the first virtual machine.
Carry relation broken module is also used in the carry for releasing the system disk of the first virtual machine on the second virtual machine While, specified file data are deleted.Specified file data may include file relevant to the system disk of carry, and File relevant to the execution institute of modification of encrypted message for working as the secondary system disk to the first virtual machine.
Fig. 4 shows a kind of structural block diagram of password modification device provided according to embodiments of the present invention.Referring to fig. 4, the dress It sets and includes:
Receiving module 41, for receive the first virtual machine information and modified encrypted message;
Carry system disk determining module 42 in the disk of carry, determines for the information according to the first virtual machine The system disk of one virtual machine;
Modified module 43 stores in the system disk of the first virtual machine for modifying according to modified encrypted message Encrypted message.
In one embodiment, referring to Fig. 5, modified module 43, comprising:
NameSpace determines submodule 51, the NameSpace of the system disk for establishing the first virtual machine;
Password modifies submodule 52, for according to modified encrypted message, modifying the first virtual machine in NameSpace System disk encrypted message.
In one embodiment, the device further include:
NameSpace removes module, for system disk to be removed NameSpace.
The function of each module in the device of that embodiment of the invention may refer to the corresponding description in the above method, herein no longer It repeats.
Fig. 6 shows the structural block diagram of password modification equipment according to an embodiment of the present invention.As shown in fig. 6, the password is modified Equipment includes: memory 610 and processor 620, and the computer journey that can be run on processor 620 is stored in memory 610 Sequence.Processor 620 realizes the password amending method in above-described embodiment when executing computer program.Memory 610 and processor 620 quantity can be one or more.
The password modifies equipment further include:
Communication interface 630 carries out data interaction for being communicated with external device.
Memory 610 may include high speed RAM memory, it is also possible to further include nonvolatile memory (non- Volatile memory), a for example, at least magnetic disk storage.
If memory 610, processor 620 and the independent realization of communication interface 630, memory 610,620 and of processor Communication interface 630 can be connected with each other by bus and complete mutual communication.Bus can be industry standard architecture (ISA, Industry Standard Architecture) bus, external equipment interconnection (PCI, Peripheral Component Interconnect) bus or extended industry-standard architecture (EISA, Extended Industry Standard Architecture) bus etc..Bus can be divided into address bus, data/address bus, control bus etc..For convenient for It indicates, is only indicated with a thick line in Fig. 6, it is not intended that an only bus or a type of bus.
Optionally, in specific implementation, if memory 610, processor 620 and communication interface 630 are integrated in one piece of core On piece, then memory 610, processor 620 and communication interface 630 can complete mutual communication by internal interface.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored with computer program, the program quilt Processor realizes method any in above-described embodiment when executing.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.Moreover, particular features, structures, materials, or characteristics described It may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, without conflicting with each other, this The technical staff in field can be by the spy of different embodiments or examples described in this specification and different embodiments or examples Sign is combined.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic." first " is defined as a result, the feature of " second " can be expressed or hidden It include at least one this feature containing ground.In the description of the present invention, the meaning of " plurality " is two or more, unless otherwise Clear specific restriction.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable read-only memory (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable Jie Matter, because can then be edited, be interpreted or when necessary with other for example by carrying out optical scanner to paper or other media Suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In readable storage medium storing program for executing.The storage medium can be read-only memory, disk or CD etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in its various change or replacement, These should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the guarantor of the claim It protects subject to range.

Claims (18)

1. a kind of password amending method characterized by comprising
Modify password request is received, after the Modify password requests the information and modification of the first virtual machine including password to be modified Encrypted message;
According to the information of first virtual machine, the first virtual machine and the second virtual machine are determined, second virtual machine and described First virtual machine is located in same cluster;
By the system disk carry of first virtual machine in second virtual machine;
The information of first virtual machine and the modified encrypted message are sent to second virtual machine, described first The information of virtual machine and the modified encrypted message store the system disk for second virtual machine completion close The modification of code information.
2. the method according to claim 1, wherein the Modify password is requested further include: described first is virtual The data center information of machine;
The information according to first virtual machine, before determining the first virtual machine and the second virtual machine, further includes: according to institute The data center information for stating the first virtual machine, the data center being connected to where first virtual machine;
The information according to first virtual machine, determines the first virtual machine and the second virtual machine, comprising: in the data At heart, according to the information of first virtual machine, first virtual machine and second virtual machine are determined.
3. method according to claim 1 or 2, which is characterized in that the information of first virtual machine includes: described first The name information of virtual machine;
First virtual machine is determined according to the information of first virtual machine, comprising: according to the title of first virtual machine Information determines first virtual machine;
It includes: by the name information of first virtual machine that the information of first virtual machine, which is sent to second virtual machine, It is sent to second virtual machine.
4. method according to claim 1 or 2, which is characterized in that the information of first virtual machine includes: described first Cluster name where virtual machine;
Second virtual machine is determined according to the information of first virtual machine, comprising: according to where first virtual machine Cluster name determines second virtual machine.
5. according to the method described in claim 4, it is characterized in that, the title of second virtual machine and first virtual machine The cluster name at place is identical.
6. the method according to claim 1, wherein the system disk carry by first virtual machine in Before second virtual machine, further includes:
In the state that first virtual machine is in shutdown, in the hardware device of first virtual machine, described the is determined The system disk of one virtual machine.
7. a kind of password amending method characterized by comprising
Receive the first virtual machine information and modified encrypted message;
According to the information of first virtual machine, in the disk of carry, the system disk of first virtual machine is determined;
According to the modified encrypted message, the encrypted message stored in the system disk of first virtual machine is modified.
8. the method according to the description of claim 7 is characterized in that described according to the modified encrypted message, modification institute State the encrypted message of the system disk of the first virtual machine, comprising: the NameSpace of the system disk of first virtual machine is established, In the NameSpace, according to the modified encrypted message, the password of the system disk of first virtual machine is modified Information.
9. a kind of password modifies device characterized by comprising
Request receiving module, for receiving Modify password request, the Modify password request includes the first void of password to be modified The information of quasi- machine and modified encrypted message;
Virtual machine determining module determines the first virtual machine and the second virtual machine, institute for the information according to first virtual machine It states the second virtual machine and first virtual machine is located in same cluster;
Carry module, for by the system disk carry of first virtual machine in second virtual machine;
Information sending module, for the information of first virtual machine and the modified encrypted message to be sent to described Two virtual machines, the information of first virtual machine and the modified encrypted message are completed for second virtual machine to described The modification of the encrypted message of system disk storage.
10. device according to claim 9, which is characterized in that the Modify password request further include: described first is virtual The data center information of machine;
Described device further include: data center's link block, for the data center information according to first virtual machine, connection Data center to where first virtual machine;
The virtual machine determining module, in the data center, according to the information of first virtual machine, determine described in First virtual machine and second virtual machine.
11. device according to claim 9 or 10, which is characterized in that the virtual machine determining module is used for according to The name information of first virtual machine determines first virtual machine;
The information sending module, for the name information of first virtual machine to be sent to second virtual machine.
12. device according to claim 9 or 10, which is characterized in that the information of first virtual machine includes: described Cluster name where one virtual machine;
The virtual machine determining module, for determining that described second is virtual according to the cluster name where first virtual machine Machine.
13. device according to claim 9, which is characterized in that further include: the first system disk determining module is used for The carry module by the system disk carry of first virtual machine before second virtual machine, in first virtual machine In the state of shutdown, in the hardware device of first virtual machine, the system disk of first virtual machine is determined.
14. a kind of password modifies device characterized by comprising
Receiving module, for receive the first virtual machine information and modified encrypted message;
Carry system disk determining module, for the information according to first virtual machine, in the disk of carry, described in determination The system disk of first virtual machine;
Modified module, for modifying and being stored in the system disk of first virtual machine according to the modified encrypted message Encrypted message.
15. device according to claim 14, which is characterized in that the modified module, comprising:
NameSpace determines submodule, the NameSpace of the system disk for establishing first virtual machine;
Password modifies submodule, for according to the modified encrypted message, modifying described first in the NameSpace The encrypted message of the system disk of virtual machine.
16. a kind of password modifies equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors Realize such as method as claimed in any one of claims 1 to 6.
17. a kind of password modifies equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors Realize the method as described in any in claim 7-8.
18. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the program is held by processor Such as method described in any one of claims 1-8 is realized when row.
CN201910772453.9A 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium Active CN110471744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910772453.9A CN110471744B (en) 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910772453.9A CN110471744B (en) 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110471744A true CN110471744A (en) 2019-11-19
CN110471744B CN110471744B (en) 2021-11-30

Family

ID=68513250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910772453.9A Active CN110471744B (en) 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110471744B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110968852A (en) * 2019-12-20 2020-04-07 深信服科技股份有限公司 Virtual machine password management method, system, equipment and computer storage medium
CN111090851A (en) * 2019-12-20 2020-05-01 深信服科技股份有限公司 Method and device for resetting virtual machine authentication information, host machine and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
CN105389495A (en) * 2015-11-03 2016-03-09 国云科技股份有限公司 Method for externally resetting password of windows virtual machine
CN105468433A (en) * 2015-11-19 2016-04-06 北京北信源软件股份有限公司 Method and system for acquiring disc data of virtual machines
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine
CN107291525A (en) * 2016-04-01 2017-10-24 华为技术有限公司 A kind of method, host and system for disposing virtual machine
CN109002344A (en) * 2018-06-12 2018-12-14 广东睿江云计算股份有限公司 A kind of method of cloud management platform resetting KVM virtual machine password

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
CN105389495A (en) * 2015-11-03 2016-03-09 国云科技股份有限公司 Method for externally resetting password of windows virtual machine
CN105468433A (en) * 2015-11-19 2016-04-06 北京北信源软件股份有限公司 Method and system for acquiring disc data of virtual machines
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine
CN107291525A (en) * 2016-04-01 2017-10-24 华为技术有限公司 A kind of method, host and system for disposing virtual machine
CN109002344A (en) * 2018-06-12 2018-12-14 广东睿江云计算股份有限公司 A kind of method of cloud management platform resetting KVM virtual machine password

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110968852A (en) * 2019-12-20 2020-04-07 深信服科技股份有限公司 Virtual machine password management method, system, equipment and computer storage medium
CN111090851A (en) * 2019-12-20 2020-05-01 深信服科技股份有限公司 Method and device for resetting virtual machine authentication information, host machine and storage medium

Also Published As

Publication number Publication date
CN110471744B (en) 2021-11-30

Similar Documents

Publication Publication Date Title
US20220078078A1 (en) Fpga-enabled compute instances
CN104598257B (en) The method and apparatus of remote application operation
CN109634718B (en) Method and system for creating mirror image by cloud platform
US20170034697A1 (en) Pen Needle Outer Cover Concepts
EP3374857B1 (en) Dashboard as remote computing services
US10938573B2 (en) Distributed transaction processing
CN104731635B (en) A kind of virtual machine access control method and virtual machine access control system
US10963984B2 (en) Interaction monitoring for virtualized graphics processing
US11922185B2 (en) Deployment and isolation of plugins in a virtualized computing environment
KR20180038515A (en) Graphical processing virtualization on the provider network
US11061746B2 (en) Enqueue-related processing based on timing out of an attempted enqueue
CN110471744A (en) Password amending method, device, equipment and computer readable storage medium
CN113010265A (en) Pod scheduling method, scheduler, memory plug-in and system
US10970111B2 (en) Migrating virtual machines
CN117321581A (en) Techniques for deterministic distributed caching of accelerated SQL queries
US10397130B2 (en) Multi-cloud resource reservations
US10565202B2 (en) Data write/import performance in a database through distributed memory
TWI806603B (en) Computer-implemented method, computer program product and computer system for accessing topological mapping of cores
US11915026B1 (en) Software containers with user-selectable security levels
WO2017100065A1 (en) Discovering resource availability across regions
CN105808318B (en) Information processing method and electronic equipment
CN110383255A (en) It manages and the client partitions of physical equipment is accessed
US11966754B2 (en) Cluster bootstrapping for distributed computing systems
US9367373B2 (en) Automatic configuration consistency check
CN107944297B (en) Control method and device for accessing file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant