CN110471744A - Password amending method, device, equipment and computer readable storage medium - Google Patents
Password amending method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110471744A CN110471744A CN201910772453.9A CN201910772453A CN110471744A CN 110471744 A CN110471744 A CN 110471744A CN 201910772453 A CN201910772453 A CN 201910772453A CN 110471744 A CN110471744 A CN 110471744A
- Authority
- CN
- China
- Prior art keywords
- virtual machine
- information
- encrypted message
- system disk
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Abstract
The embodiment of the present invention proposes password amending method, device, equipment and computer readable storage medium, wherein method includes: to receive Modify password request, the information of first virtual machine of the Modify password request including password to be modified and modified encrypted message;According to the information of first virtual machine, determine that the first virtual machine and the second virtual machine, second virtual machine and first virtual machine are located in same cluster;By the system disk carry of first virtual machine in second virtual machine;The information of first virtual machine and the modified encrypted message are sent to the modification for the encrypted message that second virtual machine, the information of first virtual machine and the modified encrypted message are completed to store the system disk for second virtual machine.In the case that this method may not need the first virtual machine of starting, realizes and the password of the first virtual machine is modified, reduce the influence to other business procedure of the first virtual machine.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of password amending method, device, equipment and computer can
Read storage medium.
Background technique
In cloud environment, user can usually forget Password, it is therefore desirable to reset password.But user can sometimes start
The operation that Modify password is carried out after virtual machine executes the operation of Modify password since the business procedure of client at this time may start
The business of user may be had an impact, be caused damages to user.
Summary of the invention
The embodiment of the present invention provides password amending method, device, equipment and computer readable storage medium, at least to solve
The above technical problem in the prior art.
In a first aspect, the embodiment of the invention provides a kind of password amending methods, comprising:
Modify password request is received, the Modify password request includes the information of the first virtual machine of password to be modified and repairs
Encrypted message after changing;
According to the information of first virtual machine, determine the first virtual machine and the second virtual machine, second virtual machine and
First virtual machine is located in same cluster;
By the system disk carry of first virtual machine in second virtual machine;
The information of first virtual machine and the modified encrypted message are sent to second virtual machine, it is described
The information of first virtual machine and the modified encrypted message are completed to store the system disk for second virtual machine
Encrypted message modification.
In one embodiment, the Modify password request further include: the data center information of first virtual machine;
The information according to first virtual machine, before determining the first virtual machine and the second virtual machine, further includes: root
According to the data center information of first virtual machine, the data center being connected to where first virtual machine;
The information according to first virtual machine, determines the first virtual machine and the second virtual machine, comprising: in the number
According in center, according to the information of first virtual machine, first virtual machine and second virtual machine are determined.
In one embodiment, the information of first virtual machine includes: the name information of first virtual machine;
First virtual machine is determined according to the information of first virtual machine, comprising: according to first virtual machine
Name information determines first virtual machine;
It includes: by the title of first virtual machine that the information of first virtual machine, which is sent to second virtual machine,
Information is sent to second virtual machine.
In one embodiment, the information of first virtual machine includes: the cluster name where first virtual machine
Claim;
Second virtual machine is determined according to the information of first virtual machine, comprising: according to the first virtual machine institute
Cluster name, determine second virtual machine.
In one embodiment, cluster name phase of the title of second virtual machine where with first virtual machine
Together.
In one embodiment, the system disk carry by first virtual machine is in second virtual machine
Before, further includes:
In the state that first virtual machine is in shutdown, in the hardware device of first virtual machine, institute is determined
State the system disk of the first virtual machine.
Second aspect, the embodiment of the invention provides a kind of password amending methods, comprising:
Receive the first virtual machine information and modified encrypted message;
According to the information of first virtual machine, in the disk of carry, the system disk of first virtual machine is determined;
According to the modified encrypted message, the message in cipher stored in the system disk of first virtual machine is modified
Breath.
In one embodiment, described according to the modified encrypted message, modification first virtual machine is
The encrypted message of system disk, comprising: the NameSpace for establishing the system disk of first virtual machine, in the NameSpace
In, according to the modified encrypted message, modify the encrypted message of the system disk of first virtual machine.
The third aspect, the embodiment of the invention provides a kind of passwords to modify device, comprising:
Request receiving module, for receiving Modify password request, Modify password request includes the of password to be modified
The information of one virtual machine and modified encrypted message;
Virtual machine determining module determines the first virtual machine and second virtually for the information according to first virtual machine
Machine, second virtual machine and first virtual machine are located in same cluster;
Carry module, for by the system disk carry of first virtual machine in second virtual machine;
Information sending module, for the information of first virtual machine and the modified encrypted message to be sent to institute
The second virtual machine, the information of first virtual machine and the modified encrypted message are stated for second virtual machine completion pair
The modification of the encrypted message of the system disk storage.
In one embodiment, the Modify password request further include: the data center information of first virtual machine;
Described device further include:
Data center's link block is connected to described first for the data center information according to first virtual machine
Data center where virtual machine;
The virtual machine determining module, for according to the information of first virtual machine, determining in the data center
First virtual machine and second virtual machine.
In one embodiment, the virtual machine determining module is used for the name information according to first virtual machine,
Determine first virtual machine;
The information sending module, for the name information of first virtual machine to be sent to second virtual machine.
In one embodiment, the information of first virtual machine includes: the cluster name where first virtual machine
Claim;
The virtual machine determining module, for determining described second according to the cluster name where first virtual machine
Virtual machine.
In one embodiment, further includes: the first system disk determining module, being used for will be described in the carry module
The system disk carry of first virtual machine is before second virtual machine, in the state that first virtual machine is in shutdown,
In the hardware device of first virtual machine, the system disk of first virtual machine is determined.
Fourth aspect, the embodiment of the invention provides a kind of passwords to modify device, comprising:
Receiving module, for receive the first virtual machine information and modified encrypted message;
Carry system disk determining module in the disk of carry, is determined for the information according to first virtual machine
The system disk of first virtual machine;
Modified module, in the system disk for modifying first virtual machine according to the modified encrypted message
The encrypted message of storage.
In one embodiment, the modified module, comprising:
NameSpace determines submodule, the NameSpace of the system disk for establishing first virtual machine;
Password modifies submodule, in the NameSpace, according to the modified encrypted message, described in modification
The encrypted message of the system disk of first virtual machine.
5th aspect, the embodiment of the invention provides a kind of passwords to modify equipment, and the function of the password modification equipment can
Corresponding software realization can also be executed by hardware by hardware realization.The hardware or software include one or more
Module corresponding with above-mentioned function.
It is described to deposit including processor and memory in the structure of the password modification equipment in a possible design
Reservoir supports the password modification equipment to execute password amending method provided by the embodiment of above-mentioned first aspect for storing
Program, the processor is configured to for executing the program stored in the memory.The password modification equipment may be used also
To include communication interface, it is used for and other equipment or communication.
6th aspect, the embodiment of the invention provides a kind of passwords to modify equipment, and the function of the password modification equipment can
Corresponding software realization can also be executed by hardware by hardware realization.The hardware or software include one or more
Module corresponding with above-mentioned function.
It is described to deposit including processor and memory in the structure of the password modification equipment in a possible design
Reservoir supports the password modification equipment to execute password amending method provided by the embodiment of above-mentioned second aspect for storing
Program, the processor is configured to for executing the program stored in the memory.The password modification equipment may be used also
To include communication interface, it is used for and other equipment or communication.
7th aspect, the embodiment of the invention provides a kind of computer readable storage mediums, for storing password modification dress
Set computer software instructions used comprising for executing program involved in password amending method in above-described embodiment.
A technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that by the first of password to be modified
Second virtual machine of the system disk carry of virtual machine in same cluster, is realized by the second virtual machine in carry disk
Encrypted message modification, the password of the first virtual machine is modified to realize, may not need the first virtual machine of starting, is reduced pair
The influence of other business procedure of first virtual machine.
Above-mentioned general introduction is merely to illustrate that the purpose of book, it is not intended to be limited in any way.Except foregoing description
Schematical aspect, except embodiment and feature, by reference to attached drawing and the following detailed description, the present invention is further
Aspect, embodiment and feature, which will be, to be readily apparent that.
Detailed description of the invention
In the accompanying drawings, unless specified otherwise herein, otherwise indicate the same or similar through the identical appended drawing reference of multiple attached drawings
Component or element.What these attached drawings were not necessarily to scale.It should be understood that these attached drawings depict only according to the present invention
Disclosed some embodiments, and should not serve to limit the scope of the present invention.
Fig. 1 shows a kind of a kind of flow chart of embodiment of the password amending method provided according to embodiments of the present invention;
Fig. 2 shows a kind of processes of embodiment of another password amending method provided according to embodiments of the present invention
Figure;
Fig. 3 shows a kind of a kind of structural frames of embodiment of password modification device provided according to embodiments of the present invention
Figure;
Fig. 4 shows a kind of structural frames of embodiment of another password modification device provided according to embodiments of the present invention
Figure;
Fig. 5 shows a kind of embodiment of the modified module 43 of the password modification device provided according to embodiments of the present invention
Structural block diagram;
Fig. 6 shows a kind of structural block diagram of embodiment of the password modification equipment provided according to embodiments of the present invention.
Specific embodiment
Hereinafter, certain exemplary embodiments are simply just described.As one skilled in the art will recognize that
Like that, without departing from the spirit or scope of the present invention, described embodiment can be modified by various different modes.
Therefore, attached drawing and description are considered essentially illustrative rather than restrictive.
Fig. 1 shows a kind of flow chart of the password amending method provided according to embodiments of the present invention.Referring to Fig. 1, this method
Include:
S11, Modify password request is received, Modify password request includes the information of the first virtual machine of password to be modified and repairs
Encrypted message after changing;
S12, according to the information of the first virtual machine, determine the first virtual machine and the second virtual machine, the second virtual machine and first
Virtual machine is located in same cluster;
S13, by the system disk carry of the first virtual machine in the second virtual machine;
S14, the information of the first virtual machine and modified encrypted message are sent to the second virtual machine, the first virtual machine
The modification for the encrypted message that information and modified encrypted message are completed to store system disk for the second virtual machine.
This method passes through the second void by the system disk carry of the first virtual machine of password to be modified in same cluster
Quasi- machine, the modification to the encrypted message in carry disk is realized by the second virtual machine, to realize to the first virtual machine
Password modification may not need the first virtual machine of starting, reduce the influence to other business procedure of the first virtual machine.
It should be noted that the system disk of two virtual machines in same cluster is subordinate to different void in virtualization level
Machine, but in physical layer, the bottom physical equipment resource that two systems disk uses is the same, so the two generates association.
In general, carry refers to the meter made on storage equipment (such as hard disk, CD-ROM or shared resource) by operating system
The process that calculation machine file and catalogue are accessed for user by the file system of computer.In general, when calculating organ
When machine, each carry storage once unloads experience, to ensure that the data of all queuings are written into, and guarantees that medium is above
The integrality of part system structure.
Such as in (SuSE) Linux OS, carry (mount) is an order under Linux, it can mount subregion
To under a file of Linux, to subregion and the catalogue be connected, as long as therefore accessing this file, phase
When in the access subregion.Carry has been not limited solely to Linux at present, and carry can also be used in Windows system.
In one embodiment, the Modify password in step S11 requests the request inputted from user.Specifically,
Before the first virtual machine is inactive, the password for receiving the first virtual machine of modified encrypted message and modification that user is inputted refers to
It enables, generates Modify password request.
In one embodiment, the password of step S11 can be the setting up password of virtual machine, it is understood that be user
The password of virtual machine is logged in, or is interpreted as password corresponding to the virtual machine account of user.
In one embodiment, the Modify password request in step S11 further include: the data center of the first virtual machine believes
Breath.
Before step S12, further includes: according to the data center information of the first virtual machine, be connected to where the first virtual machine
Data center.One data center may include multiple clusters.
Step S12, comprising: in the data center, according to the information of the first virtual machine, determine the first virtual machine and the second void
Quasi- machine.
In one embodiment, the information of the first virtual machine of step S12 includes: the name information of the first virtual machine.
The first virtual machine is determined according to the information of the first virtual machine in step S12, comprising: according to the name information of the first virtual machine, really
Fixed first virtual machine.It includes: by the name of the first virtual machine that the information of the first virtual machine, which is sent to the second virtual machine, in step S14
Information is claimed to be sent to the second virtual machine.
In one embodiment, the information of the first virtual machine of step S12 includes: the cluster name where the first virtual machine
Claim.The second virtual machine is determined according to the information of the first virtual machine in step S12, comprising: the cluster where the first virtual machine
Title determines the second virtual machine.
In one embodiment, the title of the second virtual machine is identical as the cluster name where the first virtual machine.
In one embodiment, before step S13, further includes:
In the state that the first virtual machine is in shutdown, in the hardware device of the first virtual machine, the first virtual machine is determined
System disk.In a kind of example, the hardware device in the first virtual machine is traversed, obtains the system disk of the first virtual machine.
Above embodiment ensure that the modification of the password of the first virtual machine is avoided in the state that the first virtual machine is in shutdown
Influence to other business procedure being currently running of the first virtual machine.
In one embodiment, step S13, comprising: determine the first configuration parameter of the second virtual machine, the first configuration ginseng
Number resets the system disk of the second virtual machine for the second virtual machine, so that the system disk carry of the first virtual machine is in second
On virtual machine.The first resetting configuration task is generated according to the first configuration parameter, issues the first resetting configuration task to second virtual
In machine.
In above embodiment, the system disk of the system disk of the first virtual machine and the second virtual machine is in virtualization level
It is subordinate to different empty machines, and in physical layer, since the first virtual machine and the second virtual machine are same cluster, two systems disk
The bottom physical equipment resource used is the same, so the two generates association.That is, to system magnetic in the second virtual machine
Disk carries out the operation such as configuration modification, equally will affect the system disk on the first virtual machine.Therefore above embodiment, passes through group
The system disk that configuration parameter resets the second virtual machine is knitted, can be realized the system disk carry of the first virtual machine in the second void
On quasi- machine.
It in one embodiment, can also include: connection data center, and in the data center really before step S14
Fixed second virtual machine, in the predefined paths of the second virtual machine, the second virtual machine of deposit completes the password stored to system disk
Program involved in the modification of information.In other embodiments, the second virtual machine completes the message in cipher stored to system disk
Program involved in the modification of breath may be to pre-deposit.
Wherein, the mode of connection data center and determining second virtual machine is referred to the embodiment of above-mentioned steps S12.
After the information of the first virtual machine and modified encrypted message are sent to the second virtual machine by step S14, starting second is virtual
Machine completes the modification of the encrypted message stored to system disk.
In one embodiment, in step S14, the second virtual machine can construct an isolation behaviour by NameSpace
Make under environment, in the NameSpace, modifies to the encrypted message of the system disk of the first virtual machine.It can reach in this way
To the purpose of static Modify password, and other processes will not be bothered.
In one embodiment, the second virtual machine can be realized by the corresponding system command of NameSpace one
Under a isolated operation environment, modify to the encrypted message of the system disk of the first virtual machine.
It should be noted that NameSpace (namespace), also referred to as " name space ", " name space ".NameSpace is
It can be used for operating system nucleus and carry out a kind of package isolation method to global system resource, so that in different NameSpaces
Process possesses independent global system resource, and the system resource changed in a NameSpace only will affect in current namespace
Process, the process in other names space is not influenced.It can make just to feel at all between different processes by NameSpace
Feel the presence less than other side, can thus allow the process in NameSpace to generate illusion, it is believed that oneself to place oneself in the midst of an independence
System in, to achieve the purpose that isolation.
Based on the technical characterstic of above-mentioned NameSpace, file system isolation mech isolation test is realized.Specifically, the present embodiment, first
Password can be carried out to other virtual machines in same cluster by first providing the second virtual machine, and first password to be modified is empty
The system disk of quasi- machine is mounted to the second virtual machine.In the second virtual machine, using system command, system disk be placed into every
The password of system disk is modified from executing in operating environment.
In one embodiment, after step S14, further includes: whether the second virtual machine of detection is completed to the first virtual machine
System disk encrypted message modification, after the completion of determination, release the first virtual machine system disk in the second virtual machine
On carry, by the system disk carry of the first virtual machine return the first virtual machine.
A kind of example releases carry of the system disk of the first virtual machine on the second virtual machine, comprising: traversal second is empty
The hardware device of quasi- machine, determines the system disk of the first virtual machine;Determine the second configuration parameter of the second virtual machine, the second configuration
Parameter resets the system disk of the second virtual machine for the second virtual machine, to release the system disk of the first virtual machine in the second void
Carry on quasi- machine;The second resetting configuration task is generated according to the second configuration parameter, issues the second resetting configuration task to second
In virtual machine.
In one embodiment, step S14 can also include: and generate password modification to execute instruction, and be sent to second
Virtual machine, password modification execute instruction the modification that the encrypted message stored to system disk is executed for triggering the second virtual machine.
In one embodiment, after step S14, in addition to releasing the system disk of the first virtual machine in the second virtual machine
On carry, further includes: specified file data are deleted.Specified file data may include relevant to the system disk of carry
File, and file relevant to the execution institute of modification of encrypted message for working as the secondary system disk to the first virtual machine.
The present embodiment can be adapted for various types of virtual machines of cloud environment, for example, kvm virtual machine and vmware it is virtual
Machine etc..
Fig. 2 shows provide a kind of flow chart of password amending method according to embodiments of the present invention.Referring to fig. 2, the device
Include:
S21, the information for receiving the first virtual machine and modified encrypted message;
S22, according to the information of the first virtual machine, in the disk of carry, determine the system disk of the first virtual machine;
S23, according to modified encrypted message, modify the encrypted message stored in the system disk of the first virtual machine.
Above-described embodiment can apply to the second virtual machine, the second virtual machine for the first virtual machine in the cluster one empty
Quasi- machine.
In one embodiment, in step S21, the information for receiving the first virtual machine includes the title letter of the first virtual machine
It ceases, in step S22, according to the name information of the first virtual machine, in the disk of carry, determines the system magnetic of the first virtual machine
Disk.
In one embodiment, step S22 includes: and ought receive password modification to execute instruction, according to the first virtual machine
Information determine the system disk of the first virtual machine in the disk of carry.
It in one embodiment, include: the system interface for scanning the second virtual machine in step S22, to search carry
Disk;In the disk of carry, according to the name information of the first virtual machine, the system disk of the first virtual machine is determined.
In one embodiment, step S23, comprising: the NameSpace for establishing the system disk of the first virtual machine is being ordered
In the name space, according to modified encrypted message, the encrypted message of the system disk of the first virtual machine is modified.After step S23,
Further include: system disk is removed into NameSpace.The detailed content of NameSpace is referred to corresponding content in an embodiment,
Details are not described herein again.
Fig. 3 shows a kind of structural block diagram of password modification device provided according to embodiments of the present invention.Referring to Fig. 3, the dress
It sets and includes:
Request receiving module 31, for receiving Modify password request, Modify password request includes the first of password to be modified
The information of virtual machine and modified encrypted message;
Virtual machine determining module 32 determines the first virtual machine and the second virtual machine for the information according to the first virtual machine,
Second virtual machine and the first virtual machine are located in same cluster;
Carry module 33, for by the system disk carry of the first virtual machine in the second virtual machine;
Information sending module 34, it is virtual for the information of the first virtual machine and modified encrypted message to be sent to second
Machine, the information of the first virtual machine and modified encrypted message complete the encrypted message stored to system disk for the second virtual machine
Modification.
In one embodiment, Modify password is requested further include: the data center information of the first virtual machine.
Device further include: data center's link block is connected to for the data center information according to the first virtual machine
Data center where one virtual machine.
Virtual machine determining module 32, in the data center, according to the information of the first virtual machine, determining the first virtual machine
And second virtual machine.
In one embodiment, virtual machine determining module 32 is used for according to the name information of the first virtual machine, determines the
One virtual machine.Information sending module 34, for the name information of the first virtual machine to be sent to the second virtual machine.
In one embodiment, the information of the first virtual machine includes: the cluster name where the first virtual machine.Virtual machine
Determining module 32, for determining the second virtual machine according to the cluster name where the first virtual machine.
In one embodiment, further includes: the first system disk determining module, for virtual by first in carry module
The system disk carry of machine is before the second virtual machine, in the state that the first virtual machine is in shutdown, in the hard of the first virtual machine
In part equipment, the system disk of the first virtual machine is determined.
In one embodiment, further includes: carry relation broken module, for detecting whether the second virtual machine is completed pair
The modification of the encrypted message of the system disk of first virtual machine;After the completion of determination, the system disk for releasing the first virtual machine exists
Carry on second virtual machine;The system disk carry of first virtual machine is returned into the first virtual machine.
Carry relation broken module is also used in the carry for releasing the system disk of the first virtual machine on the second virtual machine
While, specified file data are deleted.Specified file data may include file relevant to the system disk of carry, and
File relevant to the execution institute of modification of encrypted message for working as the secondary system disk to the first virtual machine.
Fig. 4 shows a kind of structural block diagram of password modification device provided according to embodiments of the present invention.Referring to fig. 4, the dress
It sets and includes:
Receiving module 41, for receive the first virtual machine information and modified encrypted message;
Carry system disk determining module 42 in the disk of carry, determines for the information according to the first virtual machine
The system disk of one virtual machine;
Modified module 43 stores in the system disk of the first virtual machine for modifying according to modified encrypted message
Encrypted message.
In one embodiment, referring to Fig. 5, modified module 43, comprising:
NameSpace determines submodule 51, the NameSpace of the system disk for establishing the first virtual machine;
Password modifies submodule 52, for according to modified encrypted message, modifying the first virtual machine in NameSpace
System disk encrypted message.
In one embodiment, the device further include:
NameSpace removes module, for system disk to be removed NameSpace.
The function of each module in the device of that embodiment of the invention may refer to the corresponding description in the above method, herein no longer
It repeats.
Fig. 6 shows the structural block diagram of password modification equipment according to an embodiment of the present invention.As shown in fig. 6, the password is modified
Equipment includes: memory 610 and processor 620, and the computer journey that can be run on processor 620 is stored in memory 610
Sequence.Processor 620 realizes the password amending method in above-described embodiment when executing computer program.Memory 610 and processor
620 quantity can be one or more.
The password modifies equipment further include:
Communication interface 630 carries out data interaction for being communicated with external device.
Memory 610 may include high speed RAM memory, it is also possible to further include nonvolatile memory (non-
Volatile memory), a for example, at least magnetic disk storage.
If memory 610, processor 620 and the independent realization of communication interface 630, memory 610,620 and of processor
Communication interface 630 can be connected with each other by bus and complete mutual communication.Bus can be industry standard architecture
(ISA, Industry Standard Architecture) bus, external equipment interconnection (PCI, Peripheral
Component Interconnect) bus or extended industry-standard architecture (EISA, Extended Industry
Standard Architecture) bus etc..Bus can be divided into address bus, data/address bus, control bus etc..For convenient for
It indicates, is only indicated with a thick line in Fig. 6, it is not intended that an only bus or a type of bus.
Optionally, in specific implementation, if memory 610, processor 620 and communication interface 630 are integrated in one piece of core
On piece, then memory 610, processor 620 and communication interface 630 can complete mutual communication by internal interface.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored with computer program, the program quilt
Processor realizes method any in above-described embodiment when executing.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.Moreover, particular features, structures, materials, or characteristics described
It may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, without conflicting with each other, this
The technical staff in field can be by the spy of different embodiments or examples described in this specification and different embodiments or examples
Sign is combined.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic." first " is defined as a result, the feature of " second " can be expressed or hidden
It include at least one this feature containing ground.In the description of the present invention, the meaning of " plurality " is two or more, unless otherwise
Clear specific restriction.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings
Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable read-only memory
(CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable Jie
Matter, because can then be edited, be interpreted or when necessary with other for example by carrying out optical scanner to paper or other media
Suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module
It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer
In readable storage medium storing program for executing.The storage medium can be read-only memory, disk or CD etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in its various change or replacement,
These should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the guarantor of the claim
It protects subject to range.
Claims (18)
1. a kind of password amending method characterized by comprising
Modify password request is received, after the Modify password requests the information and modification of the first virtual machine including password to be modified
Encrypted message;
According to the information of first virtual machine, the first virtual machine and the second virtual machine are determined, second virtual machine and described
First virtual machine is located in same cluster;
By the system disk carry of first virtual machine in second virtual machine;
The information of first virtual machine and the modified encrypted message are sent to second virtual machine, described first
The information of virtual machine and the modified encrypted message store the system disk for second virtual machine completion close
The modification of code information.
2. the method according to claim 1, wherein the Modify password is requested further include: described first is virtual
The data center information of machine;
The information according to first virtual machine, before determining the first virtual machine and the second virtual machine, further includes: according to institute
The data center information for stating the first virtual machine, the data center being connected to where first virtual machine;
The information according to first virtual machine, determines the first virtual machine and the second virtual machine, comprising: in the data
At heart, according to the information of first virtual machine, first virtual machine and second virtual machine are determined.
3. method according to claim 1 or 2, which is characterized in that the information of first virtual machine includes: described first
The name information of virtual machine;
First virtual machine is determined according to the information of first virtual machine, comprising: according to the title of first virtual machine
Information determines first virtual machine;
It includes: by the name information of first virtual machine that the information of first virtual machine, which is sent to second virtual machine,
It is sent to second virtual machine.
4. method according to claim 1 or 2, which is characterized in that the information of first virtual machine includes: described first
Cluster name where virtual machine;
Second virtual machine is determined according to the information of first virtual machine, comprising: according to where first virtual machine
Cluster name determines second virtual machine.
5. according to the method described in claim 4, it is characterized in that, the title of second virtual machine and first virtual machine
The cluster name at place is identical.
6. the method according to claim 1, wherein the system disk carry by first virtual machine in
Before second virtual machine, further includes:
In the state that first virtual machine is in shutdown, in the hardware device of first virtual machine, described the is determined
The system disk of one virtual machine.
7. a kind of password amending method characterized by comprising
Receive the first virtual machine information and modified encrypted message;
According to the information of first virtual machine, in the disk of carry, the system disk of first virtual machine is determined;
According to the modified encrypted message, the encrypted message stored in the system disk of first virtual machine is modified.
8. the method according to the description of claim 7 is characterized in that described according to the modified encrypted message, modification institute
State the encrypted message of the system disk of the first virtual machine, comprising: the NameSpace of the system disk of first virtual machine is established,
In the NameSpace, according to the modified encrypted message, the password of the system disk of first virtual machine is modified
Information.
9. a kind of password modifies device characterized by comprising
Request receiving module, for receiving Modify password request, the Modify password request includes the first void of password to be modified
The information of quasi- machine and modified encrypted message;
Virtual machine determining module determines the first virtual machine and the second virtual machine, institute for the information according to first virtual machine
It states the second virtual machine and first virtual machine is located in same cluster;
Carry module, for by the system disk carry of first virtual machine in second virtual machine;
Information sending module, for the information of first virtual machine and the modified encrypted message to be sent to described
Two virtual machines, the information of first virtual machine and the modified encrypted message are completed for second virtual machine to described
The modification of the encrypted message of system disk storage.
10. device according to claim 9, which is characterized in that the Modify password request further include: described first is virtual
The data center information of machine;
Described device further include: data center's link block, for the data center information according to first virtual machine, connection
Data center to where first virtual machine;
The virtual machine determining module, in the data center, according to the information of first virtual machine, determine described in
First virtual machine and second virtual machine.
11. device according to claim 9 or 10, which is characterized in that the virtual machine determining module is used for according to
The name information of first virtual machine determines first virtual machine;
The information sending module, for the name information of first virtual machine to be sent to second virtual machine.
12. device according to claim 9 or 10, which is characterized in that the information of first virtual machine includes: described
Cluster name where one virtual machine;
The virtual machine determining module, for determining that described second is virtual according to the cluster name where first virtual machine
Machine.
13. device according to claim 9, which is characterized in that further include: the first system disk determining module is used for
The carry module by the system disk carry of first virtual machine before second virtual machine, in first virtual machine
In the state of shutdown, in the hardware device of first virtual machine, the system disk of first virtual machine is determined.
14. a kind of password modifies device characterized by comprising
Receiving module, for receive the first virtual machine information and modified encrypted message;
Carry system disk determining module, for the information according to first virtual machine, in the disk of carry, described in determination
The system disk of first virtual machine;
Modified module, for modifying and being stored in the system disk of first virtual machine according to the modified encrypted message
Encrypted message.
15. device according to claim 14, which is characterized in that the modified module, comprising:
NameSpace determines submodule, the NameSpace of the system disk for establishing first virtual machine;
Password modifies submodule, for according to the modified encrypted message, modifying described first in the NameSpace
The encrypted message of the system disk of virtual machine.
16. a kind of password modifies equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors
Realize such as method as claimed in any one of claims 1 to 6.
17. a kind of password modifies equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors
Realize the method as described in any in claim 7-8.
18. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the program is held by processor
Such as method described in any one of claims 1-8 is realized when row.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910772453.9A CN110471744B (en) | 2019-08-20 | 2019-08-20 | Password modification method, device, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910772453.9A CN110471744B (en) | 2019-08-20 | 2019-08-20 | Password modification method, device, equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110471744A true CN110471744A (en) | 2019-11-19 |
CN110471744B CN110471744B (en) | 2021-11-30 |
Family
ID=68513250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910772453.9A Active CN110471744B (en) | 2019-08-20 | 2019-08-20 | Password modification method, device, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110471744B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110968852A (en) * | 2019-12-20 | 2020-04-07 | 深信服科技股份有限公司 | Virtual machine password management method, system, equipment and computer storage medium |
CN111090851A (en) * | 2019-12-20 | 2020-05-01 | 深信服科技股份有限公司 | Method and device for resetting virtual machine authentication information, host machine and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571698A (en) * | 2010-12-17 | 2012-07-11 | 中国移动通信集团公司 | Access authority control method, system and device for virtual machine |
CN105389495A (en) * | 2015-11-03 | 2016-03-09 | 国云科技股份有限公司 | Method for externally resetting password of windows virtual machine |
CN105468433A (en) * | 2015-11-19 | 2016-04-06 | 北京北信源软件股份有限公司 | Method and system for acquiring disc data of virtual machines |
CN105530246A (en) * | 2015-12-04 | 2016-04-27 | 华为技术有限公司 | Method, device and system for managing virtual machine |
CN107291525A (en) * | 2016-04-01 | 2017-10-24 | 华为技术有限公司 | A kind of method, host and system for disposing virtual machine |
CN109002344A (en) * | 2018-06-12 | 2018-12-14 | 广东睿江云计算股份有限公司 | A kind of method of cloud management platform resetting KVM virtual machine password |
-
2019
- 2019-08-20 CN CN201910772453.9A patent/CN110471744B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571698A (en) * | 2010-12-17 | 2012-07-11 | 中国移动通信集团公司 | Access authority control method, system and device for virtual machine |
CN105389495A (en) * | 2015-11-03 | 2016-03-09 | 国云科技股份有限公司 | Method for externally resetting password of windows virtual machine |
CN105468433A (en) * | 2015-11-19 | 2016-04-06 | 北京北信源软件股份有限公司 | Method and system for acquiring disc data of virtual machines |
CN105530246A (en) * | 2015-12-04 | 2016-04-27 | 华为技术有限公司 | Method, device and system for managing virtual machine |
CN107291525A (en) * | 2016-04-01 | 2017-10-24 | 华为技术有限公司 | A kind of method, host and system for disposing virtual machine |
CN109002344A (en) * | 2018-06-12 | 2018-12-14 | 广东睿江云计算股份有限公司 | A kind of method of cloud management platform resetting KVM virtual machine password |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110968852A (en) * | 2019-12-20 | 2020-04-07 | 深信服科技股份有限公司 | Virtual machine password management method, system, equipment and computer storage medium |
CN111090851A (en) * | 2019-12-20 | 2020-05-01 | 深信服科技股份有限公司 | Method and device for resetting virtual machine authentication information, host machine and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110471744B (en) | 2021-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220078078A1 (en) | Fpga-enabled compute instances | |
CN104598257B (en) | The method and apparatus of remote application operation | |
CN109634718B (en) | Method and system for creating mirror image by cloud platform | |
US20170034697A1 (en) | Pen Needle Outer Cover Concepts | |
EP3374857B1 (en) | Dashboard as remote computing services | |
US10938573B2 (en) | Distributed transaction processing | |
CN104731635B (en) | A kind of virtual machine access control method and virtual machine access control system | |
US10963984B2 (en) | Interaction monitoring for virtualized graphics processing | |
US11922185B2 (en) | Deployment and isolation of plugins in a virtualized computing environment | |
KR20180038515A (en) | Graphical processing virtualization on the provider network | |
US11061746B2 (en) | Enqueue-related processing based on timing out of an attempted enqueue | |
CN110471744A (en) | Password amending method, device, equipment and computer readable storage medium | |
CN113010265A (en) | Pod scheduling method, scheduler, memory plug-in and system | |
US10970111B2 (en) | Migrating virtual machines | |
CN117321581A (en) | Techniques for deterministic distributed caching of accelerated SQL queries | |
US10397130B2 (en) | Multi-cloud resource reservations | |
US10565202B2 (en) | Data write/import performance in a database through distributed memory | |
TWI806603B (en) | Computer-implemented method, computer program product and computer system for accessing topological mapping of cores | |
US11915026B1 (en) | Software containers with user-selectable security levels | |
WO2017100065A1 (en) | Discovering resource availability across regions | |
CN105808318B (en) | Information processing method and electronic equipment | |
CN110383255A (en) | It manages and the client partitions of physical equipment is accessed | |
US11966754B2 (en) | Cluster bootstrapping for distributed computing systems | |
US9367373B2 (en) | Automatic configuration consistency check | |
CN107944297B (en) | Control method and device for accessing file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |