CN111526150A - Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port - Google Patents

Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port Download PDF

Info

Publication number
CN111526150A
CN111526150A CN202010348127.8A CN202010348127A CN111526150A CN 111526150 A CN111526150 A CN 111526150A CN 202010348127 A CN202010348127 A CN 202010348127A CN 111526150 A CN111526150 A CN 111526150A
Authority
CN
China
Prior art keywords
cluster
port
user account
address
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010348127.8A
Other languages
Chinese (zh)
Inventor
吴飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010348127.8A priority Critical patent/CN111526150A/en
Publication of CN111526150A publication Critical patent/CN111526150A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a zero-trust automation rule releasing platform and a releasing method for a remote operation and maintenance port of a single-cluster or multi-cluster cloud computer, wherein the releasing platform comprises a verification end, a server end, a client end and a database, both the verification end and the server end can perform data interaction with the database, the client end is used for sending request user account information and an authentication password, the verification end is used for comparing the request user account information and the authentication password with data prestored in the database, reading an IP address and port information of the server end prestored in the database and acquiring the IP address of the request client end, and the server end is used for receiving the IP address of the request client end and the port information of the server end and uniquely releasing the IP address of the request client end of a corresponding port. The invention adds a layer of authentication mechanism for the internal and external network security of the remote operation and maintenance port, and simplifies the security clearance method of the remote operation and maintenance port.

Description

Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port
Technical Field
The invention relates to the field of virtualization networks, in particular to a single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule releasing platform.
Background
With the increasing maturity of computer virtualization technology, a large amount of deployment and application of cloud computers, and the opening of remote operation and maintenance ports become the very need of cloud operation and maintenance work. In an increasingly complex network security environment, great security and operation and maintenance challenges are brought to large-scale deployment of cloud computers. Once the remote operation and maintenance port of the computer is opened, potential safety hazards are brought to the system, once any computer in the cloud is attacked by a hacker, other cloud computers in the same network segment are in a dangerous environment all the time.
To realize image interaction, operation and maintenance between the terminal and the cloud, a communication port must be opened at the cloud terminal. Once the port is opened, potential safety hazards are brought to all the systems in the cloud. In recent years, many organizations and enterprises at home and abroad suffer from network security events such as wild attacks and lassos similar to lasso virus, and system user passwords suffer from violent cracking, so that great risks are brought to information and data security. Meanwhile, the method brings unprecedented new challenges to IT operation and maintenance personnel.
In the prior art, the black-and-white list rule of the IP security policy is manually deployed, and other methods such as VPN two-factor authentication and port number modification are adopted. While security defense within the scope of rules can be achieved, automated zero trust clearance mechanisms are lacking.
And the manual deployment rule only adapts to small-scale IT deployment and operation and maintenance with weak mobility, and for large-scale deployment and service such as private cloud computers with strong mobility requirements, if other methods such as manual black-and-white list security policy setting or VPN authentication are adopted, the security mobility of the cloud computers is limited, the working efficiency of IT operation and maintenance personnel is reduced, and the labor cost of security defense is increased.
Disclosure of Invention
Aiming at the problems, the invention provides a zero-trust automation rule releasing platform for a single-cluster or multi-cluster cloud computer remote operation and maintenance port, which adds a layer of authentication mechanism for the safety of an internal network and an external network of the remote operation and maintenance port.
The technical scheme adopted by the invention for solving the technical problems is as follows: a zero-trust automation rule releasing platform for remote operation and maintenance ports of single-cluster or multi-cluster cloud computers comprises a verification end and a service end which are in the same cluster, client ends of the same cluster or different clusters and a database, wherein the verification end and the service end can perform data interaction with the database, the client ends are used for sending request user account information and an authentication password to a designated cluster verification end, the verification end is used for comparing the request user account information and the authentication password sent by the client ends with data prestored in the database and verifying the request user account information and the authentication password, reading an IP address and port information of the service end corresponding to the user account information prestored in the database, and simultaneously acquiring the IP address of the request client end, and the corresponding service end with the IP address of the service end is used for receiving the IP address of the request client end and the port information of the service end corresponding to the user account information, and uniquely releasing the request client IP address of the corresponding port to realize the permission/non-permission of the appointed port of the request client IP address.
The invention also provides a release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform, which comprises the following steps:
(1) a user sends a request user account information and an authentication password to a designated cluster verification end through a client at any terminal or equipment;
(2) after receiving the request user account information and the authentication password, the verifying terminal compares the request user account information and the authentication password with user account information and authentication password data prestored in a database so as to verify whether the request user account information exists and the authentication password is correct by comparison, and reads a server IP address and port information which are prestored in the database and correspond to the user account information; simultaneously acquiring the IP address of the request client; after the comparison is passed, executing the step (3); when the comparison does not pass, executing the step (4);
(3) the verification end sends the IP address of the request client end and the read port information of the service end corresponding to the user account information to the corresponding service end, and the corresponding service end with the IP address of the service end receives the IP address of the client end and the port information of the service end corresponding to the user account information and uniquely releases the IP address of the request client end of the corresponding port; meanwhile, feeding back the information of 'check pass' to the client;
(4) the verification end feeds back 'failure' information to the client, and the black and white list port release rule corresponding to the server is kept unchanged.
Preferably, in the step (1), the requesting user account information is encrypted requesting user account information, and preferably double-layer encryption is performed.
Preferably, in the step (2), after receiving the request user account information and the authentication password, the verifying terminal needs to decrypt first, and then compares the decrypted request user account information and the authentication password with a data password pre-stored in the database.
Preferably, in the step (3), after receiving the IP address of the client and the port information of the server corresponding to the user account information, the server uniquely releases the IP address of the client requesting the corresponding port, and simultaneously feeds back the received information to the verification end.
Preferably, the verification end can record the IP address and the communication time information of the client, and automatically intercept and record illegal users.
Preferably, any user authentication password pre-stored or stored in the database adopts different encryption ciphertexts.
Preferably, the corresponding port release rule that passes without authentication by the method defaults to not allowing any IP address to be released.
Preferably, the background thread of the server automatically judges the connection and disconnection states of the operation and maintenance user, and once the user disconnects, any release rule of the corresponding operation and maintenance port is closed immediately.
Compared with the prior art, the invention has the following beneficial effects:
1. a layer of authentication mechanism is added for the safety of the internal network and the external network of the remote operation and maintenance port, and meanwhile, the safety release method of the remote operation and maintenance port is simplified;
2. safety and prevention are improved for novel information construction;
3. the occurrence of a password brute force cracking event is prevented to the maximum extent;
4. the working efficiency of personnel such as IT operation and maintenance service is improved.
Drawings
FIG. 1 is a schematic flow diagram of the present invention.
Detailed Description
The invention will now be described in detail with reference to fig. 1, wherein exemplary embodiments and descriptions of the invention are provided to explain the invention, but not to limit the invention.
The invention particularly relates to a zero-trust automation rule releasing platform and a zero-trust automation rule releasing method for a single-cluster or multi-cluster cloud computer remote operation and maintenance port, which are called zero-trust cloud operation and maintenance platform or zero-trust cloud operation and maintenance firewall for short.
The operation and maintenance port in the invention refers to an operation and maintenance port (such as SSH, RDP and other ports) which can be accessed only after authentication of a user name and a password, and does not contain an HTTP, HTTPS and other ports which can be accessed anonymously.
A zero-trust automatic rule releasing platform for remote operation and maintenance ports of single-cluster or multi-cluster cloud computers comprises a verification end and a server end which are in the same cluster, client ends of the same cluster or different clusters and a database, wherein the verification end and the server ends can perform data interaction with the database, the client ends are used for sending request user account information and an authentication password to a designated cluster verification end, the verification end is used for comparing the request user account information and the authentication password sent by the client ends with pre-stored data in the database and verifying the request user account information and the authentication password, reading IP addresses and port information of the server ends corresponding to the user account information and pre-stored in the database, reading other pre-stored information such as MAC addresses and the like, and simultaneously acquiring IP addresses of the request client ends, and the corresponding server ends with the IP addresses of the server ends are used for receiving the IP addresses of the request client ends passed by the verification end and the port information of the server ends corresponding to the user account information And uniquely passing through the IP address of the request client of the corresponding port so as to realize the permission/non-permission of the appointed port of the IP address of the request client. The client can comprise a plurality of terminal clients, and the server is a cloud computer server and comprises a cloud host server, n cloud desktop servers and the like.
The automatic zero-trust release mechanism of the computer remote operation and maintenance port is suitable for IT deployment and operation and maintenance of novel information-based construction such as public cloud, private cloud, mixed cloud, organization local area network office (both internal and external networks are suitable) and the like.
The invention also provides a release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform, which comprises the following steps:
(1) a user sends a request user account information and an authentication password to a designated cluster verification end through a client at any terminal or equipment; in the step (1), the request user account information is encrypted request user account information, and preferably double-layer encryption is performed.
(2) After receiving the request user account information and the authentication password, the verifying terminal compares the request user account information and the authentication password with user account information and authentication password data prestored in a database so as to verify whether the request user account information exists and the authentication password is correct by comparison, and reads a server IP address and port information which are prestored in the database and correspond to the user account information; simultaneously acquiring the IP address of the request client; after the comparison is passed, executing the step (3); when the comparison does not pass, executing the step (4); in the step (2), after receiving the request user account information and the authentication password, the verifying terminal needs to decrypt the request user account information and the authentication password, and then compares the decrypted request user account information and the decrypted authentication password with the data password prestored in the database.
(3) The verification end sends the IP address of the request client end and the read port information of the service end corresponding to the user account information to the corresponding service end, and the corresponding service end with the IP address of the service end receives the IP address of the client end and the port information of the service end corresponding to the user account information and uniquely releases the IP address of the request client end of the corresponding port; meanwhile, feeding back the information of 'check pass' to the client;
after receiving the IP address of the client and the port information of the server corresponding to the user account information, the server uniquely releases the IP address of the client requesting the corresponding port, and feeds back the received information to the verification end;
(4) the verification end feeds back 'failure' information to the client, and the black and white list port release rule corresponding to the server is kept unchanged.
The verification end can record the IP address and the communication time information of the client, and automatically intercept and record illegal users.
According to the invention, under the default condition, the remote interaction port of any cloud computer is in a zero trust state, and only after verification and verification of a cloud firewall, the unique passing of the request IP address can be automatically carried out. The verification ciphertext is set or modified by the cloud computer user, and any request data is encrypted. The safety and the mobility are ensured, the IT operation and maintenance are simplified, and the working efficiency of operation and maintenance personnel is improved. And simultaneously adding attack interception and log recording of malicious users.
The invention is composed of three basic components of Client, Authentication and Server (namely Client, verification end and Server), and needs to be matched with open source or commercial database for use (MsSQL, MySQL, Oracle SQL, etc.). All data transmissions are encrypted.
The verification terminal, the server terminal and the database are required to be located in the same VLAN network segment of the same cluster, so that reliability and safety are improved, and operation and maintenance personnel and cloud desktop users do not need to know the packaging process and the data interaction mode of a data packet.
And the database is responsible for recording related information such as the IP address, the MAC address, the port, the user account number, the verification passwords of different encryption rules and the like of the cloud server and the cloud desktop. The verification password is set and modified by operation and maintenance personnel or cloud desktop users at the cloud computer client. And the system is deployed in any cloud server system (Windows or Linux) in the cluster. The verification end and the server end can perform data interaction with the database, and can also be deployed on the same cloud server system with the verification end. (the database only stores the authentication passwords of all users and does not store the operation and maintenance passwords of the cloud computer).
The verification end is deployed in any Windows cloud server system in the cluster and can communicate with the only port of the service end on the effective cloud computer recorded in the database in the cluster (effective means that the verification end can normally communicate with the service end of the cloud computer). According to different scenes and requirements, rules can be released to any internal and external network open verification end port, and a legal client can be ensured to normally communicate with the open port of the verification end. And the verifying end verifies the verification request of the legal client, records information such as the IP address, the communication time and the like of the client, automatically intercepts and records the illegal user, and reserves the original evidence for future verification.
The server is deployed in a Windows cloud computer which needs to open a remote operation and maintenance port in a cluster, and only a unique communication port is opened to the verification end IP. Any cloud computer in the cluster can set and modify a client authentication password through a server software interface, the authentication passwords of different users adopt different encryption ciphertexts and are responsible for judging the connection and disconnection states of the operation and maintenance users, once the users are disconnected, any release rule of the corresponding operation and maintenance port is immediately closed, and a zero trust mechanism of the corresponding port is started.
The client is arranged on any visual graphic terminal device in any network or the same VLAN network and is responsible for submitting the verification request of the user and receiving the feedback information of the verification end.
The technical solutions provided by the embodiments of the present invention are described in detail above, and the principles and embodiments of the present invention are explained herein by using specific examples, and the descriptions of the embodiments are only used to help understanding the principles of the embodiments of the present invention; meanwhile, for a person skilled in the art, according to the embodiments of the present invention, there may be variations in the specific implementation manners and application ranges, and in summary, the content of the present description should not be construed as a limitation to the present invention.

Claims (9)

1. A zero-trust automation rule releasing platform for a single-cluster or multi-cluster cloud computer remote operation and maintenance port is characterized in that: the system comprises a verifying end and a server end which are positioned in the same cluster, client ends of the same cluster or different clusters and a database, wherein the verifying end and the server end can perform data interaction with the database, the client ends are used for sending request user account information and an authentication password to a designated cluster verifying end, the verifying end is used for comparing and verifying the request user account information and the authentication password sent by the client ends and pre-stored data in the database, reading IP addresses and port information of the server end corresponding to the user account information and pre-stored in the database, and simultaneously acquiring the IP address of the request client end, the corresponding server end with the IP address of the server end is used for receiving the IP address of the request client end passed by the verifying end and the port information of the server end corresponding to the user account information, and uniquely releasing the IP address of the request client end of the corresponding port, to enable the specified port of the requesting client IP address to allow/disallow pass-through.
2. A release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 1, characterized in that: the method comprises the following steps:
(1) a user sends a request user account information and an authentication password to a designated cluster verification end through a client at any terminal or equipment;
(2) after receiving the request user account information and the authentication password, the verifying terminal compares the request user account information and the authentication password with user account information and authentication password data prestored in a database so as to verify whether the request user account information exists and the authentication password is correct by comparison, and reads a server IP address and port information which are prestored in the database and correspond to the user account information; simultaneously acquiring the IP address of the request client; after the comparison is passed, executing the step (3); when the comparison does not pass, executing the step (4);
(3) the verification end sends the IP address of the request client end and the read port information of the service end corresponding to the user account information to the corresponding service end, and the corresponding service end with the IP address of the service end receives the IP address of the client end and the port information of the service end corresponding to the user account information and uniquely releases the IP address of the request client end with the corresponding port; meanwhile, feeding back the information of 'check pass' to the client;
(4) the verification end feeds back 'failure' information to the client, and the black and white list port release rule corresponding to the server is kept unchanged.
3. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: in the step (1), the request user account information is encrypted request user account information, and preferably double-layer encryption is performed.
4. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: in the step (2), after receiving the request user account information and the authentication password, the verifying terminal needs to decrypt the request user account information and the authentication password, and then compares the decrypted request user account information and the decrypted authentication password with the data password prestored in the database.
5. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: in the step (3), after receiving the IP address of the client and the port information of the server corresponding to the user account information, the server uniquely releases the IP address of the client requesting the corresponding port, and feeds back the received information to the verification end.
6. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: the verification end can record the IP address and the communication time information of the client, and automatically intercept and record illegal users.
7. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: the authentication passwords of any user pre-stored or stored in the database adopt different encryption ciphertexts.
8. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: the corresponding port release rule which passes without the authentication of the method defaults to not allow any IP address to release.
9. The release method applied to the single-cluster or multi-cluster cloud computer remote operation and maintenance port zero-trust automation rule release platform according to claim 2, characterized in that: the server side automatically judges the connection and disconnection states of the operation and maintenance user, and once the user disconnects, any releasing rule of the corresponding operation and maintenance port is closed immediately.
CN202010348127.8A 2020-04-28 2020-04-28 Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port Pending CN111526150A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010348127.8A CN111526150A (en) 2020-04-28 2020-04-28 Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010348127.8A CN111526150A (en) 2020-04-28 2020-04-28 Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port

Publications (1)

Publication Number Publication Date
CN111526150A true CN111526150A (en) 2020-08-11

Family

ID=71906065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010348127.8A Pending CN111526150A (en) 2020-04-28 2020-04-28 Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port

Country Status (1)

Country Link
CN (1) CN111526150A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112118242A (en) * 2020-09-09 2020-12-22 厦门安胜网络科技有限公司 Zero trust authentication system
CN112422340A (en) * 2020-11-18 2021-02-26 北京魔带互联科技有限公司 System and method for managing cloud service cluster
CN112637187A (en) * 2020-12-18 2021-04-09 合肥阿格德信息科技有限公司 Computer network information safety system

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1874303A (en) * 2006-03-04 2006-12-06 华为技术有限公司 Method for implementing black sheet
CN103139187A (en) * 2011-12-02 2013-06-05 中兴通讯股份有限公司 Method and device for interacting with telnet servers
US20140047526A1 (en) * 2012-08-10 2014-02-13 Hon Hai Precision Industry Co., Ltd. Electronic device and method for providing cloud computing services
CN103618752A (en) * 2013-12-18 2014-03-05 广东中科遥感技术有限公司 Virtual machine remote desktop safety access system and method
CN103763119A (en) * 2011-03-09 2014-04-30 成都勤智数码科技股份有限公司 Telnet/SSH-based network terminal management method
CN103944890A (en) * 2014-04-08 2014-07-23 山东乾云启创信息科技有限公司 Virtual interaction system and method based on client/server mode
CN104270334A (en) * 2014-06-13 2015-01-07 国家电网公司 SSH (Secure Shell) network security access protocol monitoring method
CN104283879A (en) * 2014-10-09 2015-01-14 广州杰赛科技股份有限公司 Virtual machine remote connection method and system
CN104363245A (en) * 2014-11-28 2015-02-18 上海斐讯数据通信技术有限公司 Remote login system and method based on telnet protocol
CN104954189A (en) * 2015-07-07 2015-09-30 上海斐讯数据通信技术有限公司 Automatic server cluster detecting method and system
CN104951524A (en) * 2015-06-11 2015-09-30 上海新炬网络信息技术有限公司 Mobile platform for database operation and maintenance and using method of mobile platform
CN105141632A (en) * 2015-09-21 2015-12-09 北京百度网讯科技有限公司 Method and device used for checking pages
WO2015196659A1 (en) * 2014-06-23 2015-12-30 中兴通讯股份有限公司 Method and device for authenticating connection between desktop cloud client and serving end
CN105577677A (en) * 2015-12-31 2016-05-11 亿阳安全技术有限公司 Remote login method and system based on J2EE
CN106161463A (en) * 2016-08-30 2016-11-23 江苏名通信息科技有限公司 A kind of online game account login method
CN107026913A (en) * 2017-05-18 2017-08-08 广西拾叁工房网络科技有限公司 The remote cluster control system and its control method of a kind of ios device
CN107819874A (en) * 2017-11-27 2018-03-20 南京城市职业学院 A kind of method of remote control fire wall terminal
CN108429730A (en) * 2018-01-22 2018-08-21 北京智涵芯宇科技有限公司 Feedback-less safety certification and access control method
CN110166432A (en) * 2019-04-17 2019-08-23 平安科技(深圳)有限公司 The access method of internal net destination service provides the method for Intranet destination service
CN110351298A (en) * 2019-07-24 2019-10-18 中国移动通信集团黑龙江有限公司 Access control method, device, equipment and storage medium
CN110719276A (en) * 2019-09-30 2020-01-21 北京网瑞达科技有限公司 Network equipment safety access system based on cache password and working method thereof

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1874303A (en) * 2006-03-04 2006-12-06 华为技术有限公司 Method for implementing black sheet
CN103763119A (en) * 2011-03-09 2014-04-30 成都勤智数码科技股份有限公司 Telnet/SSH-based network terminal management method
CN103139187A (en) * 2011-12-02 2013-06-05 中兴通讯股份有限公司 Method and device for interacting with telnet servers
US20140047526A1 (en) * 2012-08-10 2014-02-13 Hon Hai Precision Industry Co., Ltd. Electronic device and method for providing cloud computing services
CN103618752A (en) * 2013-12-18 2014-03-05 广东中科遥感技术有限公司 Virtual machine remote desktop safety access system and method
CN103944890A (en) * 2014-04-08 2014-07-23 山东乾云启创信息科技有限公司 Virtual interaction system and method based on client/server mode
CN104270334A (en) * 2014-06-13 2015-01-07 国家电网公司 SSH (Secure Shell) network security access protocol monitoring method
WO2015196659A1 (en) * 2014-06-23 2015-12-30 中兴通讯股份有限公司 Method and device for authenticating connection between desktop cloud client and serving end
CN104283879A (en) * 2014-10-09 2015-01-14 广州杰赛科技股份有限公司 Virtual machine remote connection method and system
CN104363245A (en) * 2014-11-28 2015-02-18 上海斐讯数据通信技术有限公司 Remote login system and method based on telnet protocol
CN104951524A (en) * 2015-06-11 2015-09-30 上海新炬网络信息技术有限公司 Mobile platform for database operation and maintenance and using method of mobile platform
CN104954189A (en) * 2015-07-07 2015-09-30 上海斐讯数据通信技术有限公司 Automatic server cluster detecting method and system
CN105141632A (en) * 2015-09-21 2015-12-09 北京百度网讯科技有限公司 Method and device used for checking pages
CN105577677A (en) * 2015-12-31 2016-05-11 亿阳安全技术有限公司 Remote login method and system based on J2EE
CN106161463A (en) * 2016-08-30 2016-11-23 江苏名通信息科技有限公司 A kind of online game account login method
CN107026913A (en) * 2017-05-18 2017-08-08 广西拾叁工房网络科技有限公司 The remote cluster control system and its control method of a kind of ios device
CN107819874A (en) * 2017-11-27 2018-03-20 南京城市职业学院 A kind of method of remote control fire wall terminal
CN108429730A (en) * 2018-01-22 2018-08-21 北京智涵芯宇科技有限公司 Feedback-less safety certification and access control method
CN110166432A (en) * 2019-04-17 2019-08-23 平安科技(深圳)有限公司 The access method of internal net destination service provides the method for Intranet destination service
CN110351298A (en) * 2019-07-24 2019-10-18 中国移动通信集团黑龙江有限公司 Access control method, device, equipment and storage medium
CN110719276A (en) * 2019-09-30 2020-01-21 北京网瑞达科技有限公司 Network equipment safety access system based on cache password and working method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
RIDHO MAULANA ARIFIANTO: "An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System", 《 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT)》 *
王少青: "基于集成虚拟化集群服务器的高校数字校园平台设计与实现", 《信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112118242A (en) * 2020-09-09 2020-12-22 厦门安胜网络科技有限公司 Zero trust authentication system
CN112422340A (en) * 2020-11-18 2021-02-26 北京魔带互联科技有限公司 System and method for managing cloud service cluster
CN112637187A (en) * 2020-12-18 2021-04-09 合肥阿格德信息科技有限公司 Computer network information safety system

Similar Documents

Publication Publication Date Title
US11647003B2 (en) Concealing internal applications that are accessed over a network
US10419459B2 (en) System and method for providing data and device security between external and host devices
US9781114B2 (en) Computer security system
US9729514B2 (en) Method and system of a secure access gateway
EP2328319B1 (en) Method, system and server for realizing the secure access control
EP1782265B1 (en) System and method for secure network connectivity
CN114598540B (en) Access control system, method, device and storage medium
JP4168052B2 (en) Management server
EP4236206B1 (en) Actively monitoring encrypted traffic by inspecting logs
US20120151565A1 (en) System, apparatus and method for identifying and blocking anomalous or improper use of identity information on computer networks
CN111526150A (en) Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port
CN110719277B (en) System and method for secure access of network device based on one-time access credential
CN116032533A (en) Remote office access method and system based on zero trust
WO2008155428A1 (en) Firewall control system
CN113472758A (en) Access control method, device, terminal, connector and storage medium
KR101858207B1 (en) System for security network
CN111628960B (en) Method and apparatus for connecting to network services on a private network
CN114915427B (en) Access control method, device, equipment and storage medium
CN116827646A (en) Terminal flow agent and access control method based on eBPF
CN116248405A (en) Network security access control method based on zero trust and gateway system and storage medium adopting same
CN114662080A (en) Data protection method and device and desktop cloud system
CN118300899B (en) Authorized communication method, device, computer equipment and storage medium
Yoo et al. TAPS: Trust-based Access Control and Protect System
Conde Ortiz Ethical Hacking Of An Industrial Control System
CN118118184A (en) Medical equipment remote operation and maintenance method, system and device based on zero trust security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200811

RJ01 Rejection of invention patent application after publication