CN112115437B - Method and device for remotely modifying Windows device password through Linux device - Google Patents
Method and device for remotely modifying Windows device password through Linux device Download PDFInfo
- Publication number
- CN112115437B CN112115437B CN202010922479.XA CN202010922479A CN112115437B CN 112115437 B CN112115437 B CN 112115437B CN 202010922479 A CN202010922479 A CN 202010922479A CN 112115437 B CN112115437 B CN 112115437B
- Authority
- CN
- China
- Prior art keywords
- windows
- decryption
- equipment
- linux
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000015654 memory Effects 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 14
- 238000012423 maintenance Methods 0.000 abstract description 16
- 230000008569 process Effects 0.000 abstract description 10
- 230000004048 modification Effects 0.000 abstract description 5
- 238000012986 modification Methods 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000005291 magnetic effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 230000009545 invasion Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000000280 densification Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Selective Calling Equipment (AREA)
- Computer And Data Communications (AREA)
Abstract
The purpose of the application is to provide a scheme for remotely modifying Windows device passwords through Linux devices. According to the scheme, a decryption instruction is sent to Windows transfer equipment through Linux equipment, and after the Windows transfer equipment receives the decryption instruction, decryption operation is carried out on target Windows equipment through PowerShell. The method and the device can avoid the system intrusion risk caused by the increase of the public ports, and can reduce the complicated work of the Windows system setting level. The method and the device are applied to the operation and maintenance management system, can smoothly realize remote modification of the Windows device password on the Linux platform, improve the success rate of Windows device decryption, and improve the applicability, practicality, safety and flexibility of the operation and maintenance management system, so that the operation and maintenance management system can more perfectly process various Windows devices.
Description
Technical Field
The application relates to the technical field of information, in particular to a technology for remotely modifying Windows device passwords through Linux devices.
Background
Along with the advancement of the national informatization industry, information security is increasingly receiving attention from governments and enterprises. After various IT infrastructures are built, operation and maintenance work of IT equipment becomes more and more complicated, and an operation and maintenance management system is generated under such circumstances. The operation and maintenance management system is used as an intermediate layer of the user and the target equipment, and needs to complete the proxy operation and maintenance process of various protocols and realize related control functions, wherein an important module is decryption operation. The main stream equipment operating system of industry users mostly adopts Windows operating systems of various versions, and the realization of the densification of Windows equipment is a serious issue of the whole operation and maintenance management work.
The existing Linux operation and maintenance management system is used for remotely modifying the password of the Windows device and is mainly realized based on remote login operation of an RPC protocol (Remote Procedure Call Protocol), but the scheme has a lot of requirements on the setting of the Windows system, so that extra maintenance workload is added to a user, and meanwhile, the system invasion risk caused by opening of a port is increased. In particular, the drawbacks of this existing solution are as follows: (1) The RPC protocol remote access needs to open part of the public ports, so that the system intrusion risk is increased; (2) The decryption operation depends on system level limitation, and different versions of Windows systems have certain differences in setting, so that accurate positioning is difficult.
Disclosure of Invention
An object of the present application is to provide a method and device for remotely modifying a password of a Windows device by using a Linux device.
According to one aspect of the application, there is provided a method for remotely modifying a Windows device password by a Linux device, wherein the method includes:
sending a decryption instruction to Windows transfer equipment through Linux equipment;
and after the Windows transit equipment receives the decryption instruction, the target Windows equipment is decrypted through PowerShell.
According to another aspect of the application, there is also provided a method for remotely modifying a Windows device password at a Linux device side, wherein the method includes:
sending a decryption instruction to Windows transfer equipment;
and receiving feedback information about the decryption instruction returned by the Windows transit equipment.
According to still another aspect of the present application, there is further provided a method for remotely modifying a password of a Windows device at a Windows relay device side, where the method includes:
receiving a decryption instruction sent by Linux equipment;
based on the decryption instruction, performing decryption operation on the target Windows device through PowerShell;
and receiving feedback information about the decryption operation returned by the target Windows device, and sending the feedback information about the decryption instruction to the Linux device.
According to still another aspect of the present application, there is also provided a Linux device for remotely modifying a password of a Windows device, wherein the device includes:
the decryption instruction sending module is used for sending decryption instructions to the Windows transfer equipment;
and the feedback information receiving module is used for receiving feedback information about the decryption instruction returned by the Windows transit equipment.
According to still another aspect of the present application, there is also provided a Windows transit device for remotely modifying a password of a Windows device, wherein the device includes:
the decryption instruction receiving module is used for receiving decryption instructions sent by the Linux equipment;
the decryption operation module is used for carrying out decryption operation on the target Windows equipment through PowerShell based on the decryption instruction;
and the decryption result feedback module is used for receiving feedback information about the decryption operation returned by the target Windows equipment and sending the feedback information about the decryption instruction to the Linux equipment.
According to yet another aspect of the present application, there is also provided a computing device, wherein the device comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of remotely modifying a Windows device password.
According to yet another aspect of the present application, there is also provided a computer readable medium having stored thereon computer program instructions executable by a processor to implement the method of remotely modifying a Windows device password.
In the scheme provided by the application, the encryption changing instruction is sent to the Windows transfer device through the Linux device, and after the Windows transfer device receives the encryption changing instruction, the encryption changing operation is carried out on the target Windows device through the PowerShell. The method and the device can avoid the system intrusion risk caused by the increase of the public ports, and can reduce the complicated work of the Windows system setting level. The method and the device are applied to the operation and maintenance management system, can smoothly realize remote modification of the Windows device password on the Linux platform, improve the success rate of Windows device decryption, and improve the applicability, practicality, safety and flexibility of the operation and maintenance management system, so that the operation and maintenance management system can more perfectly process various Windows devices.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 is a flow chart of a method for remotely modifying Windows device passwords by a Linux device according to an embodiment of the application;
FIG. 2 is a flow chart of remote modification of Windows device passwords by a Linux device according to an embodiment of the application;
FIG. 3 is a flowchart of a method for remotely modifying Windows device passwords at a Linux device end and a Windows transit device end according to an embodiment of the application;
FIG. 4 is a schematic diagram of a Linux device for remotely modifying Windows device passwords according to an embodiment of the application;
fig. 5 is a schematic diagram of a Windows transit device for remotely modifying a Windows device password according to an embodiment of the present application.
The same or similar reference numbers in the drawings refer to the same or similar parts.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
In one typical configuration of the present application, the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer-readable media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, program devices, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium which can be used to store information that can be accessed by a computing device.
The embodiment of the application provides a method for realizing remote modification of Windows device passwords by Linux devices based on a PowerShell mode, which solves the problem of conveniently modifying Windows device passwords in a Linux environment, can avoid the system invasion risk caused by the increase of a public port, and can reduce the complicated work of a Windows system setting level.
In a practical scenario, the device performing the method may be a user device, a network device, or a device formed by integrating the user device and the network device through a network. The user equipment includes, but is not limited to, terminal equipment such as a smart phone, a tablet computer, a Personal Computer (PC) and the like, and the network equipment includes, but is not limited to, a network host, a single network server, a plurality of network server sets or a computer set based on cloud computing and the like. Here, the Cloud is composed of a large number of hosts or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual computer composed of a group of loosely coupled computer sets.
Fig. 1 is a flowchart of a method for remotely modifying a password of a Windows device by using the Linux device according to an embodiment of the present application, where the method includes step S1 and step S2.
And S1, sending a decryption instruction to the Windows transit equipment through the Linux equipment.
The Linux devices comprise, but are not limited to, personal Computers (PCs), servers and the like adopting a Linux operating system, and the Windows transit devices comprise, but are not limited to, personal Computers (PCs), servers and the like adopting a Windows operating system.
Because the PowerShell in the current Linux environment does not have the WinRM (Windows Remote Management) remote management module, the Windows transfer device is adopted as the transfer in the embodiment of the application.
In some embodiments, the method further comprises: and the Linux equipment and the Windows transfer equipment interact by adopting a custom protocol. For example, the decryption instruction and decryption information can be transmitted between the Linux device and the Windows transit device through the custom protocol.
And S2, after the Windows transit equipment receives the decryption instruction, the decryption operation is carried out on the target Windows equipment through PowerShell.
For example, the Windows transit device may parse the decryption instruction to obtain a target Windows device corresponding to the decryption instruction and corresponding decryption information, and then perform decryption operation on the target Windows device through PowerShell.
The target Windows devices include, but are not limited to, personal Computers (PCs), tablet computers, servers and the like which adopt Windows operating systems. PowerShell is a cross-platform (e.g., windows, linux) automation and configuration tool that can be integrated with existing tool friendliness and that contains a command line Shell, an associated scripting language, and a framework for handling command sets cmdlets.
In some embodiments, the step S2 includes: and the Windows transfer device remotely logs in the target Windows device through a WinRM (Windows Remote Management) module of PowerShell, and performs decryption operation on the target Windows device. The whole process is carried out on the Windows transfer device, the whole interactive process can be recorded, and the safe and effective tracking effect is achieved.
In some embodiments, the method further comprises: the target Windows device returns feedback information about the decryption operation to the Windows transit device; and the Windows transit equipment returns the feedback information about the decryption instruction to the Linux equipment.
For example, as shown in fig. 2, the Windows transit device may define a decryption result (such as success of decryption, failure of decryption, etc.) according to the interaction information with the target Windows device, and then the Windows transit device sends the decryption result to the Linux device through the custom protocol.
Fig. 3 is a flowchart of a method for remotely modifying a password of a Windows device at a Linux device end and a Windows transit device end according to an embodiment of the present application, where the method includes steps S101 and S102 of the Linux device end, and steps S201, S202 and S203 of the Windows transit device end.
Step S101, linux equipment sends a decryption instruction to Windows transfer equipment; step S201, the Windows transit device receives a decryption instruction sent by the Linux device.
The Linux devices comprise, but are not limited to, personal Computers (PCs), servers and the like adopting a Linux operating system, and the Windows transit devices comprise, but are not limited to, personal Computers (PCs), servers and the like adopting a Windows operating system.
Because the PowerShell in the current Linux environment does not have the WinRM (Windows Remote Management) remote management module, the Windows transfer device is adopted as the transfer in the embodiment of the application.
In some embodiments, the Linux device interacts with the Windows transit device using a custom protocol. For example, the decryption instruction and decryption information can be transmitted between the Linux device and the Windows transit device through the custom protocol.
Step S202, the Windows transit device performs decryption operation on the target Windows device through PowerShell based on the decryption instruction.
For example, the Windows transit device may parse the decryption instruction to obtain a target Windows device corresponding to the decryption instruction and corresponding decryption information, and then perform decryption operation on the target Windows device through PowerShell.
The target Windows devices include, but are not limited to, personal Computers (PCs), tablet computers, servers and the like which adopt Windows operating systems. PowerShell is a cross-platform (e.g., windows, linux) automation and configuration tool that can be integrated with existing tool friendliness and that contains a command line Shell, an associated scripting language, and a framework for handling command sets cmdlets.
In some embodiments, the step S202 includes: and the Windows transfer device remotely logs in the target Windows device through a WinRM (Windows Remote Management) module of PowerShell, and performs decryption operation on the target Windows device. The whole process is carried out on the Windows transfer device, the whole interactive process can be recorded, and the safe and effective tracking effect is achieved.
Step 203, the Windows transit device receives feedback information about the decryption operation returned by the target Windows device, and sends the feedback information about the decryption instruction to the Linux device; step S102, the Linux equipment receives feedback information about the decryption instruction returned by the Windows transit equipment.
For example, the Windows transit device may define a decryption result (such as decryption success, decryption failure, etc.) according to the interaction information with the target Windows device, and then the Windows transit device sends the decryption result to the Linux device through the custom protocol.
Fig. 4 is a schematic diagram of a Linux device for remotely modifying a password of a Windows device according to an embodiment of the present application, where the Linux device includes a decryption instruction sending module 401 and a feedback information receiving module 402. Fig. 5 is a schematic diagram of a Windows transit device for remotely modifying a password of a Windows device according to an embodiment of the present application, where the Windows transit device includes a decryption instruction receiving module 501, a decryption operation module 502, and a decryption result feedback module 503.
The decryption instruction sending module 401 of the Linux device sends a decryption instruction to the Windows transfer device; the decryption instruction receiving module 501 of the Windows transit device receives the decryption instruction sent by the Linux device.
The Linux devices comprise, but are not limited to, personal Computers (PCs), servers and the like adopting a Linux operating system, and the Windows transit devices comprise, but are not limited to, personal Computers (PCs), servers and the like adopting a Windows operating system.
Because the PowerShell in the current Linux environment does not have the WinRM (Windows Remote Management) remote management module, the Windows transfer device is adopted as the transfer in the embodiment of the application.
In some embodiments, the Linux device interacts with the Windows transit device using a custom protocol. For example, the decryption instruction and decryption information can be transmitted between the Linux device and the Windows transit device through the custom protocol.
The decryption operation module 502 of the Windows transit device performs decryption operation on the target Windows device through PowerShell based on the decryption instruction.
For example, the Windows transit device may parse the decryption instruction to obtain a target Windows device corresponding to the decryption instruction and corresponding decryption information, and then perform decryption operation on the target Windows device through PowerShell.
The target Windows devices include, but are not limited to, personal Computers (PCs), tablet computers, servers and the like which adopt Windows operating systems. PowerShell is a cross-platform (e.g., windows, linux) automation and configuration tool that can be integrated with existing tool friendliness and that contains a command line Shell, an associated scripting language, and a framework for handling command sets cmdlets.
In some embodiments, the decryption operation module 502 of the Windows transit device remotely logs in the target Windows device through the WinRM (Windows Remote Management) module of PowerShell, and performs decryption operation on the target Windows device. The whole process is carried out on the Windows transfer device, the whole interactive process can be recorded, and the safe and effective tracking effect is achieved.
The decryption result feedback module 503 of the Windows transit device receives feedback information about the decryption operation returned by the target Windows device, and sends feedback information about the decryption instruction to the Linux device; the feedback information receiving module 402 of the Linux device receives feedback information about the decryption instruction returned by the Windows transit device.
For example, the Windows transit device may define a decryption result (such as decryption success, decryption failure, etc.) according to the interaction information with the target Windows device, and then the Windows transit device sends the decryption result to the Linux device through the custom protocol.
In summary, when the embodiment of the application is applied to the operation and maintenance management system, remote modification of the Windows device password can be smoothly realized on the Linux platform, the success rate of Windows device decryption is improved, the applicability, the practicability, the safety and the flexibility of the operation and maintenance management system are improved, and the operation and maintenance management system can process various Windows devices more perfectly.
Furthermore, portions of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application by way of operation of the computer. Program instructions for invoking the methods of the present application may be stored in fixed or removable recording media and/or transmitted via a data stream in a broadcast or other signal bearing medium and/or stored within a working memory of a computer device operating according to the program instructions. Some embodiments of the present application provide a computing device comprising a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the methods and/or aspects of the various embodiments of the present application described previously.
Furthermore, some embodiments of the present application provide a computer readable medium having stored thereon computer program instructions executable by a processor to implement the methods and/or aspects of the various embodiments of the present application described above.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In some embodiments, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Claims (9)
1. A method for remotely modifying a Windows device password by a Linux device, wherein the method comprises:
sending a decryption instruction to Windows transfer equipment through Linux equipment, wherein the decryption instruction and decryption information are transmitted between the Linux equipment and the Windows transfer equipment through a custom protocol;
after the Windows transit device receives the decryption instruction, the target Windows device is remotely logged in through a WinRM module of PowerShell, and decryption operation is performed on the target Windows device.
2. The method of claim 1, wherein the method further comprises:
the target Windows device returns feedback information about the decryption operation to the Windows transit device;
and the Windows transit equipment returns the feedback information about the decryption instruction to the Linux equipment.
3. The method according to claim 1 or 2, wherein the method further comprises:
and the Linux equipment and the Windows transfer equipment interact by adopting a custom protocol.
4. A method for remotely modifying a Windows device password at a Linux device side, wherein the method comprises the following steps:
sending a decryption instruction to Windows transfer equipment;
the decryption instruction and decryption information are transmitted between the Linux equipment and the Windows transfer equipment through a custom protocol; after the Windows transit equipment receives the decryption instruction, remotely logging in target Windows equipment through a WinRM module of PowerShell, and performing decryption operation on the target Windows equipment;
and receiving feedback information about the decryption instruction returned by the Windows transit equipment.
5. A method for remotely modifying a password of a Windows device at a Windows transfer device side, wherein the method comprises the following steps:
receiving a decryption instruction sent by a Linux device, wherein the decryption instruction and decryption information are transmitted between the Linux device and the Windows transfer device through a custom protocol;
based on the decryption instruction, remotely logging in target Windows equipment through a WinRM module of PowerShell, and performing decryption operation on the target Windows equipment;
and receiving feedback information about the decryption operation returned by the target Windows device, and sending the feedback information about the decryption instruction to the Linux device.
6. A Linux device for remotely modifying a Windows device password, wherein the device comprises:
the decryption instruction sending module is used for sending decryption instructions to the Windows transfer equipment;
the decryption instruction and decryption information are transmitted between the Linux equipment and the Windows transfer equipment through a custom protocol; after the Windows transit equipment receives the decryption instruction, remotely logging in target Windows equipment through a WinRM module of PowerShell, and performing decryption operation on the target Windows equipment;
and the feedback information receiving module is used for receiving feedback information about the decryption instruction returned by the Windows transit equipment.
7. A Windows transit device for remotely modifying a Windows device password, wherein the device comprises:
the decryption instruction receiving module is used for receiving decryption instructions sent by the Linux equipment, wherein the decryption instructions and decryption information are transmitted between the Linux equipment and the Windows transfer equipment through a custom protocol;
the decryption operation module is used for remotely logging in the target Windows equipment through the WinRM module of the PowerShell based on the decryption instruction, and carrying out decryption operation on the target Windows equipment;
and the decryption result feedback module is used for receiving feedback information about the decryption operation returned by the target Windows equipment and sending the feedback information about the decryption instruction to the Linux equipment.
8. A computing device, wherein the device comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any one of claims 1 to 5.
9. A computer readable medium having stored thereon computer program instructions executable by a processor to implement the method of any of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010922479.XA CN112115437B (en) | 2020-09-04 | 2020-09-04 | Method and device for remotely modifying Windows device password through Linux device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010922479.XA CN112115437B (en) | 2020-09-04 | 2020-09-04 | Method and device for remotely modifying Windows device password through Linux device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112115437A CN112115437A (en) | 2020-12-22 |
CN112115437B true CN112115437B (en) | 2023-12-29 |
Family
ID=73802773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010922479.XA Active CN112115437B (en) | 2020-09-04 | 2020-09-04 | Method and device for remotely modifying Windows device password through Linux device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112115437B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101676875A (en) * | 2008-08-15 | 2010-03-24 | 北京北大众志微系统科技有限责任公司 | Method for seamless access remote Windows application program by Linux terminal and apparatus thereof |
CN102955907A (en) * | 2012-10-25 | 2013-03-06 | 北京奇虎科技有限公司 | Password management method device |
CN106506153A (en) * | 2016-11-28 | 2017-03-15 | 浙江齐治科技股份有限公司 | One kind changes decryption method, device and fort machine automatically |
CN106686104A (en) * | 2017-01-04 | 2017-05-17 | 上海上讯信息技术股份有限公司 | Method and device used for operation and maintenance of target server |
CN106713494A (en) * | 2017-01-23 | 2017-05-24 | 上海上讯信息技术股份有限公司 | Intelligent auditing method and device |
CN108694102A (en) * | 2018-05-11 | 2018-10-23 | 携程旅游信息技术(上海)有限公司 | A kind of data manipulation method, equipment, system and medium based on Nexus services |
CN109446793A (en) * | 2018-09-21 | 2019-03-08 | 广州江南科友科技股份有限公司 | A kind of account based on Windows agent changes decryption method and device |
CN110401529A (en) * | 2019-07-23 | 2019-11-01 | 南瑞集团有限公司 | A kind of cipher management method |
CN110851253A (en) * | 2019-11-06 | 2020-02-28 | 万达信息股份有限公司 | Remote operation and maintenance method, system, storage medium and electronic equipment |
CN111177617A (en) * | 2019-12-06 | 2020-05-19 | 上海上讯信息技术股份有限公司 | Web direct operation and maintenance method and device based on operation and maintenance management system and electronic equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030204724A1 (en) * | 2002-04-30 | 2003-10-30 | Microsoft Corporation | Methods for remotely changing a communications password |
-
2020
- 2020-09-04 CN CN202010922479.XA patent/CN112115437B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101676875A (en) * | 2008-08-15 | 2010-03-24 | 北京北大众志微系统科技有限责任公司 | Method for seamless access remote Windows application program by Linux terminal and apparatus thereof |
CN102955907A (en) * | 2012-10-25 | 2013-03-06 | 北京奇虎科技有限公司 | Password management method device |
CN106506153A (en) * | 2016-11-28 | 2017-03-15 | 浙江齐治科技股份有限公司 | One kind changes decryption method, device and fort machine automatically |
CN106686104A (en) * | 2017-01-04 | 2017-05-17 | 上海上讯信息技术股份有限公司 | Method and device used for operation and maintenance of target server |
CN106713494A (en) * | 2017-01-23 | 2017-05-24 | 上海上讯信息技术股份有限公司 | Intelligent auditing method and device |
CN108694102A (en) * | 2018-05-11 | 2018-10-23 | 携程旅游信息技术(上海)有限公司 | A kind of data manipulation method, equipment, system and medium based on Nexus services |
CN109446793A (en) * | 2018-09-21 | 2019-03-08 | 广州江南科友科技股份有限公司 | A kind of account based on Windows agent changes decryption method and device |
CN110401529A (en) * | 2019-07-23 | 2019-11-01 | 南瑞集团有限公司 | A kind of cipher management method |
CN110851253A (en) * | 2019-11-06 | 2020-02-28 | 万达信息股份有限公司 | Remote operation and maintenance method, system, storage medium and electronic equipment |
CN111177617A (en) * | 2019-12-06 | 2020-05-19 | 上海上讯信息技术股份有限公司 | Web direct operation and maintenance method and device based on operation and maintenance management system and electronic equipment |
Non-Patent Citations (1)
Title |
---|
基于Telnet协议的网络设备密码管理系统的设计与实现;温凤;;通信与信息技术(第03期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112115437A (en) | 2020-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11343276B2 (en) | Systems and methods for discovering and alerting users of potentially hazardous messages | |
EP2479697B1 (en) | System and method for netbackup data decryption in a high latency low bandwidth environment | |
AU2020234675B2 (en) | Binding secure keys of secure guests to a hardware security module | |
AU2019221574A1 (en) | Asset management system, method, apparatus, and electronic device | |
EP3610623B1 (en) | Protocol-level identity mapping | |
US11632285B2 (en) | Dynamically accessing and configuring secured systems | |
US20190260718A1 (en) | Transforming a wrapped key into a protected key | |
Dashti et al. | Security challenges over cloud environment from service provider prospective | |
CN112115436B (en) | AD domain account password modification method and device | |
CN112671876B (en) | Method and equipment for page operation and maintenance | |
US10462113B1 (en) | Systems and methods for securing push authentications | |
CN112115437B (en) | Method and device for remotely modifying Windows device password through Linux device | |
US20230344826A1 (en) | Authentication token management for multiple processes and representational state transfer clients | |
US11082232B2 (en) | Auditably proving a usage history of an asset | |
CN112395591A (en) | Encryption method and system | |
CN115843359A (en) | Management of computing secrets | |
CN113411287B (en) | Key management system, method, device and equipment | |
CN110808943A (en) | Client connection emergency management method, client and computer readable storage medium | |
Liu et al. | Cross-organizational Non-repudiation Industrial Control Log System Based on Blockchain | |
Wahab Dashti et al. | Security Challenges over Cloud Environment from Service Provider Prospective | |
CN117201155A (en) | Security processing method, cloud platform for realizing method and computer readable medium | |
CN112214255A (en) | Method and equipment for calling executable program with parameters | |
CN117633743A (en) | Rights management, authentication processing method, device and computer readable medium | |
CN117056943A (en) | Data processing method, system, device and readable storage medium | |
CN115766191A (en) | Auditing system and method for operation and maintenance operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |