Method for realizing automatic password change containing fault-tolerant mechanism for cloud host and cloud bastion host

A fault-tolerant mechanism, the technology of the bastion machine, applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the problems of difficulty in realizing automatic encryption, unstable automatic encryption, and scattered distribution.

Pending Publication Date: 2022-04-19
COSCO SHIPPING TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve the problems of highly heterogeneous and scattered infrastructure of the cloud computing platform, the isolation of the cloud computing platform and the traditional bastion machine, it is difficult to realize automatic encryption and the automatic encryption is unstable after realization, etc., the present invention develops a A method for automatically changing encryption with a fault-tolerant mechanism for cloud hosts and cloud bastion machines, which can complete the automatic synchronization of cloud asset information in the cloud computing platform of the cloud computing platform and the bastion machine, and can issue password policies through the cloud computing platform to realize cloud computing. The cloud asset information in the computing platform is automatically changed; under the unified management of the cloud platform, the random change of the cloud asset information in all cloud computing platforms is completed, and the information is synchronized with the cloud bastion machine, and the automatic change is realized. After encryption, the cloud tenant directly logs in to the cloud bastion machine through the cloud platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing automatic password change containing fault-tolerant mechanism for cloud host and cloud bastion host
  • Method for realizing automatic password change containing fault-tolerant mechanism for cloud host and cloud bastion host
  • Method for realizing automatic password change containing fault-tolerant mechanism for cloud host and cloud bastion host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only Embodiments of some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0049] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cloud computing and information security, in particular to a method for realizing automatic password change containing a fault-tolerant mechanism for a cloud host and a cloud bastion host. According to the invention, the cloud computing service is arranged, deployed and fused with the open source bastion host, so that the butt joint of the cloud computing platform and the cloud bastion host is realized, the automatic synchronization of the cloud asset information of the cloud computing platform is completed, and the timed automatic password change of the cloud asset information of the cloud computing platform is realized by adding a fault-tolerant mechanism and issuing a password strategy by the cloud computing platform. The method comprises the following steps: deploying and fusing an open source bastion host, and developing a cloud bastion host verification module; establishing a fault-tolerant mechanism response rule; synchronizing a cloud asset information rule response rule in the cloud computing platform in real time; obtaining a password changing strategy; and executing automatic password changing. According to the method and the system, automatic password change for the cloud host and the cloud bastion host is realized, random password change of all cloud resource accounts is completed, synchronization with the cloud bastion host is realized, and the cloud tenant can directly log in the cloud bastion host through the cloud platform after automatic password change.

Description

technical field [0001] The invention relates to the technical field of cloud computing and information security, in particular to a method for realizing automatic encryption with a fault-tolerant mechanism for cloud hosts and cloud bastion hosts. Background technique [0002] Cloud host is an important part of cloud computing in infrastructure applications. It is located at the bottom of the cloud computing industry chain pyramid, and its products originate from cloud computing platforms. The platform integrates three core elements of Internet applications: computing, storage, and network, and provides public Internet infrastructure services for users. Cloud host is a virtualization technology similar to VPS host. VPS uses virtual software. VZ or VM virtualizes multiple parts similar to independent hosts on one host. operating system, the management method is the same as that of the host. With the development of cloud computing, the network security issues cannot be ignore...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L67/10H04L9/40H04L67/1095
CPCH04L67/10H04L63/20H04L63/083H04L67/1095
Inventor 吴中岱王骏翔郭磊胡蓉韩冰刘晋
Owner COSCO SHIPPING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products