CN108737426A - One kind remotely exempting from close login method and system - Google Patents

One kind remotely exempting from close login method and system Download PDF

Info

Publication number
CN108737426A
CN108737426A CN201810508035.4A CN201810508035A CN108737426A CN 108737426 A CN108737426 A CN 108737426A CN 201810508035 A CN201810508035 A CN 201810508035A CN 108737426 A CN108737426 A CN 108737426A
Authority
CN
China
Prior art keywords
client
key
login
destination server
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810508035.4A
Other languages
Chinese (zh)
Inventor
黄锦盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810508035.4A priority Critical patent/CN108737426A/en
Publication of CN108737426A publication Critical patent/CN108737426A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides one kind and remotely exempting from close login method and system, obtains the address information of destination server and logs in key;The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction is configured to destination server log-on message table;The login key and target for configuring client transfer instruction, and the login key and target of client are transferred instruction and bound respectively with each log-in instruction in destination server log-on message table;Client-based login key obtains target and transfers instruction, parses destination server address information, and destination server is logged in by the login key of the destination server address information.The multiple login keys for needing to log in destination server concentrated in the client, user can improve the convenient of login in being logged in the switching of destination server to avoid input password.

Description

One kind remotely exempting from close login method and system
Technical field
The present invention relates to computer server technical fields, more particularly to one kind remotely exempting from close login method and system.
Background technology
In the prior art, it is to use plaintext communication that data, which communicate most common mode, that is, could be used without encrypted word, one As the meaning that can understand of people.May be bit stream in a communications system, such as text, bitmap, digitized voice or number The video image etc. of change.It can generally be simply considered that meaningful character or sets of bits in plain text, or by disclosed in certain Coding standard is with regard to obtainable message.
Internet communication uses plaintext communication, once being trapped, content just exposes undoubtedly.In order to be encrypted, at present Through starting SSH agreements, log-on message is all encrypted, becomes a basic solution of internet security, rapidly in full generation Boundary puts it over.
If a user uses another remote computer of SSH protocol entries from local computer, then it is assumed that, it is this Login is safe.If user switches between multiple remote computers in use, at this moment needing to each remote computer Use SSH protocol entries using using, increase in this way it is inconvenient, and during logging in remote computer, if Being manually entered password bad will lead to not normally log in use, influence to use.
Invention content
In order to overcome above-mentioned deficiency in the prior art, the present invention to provide one kind and remotely exempting from close login method, method includes:
It obtains the address information of destination server and logs in key;
The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction is configured to target Server log information table;
The login key and target for configuring client transfer instruction, and the login key and target of client are transferred instruction It is bound respectively with each log-in instruction in destination server log-on message table;
Client-based login key obtains target and transfers instruction, destination server address information is parsed, by described The login key of destination server address information logs in destination server.
Preferably, the client-based login key of step, which obtains local key and transfers instruction, further includes:
Corresponding client is set in client and logs in public key and client login private key;
Public key is added on the logon account of client;
Certification is completed using private key in client, client is logged in by public key.
Preferably, step is arranged corresponding login public key and logs in private key in client further includes:
The login public key of client is sent to destination server by the address information of destination server, makes destination service Device logs in client by logging in public key.
Preferably, destination server logs in client by logging in public key, and obtaining destination server from client logs in letter Table is ceased, destination server is made to log in other destination servers based on destination server log-on message table.
Preferably, client, which generates, logs in digital certificate, and logging in digital certificate includes:Corresponding client logs in public Key, client log in private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key, is logged in by key pair client as key parameter Private key is encrypted.
Preferably, encrypted private key and login digital certificate are preserved into electron key;
Using client PIN code as key parameter, calls des encryption algorithm to generate electron key and open key, pass through electricity Sub- key opens key and opens the encrypted private key of electron key acquisition and log in digital certificate.
Kind remotely exempts from close login system, client and multiple destination servers;
Client includes:Server info acquisition module, information table system tie up module and server log module;
Server info acquisition module is used to obtain the address information of destination server and logs in key;
Information table system ties up module and is used to the address information of destination server and login key being correspondingly formed log-in instruction, will Log-in instruction is configured to destination server log-on message table, and the login key and target for configuring client transfer instruction, will be objective The login key and target at family end are transferred instruction and are tied up respectively with each log-in instruction in destination server log-on message table It is fixed;
Server log module obtains target for client-based login key and transfers instruction, parses destination server Address information logs in destination server by the login key of the destination server address information.
Preferably, client further includes:Client logs in encrypting module;
Client logs in encrypting module and is used to that corresponding client login public key and client login to be arranged in client Private key;Public key is added on the logon account of client;And certification is completed using private key in client, it is logged in by public key Client.
Preferably, client further includes:Log-on message table sharing module;
Log-on message table sharing module is used to send the public key that logs in of client by the address information of destination server To destination server, so that destination server is passed through and log in public key login client;
Destination server includes:System login module;
System login module logs in public key login client for making destination server pass through, and target clothes are obtained from client Business device log-on message table, makes destination server log in other destination servers based on destination server log-on message table.
Preferably, client further includes:Log in security module;
It logs in security module and logs in digital certificate for making client generate, logging in digital certificate includes:Corresponding visitor Family end logs in public key, and client logs in private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key, is logged in by key pair client as key parameter Private key is encrypted.
Security module is logged in be additionally operable to preserve encrypted private key and login digital certificate into electron key;It will be objective Family end PIN code calls des encryption algorithm to generate electron key and opens key, opened by electron key close as key parameter Key opens electron key and obtains encrypted private key and log in digital certificate.
As can be seen from the above technical solutions, the present invention has the following advantages:
The client-based login key of system obtains target and transfers instruction, parses destination server address information, passes through The login key of the destination server address information logs in destination server.Mesh is extracted from destination server log-on message table Mark server address information and log in key, address information of the client based on destination server and log in cipher key lookup to pair The destination server answered is logged in by logging in key.User can based on need log in destination server login key, Realize the login to destination server.The multiple login keys for needing to log in destination server concentrated in the client, user In being logged in the switching of destination server, the convenient of login can be improved to avoid input password.Meanwhile client is arranged Safeguard protection, promotes the safety of client and the safety of lifting system, and no authorized user is avoided to log in.
System is for supporting ssh Telnets, when to being carried out at the same time more Telnets, avoid being manually entered it is cumbersome, Easy to operate, practicability is stronger, reduces the error rate being manually entered, shortens the testing time, improves testing efficiency.
Description of the drawings
In order to illustrate more clearly of technical scheme of the present invention, attached drawing needed in description will be made below simple Ground introduction, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill For personnel, without creative efforts, other drawings may also be obtained based on these drawings.
Fig. 1 is remotely to exempt from close login method flow chart;
Fig. 2 is that the local key of client-based login key acquisition transfers instruction flow chart;
Fig. 3 is remotely to exempt from close login system schematic diagram;
Fig. 4 is remotely to exempt from close login system embodiment schematic diagram.
Specific implementation mode
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, it will use below specific Embodiment and attached drawing, the technical solution protected to the present invention are clearly and completely described, it is clear that implementation disclosed below Example is only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiment in this patent, the common skill in this field All other embodiment that art personnel are obtained without making creative work belongs to the model of this patent protection It encloses.
The present embodiment provides one kind remotely exempting from close login method, as shown in Figure 1, method includes:
S1 obtains the address information of destination server and logs in key;
Namely client obtains the server address for needing to log in from system, and clothes can be found by server address Business device, and login key is obtained, by the corresponding server of login key sign-on access of server.Address information and login key As the relationship of a pair of binding, logged in obtain address.
The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction are configured to by S2 Destination server log-on message table;
Address information and login key based on acquisition carry out collecting arrangement, form a destination server log-on message Table can also be according to login when destination server log-on message table can be according to certain sequential arrangement, inquiry accessible by user Order arranged.
S3, the login key and target for configuring client transfer instruction, the login key and target of client are transferred Instruction is bound with each log-in instruction in destination server log-on message table respectively;
After forming destination server log-on message table, user can send out target to client and transfer instruction, that is, use The destination server address information that family will log in, target of the system based on user transfer the destination server address letter in instruction It ceases and gets the address information of destination server in destination server log-on message table and log in key.
S4, client-based login key obtain target and transfer instruction, parse destination server address information, pass through institute The login key for stating destination server address information logs in destination server.
The address information of destination server is extracted from destination server log-on message table and logs in key, and client is based on The address information and login cipher key lookup of destination server are logged in corresponding destination server by logging in key.
In the present embodiment, in order to ensure the safety of client, the safety of client and the peace of lifting system are promoted Quan Xing avoids no authorized user from logging in.
It transfers instruction as shown in Fig. 2, the client-based login key of step obtains local key and further includes:
S11 is arranged corresponding client in client and logs in public key and client login private key;
Public key is added on the logon account of client by S12;
S13 completes certification using private key in client, client is logged in by public key.
A pair of secret keys is made using key generator, one of them is public key, and one is private key.Public key is added to client In the storage area at end, client can be completed to protect the information of some clients using private key.There is no private key, any user can not It is remotely logged into client by the password of SSH Brute Force public keys.If public key is sent to, or based on the mesh after mandate Mark server can log on to client after getting public key.
Such a is public key, and one improves the safety to client and system for private key.
Further, step is arranged corresponding login public key and logs in private key in client further includes:By client It logs in public key and destination server is sent to by the address information of destination server, so that destination server is passed through and log in public key login Client.Needs of the destination server based on user can log on to client by logging in public key, and mesh is got from client Server log information table is marked, the address information based on the destination server on destination server log-on message table and login key Realize the sign-on access to other servers.If but needing to log in private key to the modification for logging in public key to realize.
In the present embodiment, in order to improve the safety of system, client, which generates, logs in digital certificate, logs in digital certificate packet It includes:Corresponding client logs in public key, and client logs in private key, client ip, certificate purposes;Client PIN code is as close Key parameter calls des encryption algorithm to generate key, and logging in private key by key pair client is encrypted.
Encrypted private key and login digital certificate are preserved into electron key;Using client PIN code as key Parameter calls des encryption algorithm to generate electron key and opens key, and opening key unlatching electron key by electron key obtains Encrypted private key and login digital certificate.
The login to client may be implemented by electron key by user, in this way can be to avoid being manually entered login public key. If system includes multiple client, it is provided with client ip in digital certificate, client login can be distinguished in this way Public key cryptosyst.If user customer logs in public key and modifies, it can get which client is stepped on by client ip Record public key is modified.Different clients can be set in this way and log in public key to realize for different client logins.
The present invention also provides one kind remotely exempting from close login system, as shown in Figure 3 and Figure 4, client 1 and multiple targets clothes Business device 2;
Client 1 includes:Server info acquisition module 11, information table system tie up module 12 and server log module 13;
Server info acquisition module 11 is used to obtain the address information of destination server and logs in key;Information table system is tied up Module 12 is used to the address information of destination server and login key being correspondingly formed log-in instruction, and log-in instruction is configured to mesh Mark server log information table, the login key and target for configuring client transfer instruction, by the login key of client with Target is transferred instruction and is bound respectively with each log-in instruction in destination server log-on message table;Server log module 13 obtain target for client-based login key transfers instruction, parses destination server address information, passes through the mesh The login key for marking server address information logs in destination server.
Client obtains the server address for needing to log in from system, and server can be found by server address, And login key is obtained, by the corresponding server of login key sign-on access of server.Address information and login key conduct The relationship of a pair of of binding, is logged in obtain address.
Address information and login key based on acquisition carry out collecting arrangement, form a destination server log-on message Table can also be according to login when destination server log-on message table can be according to certain sequential arrangement, inquiry accessible by user Order arranged.After forming destination server log-on message table, user can send out target to client and transfer instruction, It is exactly the destination server address information that user will log in, target of the system based on user transfers the destination server in instruction Address information gets the address information of destination server in destination server log-on message table and logs in key.
The address information of destination server is extracted from destination server log-on message table and logs in key, and client is based on The address information and login cipher key lookup of destination server are logged in corresponding destination server by logging in key.
In the present embodiment, client further includes:Client logs in encrypting module;Client logs in encrypting module and is used in visitor Family end is arranged corresponding client and logs in public key and client login private key;Public key is added to the logon account of client On;And certification is completed using private key in client, client is logged in by public key.
Client further includes:Log-on message table sharing module;Log-on message table sharing module is used for the login of client Public key is sent to destination server by the address information of destination server, so that destination server is passed through and logs in public key login client End;Destination server includes:System login modular system login module logs in public key login visitor for making destination server pass through Family end is obtained destination server log-on message table from client, destination server is made to be stepped on based on destination server log-on message table Record other destination servers.
In the present embodiment, client further includes:Log in security module;Security module is logged in log in for making client generate Digital certificate, logging in digital certificate includes:Corresponding client logs in public key, and client logs in private key, client ip, certificate Purposes;Client PIN code calls des encryption algorithm to generate key as key parameter, and private key is logged in by key pair client It is encrypted.Security module is logged in be additionally operable to preserve encrypted private key and login digital certificate into electron key;It will Client PIN code calls des encryption algorithm to generate electron key and opens key, opened by electron key as key parameter Key opens electron key and obtains encrypted private key and log in digital certificate.
The login to client may be implemented by electron key by user, in this way can be to avoid being manually entered login public key. If system includes multiple client, it is provided with client ip in digital certificate, client login can be distinguished in this way Public key cryptosyst.If user customer logs in public key and modifies, it can get which client is stepped on by client ip Record public key is modified.Different clients can be set in this way and log in public key to realize for different client logins.
Need to input password login manually when system is for long-range ssh login Linux OS, provide a kind of highly practical The LinuxOS for exempting from password ssh Telnet test leads may be implemented in method, avoids testing all being manually entered every time, reduces Mistake.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, identical similar portion refers to mutually between each embodiment.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest range caused.

Claims (10)

1. one kind remotely exempting from close login method, which is characterized in that method includes:
It obtains the address information of destination server and logs in key;
The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction is configured to destination service Device log-on message table;
The login key and target for configuring client transfer instruction, and the login key and target of client are transferred instruction difference It is bound with each log-in instruction in destination server log-on message table;
Client-based login key obtains target and transfers instruction, parses destination server address information, passes through the target The login key of server address information logs in destination server.
2. according to claim 1 remotely exempt from close login method, which is characterized in that
The client-based local key of login key acquisition of step transfers instruction and further includes:
Corresponding client is set in client and logs in public key and client login private key;
Public key is added on the logon account of client;
Certification is completed using private key in client, client is logged in by public key.
3. according to claim 2 remotely exempt from close login method, which is characterized in that
Step is arranged corresponding login public key and logs in private key in client:
The login public key of client is sent to destination server by the address information of destination server, keeps destination server logical It crosses login public key and logs in client.
4. according to claim 3 remotely exempt from close login method, which is characterized in that
Destination server logs in client by logging in public key, obtains destination server log-on message table from client, makes target Server logs in other destination servers based on destination server log-on message table.
5. according to claim 1 or 2 remotely exempt from close login method, which is characterized in that
Client, which generates, logs in digital certificate, logs in digital certificate and includes:Corresponding client logs in public key, and client logs in Private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key as key parameter, and private key is logged in by key pair client It is encrypted.
6. according to claim 5 remotely exempt from close login method, which is characterized in that
Encrypted private key and login digital certificate are preserved into electron key;
Using client PIN code as key parameter, calls des encryption algorithm to generate electron key and open key, pass through electronics key Spoon opens key and opens the encrypted private key of electron key acquisition and log in digital certificate.
7. one kind remotely exempting from close login system, which is characterized in that client and multiple destination servers;
Client includes:Server info acquisition module, information table system tie up module and server log module;
Server info acquisition module is used to obtain the address information of destination server and logs in key;
Information table system ties up module for the address information of destination server and login key to be correspondingly formed log-in instruction, will log in Instruction is configured to destination server log-on message table, and the login key and target for configuring client transfer instruction, by client Login key and target transfer instruction bound respectively with each log-in instruction in destination server log-on message table;
Server log module obtains target for client-based login key and transfers instruction, parses destination server address Information logs in destination server by the login key of the destination server address information.
8. according to claim 7 remotely exempt from close login system, which is characterized in that
Client further includes:Client logs in encrypting module;
Client logs in encrypting module and is used to that corresponding client login public key and client login private key to be arranged in client; Public key is added on the logon account of client;And certification is completed using private key in client, client is logged in by public key End.
9. according to claim 7 remotely exempt from close login system, which is characterized in that
Client further includes:Log-on message table sharing module;
Log-on message table sharing module is used to the login public key of client being sent to mesh by the address information of destination server Server is marked, so that destination server is passed through and logs in public key login client;
Destination server includes:System login module;
System login module logs in public key login client for making destination server pass through, and destination server is obtained from client Log-on message table makes destination server log in other destination servers based on destination server log-on message table.
10. according to claim 7 remotely exempt from close login system, which is characterized in that
Client further includes:Log in security module;
It logs in security module and logs in digital certificate for making client generate, logging in digital certificate includes:Corresponding client Public key is logged in, client logs in private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key as key parameter, and private key is logged in by key pair client It is encrypted;
Security module is logged in be additionally operable to preserve encrypted private key and login digital certificate into electron key;By client PIN code calls des encryption algorithm to generate electron key and opens key as key parameter, opens key by electron key and opens Electron key is opened to obtain encrypted private key and log in digital certificate.
CN201810508035.4A 2018-05-24 2018-05-24 One kind remotely exempting from close login method and system Pending CN108737426A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810508035.4A CN108737426A (en) 2018-05-24 2018-05-24 One kind remotely exempting from close login method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810508035.4A CN108737426A (en) 2018-05-24 2018-05-24 One kind remotely exempting from close login method and system

Publications (1)

Publication Number Publication Date
CN108737426A true CN108737426A (en) 2018-11-02

Family

ID=63936172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810508035.4A Pending CN108737426A (en) 2018-05-24 2018-05-24 One kind remotely exempting from close login method and system

Country Status (1)

Country Link
CN (1) CN108737426A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071922A (en) * 2019-04-24 2019-07-30 苏州浪潮智能科技有限公司 A kind of method and system of Telnet bulk service device Linux system
CN111049671A (en) * 2019-11-08 2020-04-21 合肥宜拾惠网络科技有限公司 System integration method and device
CN112256500A (en) * 2020-09-18 2021-01-22 苏州浪潮智能科技有限公司 Storage system test server configuration method, system, terminal and storage medium
CN112565198A (en) * 2020-11-11 2021-03-26 浪潮电子信息产业股份有限公司 Secret-free login method and device, electronic equipment and storage medium
CN114124496A (en) * 2021-11-12 2022-03-01 福州汇思博信息技术有限公司 SSH remote login method based on server issued key and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391198A (en) * 2013-07-22 2013-11-13 三珠数码软件开发(上海)有限公司 Data processing method of Linux server cluster accounts
US8701157B1 (en) * 2011-10-28 2014-04-15 Google Inc. Configuring policy settings on client computing devices
CN105208010A (en) * 2015-08-28 2015-12-30 苏州国云数据科技有限公司 Reverse-SSH-based cross-local-area-network remote data connecting method
CN106131092A (en) * 2016-08-31 2016-11-16 天脉聚源(北京)传媒科技有限公司 A kind of method and device of telnet server
CN106790364A (en) * 2016-11-14 2017-05-31 天脉聚源(北京)传媒科技有限公司 A kind of remote entry method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8701157B1 (en) * 2011-10-28 2014-04-15 Google Inc. Configuring policy settings on client computing devices
CN103391198A (en) * 2013-07-22 2013-11-13 三珠数码软件开发(上海)有限公司 Data processing method of Linux server cluster accounts
CN105208010A (en) * 2015-08-28 2015-12-30 苏州国云数据科技有限公司 Reverse-SSH-based cross-local-area-network remote data connecting method
CN106131092A (en) * 2016-08-31 2016-11-16 天脉聚源(北京)传媒科技有限公司 A kind of method and device of telnet server
CN106790364A (en) * 2016-11-14 2017-05-31 天脉聚源(北京)传媒科技有限公司 A kind of remote entry method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曲广平: "基于密钥对认证登录SSH", 《网络安全和信息化》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071922A (en) * 2019-04-24 2019-07-30 苏州浪潮智能科技有限公司 A kind of method and system of Telnet bulk service device Linux system
CN111049671A (en) * 2019-11-08 2020-04-21 合肥宜拾惠网络科技有限公司 System integration method and device
CN112256500A (en) * 2020-09-18 2021-01-22 苏州浪潮智能科技有限公司 Storage system test server configuration method, system, terminal and storage medium
CN112256500B (en) * 2020-09-18 2023-01-10 苏州浪潮智能科技有限公司 Storage system test server configuration method, system, terminal and storage medium
CN112565198A (en) * 2020-11-11 2021-03-26 浪潮电子信息产业股份有限公司 Secret-free login method and device, electronic equipment and storage medium
CN114124496A (en) * 2021-11-12 2022-03-01 福州汇思博信息技术有限公司 SSH remote login method based on server issued key and server
CN114124496B (en) * 2021-11-12 2023-11-24 福建汇思博数字科技有限公司 SSH remote login method based on server issued key and server

Similar Documents

Publication Publication Date Title
CN108737426A (en) One kind remotely exempting from close login method and system
US8737624B2 (en) Secure email communication system
CN107425983A (en) A kind of unified identity authentication method and system platform based on WEB service
US20110170696A1 (en) System and method for secure access
CA2661922A1 (en) Method and system for providing authentication service for internet users
Ashley et al. Practical Intranet Security: Overview of the State of the Art and Available Technologies
CN110602083B (en) Secure transmission and storage method of digital identity authentication data
CN101521667A (en) Method and device for safety data communication
Sauter et al. Achievement of secure Internet access to fieldbus systems
Katz Wpa vs. wpa2: Is wpa2 really an improvement on wpa?
Steinberg et al. SSL VPN: Understanding, evaluating, and planning secure, web-based remote access
Joshi Network security: know it all
Ji et al. Security analysis of shadowsocks (r) protocol
Alhumrani et al. Cryptographic protocols for secure cloud computing
Ren et al. A detailed implement and analysis of MPLS VPN based on IPSec
Luo et al. Research on OPC UA Security Encryption Method
Held Virtual private networking: a construction, operation and utilization guide
CN100525175C (en) Housing district communication encipher method based on broadband network
Reid Plugging the holes in host-based authentication
Forrester Security in data networks
Singh Network Security and Cryptography: A Qualitative Exploration and Recent Advancements
Galande et al. Security in Voip Network Using Neural Network and Encryption Techniques
Roos Lecture Notes: Computer Networks CSE1405 Cryptography and Network Security
Barriga et al. Communications security in an all-IP world
Stahnke Legacy Protocols: Why Replace Telnet, FTP, rsh, rcp, and rlogin with SSH?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102