CN108737426A - One kind remotely exempting from close login method and system - Google Patents
One kind remotely exempting from close login method and system Download PDFInfo
- Publication number
- CN108737426A CN108737426A CN201810508035.4A CN201810508035A CN108737426A CN 108737426 A CN108737426 A CN 108737426A CN 201810508035 A CN201810508035 A CN 201810508035A CN 108737426 A CN108737426 A CN 108737426A
- Authority
- CN
- China
- Prior art keywords
- client
- key
- login
- destination server
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides one kind and remotely exempting from close login method and system, obtains the address information of destination server and logs in key;The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction is configured to destination server log-on message table;The login key and target for configuring client transfer instruction, and the login key and target of client are transferred instruction and bound respectively with each log-in instruction in destination server log-on message table;Client-based login key obtains target and transfers instruction, parses destination server address information, and destination server is logged in by the login key of the destination server address information.The multiple login keys for needing to log in destination server concentrated in the client, user can improve the convenient of login in being logged in the switching of destination server to avoid input password.
Description
Technical field
The present invention relates to computer server technical fields, more particularly to one kind remotely exempting from close login method and system.
Background technology
In the prior art, it is to use plaintext communication that data, which communicate most common mode, that is, could be used without encrypted word, one
As the meaning that can understand of people.May be bit stream in a communications system, such as text, bitmap, digitized voice or number
The video image etc. of change.It can generally be simply considered that meaningful character or sets of bits in plain text, or by disclosed in certain
Coding standard is with regard to obtainable message.
Internet communication uses plaintext communication, once being trapped, content just exposes undoubtedly.In order to be encrypted, at present
Through starting SSH agreements, log-on message is all encrypted, becomes a basic solution of internet security, rapidly in full generation
Boundary puts it over.
If a user uses another remote computer of SSH protocol entries from local computer, then it is assumed that, it is this
Login is safe.If user switches between multiple remote computers in use, at this moment needing to each remote computer
Use SSH protocol entries using using, increase in this way it is inconvenient, and during logging in remote computer, if
Being manually entered password bad will lead to not normally log in use, influence to use.
Invention content
In order to overcome above-mentioned deficiency in the prior art, the present invention to provide one kind and remotely exempting from close login method, method includes:
It obtains the address information of destination server and logs in key;
The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction is configured to target
Server log information table;
The login key and target for configuring client transfer instruction, and the login key and target of client are transferred instruction
It is bound respectively with each log-in instruction in destination server log-on message table;
Client-based login key obtains target and transfers instruction, destination server address information is parsed, by described
The login key of destination server address information logs in destination server.
Preferably, the client-based login key of step, which obtains local key and transfers instruction, further includes:
Corresponding client is set in client and logs in public key and client login private key;
Public key is added on the logon account of client;
Certification is completed using private key in client, client is logged in by public key.
Preferably, step is arranged corresponding login public key and logs in private key in client further includes:
The login public key of client is sent to destination server by the address information of destination server, makes destination service
Device logs in client by logging in public key.
Preferably, destination server logs in client by logging in public key, and obtaining destination server from client logs in letter
Table is ceased, destination server is made to log in other destination servers based on destination server log-on message table.
Preferably, client, which generates, logs in digital certificate, and logging in digital certificate includes:Corresponding client logs in public
Key, client log in private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key, is logged in by key pair client as key parameter
Private key is encrypted.
Preferably, encrypted private key and login digital certificate are preserved into electron key;
Using client PIN code as key parameter, calls des encryption algorithm to generate electron key and open key, pass through electricity
Sub- key opens key and opens the encrypted private key of electron key acquisition and log in digital certificate.
Kind remotely exempts from close login system, client and multiple destination servers;
Client includes:Server info acquisition module, information table system tie up module and server log module;
Server info acquisition module is used to obtain the address information of destination server and logs in key;
Information table system ties up module and is used to the address information of destination server and login key being correspondingly formed log-in instruction, will
Log-in instruction is configured to destination server log-on message table, and the login key and target for configuring client transfer instruction, will be objective
The login key and target at family end are transferred instruction and are tied up respectively with each log-in instruction in destination server log-on message table
It is fixed;
Server log module obtains target for client-based login key and transfers instruction, parses destination server
Address information logs in destination server by the login key of the destination server address information.
Preferably, client further includes:Client logs in encrypting module;
Client logs in encrypting module and is used to that corresponding client login public key and client login to be arranged in client
Private key;Public key is added on the logon account of client;And certification is completed using private key in client, it is logged in by public key
Client.
Preferably, client further includes:Log-on message table sharing module;
Log-on message table sharing module is used to send the public key that logs in of client by the address information of destination server
To destination server, so that destination server is passed through and log in public key login client;
Destination server includes:System login module;
System login module logs in public key login client for making destination server pass through, and target clothes are obtained from client
Business device log-on message table, makes destination server log in other destination servers based on destination server log-on message table.
Preferably, client further includes:Log in security module;
It logs in security module and logs in digital certificate for making client generate, logging in digital certificate includes:Corresponding visitor
Family end logs in public key, and client logs in private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key, is logged in by key pair client as key parameter
Private key is encrypted.
Security module is logged in be additionally operable to preserve encrypted private key and login digital certificate into electron key;It will be objective
Family end PIN code calls des encryption algorithm to generate electron key and opens key, opened by electron key close as key parameter
Key opens electron key and obtains encrypted private key and log in digital certificate.
As can be seen from the above technical solutions, the present invention has the following advantages:
The client-based login key of system obtains target and transfers instruction, parses destination server address information, passes through
The login key of the destination server address information logs in destination server.Mesh is extracted from destination server log-on message table
Mark server address information and log in key, address information of the client based on destination server and log in cipher key lookup to pair
The destination server answered is logged in by logging in key.User can based on need log in destination server login key,
Realize the login to destination server.The multiple login keys for needing to log in destination server concentrated in the client, user
In being logged in the switching of destination server, the convenient of login can be improved to avoid input password.Meanwhile client is arranged
Safeguard protection, promotes the safety of client and the safety of lifting system, and no authorized user is avoided to log in.
System is for supporting ssh Telnets, when to being carried out at the same time more Telnets, avoid being manually entered it is cumbersome,
Easy to operate, practicability is stronger, reduces the error rate being manually entered, shortens the testing time, improves testing efficiency.
Description of the drawings
In order to illustrate more clearly of technical scheme of the present invention, attached drawing needed in description will be made below simple
Ground introduction, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill
For personnel, without creative efforts, other drawings may also be obtained based on these drawings.
Fig. 1 is remotely to exempt from close login method flow chart;
Fig. 2 is that the local key of client-based login key acquisition transfers instruction flow chart;
Fig. 3 is remotely to exempt from close login system schematic diagram;
Fig. 4 is remotely to exempt from close login system embodiment schematic diagram.
Specific implementation mode
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, it will use below specific
Embodiment and attached drawing, the technical solution protected to the present invention are clearly and completely described, it is clear that implementation disclosed below
Example is only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiment in this patent, the common skill in this field
All other embodiment that art personnel are obtained without making creative work belongs to the model of this patent protection
It encloses.
The present embodiment provides one kind remotely exempting from close login method, as shown in Figure 1, method includes:
S1 obtains the address information of destination server and logs in key;
Namely client obtains the server address for needing to log in from system, and clothes can be found by server address
Business device, and login key is obtained, by the corresponding server of login key sign-on access of server.Address information and login key
As the relationship of a pair of binding, logged in obtain address.
The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction are configured to by S2
Destination server log-on message table;
Address information and login key based on acquisition carry out collecting arrangement, form a destination server log-on message
Table can also be according to login when destination server log-on message table can be according to certain sequential arrangement, inquiry accessible by user
Order arranged.
S3, the login key and target for configuring client transfer instruction, the login key and target of client are transferred
Instruction is bound with each log-in instruction in destination server log-on message table respectively;
After forming destination server log-on message table, user can send out target to client and transfer instruction, that is, use
The destination server address information that family will log in, target of the system based on user transfer the destination server address letter in instruction
It ceases and gets the address information of destination server in destination server log-on message table and log in key.
S4, client-based login key obtain target and transfer instruction, parse destination server address information, pass through institute
The login key for stating destination server address information logs in destination server.
The address information of destination server is extracted from destination server log-on message table and logs in key, and client is based on
The address information and login cipher key lookup of destination server are logged in corresponding destination server by logging in key.
In the present embodiment, in order to ensure the safety of client, the safety of client and the peace of lifting system are promoted
Quan Xing avoids no authorized user from logging in.
It transfers instruction as shown in Fig. 2, the client-based login key of step obtains local key and further includes:
S11 is arranged corresponding client in client and logs in public key and client login private key;
Public key is added on the logon account of client by S12;
S13 completes certification using private key in client, client is logged in by public key.
A pair of secret keys is made using key generator, one of them is public key, and one is private key.Public key is added to client
In the storage area at end, client can be completed to protect the information of some clients using private key.There is no private key, any user can not
It is remotely logged into client by the password of SSH Brute Force public keys.If public key is sent to, or based on the mesh after mandate
Mark server can log on to client after getting public key.
Such a is public key, and one improves the safety to client and system for private key.
Further, step is arranged corresponding login public key and logs in private key in client further includes:By client
It logs in public key and destination server is sent to by the address information of destination server, so that destination server is passed through and log in public key login
Client.Needs of the destination server based on user can log on to client by logging in public key, and mesh is got from client
Server log information table is marked, the address information based on the destination server on destination server log-on message table and login key
Realize the sign-on access to other servers.If but needing to log in private key to the modification for logging in public key to realize.
In the present embodiment, in order to improve the safety of system, client, which generates, logs in digital certificate, logs in digital certificate packet
It includes:Corresponding client logs in public key, and client logs in private key, client ip, certificate purposes;Client PIN code is as close
Key parameter calls des encryption algorithm to generate key, and logging in private key by key pair client is encrypted.
Encrypted private key and login digital certificate are preserved into electron key;Using client PIN code as key
Parameter calls des encryption algorithm to generate electron key and opens key, and opening key unlatching electron key by electron key obtains
Encrypted private key and login digital certificate.
The login to client may be implemented by electron key by user, in this way can be to avoid being manually entered login public key.
If system includes multiple client, it is provided with client ip in digital certificate, client login can be distinguished in this way
Public key cryptosyst.If user customer logs in public key and modifies, it can get which client is stepped on by client ip
Record public key is modified.Different clients can be set in this way and log in public key to realize for different client logins.
The present invention also provides one kind remotely exempting from close login system, as shown in Figure 3 and Figure 4, client 1 and multiple targets clothes
Business device 2;
Client 1 includes:Server info acquisition module 11, information table system tie up module 12 and server log module
13;
Server info acquisition module 11 is used to obtain the address information of destination server and logs in key;Information table system is tied up
Module 12 is used to the address information of destination server and login key being correspondingly formed log-in instruction, and log-in instruction is configured to mesh
Mark server log information table, the login key and target for configuring client transfer instruction, by the login key of client with
Target is transferred instruction and is bound respectively with each log-in instruction in destination server log-on message table;Server log module
13 obtain target for client-based login key transfers instruction, parses destination server address information, passes through the mesh
The login key for marking server address information logs in destination server.
Client obtains the server address for needing to log in from system, and server can be found by server address,
And login key is obtained, by the corresponding server of login key sign-on access of server.Address information and login key conduct
The relationship of a pair of of binding, is logged in obtain address.
Address information and login key based on acquisition carry out collecting arrangement, form a destination server log-on message
Table can also be according to login when destination server log-on message table can be according to certain sequential arrangement, inquiry accessible by user
Order arranged.After forming destination server log-on message table, user can send out target to client and transfer instruction,
It is exactly the destination server address information that user will log in, target of the system based on user transfers the destination server in instruction
Address information gets the address information of destination server in destination server log-on message table and logs in key.
The address information of destination server is extracted from destination server log-on message table and logs in key, and client is based on
The address information and login cipher key lookup of destination server are logged in corresponding destination server by logging in key.
In the present embodiment, client further includes:Client logs in encrypting module;Client logs in encrypting module and is used in visitor
Family end is arranged corresponding client and logs in public key and client login private key;Public key is added to the logon account of client
On;And certification is completed using private key in client, client is logged in by public key.
Client further includes:Log-on message table sharing module;Log-on message table sharing module is used for the login of client
Public key is sent to destination server by the address information of destination server, so that destination server is passed through and logs in public key login client
End;Destination server includes:System login modular system login module logs in public key login visitor for making destination server pass through
Family end is obtained destination server log-on message table from client, destination server is made to be stepped on based on destination server log-on message table
Record other destination servers.
In the present embodiment, client further includes:Log in security module;Security module is logged in log in for making client generate
Digital certificate, logging in digital certificate includes:Corresponding client logs in public key, and client logs in private key, client ip, certificate
Purposes;Client PIN code calls des encryption algorithm to generate key as key parameter, and private key is logged in by key pair client
It is encrypted.Security module is logged in be additionally operable to preserve encrypted private key and login digital certificate into electron key;It will
Client PIN code calls des encryption algorithm to generate electron key and opens key, opened by electron key as key parameter
Key opens electron key and obtains encrypted private key and log in digital certificate.
The login to client may be implemented by electron key by user, in this way can be to avoid being manually entered login public key.
If system includes multiple client, it is provided with client ip in digital certificate, client login can be distinguished in this way
Public key cryptosyst.If user customer logs in public key and modifies, it can get which client is stepped on by client ip
Record public key is modified.Different clients can be set in this way and log in public key to realize for different client logins.
Need to input password login manually when system is for long-range ssh login Linux OS, provide a kind of highly practical
The LinuxOS for exempting from password ssh Telnet test leads may be implemented in method, avoids testing all being manually entered every time, reduces
Mistake.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other
The difference of embodiment, identical similar portion refers to mutually between each embodiment.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest range caused.
Claims (10)
1. one kind remotely exempting from close login method, which is characterized in that method includes:
It obtains the address information of destination server and logs in key;
The address information of destination server and login key are correspondingly formed log-in instruction, log-in instruction is configured to destination service
Device log-on message table;
The login key and target for configuring client transfer instruction, and the login key and target of client are transferred instruction difference
It is bound with each log-in instruction in destination server log-on message table;
Client-based login key obtains target and transfers instruction, parses destination server address information, passes through the target
The login key of server address information logs in destination server.
2. according to claim 1 remotely exempt from close login method, which is characterized in that
The client-based local key of login key acquisition of step transfers instruction and further includes:
Corresponding client is set in client and logs in public key and client login private key;
Public key is added on the logon account of client;
Certification is completed using private key in client, client is logged in by public key.
3. according to claim 2 remotely exempt from close login method, which is characterized in that
Step is arranged corresponding login public key and logs in private key in client:
The login public key of client is sent to destination server by the address information of destination server, keeps destination server logical
It crosses login public key and logs in client.
4. according to claim 3 remotely exempt from close login method, which is characterized in that
Destination server logs in client by logging in public key, obtains destination server log-on message table from client, makes target
Server logs in other destination servers based on destination server log-on message table.
5. according to claim 1 or 2 remotely exempt from close login method, which is characterized in that
Client, which generates, logs in digital certificate, logs in digital certificate and includes:Corresponding client logs in public key, and client logs in
Private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key as key parameter, and private key is logged in by key pair client
It is encrypted.
6. according to claim 5 remotely exempt from close login method, which is characterized in that
Encrypted private key and login digital certificate are preserved into electron key;
Using client PIN code as key parameter, calls des encryption algorithm to generate electron key and open key, pass through electronics key
Spoon opens key and opens the encrypted private key of electron key acquisition and log in digital certificate.
7. one kind remotely exempting from close login system, which is characterized in that client and multiple destination servers;
Client includes:Server info acquisition module, information table system tie up module and server log module;
Server info acquisition module is used to obtain the address information of destination server and logs in key;
Information table system ties up module for the address information of destination server and login key to be correspondingly formed log-in instruction, will log in
Instruction is configured to destination server log-on message table, and the login key and target for configuring client transfer instruction, by client
Login key and target transfer instruction bound respectively with each log-in instruction in destination server log-on message table;
Server log module obtains target for client-based login key and transfers instruction, parses destination server address
Information logs in destination server by the login key of the destination server address information.
8. according to claim 7 remotely exempt from close login system, which is characterized in that
Client further includes:Client logs in encrypting module;
Client logs in encrypting module and is used to that corresponding client login public key and client login private key to be arranged in client;
Public key is added on the logon account of client;And certification is completed using private key in client, client is logged in by public key
End.
9. according to claim 7 remotely exempt from close login system, which is characterized in that
Client further includes:Log-on message table sharing module;
Log-on message table sharing module is used to the login public key of client being sent to mesh by the address information of destination server
Server is marked, so that destination server is passed through and logs in public key login client;
Destination server includes:System login module;
System login module logs in public key login client for making destination server pass through, and destination server is obtained from client
Log-on message table makes destination server log in other destination servers based on destination server log-on message table.
10. according to claim 7 remotely exempt from close login system, which is characterized in that
Client further includes:Log in security module;
It logs in security module and logs in digital certificate for making client generate, logging in digital certificate includes:Corresponding client
Public key is logged in, client logs in private key, client ip, certificate purposes;
Client PIN code calls des encryption algorithm to generate key as key parameter, and private key is logged in by key pair client
It is encrypted;
Security module is logged in be additionally operable to preserve encrypted private key and login digital certificate into electron key;By client
PIN code calls des encryption algorithm to generate electron key and opens key as key parameter, opens key by electron key and opens
Electron key is opened to obtain encrypted private key and log in digital certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810508035.4A CN108737426A (en) | 2018-05-24 | 2018-05-24 | One kind remotely exempting from close login method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810508035.4A CN108737426A (en) | 2018-05-24 | 2018-05-24 | One kind remotely exempting from close login method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108737426A true CN108737426A (en) | 2018-11-02 |
Family
ID=63936172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810508035.4A Pending CN108737426A (en) | 2018-05-24 | 2018-05-24 | One kind remotely exempting from close login method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108737426A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071922A (en) * | 2019-04-24 | 2019-07-30 | 苏州浪潮智能科技有限公司 | A kind of method and system of Telnet bulk service device Linux system |
CN111049671A (en) * | 2019-11-08 | 2020-04-21 | 合肥宜拾惠网络科技有限公司 | System integration method and device |
CN112256500A (en) * | 2020-09-18 | 2021-01-22 | 苏州浪潮智能科技有限公司 | Storage system test server configuration method, system, terminal and storage medium |
CN112565198A (en) * | 2020-11-11 | 2021-03-26 | 浪潮电子信息产业股份有限公司 | Secret-free login method and device, electronic equipment and storage medium |
CN114124496A (en) * | 2021-11-12 | 2022-03-01 | 福州汇思博信息技术有限公司 | SSH remote login method based on server issued key and server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103391198A (en) * | 2013-07-22 | 2013-11-13 | 三珠数码软件开发(上海)有限公司 | Data processing method of Linux server cluster accounts |
US8701157B1 (en) * | 2011-10-28 | 2014-04-15 | Google Inc. | Configuring policy settings on client computing devices |
CN105208010A (en) * | 2015-08-28 | 2015-12-30 | 苏州国云数据科技有限公司 | Reverse-SSH-based cross-local-area-network remote data connecting method |
CN106131092A (en) * | 2016-08-31 | 2016-11-16 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and device of telnet server |
CN106790364A (en) * | 2016-11-14 | 2017-05-31 | 天脉聚源(北京)传媒科技有限公司 | A kind of remote entry method and device |
-
2018
- 2018-05-24 CN CN201810508035.4A patent/CN108737426A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8701157B1 (en) * | 2011-10-28 | 2014-04-15 | Google Inc. | Configuring policy settings on client computing devices |
CN103391198A (en) * | 2013-07-22 | 2013-11-13 | 三珠数码软件开发(上海)有限公司 | Data processing method of Linux server cluster accounts |
CN105208010A (en) * | 2015-08-28 | 2015-12-30 | 苏州国云数据科技有限公司 | Reverse-SSH-based cross-local-area-network remote data connecting method |
CN106131092A (en) * | 2016-08-31 | 2016-11-16 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and device of telnet server |
CN106790364A (en) * | 2016-11-14 | 2017-05-31 | 天脉聚源(北京)传媒科技有限公司 | A kind of remote entry method and device |
Non-Patent Citations (1)
Title |
---|
曲广平: "基于密钥对认证登录SSH", 《网络安全和信息化》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071922A (en) * | 2019-04-24 | 2019-07-30 | 苏州浪潮智能科技有限公司 | A kind of method and system of Telnet bulk service device Linux system |
CN111049671A (en) * | 2019-11-08 | 2020-04-21 | 合肥宜拾惠网络科技有限公司 | System integration method and device |
CN112256500A (en) * | 2020-09-18 | 2021-01-22 | 苏州浪潮智能科技有限公司 | Storage system test server configuration method, system, terminal and storage medium |
CN112256500B (en) * | 2020-09-18 | 2023-01-10 | 苏州浪潮智能科技有限公司 | Storage system test server configuration method, system, terminal and storage medium |
CN112565198A (en) * | 2020-11-11 | 2021-03-26 | 浪潮电子信息产业股份有限公司 | Secret-free login method and device, electronic equipment and storage medium |
CN114124496A (en) * | 2021-11-12 | 2022-03-01 | 福州汇思博信息技术有限公司 | SSH remote login method based on server issued key and server |
CN114124496B (en) * | 2021-11-12 | 2023-11-24 | 福建汇思博数字科技有限公司 | SSH remote login method based on server issued key and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108737426A (en) | One kind remotely exempting from close login method and system | |
US8737624B2 (en) | Secure email communication system | |
CN107425983A (en) | A kind of unified identity authentication method and system platform based on WEB service | |
US20110170696A1 (en) | System and method for secure access | |
CA2661922A1 (en) | Method and system for providing authentication service for internet users | |
Ashley et al. | Practical Intranet Security: Overview of the State of the Art and Available Technologies | |
CN110602083B (en) | Secure transmission and storage method of digital identity authentication data | |
CN101521667A (en) | Method and device for safety data communication | |
Sauter et al. | Achievement of secure Internet access to fieldbus systems | |
Katz | Wpa vs. wpa2: Is wpa2 really an improvement on wpa? | |
Steinberg et al. | SSL VPN: Understanding, evaluating, and planning secure, web-based remote access | |
Joshi | Network security: know it all | |
Ji et al. | Security analysis of shadowsocks (r) protocol | |
Alhumrani et al. | Cryptographic protocols for secure cloud computing | |
Ren et al. | A detailed implement and analysis of MPLS VPN based on IPSec | |
Luo et al. | Research on OPC UA Security Encryption Method | |
Held | Virtual private networking: a construction, operation and utilization guide | |
CN100525175C (en) | Housing district communication encipher method based on broadband network | |
Reid | Plugging the holes in host-based authentication | |
Forrester | Security in data networks | |
Singh | Network Security and Cryptography: A Qualitative Exploration and Recent Advancements | |
Galande et al. | Security in Voip Network Using Neural Network and Encryption Techniques | |
Roos | Lecture Notes: Computer Networks CSE1405 Cryptography and Network Security | |
Barriga et al. | Communications security in an all-IP world | |
Stahnke | Legacy Protocols: Why Replace Telnet, FTP, rsh, rcp, and rlogin with SSH? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181102 |