Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Effective realization method for credible OpenSSH

An implementation method, a trusted technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as security, functional compatibility, performance, and rapid deployment without considering and solving

Inactive Publication Date: 2013-10-30
BEIJING JIAOTONG UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this patent only designed a trusted session key exchange protocol, and did not consider and solve problems such as security, functional compatibility, performance, and rapid deployment that will be encountered during the specific implementation process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Effective realization method for credible OpenSSH
  • Effective realization method for credible OpenSSH
  • Effective realization method for credible OpenSSH

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The method provided by the present invention assumes that the server and the client are equipped with a trusted security chip TPM on the hardware, and the BIOS of the server and the client both support TPM; on the software, it is assumed that the server and the client are installed with an operating system trusted boot manager, A trusted operating system that supports hardware TPM and trusted measurement modules is installed. In addition, the server and client are installed with TPM software protocol stack (TrouSers) software. The specific implementation steps of the method provided by the present invention in version 4.7 and above of the open source OpenSSH software are as follows:

[0033] Step 1. Modify the formation process of the identity authentication algorithm negotiation string: add three candidates, which are represented by the variables ssh-TPM-TPM, ssh-TPM-option, and ssh-option-TPM; trusted client and available The server side constructs an identity authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an effective realization method for credible OpenSSH, which comprises the components of a function-enhanced parameter negotiation module and a function-enhanced session key exchange module. In the method, step 1, modifying the forming process of an identity authentication algorithm negotiation string; step 2, modifying the process of selecting the identity authentication algorithm; step 3, adding two variables at a credible client side to represent a client type and a server type respectively; step 4, adding two variables at a credible server side to represent the client type and the server type respectively; step 5, modifying a session key exchange processing module at the credible client side; and step 6, modifying a key exchange processing module at the credible server side. The method realizes a trusted channel and fully considers the system performance, the expandability and the function backwards compatibility at the same time.

Description

Technical field [0001] The invention relates to an effective method for implementing trusted OpenSSH, which belongs to the field of computer information security. Background technique [0002] The SSH (Secure Shell) protocol is a security protocol developed by the IETF's network working group to protect the data transmitted between the client and the server. The SSH protocol adopts a hierarchical structure design, including four sub-protocols: SSH transport layer sub-protocol, user authentication sub-protocol, connection sub-protocol and file transfer sub-protocol. When the client and the server communicate using the SSH protocol, the first implementation is the SSH transport layer sub-protocol, which is responsible for establishing a secure channel between the server and the client. The sub-protocol includes protocol version exchange and parameter negotiation (parameter negotiation content includes key The three processes of exchange method, identity authentication algorithm, h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 常晓林左向晖刘新明韩臻刘吉强邢彬
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products