Method for implementing extensible trusted SSH

An implementation method and reliable technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as poor scalability, and achieve the effect of tight integration

Inactive Publication Date: 2013-07-31
BEIJING JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing trusted SSH implementation method needs to modify the key exchange algorithm in the SSH protocol, so the scalability is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing extensible trusted SSH
  • Method for implementing extensible trusted SSH
  • Method for implementing extensible trusted SSH

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below through specific embodiment and image 3 The present invention will be described in detail.

[0025] The method provided by the present invention requires both the server end and the client end to be equipped with a trusted security chip in hardware, and the BIOS of the server end and the client end all support TPM; in terms of software, the server end and the client end are required to install a measurement module and a trusted operating system . The measurement module determines the entity to be measured, the measurement time and the method of safely maintaining the measurement result. Its main functions include calculating the measurement value of those measured entities, recording the measurement event to the measurement storage log and recording the measurement value into the TPM specified PCR. The method of recording the measurement value into the PCR is: new PCR value=hash(original PCR value||measurement value). The metric storage log includes at least: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for implementing extensible trusted SSH. A server and a client are equipped with a trusted security chip respectively, and a measurement module and a trusted operating system are installed so as to measure the state of respective platform. A trusted SSH channel can be realized by defining three new message codes in an SSH transmission sub-protocol layer and usinga session key which is calculated by the key-exchange algorithm in the SSH transmission sub-protocol layer as a trusted computing remote authentication parameter. The realized trusted channel has twocharacteristics of transparency of the remote authentication process for the key-exchange algorithm and privacy of platform information of communication parties in the network transmission process.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a scalable and trusted SSH implementation method. Background technique [0002] The SSH (Secure Shell) protocol is a security protocol developed by the network working group of the IETF to protect the data transmitted between the client and the server. The SSH protocol adopts a layered structure design, including four sub-protocols: SSH transport layer sub-protocol, user authentication sub-protocol, connection sub-protocol and file transfer sub-protocol. The first two sub-protocols are executed sequentially. The SSH transport layer sub-protocol is responsible for establishing a secure channel between the server and the client. This sub-protocol includes three processes: protocol version exchange, parameter negotiation, and key exchange. After the operation of the SSH transport layer sub-protocol, a session key will be negotiated, which is used to encrypt the authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 常晓林王绍创藤莎左向晖韩臻刘吉强
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products