SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method

A management and control system and intelligent technology, applied in transmission systems, electrical components, etc., can solve problems such as uneasy groups, and achieve the effect of reliable security

Active Publication Date: 2012-01-25
北京思特奇信息技术股份有限公司
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing tunnel management and control, SSH and SFTP access and operation control mechanisms are used. However, there are many uneasy factors in the traditional way of accessing SSH and SFTP services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method
  • SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method
  • SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0031] Such as figure 1 As shown, an intelligent management and control system based on SSH and SFTP tunnels includes a client, a server, a transmission unit and an authentication unit, and it also includes a command controllable unit,

[0032] The command controllable unit captures the operation command used by the client, and judges and processes the feasibility of the operation command.

[0033] A method for tunnel intelligent management and control based on SSH, SFTP tunnel intelligent management and control system, comprising the following steps:

[0034] Step 1: The client sends an authentication request to the server;

[0035] Step 2: The server receives the authentication request and verifies it;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system which comprises a transmission unit and an authentication unit, and also comprises a command controllable unit, wherein the command controllable unit is used for capturing an operation command used by a client end and judging and processing the feasibility of the operation command. The invention relates to an SSH and SFTP-based tunnel intelligent management and control method. The invention has the beneficial effects of enabling the tunnel management and operation to be visible, controllable and manageable, solving the safety problem and the safety threats of SSH and SFTP server system levels and providing reliable safety guarantee for normal order operation of the server in a company IT environment.

Description

technical field [0001] The invention relates to an intelligent management and control system and method based on SSH and SFTP tunnels. Background technique [0002] The SSH (Secure Shell) protocol is a network security protocol that implements secure remote access and file transfer services through encryption and authentication mechanisms in an insecure network environment. [0003] The SSH protocol has the following advantages: data transmission uses cipher text to ensure the confidentiality of information interaction; user authentication information is transmitted in cipher text, which can effectively prevent user information from being eavesdropped; in addition to traditional password authentication, SSH server Users can also be authenticated in a variety of ways (such as public key authentication with a higher level of security), which improves the strength of user authentication; the encryption and decryption keys used for communication between the client and the server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 曾林生
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products