Safety accessing system and safety accessing method for character terminal RLOGIN protocol

A character terminal and protocol security technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as installation failure, not easy to implement, and increased work pressure of management personnel, so as to protect equipment investment and guarantee safety effect

Inactive Publication Date: 2013-08-07
DATCENT TECH
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For RLOGIN is an insecure remote access protocol (non-encrypted), the more effective solution is to completely replace it with the SSH login protocol, but for early versions of network operating systems such as AIX UNIX, SCO UNIX and other UNXI systems, SSH The service needs to be installed and configured

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety accessing system and safety accessing method for character terminal RLOGIN protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] This embodiment is a character terminal RLOGIN protocol security access system, the system is connected as figure 1 As shown, the system of this embodiment is integrated in the "network security access system". The network security access system needs to be assigned two addresses, one address is used for direct access from the external network, and the other is used for internal network access. The network security access system integration The SSH proxy server and character login access control server are installed, among which:

[0022] SSH proxy server: used for the client to log in to the SSH connection of the intranet, verify the identity, and select the device to be accessed;

[0023] Character login access control server: used to connect to the selected UNIX / LINUX server with the RLOGIN login protocol, convert data between encryption and non-encryption, and monitor command keywords at the same time, and block commands when necessary.

[0024] The character termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network security, and discloses a safety accessing system and a safety accessing method for a character terminal RLOGIN protocol. The safety accessing system for the character terminal RLOGIN protocol comprises an SSH (secure shell) agency service terminal and a character login access control service terminal, wherein the SSH agency service terminal is used for SSH connection from client sides to login an internal network, verifying identifications and selecting equipment requiring to be accessed, and the character login access control service terminal is used for connecting an RLOGIN protocol to a selected UNIX/LINUX server, converting data between encrypted data and unencrypted data, simultaneously monitoring keywords of an instruction, and performing instruction blocking as required. On the basis of not changing existing network environment and operation habits as far as possible, the safety accessing system and the safety accessing method for the character terminal RLOGIN protocol guarantees safety of access links, and can effectively manage network equipment and servers requiring to be accessed.

Description

technical field [0001] The invention belongs to the technical field of computer network security, in particular to a character terminal RLOGIN protocol security access system and method. Background technique [0002] RLOGIN is an old network protocol, but it is still used by web servers. Although it is convenient to use, it is also an insecure remote access protocol (non-encrypted). According to the applicant's understanding, the RLOGIN protocol is not used very much now, but in some occasions, it will bring great convenience, so in the process of network maintenance, many people will still use it, especially for some Old equipment is more convenient to use. For RLOGIN is an insecure remote access protocol (non-encrypted), the more effective solution is to completely replace it with the SSH login protocol, but for early versions of network operating systems such as AIX UNIX, SCO UNIX and other UNXI systems, SSH The service needs to be installed and configured separately, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L9/00
Inventor 张纯青蒋树春吕兵李曙强
Owner DATCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products