Safety login method based on domestic cryptographic algorithm

A technology of secure login and national secret algorithm, applied in the field of secure login of network equipment, can solve problems such as major security risks, and achieve the effect of improving security, preventing illegal attacks, and being highly portable.

Active Publication Date: 2015-12-16
成都卫士通信息产业股份有限公司
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in an application environment with a higher securit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety login method based on domestic cryptographic algorithm
  • Safety login method based on domestic cryptographic algorithm
  • Safety login method based on domestic cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0015] A secure login method based on a national secret algorithm. The device login software is composed of two parts: the server and the client, which are installed on the embedded device and the debugger computer respectively, and the device and the computer are connected through a network port. The client remotely logs in to the device through the network, shielding the password authentication method with higher security risks. The software adopts the key verification method, and the user can log in to the device after the client and server keys have passed their respective verifications. Among them, the core key agreement and communication encryption are completely implemented based on the national secret algorithm.

[0016] Such as figure 1 As shown, the communication protocol framework for secure remote login: Transport Layer Protocol (TransportLayerProtocol) provides server-side authentication, transmission data encryption and data integrity verification; User Authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety login method based on a domestic cryptographic algorithm. Service-end login software and client-end login software are installed on an embedded device and a debugging computer respectively. The embedded device is connected with the debugging computer through a network interface. A client end remotely logs in a device through a network. The login software uses a secret key verification method. A user may log in the device just after a client-end secret key and a service-end secret key pass respective identity verification so as to perform encrypted session. The safety login software is installed on the client end. On the premise that an original function of the device is not changed, a new authentication mode is used and plaintext transmission is converted into cryptograph transmission. Thus, a risk bug in the conventional remote login software is solved, communication security between the network equipment and external environment is improved, and malicious attack to network management is effectively defended.

Description

technical field [0001] The invention belongs to the field of security login of information security technology, and in particular relates to a security login method of network equipment. Background technique [0002] The remote login software is a communication software for equipment maintenance and management through the network port. It is common in electronic products such as servers, embedded network devices, routers, and switches. Most login software uses clear text transmission and uses passwords as unique identifiers for identity verification. After passwords are cracked, device information may be maliciously tampered with or stolen. Therefore, in an application environment with a higher security level, common remote login software has a great security risk. [0003] National secret refers to the domestic encryption algorithm recognized by the State Cryptography Administration, and it can also be called commercial encryption. Specifically, it refers to the technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 李曦灏
Owner 成都卫士通信息产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products