Test method and system capable of carrying out login authentication on the basis of SSH (Secure Shell) protocol

A technology for certification testing and testing methods, applied in transmission systems, digital data certification, digital transmission systems, etc., can solve problems such as low efficiency and cumbersome operations, and achieve the effect of avoiding low testing efficiency

Active Publication Date: 2016-01-13
湖州帷幄知识产权运营有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a test method and system for login authentication based on the SSH protocol, which is used to solve the problems of cumbersome operation and low efficiency in the prior art when performing login authentication test manually

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test method and system capable of carrying out login authentication on the basis of SSH (Secure Shell) protocol
  • Test method and system capable of carrying out login authentication on the basis of SSH (Secure Shell) protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0027] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a test method and system capable of carrying out login authentication on the basis of an SSH (Secure Shell) protocol. User equipment generates a login information pair according to a preset generation rule and sends at least one piece of login information in the login information pair to tested equipment; the tested equipment stores and determines a corresponding authentication test program; the user equipment sends at least another one pieces of login information in the login information pair to the tested equipment on the basis of the SSH protocol; and the tested equipment executes the authentication test program corresponding to the login information pair and feeds a test result back to user equipment. The test method and system is convenient for test personnel to carry out a batch test and does not need manual operation so as to avoid defects of low test efficiency, high error rate and the like brought by artificial participation.

Description

technical field [0001] The invention relates to a testing field, in particular to a testing method and system for login authentication based on the SSH protocol. Background technique [0002] At present, when testing the SSH protocol function, you need to use the puttygen tool to create the RSA / DSA encryption method of the SSH1 and SSH2 versions, and public and private keys with different encryption lengths. Start the user password verification mode or key mode on the device, and the user device successfully logs in to the device under test through the puttygen tool. This test requires manual generation of public and private keys with different versions, different encryption methods, and different encryption lengths. It is necessary to manually configure the SSH user multiple times, and the user needs to upload different keys multiple times and enter the password to log in to the device. The test steps are repeated and cumbersome, which consumes a lot of manpower and man-ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/31H04L12/26H04L29/06
Inventor 何莉
Owner 湖州帷幄知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products