A method and system for SSH secret key management

A secret key and management center technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as inability to effectively replace secret keys in a timely manner, and inability to effectively prevent "man-in-the-middle" attacks, and achieve the effect of improving security

Inactive Publication Date: 2018-12-11
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, these two security authentication methods cannot effectively prevent "man-in-the-middle" attacks, and cannot manage the secret key reasonably, and cannot effectively replace the secret key in time to ensure the security of the secret key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for SSH secret key management
  • A method and system for SSH secret key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0028] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a method for managing SSH keys. figure 1 Shown is a schematic flow chart of the method.

[0029] Such as figure 1 As shown in , the method generally includes the following steps:

[0030] First, in step S101, the host public key information of the SSH remote host and the client public key information and IP information uploaded to the SSH remote host are collected via the monitoring module of the SSH remote host, and reported to the SSH key management center for further processing. Publicity, and then proceed to step S102.

[0031] In step S102, the notarization and early warning ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for managing SSH secret key includes collecting host public key information, client public key information and IP information of SSH remote host through monitoring module of SSH remote host and reporting them to SSH secret key management center for publicity. 2) verifying the host public key fingerprint of the SSH remote host uploaded to the SSH secret key management center when the client accesses the SSH remote host according to the publicity through the notarization and early warning module of the SSH secret key management center; 3) if the host public key fingerprint passes the verification, further verifying the client public key information and the IP information upload to the SSH secret key management center when the client accesses the SSH remote host according to the notarization and early war module, and if the host public key fingerprint fails the verification, sending a warning to the client and denying access; 4) if the client public key information and the IP information pass further verification, allowing the access; if the client public key information and the IP information fail to pass, denying the access. The method can effectively improve the security of the SSH remote connection.

Description

technical field [0001] The present invention relates to the communication field, and more particularly relates to a method and system for SSH key management. Background technique [0002] The SSH protocol is the abbreviation of Secure Shell (secure shell), customized by the Network Working Group of the IETF. SSH is a security protocol based on the application layer and the transport layer. It is currently reliable and designed for remote login. A protocol that provides security for sessions and other network services. The traditional network service program does not consider the security mechanism in the transmission mechanism and implementation principle, but only uses a simple security verification method, so the data transmitted between the user and the server is easily attacked by network hackers. In order to ensure data security, SSH has gradually replaced traditional network service programs with its more secure features. [0003] Currently, there are two ways for SS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L9/0894H04L63/06H04L63/062H04L63/068H04L63/08H04L63/0846H04L63/0876
Inventor 朱英澍
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products