SSH authentication method based on key distribution center

A key distribution center and authentication method technology, which is applied in the field of power system network security, can solve problems such as manual, inflexible and convenient, and the danger of host deception, so as to prevent tampering and replay of response information, improve flexibility and convenience effect

Active Publication Date: 2020-02-18
NARI TECH CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Although SSH has a strong authentication mechanism and a relatively secure channel transmission mechanism, there are still deficiencies, such as lack of key management, and no specific operations such as generation, distribution, and abolition of keys used for user authentication. It is also done manually
It is not flexible and convenient enough. The security is not enough; host spoofing is dangerous, allowing the client to directly accept its host key when connecting to a host (server) for the first time without checking whether the key really belongs to the host

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SSH authentication method based on key distribution center
  • SSH authentication method based on key distribution center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] A method for managing the reception of various operation and maintenance indicator data based on memory queues in the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] The Key Distribution Center (KDC, Key Distribution Center) is a service running on a physical security server, and the KDC maintains a database of account information of all security principals in the domain. The KDC stores an encryption key that only the security principal and the KDC know. This key is also called a long-term key, that is, the master key, and is used for exchanging between the security principal and the KDC. KDC is a third party trusted by both the initiator and receiver because it maintains an account database that stores all accounts in the domain, that is, it manages the name belonging to each account and the master key derived from the account password . The session key used for mutual authentication between the clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SSH authentication method based on a key distribution center. The SSH authentication method comprises the following steps: providing the key distribution center; the clientdoes not need to store all the host public keys to be connected, the generation, distribution and cancel operations of the used keys are completed by the key distribution center, manual participationis not needed, and the flexibility and convenience of key management are improved. The client obtains the encrypted session key through the key distribution center, and the key distribution center completes the authentication of the server identity. Moreover, the client can confirm that the obtained secret key and identity information are sent by the secret key distribution center through the unique recognition code returned by the secret key distribution center, thereby preventing the sent application from being tampered and preventing the response information from being replayed.

Description

technical field [0001] This application belongs to the field of power system network security. Background technique [0002] Developed by the IETF standardization body, the SSH protocol is one of the most widely deployed network security protocols. It was originally designed to replace the remote login protocol that sends unprotected information over the network. Since then, SSH has become a common tool for securing Internet transmissions. Due to the increasing security requirements of the internal network of the substation and the insecurity of other remote login protocols, it is recommended that users use SSH to remotely access the equipment in the substation. [0003] The standard SSH protocol uses a "Trust-On-First-Use" mechanism to authenticate the server to the client. The specific process is: when the client receives the host public key sent by the server for the first time, if there is no corresponding host public key in the client cache, it chooses to accept the k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/083H04L63/062H04L63/08H04L63/20H04L63/168Y04S40/20
Inventor 袁鲁海周斌王海峰张婷蒋文辉
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products