SSH remote connection method of mimicry system, mimicry architecture and readable storage medium

A remote connection and mimic system technology, applied in the field of readable storage media, can solve problems such as inability to directly adapt to SSH remote connections

Active Publication Date: 2020-09-15
河南信大网御科技有限公司 +1
View PDF12 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the problem that the mimic system cannot directly adapt to the SSH remote connection after simplifying the input agent, and provide a SSH remote connection method for the mimic system that can log in to multiple SSH server terminals corresponding to one SSH client and improve the security of the mimic system , connection architecture and readable storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SSH remote connection method of mimicry system, mimicry architecture and readable storage medium
  • SSH remote connection method of mimicry system, mimicry architecture and readable storage medium
  • SSH remote connection method of mimicry system, mimicry architecture and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions of the present invention will be described in further detail below through specific implementation methods.

[0033] An SSH remote connection method of a mimic system, which is used to realize login and communication between an SSH client and multiple heterogeneous executives.

[0034] This application is based on the key-based authentication method provided by SSH. The biggest advantage is that it can avoid man-in-the-middle attacks. Its biggest feature is that there is a server-side query process during the verification process, and the encrypted information will be added during the query. A set of random numbers is used to verify the security of data, which leads to obstacles in application in a mimic system with multiple heterogeneous executives. This embodiment solves this problem through the following methods.

[0035] like figure 1 As shown, the preparation stage:

[0036] Step 1): Generate a pair of keys, public key and private key in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an SSH remote connection method of a mimicry system. The SSH remote connection method comprises the following steps: a preparation stage: an SSH client sends a public key to heterogeneous executives for storage; and a login verification stage: the SSH client sends a login request, an SSH server on each heterogeneous executive performs verification by adopting the public key,acquire the same random number from a feedback device, carries out encryption by using the public key and makes judgment, and sends information to the SSH client through a feedback controller, the SSH client decrypts the returned information by using a local private key and sends the decrypted information to the SSH server of each heterogeneous executive, and the SSH server of each heterogeneousexecutive compares the decrypted information, sends a result of whether login is allowed or not to a judgment device for judgment and judges whether login is allowed or not; and if login is allowed, the SSH client enters a normal login state, and if not, the SSH client requests login again. According to the method, the problem that SSH remote connection cannot be applied to the mimicry system is solved, and the remote access security of the mimicry system is improved.

Description

technical field [0001] The present invention relates to a mimic system, in particular to an SSH remote connection method of the mimic system, a mimic framework with SSH remote connection and a readable storage medium. Background technique [0002] A mimic system generally consists of an input agent, a heterogeneous executive, an arbiter, and a feedback controller. The input agent distributes the external input information to the heterogeneous executive body; the heterogeneous executive body executes the externally input information and outputs the result; the arbiter judges the output result; the feedback controller adjusts the heterogeneous executive body according to the ruling result to realize mimicry camouflage. The input agent part of the mimic system directly faces the user and completes the distribution of user requests. [0003] SSH is a remote connection tool and an encrypted network transmission protocol, which realizes the connection between the SSH client and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/08H04L63/0815H04L63/0428H04L67/141H04L67/56
Inventor 王群锋郭义伟吕青松郑清彬冯志峰宋延坡鲍尚策
Owner 河南信大网御科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products