Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A character terminal telnet protocol security access system and method

A character terminal and protocol security technology, applied in transmission systems, electrical components, etc., can solve problems such as support difficulties, upgrade systems, troubles, etc., and achieve the effect of guaranteeing equipment investment and ensuring safety

Active Publication Date: 2015-09-30
德讯创新(北京)科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) It does not support some old network devices. Due to the characteristics of network devices (small devices and single configuration), if the manufacturer does not support SSH when producing this device, Then it is more difficult to support in the future, and even if it can be upgraded through software, there is also a risk of upgrade failure, especially for some key devices on the network, if there is a problem, the loss will be great.
[0005] (2) For network operating systems such as AIX UNIX, SCO UNIX and other UNIX systems, the SSH service needs to be installed and configured separately, so that the work pressure on the management personnel will also increase. increase, and some systems only support SSH in high-version systems, it is impossible to upgrade the system to install SSH services, adding additional money and time overhead
[0006] It can be seen that it is not so easy to completely replace the remote login of TELNET with SSH in the current network environment. In view of the above situation, there are many intranet The system requires that only TELNET can be connected to the internal network, but this will cause trouble if the relevant maintenance personnel are not on the internal network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A character terminal telnet protocol security access system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] This embodiment provides a character terminal Telnet protocol security access system, connecting such as figure 1 As shown, the system of this embodiment is integrated in the "network security access system".

[0027] The network security access system needs to assign two addresses, one address is used for direct access from the external network, and the other is used for internal network access. The network security access system integrates the SSH proxy server and character login access control server.

[0028] SSH proxy server: used for the client to log in to the SSH connection of the intranet, verify the identity, and select the device to be accessed;

[0029] Character login access control server: It is used to connect to the selected access device (such as: unix server, switch) with the specified TELNET login protocol, and convert the data between encryption and non-encryption, and at the same time perform command keyword Monitor and block commands if necessary....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer network security, in particular to a Telnet protocol security access system and a Telnet protocol security access method for a character terminal. The system comprises a secure shell housing (SSH) proxy server for executing SSH connection that a client logs into an internal network, checking the identity and selecting equipment to be accessed, and the server is connected to a selected device by means of an appointed login protocol, converting data between encrypted and non-encrypted, monitoring instruction keywords and executing instruction interruption if necessary. Under the condition that the existing network environment and the existing operation habit are not changed as much as possible, the security of a passageway link is guaranteed, and the network equipment to be accessed and a server can be effectively managed.

Description

technical field [0001] The invention belongs to the technical field of computer network security, in particular to a character terminal Telnet protocol security access system and method. Background technique [0002] As far as the applicant knows, in the current computers and networks, there are quite a few network devices and servers that use Telnet to log in. It is well known that Telnet is an insecure remote login protocol (non-encrypted), especially when the management It is even more dangerous when personnel need to access devices on the internal network from the external network. [0003] At present, the more effective solution is to completely replace it with the SSH login protocol. The main disadvantages of this method are as follows: [0004] ⑴It does not support some old network devices. Due to the characteristics of network devices (small devices and single configuration), if the manufacturer does not support SSH when producing this device, it will be more diffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 张纯青蒋树春吕兵
Owner 德讯创新(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products