Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dual authentication method, system and device for SSH safe login

A two-factor authentication and secure login technology, applied in the field of information security, can solve the problems of inability to guarantee security, leakage of users' passwords, and difficulty in distinguishing the authenticity of the server from the server, so as to facilitate remote login authentication, prevent identity theft, and improve security. Effect

Inactive Publication Date: 2015-12-16
BEIJING STONE SHIELD TECH
View PDF8 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This process itself is safe, but there is a risk: if someone steals the user's login password and then pretends to be the user, it will be difficult for the server to distinguish the authenticity
[0007] With the increasing number of user password leakage incidents, the risk of user password leakage is very high, and the security cannot be guaranteed.
Usernames and passwords are easily stolen by malicious code in the terminal device when entered through the keyboard, thereby reducing the security of authentication
Therefore, the user name / password mode of the client becomes the weak link of the entire SSH authentication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual authentication method, system and device for SSH safe login
  • Dual authentication method, system and device for SSH safe login
  • Dual authentication method, system and device for SSH safe login

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Example 1, such as figure 1 As shown, the double authentication device for SSH secure login described in the first embodiment of the present invention includes an SSH authentication server, a client, and an intelligent terminal.

[0059] The client is used to send the user name and password or certificate, and display the QR code returned by the SSH authentication server.

[0060] The SSH authentication server performs the first identity authentication on the user name and password or the certificate entered by the user, and if the authentication is passed, generates the QR code required for the second authentication on the user.

[0061] The smart terminal has a built-in encryption key, which is used to scan the QR code required for authentication when authentication is required, encrypt it with the encryption key inside the smart terminal, and return the encrypted QR code to the SSH authentication server.

[0062] like figure 2 As shown, the dual authentication met...

Embodiment 2

[0074] Example 2, such as Figure 4 As shown, a double authentication device for SSH secure login according to the second embodiment of the present invention includes an SSH authentication server, a client, an intelligent terminal and a two-dimensional code hardware device.

[0075] The client is used to send the user name and password or certificate, and display the QR code returned by the SSH authentication server.

[0076] The SSH authentication server performs the first identity authentication on the user name and password or the certificate entered by the user, and if the authentication is passed, generates the QR code required for the second authentication on the user.

[0077] The smart terminal has a built-in encryption key, which is used to scan the QR code required for authentication when authentication is required, encrypt it with the encryption key inside the smart terminal, and return the encrypted QR code to the SSH authentication server.

[0078] The two-dimens...

Embodiment 3

[0093] Example 3, such as Figure 7 As shown, a double authentication device for SSH secure login according to the third embodiment of the present invention includes an SSH authentication server, a client, an intelligent terminal, and a two-dimensional code authentication server.

[0094] The client is used to send the user name and password or certificate, and display the QR code returned by the SSH authentication server.

[0095] The SSH authentication server performs the first identity authentication on the user name and password or the certificate entered by the user, and if the authentication is passed, generates the QR code required for the second authentication on the user.

[0096] The smart terminal has a built-in encryption key, which is used to scan the QR code required for authentication when authentication is required, encrypt it with the encryption key inside the smart terminal, and return the encrypted QR code to the SSH authentication server.

[0097] The two-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual authentication method for SSH safe login. The method includes the following steps: a client sends a user name and a password or certificate, and a user uses the user name and the password or certificate to log in a managed SSH authentication server; if the user name and the password or certificate are valid, the SSH authentication server returns a two-dimensional code to be displayed on the client; the user uses an intelligent terminal to scan the two-dimensional code displayed on the client; the intelligent terminal generates signature information for a login session of this time to a two-dimensional verification server or the SSH authentication server through the two-dimensional code, a built-in certificate and a hardware token thereof; and the SSH authentication server verifies whether the signature information is correct, and if the signature information is correct, the SSH authentication server logs in successfully. The dual authentication method for SSH safe login has the beneficial effects that a secondary authentication process based on a two-dimensional code is added, and two-dimensional code information is leaked, is unique and cannot be repetitive, thereby greatly improving security of login verification of the SSH authentication server, and preventing the problem of identity theft caused by user password loss.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a double authentication method, system and device for SSH secure login. Background technique [0002] In the earliest days, Internet communications were all plaintext communications, and once intercepted, the content would be exposed without a doubt. In 1995, Finnish scholar Tatu Ylonen designed the SSH protocol, which encrypted all login information and became a basic solution for Internet security. It was quickly promoted all over the world and has now become the standard configuration of Linux systems. [0003] SSH is a network protocol used for encrypted logins between computers. If a user logs in to another remote computer using the SSH protocol from a local computer, it can be considered that this login is safe, even if it is intercepted midway, the password will not be revealed. As Linux devices gradually expand from computers to mobile phones, perip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0823H04L63/083H04L63/0876
Inventor 韩晟王盈徐菲张健李勇杨宏伟
Owner BEIJING STONE SHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products