A Secure Login Method Based on National Secret Algorithm

A technology of secure login and national secret algorithm, which is applied in the field of secure login of network equipment, can solve problems such as large security risks, and achieve the effects of improving security, strong portability, and ensuring security

Active Publication Date: 2019-09-06
中电科网络安全科技股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in an application environment with a higher security level, common remote login software has a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Login Method Based on National Secret Algorithm
  • A Secure Login Method Based on National Secret Algorithm
  • A Secure Login Method Based on National Secret Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] A secure login method based on the national secret algorithm. The device login software consists of two parts, the server and the client, which are installed on the embedded device and the debugging machine computer respectively, and the device and the computer are connected through the network port. The client logs in to the device remotely through the network, shielding the password authentication method with high security risks, and the software adopts the key verification method, and the user can log in to the device only after the client and server keys pass their respective verifications. Among them, the core key agreement and communication encryption are completely implemented based on the National Secret Algorithm.

[0016] Such as figure 1 As shown, the communication protocol framework of secure remote login: Transport Layer Protocol (Transport Layer Protocol) provides server authentication, transmission data encryption and data integrity verification; User Aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety login method based on a domestic cryptographic algorithm. Service-end login software and client-end login software are installed on an embedded device and a debugging computer respectively. The embedded device is connected with the debugging computer through a network interface. A client end remotely logs in a device through a network. The login software uses a secret key verification method. A user may log in the device just after a client-end secret key and a service-end secret key pass respective identity verification so as to perform encrypted session. The safety login software is installed on the client end. On the premise that an original function of the device is not changed, a new authentication mode is used and plaintext transmission is converted into cryptograph transmission. Thus, a risk bug in the conventional remote login software is solved, communication security between the network equipment and external environment is improved, and malicious attack to network management is effectively defended.

Description

technical field [0001] The invention belongs to the field of security login of information security technology, and in particular relates to a security login method of network equipment. Background technique [0002] The remote login software is a communication software for equipment maintenance and management through the network port. It is common in electronic products such as servers, embedded network devices, routers, and switches. Most login software uses clear text transmission and uses passwords as unique identifiers for identity verification. After passwords are cracked, device information may be maliciously tampered with or stolen. Therefore, in an application environment with a higher security level, common remote login software has a great security risk. [0003] National secret refers to the domestic encryption algorithm recognized by the State Cryptography Administration, and it can also be called commercial encryption. Specifically, it refers to the technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李曦灏
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products