首页>
外国专利>
SSH SSH A remote access system using the SSH protocol and managing SSH authentication key securely
SSH SSH A remote access system using the SSH protocol and managing SSH authentication key securely
展开▼
机译:SSH SSH使用SSH协议并安全管理SSH身份验证密钥的远程访问系统
展开▼
页面导航
摘要
著录项
相似文献
摘要
The present invention relates to an SSH protocol-based server remote access system for securely managing an SSH authentication key, which securely manages an SSH authentication key in an access control gateway, wherein, upon request for authorized access, the access control gateway performs SSH authentication key authentication and relays the connection. The SSH protocol-based server remote access system for securely managing an SSH authentication key comprises: an authentication authority policy unit for setting information on an accessible server in advance, storing the same as authorized access information, registering an SSH authentication key of each user first, and storing the same in an SSH authentication key storage; a client proxy handler for receiving a message from an access control client, forming a session with the access control client (hereinafter referred to as a client session), and relaying the message; an SSH client handler for forming a session corresponding to the client session (hereinafter referred to as a server session) with the server; an SSH key manager for updating the SSH authentication key of each user and storing the updated SSH authentication key in the SSH authentication key storage; and a policy checking unit for relaying a message between the client session and the server session, and authenticating the server session by using the SSH authentication key stored in the SSH authentication key storage when a negotiation message for forming an SSH session is transmitted and received. According to the system as described above, the SSH authentication key is securely managed in the access control gateway and the SSH authentication key is automatically authenticated during the server access, thereby preventing the SSH authentication key from being leaked to the outside and improving user convenience.
展开▼