Font Size: a A A

Application Research On "PKI" In National Cultural Information Resources Share Engineer Of Culture Department

Posted on:2005-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:T BiFull Text:PDF
GTID:2168360152965538Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As a culture innovative item in a whole state, the SHARE PROJECT OF COUNTRYWIDE CULTURE INFORMATION RESOURCE (later simply called the SHARE PROJECT) is organized by 4 groups which are the state center, the province branch center, the grass roots center and the grass roots node, whose structure is comparably dispersive. On the basis of analyzing the development actuality and the system demands, this article discusses the application of PKI system in the SHARE PROJECT.The resource quantity of each province center is beyond the one of the state center. Owing to the careless of the internetwork security and the indefiniteness of the users' identifications, it is affected the further development of the SHARE PROJECT, and the construction of the identity system becomes the instant technology. Because of the dispersive and abstract system organization to the culture information, the PKI system modes have no examples to copy, so we need a technology to replacement. To the abstract and complex system structure of the SHARE PROJECT, we compare the operation environment and those advantages and disadvantages of bridge systems and branch systems. On the basis of the CA INTERNET DEMONSTRATION PROJECT, this article introduces the new structure mode called PKI structure mode, and we will carry on this new mode by adding the length of roots, names and ploys. The structure of PKI system consists of the state CA center, the province CA center, RA center and each operational station. The whole structure of PKI is the secondary CA. The subsystem of CA is formed of certificate service machine, certificate issuance service machine and the management system of certificate service machine, while the subsystem of RA is formed of RA service machine, RA management system and certificate service system, whose certificates have 8 statements, 12 examples. In the function design of PKI system, we put the certificate into two parts. One is system certificate, the other is user certificate. If we follow the institutions of such project, we can fall into 4 distinctions. In the certificate management, we carry through some specifications and design to the 8 statements, and limit the intermediate of certificate being all kinds of computer intermediate. The PKI system is a kind of internet security technology replacements to project, and also it is such a research which supplies a gap to the application research of PKI technology in a dispersive and abstract system structure. On the other hand, the PKI system itself is a system as well, and confronts with many security problems, whose security includes the physical security, the system, the line controlling, the file reservation management, the codes security, the database security and so on.
Keywords/Search Tags:information security, resources share, PKI, CA, trust pattern
PDF Full Text Request
Related items