Font Size: a A A

The Design And Implement Of Security Logging On System Use USB Key Based PKI

Posted on:2006-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:X F GengFull Text:PDF
GTID:2168360155974321Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the continuance development of the Internet, the application of the E-Government is deepen than before. But the problem of safety is terrible also because application environment of E-Government is complex (includes the intranet , special net and the Internet).It has become the first problem of the current development of the E-Government that how to resolve the problem of safety in the application of the E-Government. For example: the Username and Password is the exclusive way in the traditional way of user log on the computer, it simple and convenient, but it has no strong safety and breached by people easily, further more the password of many people have stated orderliness and mutuality, so we need the better scheme about logging on computer for user.At present, the PKI is base on safely application for E-Government, base on the PKI, and add some other measure, wecan devise the better system of E-Government. In this paper, we bring forward the system of logging on computer use the electronic key base on the PKI according to the safely logging on in special net of E-Government, it integrate the USB KEY(electronic key) utilize the technique of encryption , digital signature etc, the certificate and the private key in the USB KEY, insure one people have the only certificate and USB KEY. On the time of logging on, we can confirm the identity of the user if the server validate the certificate successfully, and the certificate and the user is corresponding, people use other certificate can not log on the computer, and that, each KEY have the password(Personal Identification Number), even if user lose the KEY immodestly, but have no the password, we still can not log on the computer, thereby the certificate and the password constitute dual protective gene on the safely logging on, overcome the shortcoming of simple way of username and password. The computer is locked after removing of the KEY, user can not operate computer, none but insert the KEY and input the password, user can use the computer normally. In order to prevent the attack on guess of password, if people input thewrong password continuously, then the KEY is locked, at this moment, only the server can undo the locked KEY. At the same time, system can send information to the server for the server manage system better. In this system, as the electronic key, to the USB KEY, people can operate it simply, can use it expediently, can use it in the way of Hot Plug In, and inside of the KEY embed a chip of CPU, the chip can complete the operation of encryption > digital signature etc. In this paper we introduce the basic knowledge of PKI and USB KEY firstly, and present the function and design of system.The system have the friendly interface, have the good safety, have the strong expansibility, so it have wide foreground of using and development.
Keywords/Search Tags:certificate, PKI, USB KEY, logging on, GINA, CSP
PDF Full Text Request
Related items