Font Size: a A A

The Research And Implement Of Security In Password Authentication System

Posted on:2010-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:M Q WangFull Text:PDF
GTID:2178330332977685Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
With the development of internet, intruders are convenient to invade most information systems by internet. Therefore, when information systems are designed, realized and maintained, it's important to consider the security of information systems. Password authentication is often a way to validate users' identity in information systems. It's easy for intruders to invade an information system by filching a user's password. So, advanced technology is used to improve the security of password authentication in information systems.Based on above the viewpoint, a system based on SSL protocol is constructed to reinforce the security of password authentication. When a user sets a password, it tests the user's password by previous proof-test based on SVM. It's sure that the user's password is strong. When a user logs on the system, it firstly confirms a client system by a digital certificate, MAC address and IP address. When the user inputs personal information and password, CAPTCHA based on Chinese characters is input in order to judge whether a man use the computer or the computer logs on the system by itself. By encrypting password and limited times of users' passwords, users' passwords are better protected.In this paper, SVM is firstly used in distinguishing with static passwords. By compared with BP neural network, the advantages of SVM classification are stood out. By CAPTCHA based on Chinese characters, it protects users' passwords and confirms a client system. By designing and realizing the password authentication system, it shows that the password authentication system is usability and better protects users' passwords. By the application of the password authentication, the security of password authentication in information system is enhanced while the modification of information system is a little.
Keywords/Search Tags:Information Security, Password Authentication, SSL Protocol, SVM, CAPTCH
PDF Full Text Request
Related items