Font Size: a A A

Design And Implementation Of The E-Authentication System Client

Posted on:2011-06-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178330335459934Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the increasing scale of the Internet and its feature of virtual identity, cyber crimes spread very rapidly and widely. At the same time, it takes lower cost to commit cyber crimes while extremely high cost to investigate and take evidence. Faced with such a situation, it's an important guarantee to monitor the Internet with information technology, make effective reaction according to the early warning system when necessary, and enforce access control and behavior management pertinently. As a result, we feel that it's urgent and necessary to work on the research and application of Internet Identity technologies, on which we can rely to investigate and punish cyber criminal.For the smart card is secure and confidential, it is an ideal medium to store and manage keys. CSP from Microsoft provides a set of PKI interfaces on WINDOWS. But it stores the private key on the hard disk, obviously it may cause potential hazard. While using smart card can guarantee the private keys cannot be exported because of the COS built-in. So we developed a full-function CSP based on smart card. By the certificates written on the smart card, we can fulfill the function of identity authentication when logining with SSL.This paper highlights the design and implementation of the client of the electronic authentication system. First, it introduces the background and related works, including current research and associating theories, such as PKI, smart card and CSP. After that we show the architecture of the electronic authentication system, involving the issuing of the certificates and the process of the authenticating with SSL. And then we focus on the implementation details of the client, including the smart card module, CSP module and user tool module. Finally, we draw a conclusion of the project, pointing out the disadvantages and the future work.
Keywords/Search Tags:PKI, SMART CARD, COS, CSP, SSL
PDF Full Text Request
Related items