Font Size: a A A

The Research About Safe Authentication Mechanism Of Mobile Government

Posted on:2012-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:Q K CaoFull Text:PDF
GTID:2178330335460889Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless telecommunication and network technology, mobile E-government is becoming more and more popular. Mobile E-government overcomes the limitation of regional relativity which exit in ordinary E-government. Because of its high convenience, high efficiency, low cost and regional independence, mobile E-government has increasingly become very hot in the research and development of E-government. But at the same time, security problems became more and more important.Firstly, this paper analyses the current security problems which are exist in the mobile E-government. Based on the analysis of security threatens and security requirements for mobile station in the user domain, we propose the security architecture for mobile station, and use the mobile trusted module to enhance mobile station platform's security. we present a mutual authentication protocol for user, mobile equipments and USIMs. This protocol uses in secure mobile station platform. Using the results of authentication, the access control policies are proposed.Then, it researches and analyses several identity authentications which are currently using popularly and Prospects of the development trend of identity authentication technology. And then, Combining with the security problem in electronic commerce, there will brings forward a kind of unified identity authentication schema. This schema which combines the biology identification, WPKI and smart card. This schema also makes use of the dynamic Password, SSO, and X.509.This schema can solve most of network attack problems such as static Password leak, data integrality and so on Compared with other authentications this schema has more advantages:From client aspect, you only need a mobile phone, it can be used to generation keys and digital signature, provides authenticate for client and server; from server aspect, according to different types of a customer requests for different types of certification,It support dynamic password authentication PKI and so on, This schema combine with the smart card authentication and PKI, Can achieve identification authentication by users of the smart card of mobile phone.
Keywords/Search Tags:e-government, identity authentication, security, smart card
PDF Full Text Request
Related items