Font Size: a A A

Research On Application Of Unified Identity Authentication In Mobile Communication System

Posted on:2012-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2178330335951372Subject:Information security
Abstract/Summary:PDF Full Text Request
ABSTRACT:As the mobile communication network continues to develop and evolve, there are several problems which are similar in the traditional internet—users are required for personally identity registration in each mobile business. With the deep development of mobile communication business and the diversity of users'need, users have to remember more and more complicated personal identity. The difficulty of implementing management and security issues becomes more prominent.Therefore, we urgently need an unified identity authentication mechanism for users in mobile communication system. The mechanism must not only get multiple identity information to centralized and shared management, but also provide integration of security strategy and authentication at each business provider. Finally, this mechanism is required to ensure highly safety and make the demand of "one identity to enjoy various services" become imaginable.Firstly, this thesis analyzes and compares several classical unified authentication mechanisms, and then it focuses on the basis of the design—OpenID authentication protocol standards used widely in the Internet. Through the analysis of advantages and disadvantages in this protocol and the evolution of the mobile internet environment, we propose an unified identity authentication architecture in mobile communication environment. And also, by completing the mechanism of authentication in different domain, we ensure that the implementation of services in new dividing domain and cross-domain will be realized. And then with the existing static password authentication security flaws, this thesis particularly proposes OTP (One-Time Password) based authentication to improve the mechanism. The safety and executive capability analysis are accomplished. We also compare it with the former mechanism. Finally, we realize a simple system to demonstrate the process of accessing to the actual authentication services, and also verify that the design of the unified identity authentication mechanism is feasible. So we actually achieve the expected goal of this article.
Keywords/Search Tags:Unified identity authentication, OpenID, Mobile Internet, One-Time Password
PDF Full Text Request
Related items