Font Size: a A A

The Research And Realization Of The Secure Terminal Service System

Posted on:2007-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:J S LiFull Text:PDF
GTID:2178360215470212Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the increasing development of network communicatiion technology, network terminal (thin client) has been rapidly grown. The security of terminal service system directly threatens network and system flat. As an interaction mechanism between network terminal and application system in server, secure terminal service protocol (STSP) is very important to be developed. This paper studies the technology of how to transport data securely and combines the current related field's research achievements then points out the challenge and main problem in the security of data transporting in terminal service. The schema of data security transporting in terminal service is pointed out then combining the identity authentication, data encryption technology and message authentication technology,presents the secure terminal service protocol.Firstly, the mechanism of various user identity authentcation was analysed and a new mechanism of user authentication based on RAS was presented, thereby a security protocol of user identity authentication was completed. Secondly, the work based on the data encryption algorithm and message authentication, adopts mixed data encryption and RSA, transport sharing session key, solves the problem of managing key, acquires the check sum through using MD5 and HMAC. The group including proclaimed in writing and check sum was used on the schema of the security of data transporting in RC4, these ensure the integrality and confidentiality of data.It is based on OpenSSL, the corresponding module on cryptogram algorithms library was amended. The secure terminal service protocol was presented in VNC. The amended VNC was tasted, the result of testing expressed that the schema enhanced VNC security and fulfilled the expectant goal with this approach.Finally, advantage and disadvantage of this secure system are summarized and feather studying direction is pointed out.
Keywords/Search Tags:Terminal service, Secure mechanism, Identity authentication, Data encryption algorithm, OpenSSL
PDF Full Text Request
Related items