Font Size: a A A

Identity Authentication Research In The Wireless Application Area

Posted on:2008-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:X L YangFull Text:PDF
GTID:2178360215482535Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless applications, such as wireless payment, mobile bank, wireless multimedia are coming to our lives with the development of mobile communication.The development of wireless businesses give us unlimited opportunities.Banks, mobile operators, and sevice providers are coorperated actively with each other to promote the development of the wireless value-added services.Wireless application needs the sustain of wireless network and wire network.In such environment, it will faces all kinds of security risk.In order to lower the hurt of security problem, eliminate the user's worry about security and take hold of the business opportunity, we should solve the security problems well. The identity authentication, which is the first barrier to enter a wireless application, is the most important line of defense in the wireless security area.Only the user who has passed through the identity authentication can using the application services under the scope of the system authorization.There is numerous application business and technologies, have no uniform standards for identity authentication. It will make great important significant for the development of wireless application if we could put forward a kind of authentication scheme referencing to the various identity authentication technology and combining the features of their wireless applications.Firstly, this paper analyses the current security problems faced by the wireless applications, introduces the basic technology for network security services.Then, it introduces the advantages and the disadvantages of several identity authentications which are currently using popularity and prospects of the development trend of identity authentication technology.Combining with the security problem the wireless application facing, I enhances a kind of unified identity authentication schema.This schema which combines the biology identification, WPKI and smart card, surports many kinds of services. Finally, with the realization of the mobile bank, I introduce the application of the schema.
Keywords/Search Tags:network security, identity authentication, public key infrastructure, wireless application, smart card
PDF Full Text Request
Related items