Font Size: a A A

Design And Realization Of The Secure Network Identity Authentication Model

Posted on:2007-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:H XieFull Text:PDF
GTID:2178360242461952Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Network development gives more importance to security research. As the base of network security system, identity authentication is the research focus. Although the authentication based on USB Key (Universal Serial Bus Key) is secure and user-friendly, many problems exist in the adaptability to various applications.After analyzing the characters of USB Key, a secure network identity authentication model based on impact-response mode is proposed, which adopts C/S (Client/Server) architecture. Several technologies, such as encryption, access control, authentication and packet filter, are employed in this model. Furthermore, more details about the model's functions and modules are designed.Based on the proposed model, the relationship between identity and application is defined in several tables and the structure of every authentication message is also introduced. The communication between client and server which is implemented by using completion port can be very effective when more I/O (Input/Output) requests come from client. The adopted NDIS (Network Driver Interface Specification) intermediate driver works on OSI (Open System Interconnection) network layer and filter every packet according to the access control rules, which protects the network system to supply the specific applications to authenticated users.Experiments on the established model show the identity authentication function based on USB Key is very steady and the seamless embedded access control function is provided to the applications running on it. In a word, the security of network is enhanced.
Keywords/Search Tags:Identity Authentication, Access Control, Completion Port, Intermediate Driver, Packet Filter
PDF Full Text Request
Related items