Font Size: a A A

Study And Implement Of Business Enterprise Bank Safety System

Posted on:2009-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:C Y DengFull Text:PDF
GTID:2178360242470477Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Nowadays, as the competitions of financial markets become more severe, many banks resort to the Enterprises Banking System to satisfy the needs of their clients and their own developments. The Enterprises Banking System brings many conveniences to both the clients and the banks themselves. Through this system, users can obtain banks' information and do bank businesses even at home. But there is also a crucial disadvantage to this system—the transparent transferring of information; this means the information can be gained easily and illegally by others. This then causes many network crimes.This article is purposed to solve the safety problem of the Enterprises Banking System. In this article, the writer provides a practical plan to secure the banks' systems, that is, to create two new sub-systems to the Enterprises Banking System: The first sub-system is a USBKEY Identification System, this system requires users to provide an identification password when entering the Enterprises Banking System; the other sub-system is to an S-RAS (Security Remote Access System) , this system can make sure even remote users can use the bank's internal network while their information may not be disclosed. These two new sub-systems' provide encryption of both data and network to the traditional Enterprises Banking System. Then the Enterprises Banking System now can provide safety and security in information transferring and sharing for users, and at the same time prevent the illegal entering of internal network, stealing of users' codes and passwords, etc.In one word, the writer of this article provides a new theory of network security system in the traditional Enterprises Banking System for banks, and this new technology has passed the National Authority's security examination. Now this technology plays a leading role in the domestic fields and it has gained many satisfactions and affirmations from those enterprises that use them.
Keywords/Search Tags:Security of network, Identity authentication, Encryption of data, IPsec, Encryption of network
PDF Full Text Request
Related items