Font Size: a A A

The Design And Implementation Of The Security System For The Banking-Securities Data Exchange Platform

Posted on:2009-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2178360245995822Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of the information age, Internet technologies widely used in the defense, telecommunications, financial services, media, commerce and trade and other fields, the network and information security problems also have become increasingly highlighted. At present, the protection of network information security programme more mature technology is used PKI Authentication Framework system, through the use of digital certificates and encryption, digital signature technology to confirm the identity of the two sides of the encryption and transmission of information. Key Management Center and PKI trust system is a vital part of the certificate authentication system to provide key management services.China's digital certificate authentication system in many places have entered the field of the development and application of digital certificates stage of the promotion, promotion approach is through the realization of the Internet industry and commerce, such as online tax, corporate users will be the number of applications certified to promote substantive stage. For example, with online business, enterprises can be realized after the completion of the annual evaluation online payment; with the Internet and e-business tax credit system, the enterprise funds through the payment gateway can reach the financial sector, complete tax process. The online payment system will be dependent on legitimate digital authentication center's corporate customers online identification and payment confirmation.But now in China, CA technology truly is the application of industry and commerce, taxation, web sites, finance, customs, import and export, telecom these large areas and sectors, the demand for small personal use. This is China's Internet and the relative level of development should be, at home and abroad CA is the fundamental reason why there is a gap.Shenzhen Securities Communication Co., Ltd. is a stock market for providing data communications services high-tech enterprises, developed for banks, securities companies and the relevant inter-agency data exchange systems business - financial data exchange platform, using mature Shenzhen Securities Communication Network as a major underlying network facilities, but also to accept dial-up, green connections, Internet VPN, and other means of open access. Through a variety of access methods, BSDEP the banks, securities firms, exchanges, clearing corporation registered, regulatory bodies, such as linking together. In order to ensure network security, and financial data exchange platform in the network, it also needs a very complete tight security measures. For existing financial data transmission platform, by the hundreds of millions of shareholders and is related to several hundreds of millions of dollars of capital flows, and its functions can not powerful, their safety is important to mention. However, financial data transmission platform powerful, more complex structure, and so in the course of its encryption, if using the same encryption methods, sometimes it is not necessary, therefore, concrete analysis of concrete problems and seek the most reasonable at the same time have a better cost encryption to ensure the security of data transmission, this is the problems faced by.In this paper, described the design of the system, given the function of the system structure and logic diagram. Then according to the system's overall structure, and analysis of the function it is to achieve the required two steps, including internal LAN transmission, green transmission. , And a detailed description of each step of the function, structure and process, and then the entire system is running the test data encryption status.This paper introduces the pki technologies, as well as how to use the technology to be pki encrypted data encryption, on several symmetric algorithm of the pros and cons and, ultimately, the use of optimal algorithm for encryption. Description of the final status of the entire system of encryption test results.
Keywords/Search Tags:PKI technology, CA, X.509, symmetric encryption, rc6
PDF Full Text Request
Related items