Font Size: a A A

Authentication Protocol And It's Application Based On One-Time-Password

Posted on:2010-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:Z X WeiFull Text:PDF
GTID:2178360275978021Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the constant accelerating of the process of social information, the information resources has become the major asset of the organizations at all levels and all departments. Information management platform plays an important role for the integration of information resources. However, so as to the traditional one, there are some fundamental flaws. Therefore, the new information management platform will become the top priority. In this article, we design an One-Time-Password authentication protocol and use it to the unified management information system for HuaiBei Coal Industry Teachers College.The main research work in this article include:(1) The introduction of the dynamic password authentication technology and its scope of application of the classification, especially the One-Time-Password authentication of the common types of technology, implementation and their Comparison.(2) Under the premise of introduction of the traditional dynamic password authentication technology, on the basis of deeply studied the agreement of CHAP, we will design a new one-time password authentication protocol—CHAPNew agreement. The agreement has the characteristics of to be designed to be simple, the smaller volume of computing and lower cost etc; to overcome the defects of that a static password authentication mechanism existed.(3) Implement of CHAPNew protocol in B / S architecture. CHAPNew identity authentication protocol will be used in unified information management platform, and studied deeply the several other modules of a unified information management platform for information security, to achieve information security. After more than a year of operation, the system security and stability run in good condition.
Keywords/Search Tags:Password Authentication, CHAP, Role-Based Access Control, Information system
PDF Full Text Request
Related items