Font Size: a A A

Research On Uniform Identity Authentication System Based On Visual Cryptography Techniques

Posted on:2010-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:Q P CengFull Text:PDF
GTID:2178360278969503Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of numerical informatization, the application system of enterprises, governments, schools and research institutes are improving progressively. Every application system all needs to be built with their own user management modules and identification modules, so that it is difficult to unify user management and identification of the whole system. It is elaborate and unsafe to some degree, not only for users to remember many different usernames and passwords in different security domains, but also to do repeated identity authentication according to authorized services. At the traditional web collaboration models, service providers are facing the problem they should manage the users from lots of multiple security domains to realize united services.Then Unify Identity Authentication System is proposed base on the background.The Identity authentication mechanism under the open network environment is comprehensively researched in this thesis. After doing basic researches on the disadvantages of Kerberos Protocol, the Visual Cryptography Techniques is used to improve Kerberos protocol. Further more, combined with driver technology, technique of system service, hardware encryption technology (USBKey) and web technology, the simple, reliable and expandable uniform identity authentication platform is built by applying uniform identity authentication technology based on visual cryptography techniques. At last, details of the implement solution on the modules of user registration, storage and management of user information, unify identity authentication, USBkey management and audit system are introduced.Practical application shows that the improved Kerberos protocol based on visual cryptography technology possess the good character of safety and reliability, and the platform has many advantages. It is not only very simple, but also easy to expand with the cross-platform capability. In addition, it is also very convenient to be able to achieve seamless link with the application system.
Keywords/Search Tags:Visual Cryptography Techniques, Unify Identity Aut hentication, Kerberos protocol
PDF Full Text Request
Related items