Font Size: a A A

Based On PKI Technology To Protect And Repair Web Page

Posted on:2010-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y B ZhangFull Text:PDF
GTID:2178360278973606Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Computer crime case rate increased rapidly, so that the computer systems of various countries in particular the network systems are faced with a great threat, and become one of serious social problems. Network security problem has become the information age challenges facing mankind, internal network security issues have become increasingly prominent. Information infrastructure facing the challenges of network security, information system there are many weak links in prediction, response, prevention and recovery capabilities.When the user remote to maintenance page recovery system, usually used simple password authentication, and file backup and recovery is often only through a simple transmission protocol, can not ensure that the contents will not be intercepted or tampered.In such cases , this paper proposed a PKI—based technology structure model, In this paper, automatic recovery system web—based PKI technology was designed, and implementation of a web design automatic recovery system. The system will be PKI digital certificate system and non—symmetric key technology into the user authentication and data transmission, fundamental to avoid the traditional web system may exist to restore the network of deception and distortion of information problem.The system consists of three parts, control center and monitoring client and client. System control center is the core of the whole system , web site backup, restore and upload through the control center to be completed, monitoring center and the monitoring client and the client realized the authentication and data encryption transmission. Monitoring client deployed in the WEB server, where the main function is to monitor the page file on the machine, when the documents were illegally destroyed immediately report to the control center, control center and then to accept an order to restore the damaged document, while monitoring client would also like to receive monitor center web site about the maintenance of order of a legitimate web site content maintenance. Client center used to monitor a variety of command, as well as monitor the site updated.The system is based on PKI technology and event—triggered operating system, in a very low system resources occupied by the case of destruction of real—time detection event, alarm and then promptly destroyed the restoration of documents to ensure that when users browse the web without any impact.
Keywords/Search Tags:Network Security, PKI, Page to Resume
PDF Full Text Request
Related items