Font Size: a A A

Identity Monitor Of Printer Users

Posted on:2011-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:Q GengFull Text:PDF
GTID:2178360302499675Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In modern society with the fast development of computer and network, people have entered the information era. It brings convenience to people, however, the problem of information security threats is increasingly prominent. Information security theory research and application have become a new hotspot of social development. At the same time, as a indispensable office equipment and a standard computer output device, printer plays a more and more important role in the era of rapid growth of information. Undoubtly, the number of printed documents through the network is increasing at an unprecedented rate. This not only causes the company or enterprise costs increasing, but also causes environmental pollution and affects our health.Leakage of confidential documents is likely to cause fatal blow to company because of the improper printer management. Printer management status is in artificial stage, and also lacks of effective management means and tools. This paper on printer users control is used to solve the above problems.We adopt digital signature technology to realize user identity monitoring. The structure of this paper is arranged as following:the first chapter introduces the general situation of this topic, and the main job of what we do; the second chapter describes the theory of cryptography and digital signature, and also introduces several mainstream cryptography library,especially MIRACL Library; the third chapter introduces the working principle of this printer to help us understand printing mechanism; the fourth chapter researches signature schemes based on ECC in the standard model and proposes a new short proxy signature, and also gives security analysis and code; the fifth chapter develops the printer user identity monitoring system that we have established, and analyzes several print monitoring methods, and realizes our system founded on MFC printer mechanism; the sixth chapter gives a general summary of this paper.
Keywords/Search Tags:Digital Signature, Identity Monitor, ECC(Elliptic Curve Cryptography), Print Monitoring
PDF Full Text Request
Related items