Font Size: a A A

Research And Application Of One Personalized Identity Authentication Technology In The Consensus Information

Posted on:2011-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:F FangFull Text:PDF
GTID:2178360308962053Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the technical development of computers and networks, unauthorized users or hackers do more and more invasions on the information system through the network. Therefore, protection of computer security has become a matter of urgency. User's identity authentication is an important means to carry out system security. The traditional login method only depends on a single password content, which has the drawback of password leak and security problems, so biological identification technology is proposed to enhance system security by taking use of human biological characteristics.The background of this paper is the consensus information system, which is based on urban management data. This consensus information system is mainly aimed to the opinion of managing and planning the urban development, so the data addressed and stored in the database is about the city construction, and these information and the results of statistical analysis play a very significant role on the understanding of the overall situation of urban planning and development. Besides, this system needs the different user roles who have different operation privileges. Therefore, the identity authentication of users in this system have more strict rules.For the specific requirements of this project, the workload of the thesis is mainly reflected in:1.Summarize the various types of personalized identity authentication technology, and make detailed comparisons of their advantages and disadvantages about application.2.On the basis of summing up and absorbing the former authentication algorithm of the keystrokes, an improved keystroke authentication algorithm has been proposed from a personal point of view, and then lead to the concept of keystroke print authentication technology. In the process of studying the algorithms, the improved authentication algorithm no longer considers the overall keystroke frequency, but the every keystroke spot, which can do a detailed and comprehensive analysis of the user's keystrokes characteristic profile, which just like the user's personalized keystroke print and can play a very good protective effect of the authentication system, so the concept of keystroke print authentication is more in accordance with the meaning of the core algorithm in the authentication system.3.Lastly, design the different identification process of keystroke print to the different system roles, and apply this improved authentication algorithm of keystroke print to the identity authentication part of the consensus information system aimed for the urban data analysis. From the results of application and the actual data analysis can be drawn that both the FAR (false alarm rate) and the IPR (Imposter pass rate) of the improved keystroke print authentication algorithm are better than the performance of former authentication algorithm, so the keystroke print authentication technology has played an important role in the security protection of consensus information system, and the system is running well.
Keywords/Search Tags:biological identification technology, consensus information system, keystroke print characteristics, FAR, IPR
PDF Full Text Request
Related items