Font Size: a A A

Research And Implementation Of Identity Authentication Based On Secure Smart Card System

Posted on:2011-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:X QinFull Text:PDF
GTID:2178360308982477Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the development of the Internet technologies, the Internet-based applications and E-Commerce have made the humans' life greatly convenient. At the same time, the security problems of the Internet have become increasingly prominent. Problems with the online shopping, financial fraud in the online game as well as ID stealing are among the most issues to which the consumers and the game players pay close attention. The security of accounts like the online bank account and the online game ID could only be realized with the help of a more severe scheme of identity authentication. At the same time, the smart card technology has got greatly developed, which attracts people's attention for its identical security attributes that could be applied in solving the security problems with the Internet.This paper basically places the research emphasis on identity authentication and current smart card technology. And this paper systematically discusses and analyzes the threats, the potential security hazards and the solutions that may occur in dealing with the authentication problems with the help of smart card. Based on these works, it proposes and realizes a secure smart card operating system (S-COS) which could be widely applied in scenarios with different requirements for authentication.The main results of this paper consist of the following points:1. This paper summarizes and analyzes the main identity authentication technologies, and describes the potential security hazards and typical attacks for each of these technologies as well as pointing out these advantages and disadvantages.2. A concept of "Security Adaptation Layer" which is based on the current COS is proposed. Designed a novel secure COS, which could be applied in different hardware environments with the convenience of meeting all kinds of requirements for identity authentication, and analyzed security of Security Adaptation Layer in this paper.3. Designed and implemented an identity authentication scheme based on the secure smart card proposed in this paper and symmetric cryptography. It guarantees the validity of the identities of both communication sides, and analyzes security of this scheme.4. Designed a PKI-based authentication scheme for intelligent transportation networks based on the secure smart card. It guarantees the validity, integrity and time effectiveness in intelligent transportation.
Keywords/Search Tags:Information Security, Identity Authentication, COS, Security Adaptation Layer
PDF Full Text Request
Related items