With the development of the computer network technologies, information security is being more concerned. In the technologies of the information security, security authentication is the most important basic technology. Security authentication includes entity authentication and message security.This paper widely analyzes some typical authentication technologies, and researches the application of the production rules in the security authentication. According the difference of the production rule theory and the security authentication, some theories of them is detailed analyzed. In the research method, the production rule is a type of knowledge based artificial intelligence and export system, and the POST production rule is deeply researched, it is the condition of authentication that whether owns the artificial intelligence type knowledge of production rule.This paper researches the production rule system which is used in security authentication, including the production system model based on authentication, and researches the related authentication model,and the problems of the authentication using one-time pad and one-time password technologiesand,also designs the new authentication technology. Once the client ask for authentication, the server will send a random data to the client, at the same time, the client and the server owns the same key. The thought is firstly to design some production rules, as uses the mathematics relation of the random data and the key, changes the random data to a goal data through multiple steps. The authentication will pass if the client and the server changes the same way and get the same goal data. The authentication technology can be used in the information system by the analysis of the security.This paper also describes how to design the security authentication system software based the production rule which uses the VC++. |