Font Size: a A A

Security Authentication System Based On Production Rules And Design,

Posted on:2010-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:T FengFull Text:PDF
GTID:2208330335990845Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the computer network technologies, information security is being more concerned. In the technologies of the information security, security authentication is the most important basic technology. Security authentication includes entity authentication and message security.This paper widely analyzes some typical authentication technologies, and researches the application of the production rules in the security authentication. According the difference of the production rule theory and the security authentication, some theories of them is detailed analyzed. In the research method, the production rule is a type of knowledge based artificial intelligence and export system, and the POST production rule is deeply researched, it is the condition of authentication that whether owns the artificial intelligence type knowledge of production rule.This paper researches the production rule system which is used in security authentication, including the production system model based on authentication, and researches the related authentication model,and the problems of the authentication using one-time pad and one-time password technologiesand,also designs the new authentication technology. Once the client ask for authentication, the server will send a random data to the client, at the same time, the client and the server owns the same key. The thought is firstly to design some production rules, as uses the mathematics relation of the random data and the key, changes the random data to a goal data through multiple steps. The authentication will pass if the client and the server changes the same way and get the same goal data. The authentication technology can be used in the information system by the analysis of the security.This paper also describes how to design the security authentication system software based the production rule which uses the VC++.
Keywords/Search Tags:authentication, production rule, information security
PDF Full Text Request
Related items