Font Size: a A A

Pki-based Network Security Technology Platform Designed And Implementation

Posted on:2012-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ZhongFull Text:PDF
GTID:2218330338470105Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In face of the rapid development of information technology today, an organization or a company would meet the difficulty of network security management inevitably in the course of growing and development. The major object of this article is to provide strong information technology support for organizations and companies in users'account management, users identification, visiting control, behavior checking and so on. It has effectively realized the management of user account and action under complicated application. It has played an important role in improving the efficiency of an organization and the degree of information sharing and security.The several authentication technologied which are popular in network has are deeply studied. At the same time, other information security technologies, including authorized management and SSO has are studied, and put forward the design and realization plan of unified authentication management platform. Then, the system and security administrator can concentratedly manage various users and information, distribute authority and attest identification, which has ensure the implement of system security strategy. This platform has broad application prospect in E-government services, E-financial services, enterprise management of information resource and users, and so on. It will be of far-reaching importance for enterprise, government or a country's informationization.The main points are as follows:(1) Study the present identification technologies, discuss their advantages, disadvantages and proper application. Besides, It has introduced other popular network security technologies, including authorized management, SSO and some programming technologies in project development.(2) Design an unified authentication management platform, introduce the general design plan, modular design plan, management plan of account, identification, authentication and SSO as well as relative interfaces. Described system page and database design. At present, this platform could be put into use.(3) Introduce some extended application of the unified authentication management platform, especially the application of PKI in E-order and USB-Key.(4) Introduce some extended application of the unified authentication management platform, especially the application of PKI in E-order and USB-Key.(5) Design authorization data encryption and control control mechanism,and implement the data encryption algorithm which uses in the application of authorization.
Keywords/Search Tags:information security, PKI, identity authentication, authorization management, log auditing
PDF Full Text Request
Related items