Font Size: a A A

Research And Implementation Of Identity Authentication Technology In Public Secuirty Business Information System

Posted on:2014-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:F LuFull Text:PDF
GTID:2248330395497708Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, the information security is demandedstrongly. The study of identity authentication technology has also obtained the considerabledevelopment. There has produced many more mature, reliable identity authentication, accesscontrol solutions. More and more applications on the Internet and LAN, solve theidentification and access control of network in virtual world.In the computer network world, all the information is represented with a specific set ofdata. The numbers used to identify the user identity information are called digital identity[3].The digital identifications of users are only identified in the network world by computer. Coreidentification technology, is how to establish a reliable mechanism, to ensure the physicalidentity and digital identity application operator is reliable and accurate matching. Identityauthentication is to solve the matching problem of two identities.In the real world, identity authentication methods on the users are divided into thefollowing three methods[10]:Method One: to prove the identity according to the known informationMethod two: to prove the identity according to the human possessionsMethod three: direct to prove identity according to the physical characteristics of the oneand only person, such as fingerprint, retina[4].Used in the network world means of authentication and the real world are basically thesame, in order to achieve authentication of higher strength, usually in the above three ways tochoose two kinds of mixed use.This thesis focuses on the application and realization of identity authentication andaccess control technology in the public security business information system. Commonidentity authentication techniques are compared in the thesis. We select identity-based PKI ascertificate authentication technology and apply it in the public security business informationsystem. The issuance of the certificate and the realization of update strategy system arediscussed. The problem of expired certificate of police officers and the timely update of thecertificate is well settled. Police officers can update certificates directly through computer terminals, without the certificate centralized update. The updated certificate inherited the oldcertificate authority. On the basis of the authentication, the effective access control is furtherachieved in the application system.It is the goal of this paper that sums up the identification, access control technology inthe practical application through the analysis of characteristics of the security industrydemand, designs and finishes implementation of public security information systemidentification which can be a reference to other industries or related researchers.This paper describes the security plug-in embedded in application to realize the accesscontrol of the system, through the deployment of security plug-ins in the application system toachieve security, enhance the safety of application system, and is able to access applicationsystem audit log is complete, so as to protect the public security application system resources.In the process of construction, a set of effective, suitable for identity authentication andaccess control model of complex public security application is made according to thecharacteristics of the application of public security system, the complex number.
Keywords/Search Tags:Digital certificate, identity authentication, access control, cross-platform implementation
PDF Full Text Request
Related items