Font Size: a A A

The Research Of Authiektication And Trust Transfer Mechanism In The Mobile Internet

Posted on:2015-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:C J BiFull Text:PDF
GTID:2268330431954124Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Recent years, mobile internet develops rather rapidly and the mobile terminal has become a necessary device, not only for the communication but also for electronic commerce and work. Mobile terminal has following characteristics compared to the traditional PC terminal:high movability, wide usage, easy to carry. But its computational power is lower than PC, and the ability of the users is different. With the growth of the mobile terminal, the information security problem is more and more important. The authentication is more and more important in the Internet, the PKI technology is widely used in the traditional internet with the PC terminal, but it is still very immature in the mobile internet for the unique characteristic of the mobile terminal.I participated in the "encryption VoIP system" project, in which I am responsible for the development of the identity authentication system. During the development, I researched the identity authentication in the mobile internet and the cross-domain trust transfer mechanism, and the research results are realized in the system application.The main contents of this paper are as follows:1) Firstly we analyzed the current mainstream of the identity authentication technology and its advantages and disadvantages in this paper, which include the static authentication, the dynamic authentication, the biological recognition authentication and the authentication based on the PKI technology. We analyzed the merits of PKI technology and its application in the identity authentication.2) Secondly we analyzed the characteristic of the mobile terminal and the characteristic of the PKI technology in the mobile internet. We also gave a comprehensive of RSA, ECC and SM2algorithms, API for mobile terminal and PC terminal. We gave the implementation in the VoIP system. 3) Because of the mobile terminal has the characteristic of wide used, geographically, difficult to manage, we mainly research the cross-domain trust transfer between different trust domains. The traditional PKI technology is not fit for the mobile internet. With the combine of the TePA and the PKI technology, we proposed a trust model used for the multi-domain environment.4) With the project "encryption VoIP system", we gave the implementation of the above method, and we analyzed the performance of different technology.Finally, we summarized the work of this paper and analyzed the insufficiency of the work. we gave the direction of the further work.
Keywords/Search Tags:identity authentication, trust transfer, digital signature, PKI, mobilecommunication
PDF Full Text Request
Related items