Font Size: a A A

Inner Mongolia Electric Power Digital Authentication System Design And Implementation

Posted on:2015-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:W AoFull Text:PDF
GTID:2298330434457309Subject:Industrial engineering
Abstract/Summary:PDF Full Text Request
Under the current information technology, information and data channels mostlythrough public networks and enterprise networks spread, without any means of transportprotection and encryption, data is very easy to be intercepted and read, and may even beused by hackers maliciously modified after re-sent. Uses can successfully solve thissecurity issue digital certificates based on PKI system, and therefore to establish aunified identity authentication based on digital authentication system has importantsignificance for improving the safe operation of the enterprise information system,ordered the construction of enterprise information security.On the basis of existing research at home and abroad, considering the actualsituation of Inner Mongolia electric power information systems, this paper puts forwardthe unified identity authentication platform of digital identity authentication systemdesign and implementation scheme based on the analysis of the theory of informationmanagement, key technology of the same identity authentication. The system focuses onthe analysis and implementation of digital identity authentication system the function ofeach part of the design, deployment model. The system guarantees the consistency ofcompany departments and personnel information data, and provides a unifiedmanagement information system access entrance for all staff, security strategy to realizethe unified user authentication, unified authorization, unified and integrated managementof personnel; it not only realize the basic functions of digital certificate generation, theissue, management, and realize the combination of unified user management andauthentication and authorization system. The system of information construction forimproving the Inner Mongolia Power Company, and provides technical support forunified management of security policy and personnel management system to achieve aunified authentication system based on the business of the uniform identityauthentication, unified access, unified authorization.
Keywords/Search Tags:digital identity authentication system, PKI, Information Security
PDF Full Text Request
Related items