Font Size: a A A

Account Security Management System Based On Public Key Technology

Posted on:2015-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2298330434959221Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The times we live in is an Internet era filled with all kinds of techniques which have different functions and various social applications, shopping sites, job sites and numerous academic forums. Most of these websites need users’own accounts and passwords. As a result, the number of personal accounts and passwords increase as the number of websites used increases. But accounting for security, we can’t set same accounts for all websites. So how to memorize so many accounts and make sure the data are safe is the problem we must to solve immediately.An account security protection system based on public key technology is developed based on research on personal information protection and mechanism technology at home and abroad in this paper. The system also combines cryptography, and authentication technology. The design idea is users store their own accounts and passwords in this system and then the system ensures the security of the data by security of algorithms and keys. The system consists of three parts, client, database and the Rockey. The system uses C/S structure, has good scalability, and affords services such as identity authentication, information storage, data encryption, authority control and log audit. The system is easy to operate and combines hardware and software, which is hardware encryption lock and software. Based on public key technology, identity authentication service which the system affords includes signature authentication and Rockey’s legality authentication by using public key. What’s more, the public key encryption is combined with symmetrical encryption.In application prospects, not just individuals, enterprise applications also use account security protection and management. The system is convenient, safe, and also has a deeper application level.
Keywords/Search Tags:Account protection, Identity authentication, Encryption and decryption, Software protection
PDF Full Text Request
Related items