Font Size: a A A

Research And Implementation Of Trusted Authentication In Security Access ForMobile Terminal

Posted on:2016-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y J JiangFull Text:PDF
GTID:2308330470971969Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the promotion of information science and technology and the rapid development of network applications, especially the development of 3G mobile networks, smart mobile devices and mobile applications, mobile office and remote job mature, so remote office become more convenient and effective, greatly improving the efficiency and effectiveness of work. However, due to the nature of mobile networks and terminals, a variety of network viruses and hacker attacks cause information security issues are also increasingly important. Therefore, based on security access scheme with the mobile environment is an urgent demand. The importance of information security is self-evident, especially for banks, National Grid, the public security authorities and other government agencies and state enterprises, information security is particularly important. Therefore, how to ensure that confidential data is not being compromised, and to achieve the authentication of mobile access is the most important for secure access solutions.To solve the problem, this paper studies the trusted certificate-based authentication technologies, and in-depth study of a collection of multi-factor authentication based on security authentication scheme based terminal credible and trusted authentication scheme based on fast LDAP protocol authentication scheme authentication scheme. Then design the system architecture, functional structure and database structure identity authentication system, and research and design a terminal condition monitoring processes. Finally, to achieve the LDAP client for end users connect to the server and collecting table, and has a user authentication management module, the authentication system terminal security management module, system log module and system settings module four sub-modules server.The system has been tested on a secure access platform to achieve secure access terminal authentication work platform to ensure the safety and reliability of the access terminal, in order to protect the safe operation of the platform.
Keywords/Search Tags:Mobile Terminal, Trusted Computing, Authentication, Terminal Detection, Data Security, LDAP
PDF Full Text Request
Related items