Font Size: a A A

The OA System Data Security Control Development

Posted on:2015-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y J TangFull Text:PDF
GTID:2308330473954585Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This paper introduces the research and development of structural safety control in OA system implementation.At home and abroad on the security of information systems are extremely seriously, have carried on research and development of a lot of work from the theory and the practice.System theory and framework based on PKI, so our previous PKI on the relevant information at home and abroad, were extensively collected, first learn the cryptology theory, namely the encryption and decryption algorithms typically, have a comprehensive understanding of security of the algorithm and operation performance. The research and realization method of the PKI structure, including the realization of CA, the private key storage medium selection and implementation, application of API function and so on; to make the system to achieve a detailed approach and technical route.CA is a PKI key institutions, but also the root of the entire PKI system safe, so you first need to realize the CA service, thus completing the certificate request, certificate revocation, certificate revocation, certificate replacement, certificate renewal, the certificate expires and other functions, to achieve the certificate and key chain management and exchange of related functions.In order to ensure that the user signature is valid, we choose external portable equipment to store user private key, and supports two has an advantage each storage scheme: IC card and USBKey, to meet the needs of different. Using MCS51 singlechip circuit board self-made control IC card read and write operations and data exchange with PC, USBKey vendor programs do two times development.Basic library we follow PKI system in the PKCS 7 protocol development is an important part of the system, mainly responsible for the generation and interpretation of PKCS 7 data, fragile document original information is by the safety data of this set of base processing robust, credible.To test the correctness of program libraries, we developed the application server demo program, used COM module test base program and provides the interface objects. Using the COM component could be used for a variety of development platform such as ASP, JSP, Lotus, Notes and database connection, so as to ensure the flexibility and the integrity of the system. At the same time, the system also provides a rich interface, can easily extend the function. This paper discusses the principle and implementation of each part of the program, and gives the important data structure source code.Late, we were made for each other module system at all levels of testing, system testing and cross-platform, and finally a joint test of the entire system, to ensure the normal operation, and gradually carried out a test user configuration items; for all tests the problems were corrected zero work to ensure that the system is running well test, to verify the effectiveness of PKI theory.
Keywords/Search Tags:storge medium, PKCS#7 standard, COM, OA
PDF Full Text Request
Related items