Font Size: a A A

Procurator Line Network Identity Authentication System Research

Posted on:2014-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:H D LiuFull Text:PDF
GTID:2308330482479089Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In today’s society, the spread of the Internet make procurator organ’s management and service realize the network, electronic, transparent, and greatly enhance the work efficiency, but the openness of the network itself also buries the hidden trouble for the security of network systems. Procurator organs have high demand to data information’s privacy in network system, and security problem is becoming more and more serious with the current threat of the information. It relies on more and more intense to guarantee the safety of identity authentication system, and identity authentication technology research and development become a widely concerned topic.This paper points the threats network security faces, the coping measures, identity authentication technology research background, the cryptography foundation of identity authentication technology and current situation of the development in five chapters. This paper analyzes how to use the identity authentication technology to realize network security through the introduction of some specific authentication mode. Identity authentication network system is a process to verify user identity, and the process is simple or complex according to different authentication technologies, and it provide the safeguard for the communication security communication, and it is the guardian of the information security system, and it occupies an important position to guarantee information security. Other security measures of network system are based on the identity authentication, once the identity authentication system was destroyed, other protective measures are eroded.So identity authentication technology is very important in guaranteeing the security of procurator network, and the prospect is light, but there are still some loopholes and the insufficiency, which need further research to perfect.under the premise of the deep analysis of procuratorial line network identity authentication system’s application status, according to the reality demand of procuratorial line network identity authentication system, The analysis, design and embedding of two-factor authentication system. This paper has completed that using GINA extension technology to embed double factors identity authentication’s design and implementation, and lays a solid foundation for a more secure network system..
Keywords/Search Tags:Procurator line network, Internet security, Identity authentication, Authenticate agreement
PDF Full Text Request
Related items