Font Size: a A A

Design And Implementation Of Health Insurance Card Key Security Traffic Management System

Posted on:2015-12-01Degree:MasterType:Thesis
Country:ChinaCandidate:J HuFull Text:PDF
GTID:2308330503450300Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the highly rely on the network to provide various social public service today, the network is accompanied in every one of us around, diverse network participants, each purpose is not the same, network security has become a network application in a primary problem. General non-state social security network applications, has abandoned the physical isolation private network construction mode, based on the use of internet-based data transmission network, based on this, it is proposed transmission network security high standards and new requirements, formed under the circumstances to ensure foolproof data transmission, increase network involves transfer, namely security, easy to promote, and low cost.In recent years, China’s Medicare card to flourish, from the first-tier cities, the development of second and third tier cities, but also to cover the majority of the rural population in the future, the old centralized system card mode can not meet the rapidly growing demand to do card. Residents Medicare card issuers will use the remote mode, bound to Medicare card key transport management systems, higher security requirements. Through comparative study of existing types of network security transfer is proposed to hardware encryption for secure transmission system based on design ideas, through an integrated country’s self-developed encryption algorithm encryption chip design a purely domestic secure transport key management system, the data transmitted over the network is encrypted protection, can effectively prevent data leakage and protect data integrity, prevent illegal tampering. This paper describes the overall architecture of the key from the secure transmission management system, and a detailed description of their work processes; then from authentication function module describes the application of digital certificates, digital authentication, digital certificate update and digital certificates destruction; then from the data encryption and decryption function module introduces the secure transmission of data packets, encryption and decryption keys secure transmission and a combination of both the secure transmission of digital envelopes; Finally interface communication protocol, network configuration, database configuration and authentication of each function in detail aspects of the system to achieve the secure transmission of implementation. Residents Medicare card based key management system is based on the secure transmission hardware encryption chip as the core, through the utilization of state secret algorithm SM1, SM2 and SM3, achieve confidentiality protection for network transmission data integrity protection and anti-tamper protection. So, in the encryption algorithm vigorously country today, residents Medicare card key security traffic management system to construct a new low-level hardware-based encryption scheme secure transmission, the program not only provides a new research direction for low cost and high confidentiality, but also provides a new application space for the secure transmission network in other areas.
Keywords/Search Tags:Key, Secure Transmission, Encryption, Decryption
PDF Full Text Request
Related items