Font Size: a A A

Research On Remote Authentication System Based On Security Chip

Posted on:2016-09-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y F GaoFull Text:PDF
GTID:2348330488473998Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The Network Information Security Technology is becoming more and more important. Now,people's basic life happen on the internet on the background of “Internet +”, Information Safety is drawing greater attention of people in the world. The military or economy of our country has been associated with network. The network has been a more key factor which can affect the safety of country.The identity authentication system is the first defensive line of the security system. The information will be dangerous once the identity authentication system is broken. So there is no doubt that the identity authentication system is the first checkpoint of the entire system and it is a cornerstone to design a secure identity authentication.The scheme has improved the working mode on the basis of the traditional USBKey authentication scheme, combined with Internet. What I have done is as follows. In this paper, I design a identity authentication system which is based on A980 chip and USB communication. The client is implemented by C, C# and JSP. The server is implemented by Java and My Sql. The system has a safer mechanism. The scheme is based on challenge and response mode, dynamic password combined with static password, RSA encryption combined with Hash function in the authentication mechanism.The scheme here improves the security of traditional USBKey. A new authentication mode is put forward based on the traditional modes, in w hich RSA encryption instead of hash algorithm and random string instead of timestamp. This mode is based on traditional challenge response and digital certificate mode. The attackers can't make a successful authentication with your USBKey even if they get it and read it successfully because the security of the system is guaranteed by not only the PIN code but also the client software containing a serial which the sever will check. So a successful certification needs USBKey,PIN and the client software. It is difficult to get these factors because of their different carriers.
Keywords/Search Tags:USBKey, identity authentication, challenge response, dynamic password, RSA
PDF Full Text Request
Related items