Font Size: a A A

Research And Application Of Security Enhancement Method Of Copyright Registration System

Posted on:2018-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:D WuFull Text:PDF
GTID:2348330515983294Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In China’s information technology development process,the information system is a lot of industry with their own characteristics have been built to support the development of related business,changed the original work.Whether these information systems are running smoothly,in some sense,affect the development of units or industries.These systems not only improve the efficiency,due to the large number of information systems users,business complexity,an indirect increase in business information security risks.The country for the information system security issues,the establishment of a more comprehensive information system security level protection standard system.The copyright registration system is the copyright registration information system of the copyright protection center of China.It is mainly for copyright registration of computer software copyright and copyright of the works.The copyright protection system of the copyright registration system is very weak.Therefore,it is necessary to carry out the security of the copyright registration system according to the requirements of the third level of the security standard of the information system security level.Enhance the method of further study.Based on the requirements of application security in the third level of the security level of information system security level,this paper analyzes the security problems of the system itself,and determines the security risks that need to be solved.It is the anti-Resource control.On the basis of the non-repudiation,we choose the certificate-free public key cryptosystem as the theoretical basis.By studying the general algorithm of the certificate-free signature scheme,we propose a certificate-free signature scheme without bilinear pairing,which proves the unforgeability,The security is based on the discrete logarithmic difficult hypothesis,and finally compares the security and performance with other known certificateless signature schemes.In the aspects of software fault tolerance and resource control,we choose to change the original application service architecture as the starting point,study the application service architecture and the load balancing strategy,and determine the application architecture of the hash strategy to solve the two aspects of security problem.In the copyright registration system external load balancing request forwarding,the additional access detection function,from the source to eliminate most of the security risks.The solutions developed above are combined with the copyright registration system and are applied to existing systems to improve the security of the system as a whole.
Keywords/Search Tags:unparalleled linear pair, application service architecture, load balancing, access detectio
PDF Full Text Request
Related items