Font Size: a A A

Threat Analysis And Security Technology Research Of Network Real-Name Authentication

Posted on:2018-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:F Y LiuFull Text:PDF
GTID:2428330623950900Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Real-name authentication is to verify and audit user identity information,which is usually by using identity cards.As a necessary means of network identity management,network real-name authentication helps to establish sound and reliable Internet credits.As more and more network applications require users to execute real-name registration,existing authentication schemes expose many security issues of false real-name authentication,and therefore,real-name authentication security has drawn more and more attention.The main contributions and contents of this thesis include the following three aspects:Firstly,this thesis analyzes the process of existing real-name authentication,and builds a threat model to the real-name authentication scheme based on identity card reading devices.The model shows the possible threats and attacks on each node of real-name authentication process.The difficulties of implementing these attacks are also discussed.Secondly,this thesis proposes two secure reinforcement schemes against the library file hijacking attacks and browser plug-in hijacking attacks,which are most easily suffered attacks.The feasibility of the hijacking attacks and the effectiveness of the proposed reinforcement schemes are verified via simulation experiments.Finally,this thesis designs a cloud-based real-name authentication scheme.The new scheme verifies and decodes identity information in a secure and controllable cloud environment,and combines different kinds of user identity information such as name,identity cards number,identity cards serial number,identity cards specialized security access module serial number,face recognition etc.,to execute real-name registration.The new real-name authentication scheme can effectively resist various attacks which are serious in the existing schemes,and as a result,achieves relatively securer real-name authentication.
Keywords/Search Tags:Real-Name Authentication, Secure Threat, Hijacking Attack, Cloud Reading
PDF Full Text Request
Related items