Research on Digital Encryption Security Information System Based on Identity Authentication

被引:0
|
作者
Bu, Xu [1 ]
机构
[1] Guangzhou Nanyang Polytech Coll, Sch Informat Engn, Guangzhou 510925, Guangdong, Peoples R China
关键词
Identification Certification; Key Combination; Management System; Network Transactions;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In order to solve the problems existing in the current authentication system, a new authentication system scheme is proposed. The user identity is used as a key production factor by using the CPK (Combined Public Key) combined public key system. From the perspective of security design, and combining the theory of CPK combined public key system, the overall design framework of CPK key management system is proposed. According to the functional requirements of the system, the main modules of the system are divided, and its main functions are stipulated. The system uses a secure authentication card as the only identity of the user. The authentication card has a certain computing ability and safe storage space. It realizes the secure storage of the user's key. Finally, from actual application scenario, the data flow of the user in the process of registration and use in the system is given. The main modules of the system are tested successfully through the security authentication card.
引用
收藏
页码:175 / 178
页数:4
相关论文
共 50 条
  • [21] Research on Identity Authentication Method Based on Negative Logic System
    Cheng, Yexia
    Du, Yuejin
    Peng, Jin
    Fu, Jun
    Liu, Baoxu
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 3 - 15
  • [22] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [23] Identity-Based Encryption with Forward Security
    Li, Hongwei
    Yang, Haomiao
    Li, Fan
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
  • [24] Statistical Basics for Testing and Security of Digital Systems for Identity Authentication
    Acken, John M.
    Nelson, Leslie E.
    IMETI 2008: INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II, PROCEEDINGS, 2008, : 122 - +
  • [25] The Design and Implementation of the Wireless Network Identity Authentication System based on the Hybrid Encryption Algorithm
    Xu, Yongbing
    Wang, Junyi
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 303 - 306
  • [26] Digital certificate based identity authentication in remote login linux system
    Zhang, Chunrui
    Xu, Ke
    Hao, Xiangdong
    Liu, Yuan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (10): : 1717 - 1720
  • [27] The Unified Identity Authentication Platform of University Information System Based on CAS
    Zhang Haibo
    Lin Peifa
    Zhang Xiaomeng
    Li Xiaoyan
    Zhang Zekun
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE (ICEMAESS 2017), 2017, 172 : 398 - 403
  • [28] Intelligent user identity authentication in vehicle security system based on wireless signals
    Zhang, Jie
    Wang, Zhongmin
    Yan, QingLi
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (02) : 1243 - 1257
  • [30] Intelligent user identity authentication in vehicle security system based on wireless signals
    Jie Zhang
    Zhongmin Wang
    QingLi Yan
    Complex & Intelligent Systems, 2022, 8 : 1243 - 1257