Research on Digital Encryption Security Information System Based on Identity Authentication

被引:0
|
作者
Bu, Xu [1 ]
机构
[1] Guangzhou Nanyang Polytech Coll, Sch Informat Engn, Guangzhou 510925, Guangdong, Peoples R China
关键词
Identification Certification; Key Combination; Management System; Network Transactions;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In order to solve the problems existing in the current authentication system, a new authentication system scheme is proposed. The user identity is used as a key production factor by using the CPK (Combined Public Key) combined public key system. From the perspective of security design, and combining the theory of CPK combined public key system, the overall design framework of CPK key management system is proposed. According to the functional requirements of the system, the main modules of the system are divided, and its main functions are stipulated. The system uses a secure authentication card as the only identity of the user. The authentication card has a certain computing ability and safe storage space. It realizes the secure storage of the user's key. Finally, from actual application scenario, the data flow of the user in the process of registration and use in the system is given. The main modules of the system are tested successfully through the security authentication card.
引用
收藏
页码:175 / 178
页数:4
相关论文
共 50 条
  • [41] Research on a Dynamic Identity Security Authentication Method for Power Business
    Guo, Baoxian
    Xu, Ying
    Xu, Yu
    Zhu, Xingxiong
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2190 - 2193
  • [42] Research and Security Analysis of Anonymous Identity Authentication in Trusted Computing
    Yang, Yang
    Zhang, Huanguo
    He, Fan
    Zhang, Bo
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 409 - +
  • [43] Research on identity authentication system of Internet of Things based on blockchain technology
    Liu, Yanhui
    Zhang, Jianbiao
    Pathan, Muhammad Salman
    Yuan, Yijian
    Zhang, Puzhe
    Maroc, Sarah
    Nag, Avishek
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 10365 - 10377
  • [44] RETRACTED: Face Security Authentication System Based on Deep Learning and Homomorphic Encryption (Retracted Article)
    Sun, Dechao
    Huang, Hong
    Zheng, Dongsong
    Hu, Haoliang
    Bi, Chunyue
    Wang, Renfang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] Circular and KDM Security for Identity-Based Encryption
    Alperin-Sheriff, Jacob
    Peikert, Chris
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 334 - 352
  • [46] Efficient identity authentication and encryption technique for high throughput RFID system
    Hsu, Ching-Hsien
    Wang, Shangguang
    Zhang, Daqiang
    Chu, Hai-Cheng
    Lu, Ning
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2581 - 2591
  • [47] Research and Implementation of EPON System Encryption Security
    Yin Ai-han
    Chen Yan-yan
    Liu Fang-ren
    Wu Fan
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 78 - 81
  • [48] Identity management security authentication based on blockchain technologies
    Fan, Pengfei
    Liu, Yazhen
    Zhu, Jiyang
    Fan, Xiongfei
    Wen, Liping
    International Journal of Network Security, 2019, 21 (06) : 912 - 917
  • [49] Research on Identity Authentication in V2X Communications Based on Elliptic Curve Encryption Algorithm
    Zhang J.
    Li F.
    Li R.
    Li Y.
    Song J.
    Zhou Q.
    Qiche Gongcheng/Automotive Engineering, 2020, 42 (01): : 27 - 32
  • [50] Research and Implementation of EPON System Encryption Security
    Yin, Aihan
    Chen, Yanyan
    Wu, Fan
    Liu, Fangren
    2010 ETP/IITA CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (SSSE 2010), 2010, : 186 - 189