Research on Digital Encryption Security Information System Based on Identity Authentication

被引:0
|
作者
Bu, Xu [1 ]
机构
[1] Guangzhou Nanyang Polytech Coll, Sch Informat Engn, Guangzhou 510925, Guangdong, Peoples R China
关键词
Identification Certification; Key Combination; Management System; Network Transactions;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In order to solve the problems existing in the current authentication system, a new authentication system scheme is proposed. The user identity is used as a key production factor by using the CPK (Combined Public Key) combined public key system. From the perspective of security design, and combining the theory of CPK combined public key system, the overall design framework of CPK key management system is proposed. According to the functional requirements of the system, the main modules of the system are divided, and its main functions are stipulated. The system uses a secure authentication card as the only identity of the user. The authentication card has a certain computing ability and safe storage space. It realizes the secure storage of the user's key. Finally, from actual application scenario, the data flow of the user in the process of registration and use in the system is given. The main modules of the system are tested successfully through the security authentication card.
引用
收藏
页码:175 / 178
页数:4
相关论文
共 50 条
  • [31] Biometric-based personal identity-authentication system and security analysis
    Li, Chao
    Yang, Yi-Xian
    Niu, Xin-Xin
    Journal of China Universities of Posts and Telecommunications, 2006, 13 (04): : 43 - 47
  • [32] Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption
    Alashjaee, Abdullah Mujawib
    Alqahtani, Fahad
    IEEE ACCESS, 2024, 12 : 29738 - 29747
  • [33] An IFF Identity Authentication Scheme of Security and Guarantee System
    Deng, Jie
    Ren, Yongjin
    Li, Yunji
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1529 - 1532
  • [34] Research on Information Security System of Smart City Based on Information Security Requirements
    Dong, Na
    Zhao, Junsan
    Yuan, Lei
    Kong, Yun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [35] Security Analysis and Design of a Uniform Identity Authentication System
    Chen, Lingmin
    Xie, Xiaoyao
    Xu, Yang
    Xia, Daoxun
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 174 - 178
  • [36] A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    2015 17TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2015, : 322 - 326
  • [37] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [38] Identity Data Security System for the Digital Identity Wallet
    Choi, Daeseon
    Roh, Jonghyuk
    Kim, Seunghyun
    Jin, Seunghun
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1678 - 1681
  • [39] Research on Algorithm of Digital Filtering based on Video Information Security
    Tian, Jin
    Qiu, Yang
    Qian, Liuyu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 593 - 596
  • [40] A Network Identity Authentication Protocol of Bank Account System Based on Fingerprint Identification and Mixed Encryption
    Zhu, Lijuan
    Liu, Jingao
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878