期刊文献+

基于USB KEY网络安全系统的研究 被引量:2

Research of Network Security System Based on USB KEY
下载PDF
导出
摘要 分析归纳了局域网内多种可能导致信息泄密的途径,深入研究了密码学理论和公钥基础设施PKI,并在此基础上设计和实现了网络安全系统。该系统以硬件USB KEY产生和管理网内用户的公/私钥对,以符合PKI标准的数字证书来管理用户的公钥及其相关联的身份信息。同时提供数字签名和身份认证功能,在网络环境中确保了文件的真实性、完整性和不可否认性。将USB KEY与客户端软件相结合,通过双因子身份鉴别机制严格管理登录到客户端主机的用户,使得合法用户可以安全的通过Internet网访问内部数据。最终所实现的系统确保了在不影响某研究所所局域网当前业务的前提下,完成对局域网全面的安全管理。保证无论是在本单位的内网或是公网的合法用户在与单位内部资源服务器进行信息交互时,都能确保系统与数据的安全保密,从而提高办公自动化水平和信息管理水平。 This paper analyzes many kinds of possibility which disclose information,researchs cryptographic theory and PKI deeply,and realizes network management system based on them.The pair of public or private key were produced by USB KEY.Digital certificate manage the public key which associated with indentity information conform to PKI.At same time it provides digital signature and authentication function,so that it assure truth and integrity in network.The register users can load the operating system and access internal data through Internet by means of USB KEY and client software.The system fufills with the safety management for the whole LAN on condition that it doesn't influence the service of one research institute.When register users which are from inner or public network interact with the information server,it can assure safety and secrecy for system and data,so that capability of office automation and information management were improved heavily.
作者 胡巧玲
出处 《舰船电子工程》 2010年第4期131-135,共5页 Ship Electronic Engineering
关键词 公钥基础设施 信息安全 USB KEY 身份认证 PKI information security USB KEY identification
  • 相关文献

参考文献11

二级参考文献46

  • 1周芳,吴宁.USB2.0设备控制器IP核的Verilog HDL设计[J].南京师范大学学报(工程技术版),2003,3(4):66-70. 被引量:3
  • 2刘国伟.集体心理治疗对医学生社交焦虑和自尊的干预研究[J].新乡医学院学报,2006,23(5):526-527. 被引量:5
  • 3[1]Roscoe A W. Intensional specifications of security protocols[A]. In: Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop[C]. Los Alamitos: IEEE Computer Society, 1996. 28~38.
  • 4[2]Boyd C. Towards extensional goals in authentication protocols[J/OL].http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997.
  • 5[3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2): 85~128.
  • 6[4]Abadi M, Tuttle M R. A semantics for logic of authentication[A]. In: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing[C]. New York: ACM Press, 1991. 201~216.
  • 7[5]Meadows C. A model of computation for the NRL protocol analyzer[A]. In: Gong L, ed. Proceedings of Computer Security Foundations Workshop VII[C].Los Alamitos: IEEE Computer Society Press, 1994. 84~89.
  • 8[6]Syverson P F. Adding time to a logic of authentication[A]. In: Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security[C]. New York: ACM Press, 1993. 97~101.
  • 9AXELSONJan.USB大全[M].北京:中国电力出版社,2001.202-213.
  • 10Jan AxeLeon, "USB Complete", Lakevies Research USA, 1999.

共引文献102

同被引文献18

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部