首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
综合化航电系统的安全问题将是系统设计者的主要挑战之一,密钥管理是解决安全问题的基础.综合化航电系统的密钥管理不同于联合式航电系统,不存在专用的安全模块和加密总线,因此密钥及保密数据的加载需要新的方式.从综合化航电系统的特点出发,从地面到空中全方位考虑密钥的生成、加载、分配、存储以及擦除的过程,给出了航电系统密钥管理的一个具体方案,并对该方案的优缺点进行了分析,表明该方案具有较好的安全性.  相似文献   

2.
量子密钥通信在分布式航天测控网中的应用研究   总被引:2,自引:2,他引:0  
随着分布式航天测控网技术的不断发展,分布式航天测控网面临着信息安全问题.本文通过分析和研究各种信息加密技术,针对经典加密技术不能保证信息绝对保密性的弊端,考虑利用以量子力学为基础的量子密钥分配技术来保证测控信息传输的绝对安全.基于密钥这种"绝对保密"的方法与分布式航天测控网技术结合的思想,本文提出了量子密钥通信与分布式航天测控网相结合的密钥分配模型.  相似文献   

3.
随着车联网技术的发展,车联网通信的安全技术成为其大规模应用的关键.提出一个基于PKI的车联网安全通信与隐私保护机制.车辆用户将车辆和用户身份ID以及RFID码发送给CA进行映射,作为IPv6编址中的接口标识位和车辆的私钥;CA根据该私钥计算车辆的公钥并发给车辆,车辆接收CA发来的公钥并用该公钥和RSU通信,RSU将会给车辆分配匿名密钥,车辆在之后的通信过程中使用该匿名密钥.由于车辆的真实身份是与CA分配的主密钥相关联,可以确保匿名密钥的泄漏不会直接导致车辆与用户身份的泄漏.性能分析表明,上述安全机制能够有效保护用户隐私,同时实现车联网的安全通信.  相似文献   

4.
数字签名是密码学中的重要课题之一,它是传统文件手写签名的模拟,能够实现用户对以电子形式存放的消息的验证。当算法公开时,在计算上不可能由加密密钥求解解密密钥,因而可以将加密密钥公开,即公开密钥。RSA密码是一种利用因数分解的困难性而设计的公钥密码。本文详述了RSA加密算法的实现以及如何利用RSA实现数字签名。  相似文献   

5.
在分析了现有组播密钥管理方案的基础上,针对IP视频会议的特点,将集中式和分布式密钥管理方案相结合,提出了一种多层次的混合密钥管理方案,其高层为管理层,成员之间通过OFT方案协商产生密钥,并管理密钥;底层采用集中管理方式。该方案避免了单点失效问题,具有高效性和可扩展性的优点,适用于解决大型动态组播的密钥管理问题。  相似文献   

6.
为解决数据分发服务安全规范中身份认证与密钥协商协议存在共享密钥建立缺乏公平性、缺乏验证密钥一致性机制及会话过程缺乏完整性等安全问题,以协议为基础,设计一种新的高安全数据分发服务身份认证与密钥协商协议。新协议引入了ACK机制,并利用D-H密钥交换和非对称密码体制特点解决了原协议存在的安全问题,具备实用性和更高的安全性。  相似文献   

7.
一种特殊的软件加密方法   总被引:3,自引:0,他引:3  
如何利用硬盘的序列号对软件进行加密 ?有一种特殊的方法可以保证一台计算机只有一个密钥 ,该密钥作为程序运行的临时密钥。当临时密钥过期之后 ,可以使用软件提供商提供的软件狗来保证用户程序长期正常地运行。两种方法结合起来可以有效地维护软件提供商的利益。还介绍了软件狗的使用情况并提供了加密方法的程序源代码。  相似文献   

8.
为提高航天测控网通信的安全性,本文将量子密钥分配技术应用于分布式航天测控网,并采用容迟网络路由策略来传递量子密钥。首先在地面站和航天器之间建立量子密钥分配系统,生成并共享密钥;随后以行进中的航天器为中介,逐段加密传送密钥;最终可使两个地面站共享量子密钥,保证信息传输的绝对安全。考虑到容迟网络的特点,本文对传染病路由算法进行改进,并应用于密钥传递过程。仿真结果表明,上述密钥分配机制可有效提高航天测控网通信的性能。  相似文献   

9.
主要研究在普适计算环境下移动代理的安全机制,提出了一种主从模式下代理密钥协商的协议,此协议实施的关键是使用指令系统可变的虚拟机.这种虚拟机可被动态生成,并且每次都使用不同的指令系统,以此来保证恶意宿主不能在短时间内获取会话密钥的信息.通过模拟攻击测试验证了此移动代理安全策略的有效性.  相似文献   

10.
从信号安全的角度出发,研究了蓝牙信息传输中的安全模式,对蓝牙技术的密钥管理方法等进行了分析,并提出了作者的评价意见。  相似文献   

11.
Access control system with hand geometry verification and smartcards   总被引:1,自引:0,他引:1  
An access control system that joins the uniqueness of biometric verification, as well as the storage security and processing capabilities of smart cards, is defined here. The biometric technique chosen has been hand geometry, which is considered to provide low/medium security (there are other much more secure, as fingerprint, iris or retina), to be easy to use, to achieve high acceptance by users, and which performance is given throughout fast processing and medium cost. Also, the small template size needed for each user is positive for storage and processing capabilities required in the system. But the innovation in the system proposed is that the smart card not only stores the user's template, but also performs the verification process with the features set by the terminal to the card. With this improvement, the security of the system has risen because the template is never extracted from the card, avoiding duplication of such sensible data. The specifications for the enrolment process will be presented as well as the applications where this new system is recommended  相似文献   

12.
Due to the great increase in Information Technology (IT) systems where user authentication is needed, security in those systems relies on using PINs or passwords. During recent years, the scientific community has been trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. One of the sectors where user identity must be verified, is the identification cards sector. In fact, if great security wants to be achieved, smart cards should be used. But cardholder verification is performed using Card Holder Verification Keys (CHV-Keys), which are PIN-based. The authors are trying to integrate fingerprint verification inside a smart card, following their works in the past. The fingerprint scheme used is shown, and the work to achieve the integration inside a commercial smart card is detailed.  相似文献   

13.
设计了一个基于ARMCortex—M3和USB接口的智能卡读卡器系统,采用具有ARMCortex—M3内核的STM32F103R6T6等芯片进行相关的硬件设计;分别使用Keil和VisualC++6.0进行固件程序和驱动程序开发,实现了计算机与智能卡的准确、高效通信。同时,通过设计测试程序对系统的功能和性能进行测试,证明其有效性。  相似文献   

14.
Over the past few years, the authors have tried to integrate biometrics into a smart card. In this paper, to improve error rates obtained with hand geometry biometrics and the costs with the iris recognition system, fingerprints are used. This technique, quite well known in the industry and deeply studied for the last century, has improved its electronic sensors, pulling down prices and, therefore, enabling its use in many more applications. The first step, as in every biometric system, is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae, i.e., the discontinuities in the ridges and valleys of the fingerprint. Due to the fact that it is not possible to always catch the same number of minutiae, a special matching algorithm should be applied to compare the feature vector with the corresponding user's template. Efforts to integrate this matching algorithm in a low computer power device, such as a smart card, are given, showing the paths that should be followed in order to improve the security of access control and payment systems available today.  相似文献   

15.
基于JAVA技术的校园“一卡通”管理系统   总被引:4,自引:0,他引:4  
通过分析智能卡的特点,介绍我于JAVA技术构建的"校园一卡通"管理系统的系统分析、系统设计和系统实现,并重点介绍了智能卡商务交易问题的解决方法--电子钱包的基本架构和实现过程.  相似文献   

16.
Nowadays many systems need a portable media to store some sensible data, such as smart cards. The information can be protected by the user with his Personal Identification Number (PIN), or through biometrics. Unfortunately, there is not a smart card today that can verify the biometric template inside it, performing this task in the terminal. The author has developed the algorithms and data structures needed to solve this problem. Therefore, he has created a smart card with user biometric authentication, based on an Open Platform smart card (in this case, a JavaCard). To achieve these results, different biometric techniques have been studied: speaker verification, hand geometry and iris recognition. Experimental results are given to show the viability of the prototype developed  相似文献   

17.
It has always been claimed that smart cards provide a really high level of security, considering them as a tamper-proof device, with the possibility to auto-block some or all of the services it provides. Unfortunately, nowadays some hackers appear to have demonstrated the lack of security involved in some applications where Integrated Circuit Cards (ICC) have been used. This has led to the opinion that smart cards are not secure enough, and their security is only in the minds of the commercial companies involved with the technology. In this paper, the author explains the reasons why this hacking has succeeded. For example, sometimes memory cards have been used instead of smart cards, or very old smart cards have been issued and not renewed, or the development team involved has not used basic security techniques, such as diversified keys. The author also gives clues to achieve a high level of security depending on the final application, and the environment in which it is going to be used  相似文献   

18.
张轶辉  王昭顺 《航空计算技术》2007,37(4):129-131,134
随着我国网络银行业务的不断普及,网络上的金融犯罪也日益猖獗.因此,以PKI系统为基础的安全身份认证体系也在逐步得到广泛的关注.PKI系统的一个关键安全因素是私钥的保密,但用于存储证书和私钥的USB密码钥匙仍然存在着安全漏洞,使得系统很可能成为木马攻击的对象.首先分析了基于USB密码钥匙的PKI系统的工作原理及其存在的安全漏洞,其次针对这些漏洞提出切实可行的防御策略.  相似文献   

19.
针对基地指挥自动化网络信息安全要求,提出了基于USB身份认证卡技术,采用间接身份认证方式鉴别网络用户合法性,用双重加密算法对信息进行加密上传和解密下载的解决方案。此外,还设计了本地涉密文件加密隐藏方法。整个系统安全性高。独立性强,开发成本较低,具有较高的推广价值。  相似文献   

20.
为满足复杂战场态势下机载数据的安全性需求,需要建立对航空数据存储卡毁钥能力有效评价的方法。 建立航空数据存储卡毁钥能力有效性评价的目的是保证航空装备信息安全的重要措施,是科学、准确评价毁钥 设计是否满足需求的重要手段,是航空装备定型列装前必要的信息安全测评过程。通过对航空数据存储卡的典 型结构和硬件毁钥原理进行分析,对毁钥后电学、物理和化学等技术手段进行深入的研究,提出一种针对航空 数据存储卡毁钥能力的评价方法,从数据存储卡读取能力和存储介质损毁状态两个过程对毁钥效果开展评价, 从而规范了当前测评机构对数据存储卡毁钥能力评价过程中无统一方法的现状。本文利用该评价方法对某样品 航空数据存储卡经硬件毁钥试验后开展毁钥效果分析,验证方法的有效性。航空数据存储卡毁钥能力评价方法 可以很好的评估毁钥设计的效果,确保机载数据的安全。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号