首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
随着电子商务、电子政务已不断发展和应用,仅仅靠用户名和口令登陆操作系统的身份认证机制,其安全性已经无法保证。使用智能卡进行身份认证是目前身份认证技术的热门话题。它描述了使用智能卡自动登陆linux操作系统gdm管理器的实现方法,包括智能卡系统的安装和守护进程设计、智能卡认证PAM模块的编写、配置1inux GDM、实现linux智能卡自动登陆操作系统等内容。  相似文献   

2.
通信加密与鉴别技术所具有的良好的保密通信、防伪造、防篡改、防拒认功能,使其成为电子商务安全体系关键性技术.基于对其中对称密钥加密体系DES算法,非对称秘钥加密体系RSA算法以及SHA报文摘要算法的研究,提出了一套具有信息安全性、完整性、身份确认和防拒认功能的电子商务安全通信解决方案.  相似文献   

3.
基于JAVA技术的校园“一卡通”管理系统   总被引:4,自引:0,他引:4  
通过分析智能卡的特点,介绍我于JAVA技术构建的"校园一卡通"管理系统的系统分析、系统设计和系统实现,并重点介绍了智能卡商务交易问题的解决方法--电子钱包的基本架构和实现过程.  相似文献   

4.
综合化航电系统的安全问题将是系统设计者的主要挑战之一,密钥管理是解决安全问题的基础.综合化航电系统的密钥管理不同于联合式航电系统,不存在专用的安全模块和加密总线,因此密钥及保密数据的加载需要新的方式.从综合化航电系统的特点出发,从地面到空中全方位考虑密钥的生成、加载、分配、存储以及擦除的过程,给出了航电系统密钥管理的一个具体方案,并对该方案的优缺点进行了分析,表明该方案具有较好的安全性.  相似文献   

5.
量子密钥通信在分布式航天测控网中的应用研究   总被引:2,自引:2,他引:0  
随着分布式航天测控网技术的不断发展,分布式航天测控网面临着信息安全问题.本文通过分析和研究各种信息加密技术,针对经典加密技术不能保证信息绝对保密性的弊端,考虑利用以量子力学为基础的量子密钥分配技术来保证测控信息传输的绝对安全.基于密钥这种"绝对保密"的方法与分布式航天测控网技术结合的思想,本文提出了量子密钥通信与分布式航天测控网相结合的密钥分配模型.  相似文献   

6.
随着车联网技术的发展,车联网通信的安全技术成为其大规模应用的关键.提出一个基于PKI的车联网安全通信与隐私保护机制.车辆用户将车辆和用户身份ID以及RFID码发送给CA进行映射,作为IPv6编址中的接口标识位和车辆的私钥;CA根据该私钥计算车辆的公钥并发给车辆,车辆接收CA发来的公钥并用该公钥和RSU通信,RSU将会给车辆分配匿名密钥,车辆在之后的通信过程中使用该匿名密钥.由于车辆的真实身份是与CA分配的主密钥相关联,可以确保匿名密钥的泄漏不会直接导致车辆与用户身份的泄漏.性能分析表明,上述安全机制能够有效保护用户隐私,同时实现车联网的安全通信.  相似文献   

7.
刘昶  丁纪平  蒋明 《航空学报》1993,14(2):7-12
本文应用分支和突变理论,研究飞机在状态参数和操纵参数组成的空间内急滚机动全局稳定性。在研究铅垂平面内的对称飞行进入急滚机动时的分支和突变特性基础上,进~步讨论了水平面内转弯进入急滚机动时的情况,导出求解滚转速率临界稳定值的~般解析式,证明Phillips临界滚转速率判据只是其中的~种特殊情况。  相似文献   

8.
针对智能卡协议测试存在的自动化和标准化程度低、脚本复用性差等问题,提出了一种非接触式智能卡协议测试系统Proxi CPTS(Protocol Test System of Proximity Card)。系统采用分层结构和模块化设计的思想,通过硬件抽象层屏蔽测试设备的不一致,构建功能函数库以实现代码隔离,采用工程化方法管理测试用例,支持系统扩展。实际应用表明,该系统能够提高测试效率,且系统结构清晰,具有较高的可维护性,可以满足自动化测试的应用需求。  相似文献   

9.
在分析了现有组播密钥管理方案的基础上,针对IP视频会议的特点,将集中式和分布式密钥管理方案相结合,提出了一种多层次的混合密钥管理方案,其高层为管理层,成员之间通过OFT方案协商产生密钥,并管理密钥;底层采用集中管理方式。该方案避免了单点失效问题,具有高效性和可扩展性的优点,适用于解决大型动态组播的密钥管理问题。  相似文献   

10.
主要研究在普适计算环境下移动代理的安全机制,提出了一种主从模式下代理密钥协商的协议,此协议实施的关键是使用指令系统可变的虚拟机.这种虚拟机可被动态生成,并且每次都使用不同的指令系统,以此来保证恶意宿主不能在短时间内获取会话密钥的信息.通过模拟攻击测试验证了此移动代理安全策略的有效性.  相似文献   

11.
Access control system with hand geometry verification and smartcards   总被引:1,自引:0,他引:1  
An access control system that joins the uniqueness of biometric verification, as well as the storage security and processing capabilities of smart cards, is defined here. The biometric technique chosen has been hand geometry, which is considered to provide low/medium security (there are other much more secure, as fingerprint, iris or retina), to be easy to use, to achieve high acceptance by users, and which performance is given throughout fast processing and medium cost. Also, the small template size needed for each user is positive for storage and processing capabilities required in the system. But the innovation in the system proposed is that the smart card not only stores the user's template, but also performs the verification process with the features set by the terminal to the card. With this improvement, the security of the system has risen because the template is never extracted from the card, avoiding duplication of such sensible data. The specifications for the enrolment process will be presented as well as the applications where this new system is recommended  相似文献   

12.
Due to the great increase in Information Technology (IT) systems where user authentication is needed, security in those systems relies on using PINs or passwords. During recent years, the scientific community has been trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. One of the sectors where user identity must be verified, is the identification cards sector. In fact, if great security wants to be achieved, smart cards should be used. But cardholder verification is performed using Card Holder Verification Keys (CHV-Keys), which are PIN-based. The authors are trying to integrate fingerprint verification inside a smart card, following their works in the past. The fingerprint scheme used is shown, and the work to achieve the integration inside a commercial smart card is detailed.  相似文献   

13.
设计了一个基于ARMCortex—M3和USB接口的智能卡读卡器系统,采用具有ARMCortex—M3内核的STM32F103R6T6等芯片进行相关的硬件设计;分别使用Keil和VisualC++6.0进行固件程序和驱动程序开发,实现了计算机与智能卡的准确、高效通信。同时,通过设计测试程序对系统的功能和性能进行测试,证明其有效性。  相似文献   

14.
Over the past few years, the authors have tried to integrate biometrics into a smart card. In this paper, to improve error rates obtained with hand geometry biometrics and the costs with the iris recognition system, fingerprints are used. This technique, quite well known in the industry and deeply studied for the last century, has improved its electronic sensors, pulling down prices and, therefore, enabling its use in many more applications. The first step, as in every biometric system, is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae, i.e., the discontinuities in the ridges and valleys of the fingerprint. Due to the fact that it is not possible to always catch the same number of minutiae, a special matching algorithm should be applied to compare the feature vector with the corresponding user's template. Efforts to integrate this matching algorithm in a low computer power device, such as a smart card, are given, showing the paths that should be followed in order to improve the security of access control and payment systems available today.  相似文献   

15.
Nowadays many systems need a portable media to store some sensible data, such as smart cards. The information can be protected by the user with his Personal Identification Number (PIN), or through biometrics. Unfortunately, there is not a smart card today that can verify the biometric template inside it, performing this task in the terminal. The author has developed the algorithms and data structures needed to solve this problem. Therefore, he has created a smart card with user biometric authentication, based on an Open Platform smart card (in this case, a JavaCard). To achieve these results, different biometric techniques have been studied: speaker verification, hand geometry and iris recognition. Experimental results are given to show the viability of the prototype developed  相似文献   

16.
It has always been claimed that smart cards provide a really high level of security, considering them as a tamper-proof device, with the possibility to auto-block some or all of the services it provides. Unfortunately, nowadays some hackers appear to have demonstrated the lack of security involved in some applications where Integrated Circuit Cards (ICC) have been used. This has led to the opinion that smart cards are not secure enough, and their security is only in the minds of the commercial companies involved with the technology. In this paper, the author explains the reasons why this hacking has succeeded. For example, sometimes memory cards have been used instead of smart cards, or very old smart cards have been issued and not renewed, or the development team involved has not used basic security techniques, such as diversified keys. The author also gives clues to achieve a high level of security depending on the final application, and the environment in which it is going to be used  相似文献   

17.
张轶辉  王昭顺 《航空计算技术》2007,37(4):129-131,134
随着我国网络银行业务的不断普及,网络上的金融犯罪也日益猖獗.因此,以PKI系统为基础的安全身份认证体系也在逐步得到广泛的关注.PKI系统的一个关键安全因素是私钥的保密,但用于存储证书和私钥的USB密码钥匙仍然存在着安全漏洞,使得系统很可能成为木马攻击的对象.首先分析了基于USB密码钥匙的PKI系统的工作原理及其存在的安全漏洞,其次针对这些漏洞提出切实可行的防御策略.  相似文献   

18.
针对基地指挥自动化网络信息安全要求,提出了基于USB身份认证卡技术,采用间接身份认证方式鉴别网络用户合法性,用双重加密算法对信息进行加密上传和解密下载的解决方案。此外,还设计了本地涉密文件加密隐藏方法。整个系统安全性高。独立性强,开发成本较低,具有较高的推广价值。  相似文献   

19.
为满足复杂战场态势下机载数据的安全性需求,需要建立对航空数据存储卡毁钥能力有效评价的方法。 建立航空数据存储卡毁钥能力有效性评价的目的是保证航空装备信息安全的重要措施,是科学、准确评价毁钥 设计是否满足需求的重要手段,是航空装备定型列装前必要的信息安全测评过程。通过对航空数据存储卡的典 型结构和硬件毁钥原理进行分析,对毁钥后电学、物理和化学等技术手段进行深入的研究,提出一种针对航空 数据存储卡毁钥能力的评价方法,从数据存储卡读取能力和存储介质损毁状态两个过程对毁钥效果开展评价, 从而规范了当前测评机构对数据存储卡毁钥能力评价过程中无统一方法的现状。本文利用该评价方法对某样品 航空数据存储卡经硬件毁钥试验后开展毁钥效果分析,验证方法的有效性。航空数据存储卡毁钥能力评价方法 可以很好的评估毁钥设计的效果,确保机载数据的安全。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号