Font Size: a A A

Identity Authentication In E-government Applications

Posted on:2012-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:F ChenFull Text:PDF
GTID:2218330368998419Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Identity Theft is one of the most harmful problems in the information age,not only it brings about huge amount of economic loss, but also, it reduces the faith of people on the gradually spreading information science. Due to the efficiency, simplicity and powerful functionality, e-government plays a more and more important role in life. A lot of the files stored and transmitted of the E-Government system contain high-level secure information about government and even nation, the security issue about those things is obvious. So in order to realize access control, prevent malicious user to have access to important content,we need identity authentication technology, especially in e-government, some good identification techniques are needed.In this paper, we introduce the theory of identification, and the rules of designing identification system, summarize the development of identification theory, and explain the rigorous measurement of security; We give several security problems due to the failure of identification, describe the security flaws in e-government system and necessity of secure components. We do some research on the character of different identification techniques, and find out weak points of each, then, we give out a construction of combinatorial design of identification based on smart phone for e-government, we analyze the necessity, efficiency and security of the combinatorial design, and propose that, our design can avoid all kinds of attacks we mentioned in the former section, and only our combinatorial design could do so to ensure the security of e-government system.CA key management system including certification bodies, libraries, and certificate revocation certificate three modules. Key management system is mainly responsible for the management of user's public key, the CA Certification Authority to issue certificates to users, by binding the public key certificate can guarantee the security of public key. Key management system to provide a certificate of the certificate database queries, and certificate revocation module provides the implementation does not require a certificate revocation service.
Keywords/Search Tags:Identity authentication, Identity theft, cryptography, e-government
PDF Full Text Request
Related items