首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 171 毫秒
1.
身份直接认证5月25日获悉,兆维推出一款W-Key身份认证系统。这是一款基于对称密码方式的网络身份安全产品,结合了现代密码技术和智能卡技术,对网络用户与服务器之间直接进行身份认证,采用一次一密的加密作业方式变化认证码。该认证系统由W-Key、客户端软件和认证服务器端系统软件组成。客户端和认证服务器之间直接进行身份认证,通过USB接口与计算机连接,便于携带且操作简单,完全取代了“用户名+密码”这种模式。W-K e y身份认证系统的应用可以提高网络系统对用户身份的识别以及权限管理能力,只有W-Key的合法用户才可登陆网络。W-Key面…  相似文献   

2.
VPN动态密码认证系统设计与实现   总被引:4,自引:0,他引:4       下载免费PDF全文
汤丹  匡晓红  徐联华  胡志刚 《计算机工程》2007,33(9):171-173,176
针对VPN接入的身份认证问题,提出了一种综合运用LDAP认证、应用系统认证和动态密码认证技术的多级认证模式,运用UML模式对动态密码认证系统进行设计,实现了多应用系统和多种用户管理模式环境中的统一用户认证管理和安全的远程访问。  相似文献   

3.
合法用户的身份认证在信息安全中起着非常重要的作用,以静态口令为基础的传统认证方式正面临多种安全隐患。基于视觉密码技术的原理和特点,从使用安全性方面提出改进算法,实现了一套完整的一次一密身份口令认证方案,使得认证过程更加安全可靠。系统采用双因素认证方式,将指纹识别技术和视觉密码技术相结合,进一步提高安全性,并最终在AM3517实验平台上实现。实测表明,该系统操作简单、认证过程安全可靠、易扩展、使用成本低,具有广阔的应用前景。  相似文献   

4.
基于手机令牌方式的动态身份认证系统   总被引:4,自引:0,他引:4  
本文提出基于手机令牌方式的动态身份认证系统,该系统在手机令牌和认证服务器上分别独立地产生同步动态认证密码。系统定义了安全身份认证协议,通过该协议解决了手机令牌认证服务器的同步校正问题,并且用户能够使用手机“短信”,完成认证服务、帐号解锁、取消动态身份认证服务和无线报警提示等功能。系统具有使用成本低,稳定性高,便于用户使用的特点,并能够主动有效地发现非法用户的假冒攻击行为。  相似文献   

5.
李辉  刘文军 《计算机应用》2006,26(Z2):104-106
身份认证在网络应用系统中起着重要的作用.动态口令身份认证弥补了传统口令身份认证的不足,是一种更安全的身份认证机制.公开密钥密码体制的出现,为信息提供了更安全的加密方法.将公开密钥密码体制应用于身份认证系统,提出了一种挑战/应答方式的动态口令身份认证系统的实现方法.  相似文献   

6.
合法用户的身份认证在信息安全中起着非常重要的作用,以静态口令为基础的传统认证方式正面临多种安全隐患。基于视觉密码技术的原理和特点,从使用安全性方面提出改进算法,实现了一套完整的一次一密身份口令认证方案,使得认证过程更加安全可靠。系统采用双因素认证方式,将指纹识别技术和视觉密码技术相结合,进一步提高安全性,并最终在AM3517实验平台上实现。实测表明,该系统操作简单、认证过程安全可靠、易扩展、使用成本低,具有广阔的应用前景。  相似文献   

7.
德国电子电信业巨头西门子公司发布消息称,该公司已于近期推出了一款具有身份认证功能的新式鼠标,公司将这款新式鼠标命名为“ID鼠标”专业版,意思是说该款鼠标能够识别用户身份,还免除了人们输入密码的麻烦。据西门子公司生物测定学部门的一位官员表示,新推出的这款“ID鼠标”采用了最新的生物测定学技术,内置了一种传感器,它能够辨认不同用户的指纹,从而识别出用户的身份。利用这种新式鼠标,用户不再需要提供用户名和密码便可进行合法登录,因此大大简化了身份认证的过程。这种新式的“ID鼠标”不仅能够应用于计算机登录,而…  相似文献   

8.
用户身份认证作为网络安全和信息安全的第一道屏障,目前防水墙认证主要采用传统的静态密码认证,在身份认证过程中易被窃取,严重危及企业内部信息安全.针对防水墙身份认证的安全需求,提出了扩展硬件身份及基于混沌理论的一次一密动态密码相结合认证,建立基于VPN的网络安全传输通道,实现了身份认证的无约定动态变化,增强了防水墙身份认证的安全性.  相似文献   

9.
针对目前普遍使用的固定口令身份认证系统,给出了一种基于白噪声器件的动态口令身份认证系统。该系统中,动态口令是通过自噪声器件产生的随机序列经过特定的不可逆映射函数变换后得到的,这使得攻击者很难从已知的任何数量的口令中推断出下一个口令。此外,系统还提供了无线报警提示功能,可将用户的登录信息及时地发送给对应的合法用户,从而能够有效地防止非法用户的假冒攻击行为。  相似文献   

10.
描述了一个具有入侵容忍特性的分布式身份认证系统,利用多代理和冗余共享验证服务器的设计,使得认证系统具有容忍入侵的能力。将用户密码数据分布存储在多个共享认证服务器中,使得少数服务器受到入侵时仍能继续提供认证服务并且不会暴露用户的密码信息,提高了认证系统的可用性及安全性。  相似文献   

11.
Computer-access security systems using keystroke dynamics   总被引:5,自引:0,他引:5  
An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Two types of passwords were considered: phrases and individual names. A fixed phrase was used in the identification system. Individual names were used as a password in the verification system and in the overall recognition system. All three systems were tested and evaluated. The identification system used 10 volunteers and gave an indecision error of 1.2%. The verification system used 26 volunteers and gave an error of 8.1% in rejecting valid users and an error of 2.8% in accepting invalid users. The overall recognition system used 32 volunteers and gave an error of 3.1% in rejecting valid users and an error of 0.5% in accepting invalid users  相似文献   

12.
Given that phishing is an ever-increasing problem, a better authentication system is required. We propose a system that uses a graphical password deployed from a Trojan and virus-resistant embedded device. The graphical password utilizes a personal image to construct an image hash, which is provided as input into a cryptosystem that returns a password. The graphical password requires the user to select a small number of points on the image. The embedded device will then stretch these points into a long alphanumeric password. With one graphical password, the user can generate many passwords from their unique embedded device. The image hash algorithm employed by the device is demonstrated to produce random and unique 256-bit message digests and was found to be responsive to subtle changes in the underlying image. Furthermore, the device was found to generate passwords with entropy significantly larger than that of users passwords currently employed today.  相似文献   

13.
Much work in the emerging field of biometrics has focused on identification applications. Biometrics offers the means to identify individuals without requiring that they carry ID cards and badges or memorize passwords. A leading concern in the development of such applications, however, is how to avoid rejecting valid users or approving imposters. The iris of the eye may provide a solution by offering a much more discriminating biometric than fingerprint or face recognition. The authors have designed and implemented an iris biometric system for personal electronic identification. Further, their system solves problems associated with public use devices such as automated teller machines, where habituated use is not the norm. The system also addresses personal-use arenas, such as home banking, and other Internet and network applications, such as secure business logons. The article describes the public- and personal-use systems, as well as relating statistical analysis and field trials to gauge the effectiveness of their system  相似文献   

14.
Most password-based user authentication systems place total trust on the authentication server where cleartext passwords or easily derived password verification data are stored in a central database. Such systems are, thus, by no means resilient against offline dictionary attacks initiated at the server side. Compromise of the authentication server by either outsiders or insiders subjects all user passwords to exposure and may have serious legal and financial repercussions to an organization. Recently, several multiserver password systems were proposed to circumvent the single point of vulnerability inherent in the single-server architecture. However, these multiserver systems are difficult to deploy and operate in practice since either a user has to communicate simultaneously with multiple servers or the protocols are quite expensive. In this paper, we present a practical password-based user authentication and key exchange system employing a novel two-server architecture. Our system has a number of appealing features. In our system, only a front-end service server engages directly with users while a control server stays behind the scene; therefore, it can be directly applied to strengthen existing single-server password systems. In addition, the system is secure against offline dictionary attacks mounted by either of the two servers.  相似文献   

15.
一种新的混合式身份认证技术   总被引:2,自引:0,他引:2  
赵亚伟  张海盛 《计算机工程》2003,29(11):105-107
系统资源的安全与访问者的身份认证有着直接的关系,目前绝大多数系统的身份认证是基于常规口令的,由于人本身的因素使常规口令并不安全,因此在常规口令的基础上结合人对图像很容易识别的现象提出半可视化口令保护技术。这种技术使系统用户免去记忆枯燥的常规口令的麻烦基础上提高口令的记忆效率和安全性。给出了相关的定义和认证过程,实验验证了该技术便于记忆且是安全的。  相似文献   

16.
无线设备的接入安全是当今无线网络安全的一个严重挑战。基于射频指纹的物理层安全技术是解决无线设备接入安全的一个有效途径。在不同于已有的基于瞬态响应和稳态响应的射频指纹特征提取方法上,本文提出了一种使用星座轨迹图(CTF,Constellation Trace Figure)的射频指纹提取方法。在获得的星座轨迹图上,进一步通过K均值聚类提取射频指纹特征并进行设备身份识别。在理论阐述的基础上,本文通过在实际无线通信系统中提取射频指纹特征并进行无线设备身份识别,验证了提出方法的可靠性与实用性。使用基于星座轨迹图的射频指纹特征提取方法不需要获得设备发送信号的先验信息就可以快速获得无线设备唯一的射频指纹特征,可以被用于物理层安全以及无线接入设备的身份识别及认证。  相似文献   

17.
The identification of structural systems using naturally induced vibration data in the presence of measurement noise by the method of instrumental variables is studied. It is well known that when measurement noise is present least squares methods will yield an inconsistent estimator. This leads us to consider methods which will yield a consistent estimator in the presence of noise. The maximum likelihood method provides a solution to the method, but is difficult to implement in the case of large systems because of the amount of computation required. In this paper we present the application of the method of instrument variables for the identification of the parameters of structural systems excited by white noise in the presence of white measurement noise. The equations required for the application of the method to a structural system and the resulting consistent estimator are derived. Although the concept of instrumental variables is not new, the application of this method to problems of structural systems is sufficiently attractive to justify its presentation. The results of simulation experiments which verify the theoretical development are presented.  相似文献   

18.
Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication. Although conventional text-based passwords are rather hard to remember, users often write their passwords down in order to compromise security. One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users. Graphical user authentication methods have recently been proposed to verify the user identity. However, the fundamental limitation of a graphical password is that it must have a colorful and rich image to provide an adequate password space to maintain security, and when the user clicks and inputs a password between two possible grids, the fault tolerance is adjusted to avoid this situation. This paper proposes an enhanced graphical authentication scheme, which comprises benefits over both recognition and recall-based graphical techniques besides image steganography. The combination of graphical authentication and steganography technologies reduces the amount of sensitive data shared between users and service providers and improves the security of user accounts. To evaluate the effectiveness of the proposed scheme, peak signal-to-noise ratio and mean squared error parameters have been used.  相似文献   

19.
智能卡口令认证方案   总被引:1,自引:0,他引:1       下载免费PDF全文
本文提出了一种智能卡口令认证方案,在这个方案中,用户能随意更改口令,远程系统不需要存储用户的口令表或验证表,并且能防止恶意的重放攻击,一旦建立起安全的网络环境,认证能被通信双方单独处理。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号