期刊文献+

基于移动数字证书的企业安全认证应用研究 被引量:4

Research on Application of Enterprise Security Authentication Based on Mobile Digital Certificate
下载PDF
导出
摘要 通过传统USBKey设备来实现双因子身份认证的方法已不能满足用户对更高安全性、便捷性的要求。为了解决在移动端实现安全认证的需求,文章提出了基于移动数字证书的企业安全认证方案。首先给出移动安全认证中间件+移动安全认证管理平台的总体架构设计,基于该架构,研究详细阐明了移动安全认证涉及到的核心安全设计,在行为感知和威胁感知方面引入了机器学习模型。最后基于移动数字证书的企业应用案例,介绍了移动认证的完整业务流程。 The method of realizing two-factor identity authentication through traditional USBKey devices can no long meet the requirements of users for higher security and convenience.In order to solve the need of realizing security authentication in mobile terminal,this paper proposes an enterprise security authentication scheme based on mobile digital certificate.Firstly,this paper gives the overall architecture design of mobile security authentication middleware and mobile security authentication management platform.Based on this architecture,the core security design involved in mobile security authentication is explained in detail,and introduces machine learning model in behavior perception and threat perception.Finally,this paper gives an enterprise application case based on mobile digital certificate and introduces the complete business process of mobile authentication.
作者 钟征燕 ZHONG Zhengyan(China Tobacco Guangxi Industrial Co.,Ltd.,Nanning 530001,China)
出处 《现代信息科技》 2020年第3期153-155,共3页 Modern Information Technology
关键词 移动认证 数字证书 威胁感知 mobile authentication digital certificate threat awareness
  • 相关文献

参考文献5

二级参考文献27

  • 1[1]G Horn,B Preneel.Authentication and payment in future mobile systems [A].In Computer Security--ESORICS'98 Proceedings [C].Berlin:Springer-Verlag,1998. 被引量:1
  • 2[2]G Horn,K M Martin,C J Mitchell.Authentication protocols for mobile network environment value added services [EB/OL].http://isg.rhbnc.sc.uk/c jm/Listofpublications. 被引量:1
  • 3[3]A Mehrotra.Mobility and security management in the GSM system and some proposed future improvements [A].Proceedings of the IEEE [C].USA:IEEE,1998. 被引量:1
  • 4[4]V Shoup.On formal modules for secure key exchange [R].IBM Research Report RZ 3120,1999,http://www.shoup.net/papers 被引量:1
  • 5[5]D G Park,C Boyd,S J Moon.Forward secrecy and its application to future mobile communiations security [A].PKCS2000,LNCS 1751 [C].Melbourne,Australia:PKCS,2000. 被引量:1
  • 6[6]Mitchell,C J,Ward,M,Wilson,P.Key control in key agreement protocols [J].Electronics Letters,1998,34:980-981. 被引量:1
  • 7曹喆.基于USBKey的身份认证机制的研究与实现[D].上海:东华大学计算机科学与技术学院,20lO. 被引量:1
  • 8Chen Y C, Yeh L Y. An efficient nonce-based authentication schemewith key agreement[J]. Applied Mathematics and Computation, 2005, 169 (2) : 982- 994. 被引量:1
  • 9Lamport L. Password authentication with insecure communications[J]. Communications of ACM, 1981, 24(8) : 770-772. 被引量:1
  • 10Hwang M S, Li L H. A new remote user authentication scheme using smart eards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1): 28-30. 被引量:1

共引文献54

同被引文献41

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部