Dissertation > Excellent graduate degree dissertation topics show

Research and Design of Remote Identity Authentication Systme on Cancelable Palmprint Feature

Author: BaiPing
Tutor: ZhangJiaShu
School: Southwest Jiaotong University
Course: Applied Computer Technology
Keywords: Cancelable Palmprint Identification Data Encryption Smart-card RemoteIdentity Authentication
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 43
Quote: 0
Read: Download Dissertation


With the rapid development of computer network and information technology, the era of the global information network and information security also shows the unprecedented importance, remote user authentication as a party of information security is essential and has become hot issue. With the continuous development of biological science and technology, biometric identification technology has been used more and more widely, because palmprint image captures convenient, image information is rich, user acceptance is high and precision is high, so palmprint authentication is great concerned by the domestic and foreign researchers., Palmprint authentication system also has the problem of security risks and user privacy the same as other biometric authentication system, while cancelable palmprint identification as a technology to protect palmprint template security, can more effectively protect the security of the user’s palmprint feature under accurate authentication, so has more and more wide development space.This paper studies and researches the existing remote user authentication schemes, which are based on biometric identification technology, summarizes the security flaws in these schemes, and proposes new remote authentication scheme. The detail works are as follows:1. This paper explores the network encryption system and the cancelable palmprint identification technology, researches and designs a two factor network authentication scheme based on cancelable palmprint feature and encryption technology. Begin from the security requirements of the scheme, describes the registration, authentication and password change phases, using symmetric key system, public key system encryption and hash function, to ensure the security of the cancelable palmprint templates and users’ data.2. A network authentication prototype system based on the two factor scheme is built up, relating client side and remote server side, including user registration interface, authentication interface, and the password changed interface. This paper also elaborates the network communication between client/server, designs the system’s security database and testes the functionality of the system and safety performance.3. After careful analysis and detailed summary the three factor remote authentication scheme, this paper combines password, smart card and cancelable palmprint features to research the remote authentication. The cancelable palmprint template is generated by the palmprint features, which is encrypted by password, which not only protectes the biometric template, but also solves security flaws by using a weak password to design protocol. ensures the authenticity of the entity, the smart card only to complete a simple operation and a small amount of storage, and run the decryption algorithm. The authentication scheme can better to resist various attacks on the network, to protect the system’s safety and user’s privacy.4. A remote authentication system based on the three factors scheme is built up, and using a trusted third-party to distribute smart cards. The system includes a third party interface, server interface, client registration, authentication and password change interface, and finally the system functionality and safety performance tests show that the scheme be able to resist common attacks, is a safe and efficient authentication scheme.The authentication system uses Visual C++6.0as a software development platform, Microsoft SQL Server2000as database to design and establish user information database. Under the support of the authentication protocol, this paper completes the secure communications network between the client, server, and the trusted third-party. The user data information in the open channel transmission is encrypted, the whole system becomes more secure.

Related Dissertations

  1. Improvement and Implementation of DES Algorithm Based on Chaotic Sequence,TP309.7
  2. Design and Realization of KMS Key Management System,TN918.2
  3. The Design of Bank Smart Card Platform Upgrade,TN409
  4. Trusted Data Storage Model Based on TPM,TP309.2
  5. Design and Implementation of Smart Card Managing System Based on Digital Campus Network,TP311.52
  6. Data Safety Research on Management Information Systems of E-Commerce,TP393.08
  7. The Implementation and Theory of the Tensor Product of Matrices Encryption,TP309.7
  8. The Research and Implement of Elaborate Course Website for Computer Programing,TP393.092
  9. Identity -based authentication scheme design and analysis,TP393.08
  10. Analysis and Design of the Password Authentication Scheme Based on Smart Card,TP393.08
  11. Design and Implementation of Smart Card Web Server and Application Framework for Multi-Application,TP393.05
  12. Study and Implementation of Secure E-ticket System Based on NFC,TP393.08
  13. Research and Implementation of Operating System Core Layer of Smart Card,TN409
  14. Research DVB-C digital TV conditional access system and its implementation,TN949.197
  15. Design and Implementation of Secret Key and Card Issuance Subsystem for Agricultural Irrigation and Drainage,TN918.2
  16. Modular Design for Control System of Smart Card Machine,TP311.52
  17. Design and Implementation of SAT Module on S60,TP311.52
  18. Smart card -based biometric remote authentication protocol,TP393.08
  19. A Study on Development Strategy of Guangzhou Wangu Smart Card TECH.CO.,LTD,F279.26
  20. Research on Eem-based Network Smart Card and Its Application,TN409
  21. Analysis and Improvement of Handset Smart Card Chip Encoding Machine,TN409

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile