Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security

The Research of Access and Control Technology USB Key

Author ShaoXuDong
Tutor XueZhiï¼›PingTianHua
School Shanghai Jiaotong University
Course Computer technology
Keywords USB smart password key PC / SC Public Key Cryptography Standards CryptoAPI Unified Management Platform Underlying Unified Driver
CLC TP393.08
Type Master's thesis
Year 2008
Downloads 43
Quotes 1
Download Dissertation

As Internet technology and its applications, the rapid development of the Internet has dramatically changed the application and reshape public life, the Government of the electronic naturally become an inevitable requirement for government reform, become a society of information technology and center of one of the important links. Network security is necessary to select the construction of e-government and the basic guarantee. Government departments on the effective application of information technology is a fundamental prerequisite that must be practical and reliable security. Most security measures and technology can only solve part of cyberspace security issues. Experts have found that public key infrastructure (Public Key Infrastructure, PKI) seems to solve the vast majority of network security issues, and initially formed a complete solution. PKI to establish uniform standards and norms in the basis for networking applications entity authentication, data confidentiality, data integrity and non-repudiation and other security trading services, which are the key technologies of information security. USB smart password key is a USB interface hardware. It is built-in smart card chip, with secure storage and secure computing. You can store the user's sensitive information and computing capabilities, as a result of computing certain factors needed to set the password only from USB smart key inside access, but not allowed to be read out, so commonly used in network applications such as identification, PKI applications particularly suitable for use as the digital signature of the individual terminal devices. This USB smart password key architecture describes the various hardware modules, introduced the card operating system components, including: safety management, and file systems. Despite the variety of USB smart password key has been widely used, but a different security product developers and interface architecture, but not the same. Because each drive lack of uniform technical standards, making the upper application developers often repeated development, security services are difficult to share. This article describes three specific encryption devices with independent application developers to shield the underlying complexity of information security technology, to provide users with easy to use upper intermediate platform access methods, namely, computer operating system can use PC / SC, PKCS, CryptoAPI three ways to access the USB smart cryptographic keys, which CryptoAPI CSP is important to achieve some. This paper also proposes a unified management platform based on expansion and the underlying unified driver implementations, resolved in a computer chip manufacturers support different USB smart password key issues, including unified management platform for USB smart password key management tool capable of simultaneously management of different types of USB smart password key solutions, while the underlying unified driver in the driver layer solved simultaneously drive multiple chips, each of the chip driver in the system may conflict risks.

Related Dissertations
More Dissertations