首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
张珍珍 《通讯世界》2017,(7):270-271
一对多的框架关系组成是单点登录的明显特征,它是由单一的用户登录系统对多个应用服务进行的统一管理所提供的用户登录认证.这种统一化登录系统实现了Web应用的信息共享,在一个系统下的任何站点的用户,他都不必反复登录转换身份的去进行身份认证,不仅节省了时间,使得操作与开发效率提升,还减少了不必要的消耗,避免了重复开销,降低了操作成本.本文从实现单点登录的常见策略开始进行分析,从而优化单点登录技术在Web应用中的运用价值,确保在Web请求代理策略下简单的单点登录系统的实现,保证Web应用的高效运用,推动单点登录技术的良好发展.  相似文献   

2.
《现代电子技术》2018,(5):61-64
把混沌序列所具备的良好的随机性用于单点登录系统,利用混沌序列迭代产生的随机数序列作为一次一个变换的身份认证信息,这样每个用户的登录身份都具有惟一性,使得他人无法伪造,同时实现了身份指纹的动态变化,增加了普通单点登录系统的安全性。利用cookie技术将认证信息生成ticket,实现同一个域下面各应用子系统的整合。该系统为同一个域下面的各应用子系统提供了一种高效、安全、方便的单点登录方案。  相似文献   

3.
研究基于改进身份认证协议的单点登录系统,提高系统的身份认证的速度.针对单点登录系统中进行身份认证时,如果用户数据量过大,导致用户需要逐个核对数据库中的身份信息,造成的身份核对方法耗时,延长了单点登录系统身份认证的时间.为了避免上述问题,提出了一种基于改进身份认证协议的单点登录系统.利用线性回归方法,对用户数据进行融合处理.通过非线性传输参数方法将融合后的信息传输到服务器中,并利用参数配准和身份认证技术将其与数据库中数据进行配准,避免传统方法大规模比对带来的缺陷,提高了身份认证的速度.实验证明,该方法能够提高身份认证的速度,效果令人满意.  相似文献   

4.
基于击键动力学和口令的双因素用户验证   总被引:1,自引:0,他引:1  
提出基于击键动力学和口令的一种新的身份验证方法,该方法监视用户在输入口令时的用户击键特征的有关数据,通过采用监视键盘输入时一种新的三键持续时间的击键特征表示,用一种表示用户节奏的相对击键速度的距离衡量方式,在正常样本上建立用户模式,然后用新样本与用户模式的距离匹配情况来验证用户身份的合法性。实验表明该方法简单实用,识别效率高。  相似文献   

5.
随着企业信息化的不断发展,企业应用系统越来越趋于多样化和复杂化,用户对服务质量的要求也越来越高,统一身份认技术已成为各系统必不可少的一部分。本文通过对统一身份认技术中的单点登录的相关技术进行研究,梳理了实现单点登录的主要方式。  相似文献   

6.
在比较现有的3种单点登录模型优缺点的基础上,分析跨域单点登录应有的基本功能,尝试建立一种云环境下的跨域单点登录系统。方案利用Web Service技术封装原有系统和构建身份映射功能,使原有系统在改动尽量小的情况下与新系统的认证实现无缝对接;通过部署身份认证系统群、跨域控制器、票据授权服务器、传输加密和用户信息库等措施实现云环境下跨域跨平台的集中认证。方案实施简单,安全性高,可扩展性好。  相似文献   

7.
校园信息门户单点登录系统的实现   总被引:3,自引:0,他引:3  
李润求  谭立球 《通信学报》2005,26(B01):174-177
介绍了一个校园信息门户中单点登录系统的实现。系统实现了基于Cookies的单点登录系统,解决了SSO中Cookies不能跨域共享的问题,采用Cookie和Cookie Server来共同保存用户身份信息,具有较好的安全性。  相似文献   

8.
随着军队信息化工作的进行,越来越多的军事信息系统被开发出来,如何更好地管理各个系统的用户和权限已成为一个重要的研究课题.单点登录技术可以实现一次登录,访问所有授权的系统.在分析了军事信息系统的现状和现有单点登录技术的特点基础上,得出了适合于军事信息系统的单点登录技术.针对某军事信息系统,总结其单点登录需求,给出了总体方案和系统组成,设计了权限管理、用户身份映射等关键模块,并给出了具体实现方法.实践表明,单点登录技术的应用将会大大提高工作效率,促进信息化工作的进行.  相似文献   

9.
单点登录是近年来在开发大平台信息系统中出现的一门新兴技术,文章结合作者在开发岳阳楼区基于健康档案的区域卫生信息平台的实践,提出了单点登录技术与SSL VPN技术相结合的基于SSL VPN单点登录技术,为整合多种医疗业务应用系统提供了一个统一身份认证、统一用户管理、统一授权管理、统一资源管理和单点登录平台.  相似文献   

10.
随着信息化建设横向集成的推进,对用户身份信息进行统一认证和为用户提供单点登录访问方式的必要性日益提高,如何实现统一认证和单点登录是信息化建设的重要课题。Novell AM是Novell公司提供的统一身份认证解决方案,它通过反向代理、自动填表等技术实现信息系统的单点登录,为企业建设统一认证提供了切实可行的一种方案。  相似文献   

11.
A new approach for keystroke-based authentication when using a cellular phone keypad as input device is presented. In the proposed method, users are authenticated using keystroke dynamics acquired when typing fixed alphabetic strings on a mobile phone keypad. The employed statistical classifier is able to perform user verification with an average equal error rate of about 13%. The obtained experimental results suggest that, when using mobile devices, a strong secure authentication scheme cannot rely on the sole keystroke dynamics, which however can be a module of a more complex system including, as basic security, a password-based protocol eventually hardened by keystroke analysis.  相似文献   

12.
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device—such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services. We present a prototype implementation of our protocol using the popular Android operating system for smartphones.  相似文献   

13.
In order to improve the recognition accuracy of keystroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the user's keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last, the experimental result shows that the detector in this paper is more accurate than the other three.  相似文献   

14.
Wireless Personal Communications - In recent years, user authentication based on mouse and keystroke dynamic is the most wanted topic to identify the external user and to secure information....  相似文献   

15.

With the expansion of smart device users, the security mechanism of these devices in terms of user authentication has been advanced a lot. These mechanisms consist of a pattern based authentication, biometric based authentication, etc. For security purpose whenever a user fails to authenticate themselves, these devices get locked. But as these devices consist of numerous applications (document creator, pdf viewer, e-banking, Social networking app, etc.), locking of the whole devices prevents the user from using any of the applications. Since the variety of applications provided by the devices have different security needs, we feel it is better to have application level security rather than device level. Here, in this paper, we have proposed a behavioral biometric based user authentication mechanism for application level security. First, we have performed a risk assessment of different applications. Then for complete protection, static multi-modal (keystroke and mouse dynamics) authentication at the start of an interactive session, and a continuous keystroke authentication during this session is performed. An analysis of the proposed authentication mechanism has been conducted on the basis of false acceptance rate (FAR), false rejection rate (FRR) and equal error rate (EER). The static multi-modal authentication achieved a FAR of 0.89%, FRR of 1.2% and EER of 1.04% using J48 classification algorithm. Whereas the continuous keystroke authentication has been analyzed by the time (no. of keystrokes pressed) taken to capture an intruder.

  相似文献   

16.
A novel keystroke features recognition method based on stable linear discriminant Analysis (SLDA) was put forward.First of all,it maximum the dispersion between different sequences,while minimizing the dispersion between the same sequence set,maintain the best discriminant characteristics of the keystroke sequences.Secondly,the local similarity graph between keystroke sequences is constructed,minimizing the dispersion of the local similarity sequences,to keep the local similarity of keystroke sequences.Finally,based on the principles above,the feature of keystroke sequences are extracted,and the nearest neighbor classification criterion is used to judge the outputs.The effectiveness of the proposed method is certified by experiment results.  相似文献   

17.
For the fluctuation of CFCC caused by environmental noise is the main reason for the low accuracy of keystroke detection,the spatial characteristics of adjacent between CFCC were studied,and the spatial gradient structure of CFCC based on points was established.On this basis,the effect of CFCC spatial gradient on keystroke content recognition and the selection of precise neighborhood points were studied on training and testing.Finally,a high-robustness keystroke recognition algorithm based on acoustic signals was constructed.Extensive experiments in different environments demonstrate that the proposed CFCC spatial gradient sound feature achieves great performance and the recognition accuracy is 96.15%.  相似文献   

18.
本文从电磁辐射对人体影响的角度分析了移动通信系统的传输特性,论证了在电磁辐射约束的条件下.单用户的上行链路相对于单用户的下行链路更容易达到传输能力饱和.随着上下行链路传输能力的增长.系统将会越来越表现出单用户的上行容量受限,而单用户的下行链路却拥有更大的传输速率余量和更大的发射功率余量,单用户的上下行链路具有显著的非对称传输特性,并在此基础上探讨了提高上行链路传输容量的方法.  相似文献   

19.
Vital signs of identity [biometrics]   总被引:1,自引:0,他引:1  
Miller  B. 《Spectrum, IEEE》1994,31(2):22-30
Biometrics is emerging as the most foolproof method of automated personal identification in demand in an ever more automated world. Biometric systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristic, like a fingerprint or iris pattern, or some aspect of behavior, like handwriting or keystroke patterns. This paper describes the range of biometric systems in development or on the market including: handwriting; fingerprints; iris patterns; human faces; and speech  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号