The Application and Research of the Distributed Electronic Authentication Based Software

Article Preview

Abstract:

With the development of the internet technology, office automation (OA) has brought people great convenience and at the same time OA as an very important approach to informatization, is required to better solve deeper problems to meet more objectives. Traditional identity authentication is through users name/password pattern, however, this mode is easy to access and the password is easily stolen and hard to remember. Especially on the public computers on public use, password-mode may bring very serious potential safety hazard to the users by being seen by others, being stolen by Trojan Program and so on. This thesis introduces how to use computer software to take the place of Password. This electronic authentication technology has three-leveled dispersed hierarchical organization which can identify the user in a very secured and absolute safe way.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 694-697)

Pages:

2454-2457

Citation:

Online since:

May 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] GUI He Qing. The electronic commerce circulation system safety risk classification[J].Jiangsu Commercial Forum, Vol 6, pp.59-60, April 2011 (In Chinese)

Google Scholar

[2] Hou Jian Liang. Things networking in the electronic commerce application[J]. E-Business Journal, Vol 12, p.7, April 2009 (In Chinese)

Google Scholar

[3] SI Tiange,ZHANG Yaoxue,DAI Yiqi.L-BLP security model in local area network[J].Acta Electronica Sinica,2007,35(5):1005-1008(In Chinese)

Google Scholar

[4] Information on http://baike.baidu.com/view/757.htm(In Chinese)

Google Scholar