Abstract
With the rapid development of information technology, the traditional way of user name + password authentication system to couldn’t have far satisfied the people’s high quality requirements to the information security. People tend to look for a kind of data encryption techniques connecting mobile intelligent terminal with modern cryptography technology to meet the needs of people. This text completes the double factor authentication with PC software based on the routine use of the handheld mobile terminal (such as a handset ) about how the carrying elements of authentication, achieves a new security authentication mechanism, improves the system safety and ease of use. at the same time ,the introduction of mobile phone key concept skillfully combines the mobile intelligent terminal and modern cryptography technology, provides a more secure authentication mechanism for the users who have a more important protection requirements to the files.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Feng, G.: Network security principle and technology. Science Press, China (2003)
Feng, G., Pei, D.: Cryptography guide. Science Press, China (1999)
Chen, L.: Modern cryptography. Science Press, China (2002)
Lai, X., et al.: Computer cryptography and its application. National Defence Industry Press (July 2001)
Shi, Z., et al.: Computer network security tutorial. Tsinghua University Press, Beijing (2004)
Guo, D., et al.: Actual encryption and decryption Raiders. Tsinghua University Press, Beijing (2003)
IEEE802.15, Bluetooth communication standard protocol
Bluetooth Special Interest Group, Specification of the Bluetooth System Core
Bluetooth Special Interest Group, Specification of the Bluetooth System Profile
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gong, J., Xu, Y., Liu, B. (2011). Authentication System That Mobile Terminal Serves as a Key Carrier. In: Deng, H., Miao, D., Lei, J., Wang, F.L. (eds) Artificial Intelligence and Computational Intelligence. AICI 2011. Lecture Notes in Computer Science(), vol 7003. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23887-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-23887-1_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23886-4
Online ISBN: 978-3-642-23887-1
eBook Packages: Computer ScienceComputer Science (R0)