1, access control technology.
This technology mainly adopts firewall, which was originally a protective measure against the unsafe factors of Internet. It is an internal network barrier to block the influence of external unsafe factors, and its purpose is to prevent unauthorized access by external network users. It is the combination of computer hardware and software, and establishes a security gateway between Internet and Intranet.
So as to protect the intranet from illegal users. Firewall is mainly composed of four parts: service access policy, verification tool, packet filtering and application gateway. A firewall is software or hardware located between a computer and the network to which it is connected.
2. Encryption technology.
Encryption technology is an active information security precaution. Its principle is to use a certain encryption algorithm to convert plaintext into meaningless ciphertext to prevent illegal users from understanding the original data, thus ensuring the confidentiality of the data. In the process of encryption and decryption, the encryption and decryption variable parameters used by the encryptor and decryptor are called keys.
3. Digital signature.
Using a series of symbols and codes generated by a cryptographic operation to form an electronic password to "sign" instead of writing a signature or seal, this digital signature can also be verified by algorithms in technology, and its verification accuracy is incomparable with manual signatures and seals in the physical world.
4. Security authentication protocol.
Security authentication protocols include secure e-commerce transaction protocol and secure socket layer protocol. Secure electronic transaction protocol is an open specification, which is used to ensure the security of credit card payment when conducting online transactions on the Internet. Specification 1997 jointly issued by VISA and MasterCard in May.
SET is mainly used to solve the transaction of payment by credit card between users, merchants and banks, so as to ensure the confidentiality of payment information, the integrity of payment process, the legal identity and operability of merchants and cardholders.