CPK通向赛博安全之路:理论与实践CPK Solution to Cyber Security:Theory and Practice
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

内容简介

Identity authentication is the core technique of cyber security. So far, CPK is the only identity-based public key system to solve Identity Authentication. Self-assurance policy and virtual network system can only be realized by identity authentication. The wholistic cyber security solution is solved according to virtual IoT and IoE theory.

With the theory, a lot of new products have been developed, such as CPK virtual network with all authenticated connections. Network system includes the following: CPK virtual Internet that is from user to user; CPK virtual mobile net that is from phone-no to phone-no; CPK virtual windnet that is from real-name to real-name. Other examples are CPK virtual dual kernel that can reject all unauthorised softwares; CPK digital cash that can be circulated online and offline without fearing of being stolen; CPK digital seal that can unify that of online and offine; etc.

This book is suitable for professional theory researchers, general designers, network operator, service platform operator, technicians and application technology developer of information security company, doctoral and graduate students and tutors who are interested in Cyber security.