Education, Science, Technology, Innovation and Life
Open Access
Sign In

Digital Tiger Symbol Authorization Method Based on PKI System

Download as PDF

DOI: 10.23977/cpcs.2023.070112 | Downloads: 5 | Views: 307


Yanhang Chai 1, Wen Li 1, Wentao Zhang 2, Wei Bai 1


1 Army Engineering University of PLA, Nanjing, Jiangsu, 210007, China
2 School of Software, Liaoning Technical University, Fuxin, Liaoning, 123032, China

Corresponding Author

Wen Li


Under modern high-tech conditions, the importance of personnel authorization security is increasingly prominent. A set of safe authorization method can ensure that human resources are properly distributed to each unit, thus providing reliable guarantee for the successful completion of tasks. However, current personnel authorization are still paper-based or verbal, prone to errors or inconsistencies, and difficult to verify. In this paper, a method of digital Tiger Mark authorization based on PKI system is proposed, using modern cryptography technology to provide support for the security and reliability of personnel authorization. This method realizes fine authorization, and the authorization can be verified. The method uses digital certificates to assign people's identities to their respective roles, and uses encryption algorithms to enforce access control policies and prevent unauthorized access. The feasibility of this method is verified by us in a simulated cross-domain task environment.


PKI, digital tiger symbol, fine-grained authorization, digital certificate, cryptography


Yanhang Chai, Wen Li, Wentao Zhang, Wei Bai, Digital Tiger Symbol Authorization Method Based on PKI System. Computing, Performance and Communication Systems (2023) Vol. 7: 99-104. DOI:


[1] Dong Z. G., (2021) Research on the Implementation of Network Communication Security Based on PKI. Electronic Technology & Software Engineering, (20): 241-242.
[2] He S., (2013) Design and Implementation of Multi-domain Unified Authentication and Authorization System Based on PKI. Beijing: Beijing University of Posts and Telecommunications: 2-3.
[3] Wu B., (2008) Research and Implementation of Unified Authentication and Authorization System Based on PKI. Hubei: Wuhan University of Technology, 13-16.
[4] Luo Y., (2021) A Brief Discussion on the Design and Implementation of Unified Identity Authentication Technology Based on PKI. Yunnan Science and Technology Management, (10): 62-64.
[5] Li S. M., (2022) Research on Hospital Electronic Archives Security Management System Based on PKI Technology. Information Technology, (09): 16-18.

Downloads: 1876
Visits: 95179

Sponsors, Associates, and Links

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.