On the basis of analyzing the principles and functions of the agent server and the reverse agent server, to meet the needs of the application in the campus network of colleges and universities,this article puts forward an applicable plan to enable legal users of networks outside of the campus to visit and use the campus network resources by employing the reverse agent server.
Therefore, the problem of safe and privacy has become obvious. It becomes one of essential demand to protect identification of legal users in some applications such as E-Voting, E-Banking, and E-Commerce.
Data analyzing module uses IP-MAC, IP-PORT or IP-MAC-PORT management methods to analyze the collected data, finds out IP address embezzlement users and locates their sites, according to the legal users' information stored in User Management Database.
This thesis researches a method of IPv6 address auto-configuration based on authentication. It adds authentication mechanism to IPv6 stateless address autoconfiguration, which only allows the legal users to obtain IPv6 address and to access IPv6 network. Consequently, it can guarantee the network security from the beginning.
In this scheme, effective digital signature can not be generated by anyk-1 or fewer legal users, or only by signature executive.
A network application is developed, which allows legal users to exchange messages protected by the proposed method.
Water acquisitions and transfers must not inhibit the ability of other legal users of water to use the water to which they have rights.
Not only can server verify the legal users, but users can verify the legal server.
A corollary of this is that a watermarking method must rst of all be robust against those transformations used by legal users of the image.
The security of MSR+DH scheme in  is analysed thoroughly, which is found to be insecure against the active attack of the operators in the base station to impersonate the legal users. A new authentication and key distribution scheme is designed using Rabin public-key cryptosystem,which is superior to the MSR+DH scheme in both security and complexity.
It is one of the important contents to distinguish legal users in computer security and secrecy. This paper puts forword an effective method to distinguish legal users. The method is typical of good anti-conjecture and quick realization.