Font Size: a A A

Security Protection Mechanism In Customer Relationship Management System

Posted on:2013-02-17Degree:DoctorType:Dissertation
Country:ChinaCandidate:X B XuFull Text:PDF
GTID:1118330371982712Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Customer relationship management system in the increasingly competitive businessenvironment plays the increasingly prominent role. On one hand enterprises hope to track users'buying behavior, to understand the user purchase tendency and preference. On the other hand,some countries have introduced more stringent laws and regulations system to protection ofpersonal privacy. Enterprise faces a particular challenge is how to achieve customer marketingmanagement, collect helpful enterprise development marketing data and in the data transmissionprocess to ensure that the user's personal data is not stolen or leak.This paper discusses the customer information data collection, classification and how toensure accurate data collected from end user. Introduce the customer relationship managementregistration process, online shop online registration process. And how to combine the twoprocesses collected data. Compare mobile phone CRM system with the traditional computer one,introuce the difference and advantage. User behavior tracking data is divided into the customerrelationship management system driven model and web drive model, describe how to track dataacquisition for both models.This paper discusses a B2C enterprise based on customer relationship management systemdata warehouse building process. The paper introduces data warehouse architecture, businesslogic and data warehouse subject area, including: customer information, customer asset,customer order, customer website activities, marketing campaign activities etc. And introudcedata warehouse data extraction, data transformation and data loading process. In the datawarehouse based db structure, this paper discusses the marketing management process, and anexample is used to introduce the use of Unica tools to achieve the marketing campaignmanagement. Use BO to manage metadata, on the basis of data warehouse subject domain toestablish data presentation layer, which used to support enterprise marketing department dailyanalysis work. Rely on Unica and BO to implement marketing data analysis model, which ismore beneficial for different target user group after realizing customized marketing activities.IDEA algorithm based on the use of"dissimilarity on algebraic groups of mixed operation"design concept, the IDEA algorithm in encryption process will devide the input64bit data into4subblocks, each subblock16bit. After eight iteration operation, the remaining four sub-key willbe used to convert four subblocks, finally the four subblocks will be connected again to generatethe output ciphertext. IDEA design concept considering the packet length, key length, diffusion,confusion and password strength correlated traits,128bit key IDEA provides an enough large keyspace, make brute force attacks ineffective. But through standard IDEA sub key expansionalgorithm, the generated subkey in the initial key position is fixed, if know the encryption timesand plaintext correspondence, we can determine the relationship between plaintext and ciphertext. While in the encryption process, IDEA algorithm introduce the diffusion, mixedoperation, but because the key itself has the regularity, it can still be found through IDEA checkanalysis.Because the IDEA algorithm can be attacked through check analysis, prevent attackermaliciously to try and get the key, in this paper the original IDEA algorithm of sub keygeneration algorithm is extended and proposed the new key generation algorithm, the algorithmuses a pseudo-random sequence generate the disordered subkey, an attacker can not effectivelyanalysis sub key position in initial key, so the attacker can t determine the weak key position.Disordered subkey destruction of targeted attacks, the attack is ineffective. In only apseudo-random sequence generating sub key situation, the initial key using frequency can causenew weak key generated, therefore we introduce linear probing hash again to prevent thephenomenon. The algorithm was validated against experiments and the safety,efficiencyanalysis, the algorithm is proved to be safe and efficient. The IDEA key expansion algorithmgenerated subkey as the customer relationship management system of text data encryptionsubkey to ensure the text information transmission security.RC4encryption algorithm designed by Ron Rivest in1987, this is a variable key lengthstream encryption algorithm cluster, the core part of the S-box length can be arbitrary, butgenerally is256byte. The speed of the algorithm can be achieved DES encryption is about10times and also has the very high levels of nonlinear. RC4encryption algorithm including the keyscheduling algorithm (KSA) and pseudo random-generation algorithm (PRGA) two parts. Thekey scheduling algorithm the main function is to mess the S-box, after pseudorandom-generation algorithm processing different S-box can generate different sub keysequence.Adi Shamir proposed error introduced attack method proved to be the most effective methodto attack RC4algorithm, its target is the RC4pseudo random-generation algorithm codegeneration phase. Error induction attack under the situation that attacker has control of the cipherdevice, an attacker can control the cipher device to input error, influence the encryption process,the cipher device generate incorrect encryption results, its goal is to use the column shift processto change byte swapping steps. The parameter of analysis method is the encryption key wordsand the number of errors during the attack process. In order to resist this kind of attack, with theincrease of pseudo random-generation phase security is very effective solution. This paperpresents two kinds of improved algorithm; the idea is adopted in the original algorithm of pseudorandom-generation phase to add row shift or column shift process, which increases the nonlineartransform complexity. Improved1stalgorithm changes the original algorithm PGRA step byteswapping steps, which will make algorithm more complexity to protect the encryptioninformation. Improved2ndalgorithm use shift and column shift, by changing the variables itandJtselection method to defend against attack. After analysis two different kinds improvedalgorithm accurity,safety and the use of error introduced attacks algorithm efficiency, provedthat the attacker use error induction to attack RC4algorithm efficiency is lower than theexhaustive attack, can resist error induction attack. And also compare the two algorithmefficiency and security,1stalgorithm more efficient,2ndalgorithm more safety.With the mobile phone3G networks become much popular, the mobile phone version ofcustomer relationship management system get reconized by many companies, because themobile phone video feature much powerful, ensure video stream transmission security also is the enterprise needed to solve problem.1stalgorithm is used in customer relationship managementsystem. When user use mobile phone to share online video information, the video stream isencrypted which ensure CRM system video data transmission security.
Keywords/Search Tags:Customer relationship management, Security protection, IDEA algorithm, Linear probingrescattering, RC4algorithm, Error introduce
PDF Full Text Request
Related items