Font Size: a A A

The Research Of Wireless Public Key Infrastructure Technology

Posted on:2005-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:C YangFull Text:PDF
GTID:2168360152456777Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The 21th century is information age, the information has become the important and strategic resource of the social development. Now, society of information-based has been become core in the developing world, but the information safety will be play the extremely important role in the information society , it directly relates to national security, business enterprise management and to normal life of people.Along with the fast growth of the Internet customer, the circumstance that gets to the Internet and carries on the e-commerce through the wireless terminal is also gradually widespread, WAP, K-Java has the bridge at mobile world and Internets, that provides 'the customer with no limiting wireless increase in value business. The mobile customers can their pocketsized device to get to the Internet as so as using their own computers.At the same time, the technology of PKI has already develop mature and been good application in all countries. Our country has builded up perfect and independent PKI, and constructed the CA attestation center and profession CA attestation centers . At the same time, the nation also encourages the local business enterprises to produce their own PKI application product.The WPKI is allowed in the mobile e-commerce to realize independence in application, network and the flexible and safe project of the suppliers, which can apply traditional PKI to the wireless network environment by using expanded PKI and increasing some software and hardware. These technical realizations can guarantee the safety trade in the mobile network, and make companies and customers trust the circumstance to go the electronics bargain through the mobile network. Along with the technical further development and perfect of WPKI, the mobile e-commerce will be safe.The mobile telephone is one of the most important termini in the mobile communication. Currenty the mobile telephone customer in our country has already come up to hundred millions, and this numeral still increases. These mobile telephones can receive and send the message mostly, which can have .he stronger function by beeningexpanded. At the same time, the local handheld PC market also got the very big development, from the PDA of the low level to the portable computer of the high level, the function is more and more strong, especially the high level product which has strong processing ability and expansibility, which has the opening operate system and mobile communication, complete become the stronger mobile terminal product than other mobile telephone. Along with the stronger of the mobile terminal market, it provides the mobile e-commerce with the huge customers and the application foundations. Along with the blue tooth technical increasingly mature, various terminal production communicate each other, and the mobile application has the vaster world.WAP provides the necessary protocol for the mobile network, although encountered the setback at the time of just releasing, along with the WAP further perfect, increasing the loading the mobile network bandwidth, its application also will more and more extensive. The mobile Internet that WAP developed has the huge potential of the market, along with the WAP technical continuously mature, especially the technology of WAP encrypts solved, the prospect of WAP will be vast. It will play important role in future mobile e-commerce. Same, the mobile bank and the mobile shopping etc. Business application also will to move the huge push function of the progress creation of the e-commerce. The WAP Forum releases the WAP2.0 in January of 2002. The WAP2.0 releases to make the wireless world even near to the Internet.This paper introduces the basic principle of the PKI, and WAP, and gives system design of the WPKI. The WPKI experiment system mainly includes the system of CA and the mobile terminal initialization. The system of CA adopts the structure of the second class CA, the root CA adopts the off-line way, being responsible for countersigning the second class certificate of CA only. The se...
Keywords/Search Tags:Infrastructure
PDF Full Text Request
Related items