Font Size: a A A

The Research And Realization Of Security For JAVA Mobile Phone Consumers In Candidates Voluntary Reporting System

Posted on:2007-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:H LiuFull Text:PDF
GTID:2178360182982179Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Java is a cross-platform programming language. J2ME is a means for application programm development using Java language on equipment constrainted in resources. From the current development status of mobile phone software it can be found that the application prospects of Java mobile phone software based on J2ME are bright. To use mobile phones for visiting various services on Internet will be a trend. Meanwhile, Web service allows any customer end program developed by any language to interact on any platform. Some third-party manufacturers also provide some plug-ins such as kSOAP to make wireless equipments be able to visit Webservice. All these techniques are instrumental in the development of mobile information systems.In mobile information systems, the use of open communication protocols such as kSOAP can help to visit Web service inside enterprise firewalls. That is the application of this open communication protocols that brings security threat of data in the transmitting process from the transformation to destination. Therefore, the security of the system may become one of the key factors for success. Fortunately, the plug-ins such as Bouncy Castle developed by the third party manufacturers ensures the security for these mobile information systems.Through the combination of J2ME and Web service technique, the application of candidates' voluntary reporting system is realized. Considering the safety norms of Web service platform and security applications of J2ME platform, a security mode for mobile phones software platform to visit enterprises Webservice is presented. And this mode is realized in the system. The purpose is from the study of the securities of the voluntary reporting system to discuss how to make the security of the system strengthened, thus to make Java mobile phone software be more popular in candidates voluntary reporting systems.This essay composes of six chapters. The first chapter mainly discusses domestic and foreign research situations, research background and the contents. The secondchapter elaborates J2ME technique and introduces its system structure. It carries on the discussion to Web service technical structure and analyzes the security technique of mobile platform systems combining the information security technique. The third chapter explanes the system designing plan and describes the system functions, database design, and systyms safety realization plan, etc. The fourth chapter main shows the system realization, including the designing and visiting of server end database, the Canadian decipher, the digital signature confirmation, the development and issue of Web service and the realization of customer end KSOAP transfering the Web service, the encryption and the digital signature. The fifth chapter discusses the installment and optimization of the customer end procedure. The sixth chapter is a summary and presents the further necessary tasks.
Keywords/Search Tags:mobile security, J2ME, Web Service, Bouncy Castle Plug-in, Encyption and Decyption, Digital Signature
PDF Full Text Request
Related items