Font Size: a A A

Research And Implementation Of The Key Technologies In Security Of Enterprise Mobile Commerce Based On J2ME

Posted on:2008-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:X W SuFull Text:PDF
GTID:2178360242998982Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the mobile communication technologies and the popularization of mobile terminals, the mobile commerce is rising in all industries in China. Meanwhile,one of the mobile commerce-ECM(enterprise mobile commerce) is getting more and more attention for there are such a large number of enterprises wanting to make use of moble commerce to make more profits for themselves. However,the problems existing in the security of the ECM restrict severely the enterprises to invest money in ECM.According to the characteristics of the requirement of the enterprise's business,the thesis designs a EMCS(enterprise mobile commerce system) using J2ME and J2EE.And througth analyzing the currenting information security models of the ECM,the thesis puts forward a security model for enterprise mobile commerce-EMCSec which is based on J2ME and XML.EMCSec is specially designed for enterprise mobile commerce, it uses J2ME as the client's program and uses XML document as the the format of information. Compared to other security models of EMC, the EMCSec has following specialities:1. Using XML document as the format of the informaiton so as to combine with Web service conveniently.2. Providing end to end security for enterprise mobile comerce.3. Implementing different security strategys according to different content in a XML document.4. Defining the enterprise authentication server and trusted third party to provide the service of authentication.5. Choosing appropriate work pattern according to diffirent kinds of business and network status.6. Providing a architecture of security payment protocol.At the end, the thesis evaluates the feasibility and performance of the EMCSec, and gets a conclusion that the informaiton enterprise mobile security model is feasible.
Keywords/Search Tags:Mobile Commerce Security, Enterprise Mobile Commerce System, XML of Security, J2ME, Security protocol
PDF Full Text Request
Related items