| Mobil telecom has come to the phase of 3G. Therefore, the invading problems has become more and more concerned by people. Based on the skill of wairless PKL(WPKI) applied in mobil telecom, and according to the rapid development of it in recent years, the skills of preventing dangerous information and establishing formulation has been perfected continuously. This thesis mainly analyses how to use wireless PKI in the proceeding of logging in to realize the safety of the users' ID.The data of the users' ID is sensible, so it has to be protected quite well. ID secrets include:the secrets of the users' ID, the secrets of the users' position, and the unchased users. First of all, this thesis introducts the outline of the basic knowledge of the wireless PKI, and the copyright of the certificate, as well as the meathods of accessing. Then, it presents the ways of approving under PKI situation. Followed it closely was the statement about the safefy struction of recent 3G logging net and the skills of related prevention of invading, such as the protecting of the integrity, the encrypted protecting and approving, as well as the consulting about the code. Finally, it talks about the concrete plans used to realize the ID secret, which is based on the new priciples of the public codes. The plans is used after the realizing of the approving plans of substance in the wireless PKI situation and the classified 3G ID of recent, which finally realizes the users' confidentiality. |