Font Size: a A A

The Design And Realization Of Embedded Application System Security System

Posted on:2009-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:J L HuangFull Text:PDF
GTID:2178360272987247Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The development and union of the embedded technology and the Internettechnologyhave facilitated the birth of embedded Internet technology. With the rapiddevelopment of computer hardware, software and communication, particularly thewidespread use of network, the joint operation of the embedded systems'applicationare required to cross webpages, cross platforms, Which causes system securityproblems whileembedded Internet brings the convenience tous. This articletakes theembedded system application as a backing and has made a research to the embeddedsystemsecuritysystem.First, this paper analysis the meaning of researching on security of embeddedsystemsecurity,thenintroducestheconceptofembeddedsystem,thecharacteristicofthe common embedded operation system, the existed hidden-trouble security ofembedded system. Second, the author has made an analysis of the common securitytechnology, such as the encryption techniques, authentication techniques, FireWallstechniques,IDSSystemandSSLprotocol.Basedonthis,thispapermakesananalysison the necessity to researching the embedded system security. Taking the embeddedapplication system security as a breakthrough point, this paper proposed the securitydecision-making and plan which the embedded application system uses in view ofaccording to the security problem the embedded system faces and the particularity ofthe embedded application system security. Surrounding the research of the embeddedapplication system correlation security technology, this paper uses the characteristicand the superiority of Kerberos and OpenSSL in implementation on the embeddedapplication system safety. Last, this paper has designed and realized the identityauthentication and the database digital authenticationin under Windows2003 serverandtheWinCEplatform...
Keywords/Search Tags:Embedded System, Internet Security, Kerberos Authentication, DigitalAuthentication
PDF Full Text Request
Related items