Font Size: a A A

Research And Implementation Of Security Authentication Technology For Mobile Terminal

Posted on:2016-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:L L DingFull Text:PDF
GTID:2208330461482869Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication technology, smart mobile terminals have been popular. Mobile terminals have enriched people’s information lives, but their information security suffers a serious threat. In order to protect the information security of mobile terminals, this paper presents a safety certification method. The mobile terminal separates independently with security authentication server platform in this method.Firstly, this paper analyzes the development of mobile security certification on internet. Then it studies the mobile terminals’ safety certification process in three wireless network environments, and describes the relevant technology to build server platform. This paper designs a security certification method of mobile terminals to solve the problem of inadequate resources in mobile terminal’s security certification process. The mobile terminal just sends secure authentication request and some information for secure authentication to the server-side authentication platform with virtualization, all of the security problems in the certification process are handed over to the server with computing and storage resources. As well as, this paper analyzes two major elements of the mobile terminal security required for certification, and designs D2MRMC(Distributed Multi-reliance Multi-client) multichip access network coverage extension mechanism. The mechanism expands the coverage of security authentication server network, enhances network access capabilities of the mobile terminal, to improve the stability and safety of certification process. In order to achieve secure authentication method for the mobile terminal, this method combines with the mobile terminal’s security authentication process, to make appropriate arrangements and environments of client-side and server-side, and to achieve the server nodes’ functions.Experimental results show that the security certification technology of mobile terminal, its performances, regardless of processing power or information storage capacity is enhanced. The method proposed in this article will weaken physical constrains of the mobile terminal to some extent. At the same time, the paper designs a coverage extension mechanism D2MRMC algorithm to improve the cooperation quality QoC (Quality of Cooperation) and to expand the coverage of the authentication server network. And the method can improve network access capability of the mobile terminal. The use of method can ensure a stable topology and a secure environment of the authentication server network, while can enhance the efficiency of information processing of the server network. Comprehensive improvements in all aspects of the mobile terminal security authentication method in this paper, it can know that the method can improve the reliability and validity of the security certification process to some extent.
Keywords/Search Tags:Mobile terminal, Security, certification, Optimal cutoff bandwidth allocation, Quality of Cooperation, Virtualization
PDF Full Text Request
Related items