Font Size: a A A

Based On The Com Component B To B / B To C, Safety Study

Posted on:2003-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:Z W LiFull Text:PDF
GTID:2208360065950861Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
This paper studies component technology and cryptography techn ology and their influence on electronic commerce secure exchange, and discusses the secure exchange model based B/S, by which we probe into the mechanism which uses binary component technology-COM a-nd cryptography to make secure electronic exchange stronger, and the resolve method about some correlative question.On the theoretical basis above, we achieve an secure electronic exchange system based SSL protocol, which use object-oriented programming design, cryptography technology and COM technology .we put forward a new model -SCM(secure component model) in our system design, which realizes a two levels authentication system by using user's password authentication and the public key cryptographic digital signature authentication together; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non-repudiation .At the same time, we explore a new way which combine COM and cryptography technology to implement secure electronic exchange. This paper makes elaborate discussion about design objective, d-esign idea, component description, concrete design and implementation process about application system, and gives detailed description of the corresponding technology.
Keywords/Search Tags:Electronic Commerce, Cryptograph Technology, Digital Signature, Digital Authentication, COM (component object model)
PDF Full Text Request
Related items