Font Size: a A A

Network Security Technology Research And Application Of Manufacturing Resource Management

Posted on:2007-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:J P WangFull Text:PDF
GTID:2208360185473795Subject:Mechanical design and theory
Abstract/Summary:PDF Full Text Request
As a part of the project of "the key technology of network manufacturing resource management aiming at Cooperation business" and "The ASP manufacturing platform aiming at machine and electronics" that undertoken by professor qing sheng xie, the research project was financed by "The National science finance "and "The Main Plans of The National Project 863 / CIMS ".This paper Studies the Digital Signature safety technique based on network manufacturing resource management and sets up the digital figure signature model of components processed transaction, the digital figure signature model of leasing equipments between business enterprises and the signature model of sign negotiate of using equipments, and try to compile the program.At the same time, the paper Sets Up the Digital Signature safety system model of network manufacturing resource management based on application service provider (ASP), the safety general model of Digital figure signature in The network of the business enterprise trades and the safe verification model of the Delivered document; The paper Combines RSA with TDES Algorithm together at the same time, First encrypt the clear statement to secret content 1 by making use of TDES , then encrypt the secret content 1 to the secret content 2 by making use of the public key P of RSA Algorithm; When the secret content decrypted ,the secret content' 2 is decrypted to secret content 1 by secret key S of RSA, then decrypted to clear statement by TDES Algorithm; The Algorithm Combined RSA with TDES together can solve the weakness of slow velocity alone making use of RSA and the unsafe weakness alone use TDES Algorithm.The paper designs the intrusion detection system applied on network manufacturing and designs in detail seven modules of the intrusion detection system. What's more, the paper designs Creatively the data analyzing module and data responding module by mode matching technology and Statistics analysis technology and XML data conversion technology. What's more, manufacturing resource management system is designed and Several test use case are provided.
Keywords/Search Tags:Network Safety, Digital Signature Technology, RSA Algorithm, TDES Algorithm, Manufacturing Resource Management, network manufacturing, Intrusion Detection, Security Technology
PDF Full Text Request
Related items