Font Size: a A A

Network Business Regulation Based On Label Detection System Design And Implementation

Posted on:2012-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2248330371465531Subject:Computer technology
Abstract/Summary:PDF Full Text Request
There are many ways to ensure network security nowadays. Most methods encrypt the original data using some of the specific encryption algorithm, then transmit the encrypted data. Such methods could well ensure that original data is not peep, but cannot detect whether data has been tampered with.For some large-scale data transfer, we need some specific algorithms to ensure that it could be discovered if data were tampered with and the administrator can take some corresponding measures.The system is used to ensure secure data transmission network using embedding-tags and tags-detection methods. Before raw data is sent, the system will capture original data packet, generate a tag according to some algorithm and the original data, and the embed the tag in the data package. Some of the network nodes, and end user terminals are equipped with the system that can generate tags again, and compared with the original tag. If they do not agree with each other system will send a warning message. Alarm monitoring system can make appropriate and timely measures to deal with it.
Keywords/Search Tags:network transmission safety, network encryption, hashing algorithm
PDF Full Text Request
Related items