Font Size: a A A

Mobile Internet Security Support-Design And Implementation Of The Protection System Of Terminal User Information

Posted on:2015-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:C HanFull Text:PDF
GTID:2298330467463447Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication technology, mobile Internet is facing many threats and attacks which aimed at the traditional Internet. At the same time, the business platform like carrier and the third party platform, provide more and more service, the number of mobile Internet users grows rapidly, in addition to the complexity of mobile Internet itself, the security problems of mobile Internet has been paid more and more attention. As an important support part of the mobile Internet security, the information security of mobile terminal users’is also facing the huge challenge. Therefore, to design a mobile terminal user information protection system is not only critical to the mobile Internet users’information security, but also can provide a certain degree of support for the security of mobile Internet. This system, with the cost as small as possible, can identify the user, authenticate the users’operation and the application from the mobile terminal. We can say that, such a system canprovide security support for the mobile Internet by quite a degree.This paper’s purpose is to design a security solution for mobile terminal user’s information security, which can ensure the user’s experience,meet the security requirements.Within the current mobile Internet environment, this paper analyzed and summarized the security risks to users and application platform in the interactive process, and summed up of the current terminal user protection mechanism with concrete examples. Based on the security risks and the weakness of current mechanism, the paper’s main body introduces the design of the terminal user information protection system. First of all, this paper decribe the identity authentication mechanism for terminal user’s used in the system, which is based on the mechanism of traditional authentication framework, and according to the characteristics of mobile communication, it adds a fault tolerance mechanism, and make the security reinforcement, so it is safe and utility. And then, this paper from three angles, overall framework, the system level, system communication protocols among the different parts of the system, describes the structure of the whole system.The whole system includes three parts, the terminal, the security platform and the business platform, and introduces its core part of the safety function of the platform, and introduces the implementation of related components of these functions. Then, this paper introduces the communication between the terminal users and security platform during the process in user’s authentication, and it is mainly splited into three steps:user’s registration, user’s order and the use of ability, and introduces the design, safety parameters related to the authentication technology and related algorithm. At the same time, this paper does the function test and performance test of the system.Finally, this paper summarizes the main work completed and puts forward the problems that need further study. With the summary, we can see that the terminal user information protection system designed and implemented by this paper can meet the needs of users, but with the continued growth of user, there is a lot of room for improvement.
Keywords/Search Tags:mobile internet, security, authentication, authorization
PDF Full Text Request
Related items