Font Size: a A A

The Research Of The Micro-blog Protocol Security Based On The Mobile Internet

Posted on:2013-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:Q D ZhaoFull Text:PDF
GTID:2298330467464242Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile Internet, Micro-blog is developing rapidlythese two years as a new Internet application and has become one of the hottest Internetapplications. Meanwhile, with users increasing exponentially, the security loophole andmany security problems of mobile Internet turn to appear. The personal privacy data ofMicro-blog account exist risks as Micro-blog Implement the system of real name, in orderto avoid criminals stealing privacy data and information in the network packets, encryptingthe data transmission would be the only way to solve the problem.Encrypting the personal privacy information and transmitted data of Micro-blog canprevent law breakers intercepting, peeping, and even tampering maliciously thetransmission data with private information. It can be realized that encrypt the privacy partof data by analyzing agreement and decrypted then in terminal, to implement the programthrough a variety of encryption algorithms. It can achieve the following objectives:(1)protecting user information and privacy information,(2) enhancing the security of datatransmission.On the basis of discussing the necessity, and implementation program of networksecurity, this thesis explore the key problem of encrypting and decrypting of transmissiondata, including the common safety problems of Micro-blog data, the security mechanism ofthe data, as well as typical data encryption algorithm; Subsequently problem-solvingdiscussion network security solutions, clear the basic ideas of encryption and decryption,raise viable embedded LINUX encryption and decryption processing system program. ByExperimental test, it realizes the function of encrypting private information, haspracticability of network security and security of privacy information, and provides a newidea for further study of the problem of data security in embedded systems.
Keywords/Search Tags:Mobile Internet, Micro-blog, Data security, Embedded LINUX, Encrypt, Decrypt
PDF Full Text Request
Related items