Font Size: a A A

Design And Implementation Of Core Modules In U Community Background

Posted on:2016-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y JiaoFull Text:PDF
GTID:2298330467999157Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The U community is to mobile users as the center of the circle coverage within5kilometers around the young groups and businesses and stores the real virtual networkcommunity, life circle building social network platform based on. Objective U communityservice platform mainly is for people’s life to bring the fun and convenient, whenever andwherever possible to provide various services and communication for people. Whether peopleare in the office or at home, business center and other places are available through the mobileterminal or PC terminal landing U community to get service.The U community is the virtual community on the Internet, but mapping the realcommunity of people’s life. Where U is the meaning of English ubiquitous abbreviation, itrefers to any time, any place, any person can move through the Internet and convenient accessto community and get service information wanted. The U community reflects the IOT basedU times "four any three basic concepts, namely the" any person or entity, use any network, atany time and in any place can the omnipresent network application platform, in Everything iscontained therein. get on, be equal to anything service. The U community for the future toIOT intelligent knowledge based social networking links provide the underlying interfaceready.In this paper, the background of U service community has conducted the research andthe analysis, design and implementation of a few core service module in the backstagesupport system. Including the third party general account login module, authoritymanagement based on RBAC module, identification and filtering sensitive informationmodule. Third party general account login function convenient to log in and use the user, withthe third party open platform huge user base, to improve traffic U community, and to providedetailed information, complete friend relationship, multiple channels of communication forthe U community. The security policy of privilege management in RBAC can flexibly supportsystem based on, and fluctuations of the application system. At the same time, in the operation, permission assignment intuitive, easy to understand, easy to handle a large number of userinformation administrator. In the recognition and filtering module of sensitive information,the segmentation of text using the maximum matching algorithm in reverse, to extract thefeature of text using the TF*IDF algorithm, the algorithm of matching and shielding thesensitive words by the dictionary tree matching, greatly improves the safety andstandardization of U community background, provides technology security for the clean andgreen network environment.Experiments show that, U community backstage core service module is designed andimplemented in this paper reached the intended target, meet the design requirements, duringthe trial operation, stable operation, accurate and quick operation management, user andmanager feedback satisfactory, has a good application prospect. At the same time, the work ofthis paper has certain reference significance and reference value for related research.The content of this paper is divided into the following7chapters:The first chapter (Introduction) firstly expounds the significance of this study, introducesthe main work of this paper.At the same time, lists the organizational structure of the paper.The second chapter (introduction of relevant technology and research background)introduces the background of BBS and the U community of mobile terminals and based onthe content of RBAC authority management and identification of sensitive informationfiltering algorithm.The third chapter (the general overview) introduces the function, database design, thestructure and the position within the system, the main module.The fourth chapter (general account and authority management based on RBAC) of thesystem are introduced in detail for third party general account login and rights managementbased on RBAC implementation.The fifth chapter (identification and filtering of sensitive information) is described indetail to identify and filter the sensitive information in the system. The text segmentation,feature extraction and dictionary tree matching algorithm in detail.The sixth chapter (and the analysis of the results of the operation show) mainly runninginterface of the key parts of the system.The seventh chapter (summary and further work) the work in this thesis is summarized,and then describes the system needs to be improved.
Keywords/Search Tags:U community, Oauth protocol, authority management based on RBAC, sensitiveinformation filtering
PDF Full Text Request
Related items