Font Size: a A A

Instant Messaging System Of Electric Power Company Based On Hybrid Encryption Design And Implementation

Posted on:2015-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:H K ZhangFull Text:PDF
GTID:2308330482460237Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the advent of the era of Internet, Instant Messaging system (Instant Messaging, abbreviated as IM) has become the indispensable office tools and the essential way of life. Its development system is more mature, functional applications continue to expand. But, through the analysis found that, both for individual or enterprise IM system, mostly function first, application first, for the security degree is not enough, theft behavior, such as ShiXieMi situation has happened repeatedly.This topic to electric power company IM system is based on the design and implementation, to meet user requirements, on the basis of the emphasis on strengthening system security fluctuation kongfu, with strength, using mixed encryption technology provides a multi-level system, all aspects of the protection. Not only meet the hard and fast rules of state-owned enterprise information safety, and conform to the trend of The Times, information security as well as the future into army informatization construction has accumulated valuable experience.In this paper, the main work is as follows:(1)Adhering to the "demand for the first" the idea, repeated discussions with electric power company related department communication system design standards, has been clear about the functional requirements, clarifying the design context, making the expected goal;(2)Follow the principle of "theory", by reference, case analysis, comparison, identification, delving into the mainstream IM system development present situation at home and abroad, and combining with the consulting books literature, combing, induction, and summarizes the theory of system design and development of main points, including the model structure, transmission protocol, programming languages, etc., focusing on hybrid encryption were studied;(3)Focus on the "main" goal, guided by the related theory, set up a reasonable and efficient C/S and P2P hybrid model framework, Using the TCP and UDP protocol transmission mode, create a reliable stability of SQL Server 2005 database, describes the intuitive clear work flow and business logic;(4)Based on the thinking of "focus", Combining software and hardware encryption, symmetric and asymmetric encryption algorithm, the combination of design to build a safe and effective mixed encryption model, introduced the model contains the content;(5)According to the "first points close" steps, one by one, realize the system function module, lists the specific implementation steps, point out the important logic algorithm, shows the module running effect;(6)According to the "application for this" standard, fully tested against expected design system, determined the test environment, test content, designed the testing steps, lists the test data, analyses the test results;(7)A summary of the gain and loss of the project, looking forward to the future prospects.
Keywords/Search Tags:Electric Power Company, Instant Messaging, C/S, P2P, Java, Hybrid Encryption
PDF Full Text Request
Related items