首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
《数字通信世界》2012,(3):56-56
WebsenseInc.即日在RSA大会上宣布:为帮助企业创造安全的移动终端使用环境,并有效缓解各种因为非安全的移动设备使用引发的数据泄露事件,WebsenseN用户精心打遣了全新的WebsenseTRITON移动安全解决方案,它将给广大用户带来全新的移动安全体验。它有四个关键特点:  相似文献   

2.
finekl 《电子世界》2009,(6):47-48
手持娱乐设备不断推陈出新,给用户带来了更多娱乐方式。而时下最热门的莫过于移动电视功能。其实,国外多个国家都已经建立了相应手持电视设备标准,这次国内不少数字手持设备厂商也借北京奥运东风顺势推广开来。  相似文献   

3.
智能化大背景下,移动智能网络系统得到不断升级,使用移动智能设备时,移动终端的通信安全问题备受关注,一旦存在安全隐患,就会引起用户隐私与重要信息泄露问题,可能会为用户带来极大的损失.本文就移动终端通信安全技术进行了分析与探究.  相似文献   

4.
智能手机不慎丢失或被盗,甚至被恶意软件击,将给个人隐私和财产带来巨大威胁。目前,随移动设备功能的不断丰富,企业员工使用自备的智手机和平板电脑进行邮件收发、文件审批、资料储等办公活动的情况也变得越来越普遍,不安全移动设备正在成为企业安全中最弱的一环。2012年移动恶意软件样板增加43倍迈克菲  相似文献   

5.
介绍了移动互联网手机应用的安全现状、发展趋势以及典型的手机应用恶意行为。为降低恶意应用给用户带来的安全威胁,着眼整个移动互联网手机应用行业,提出了一个手机应用安全管控体系,该体系包含了应用上线前检测和上线后监控2个主要阶段。通过手机安全管控体系可以有效管控手机恶意应用,提高用户使用体验。  相似文献   

6.
由于移动设备的使用继续增长,企业的云应用程序目前处于用户的掌控之下,移动性所带来的一个重要问题是,需要更大的责任来保持企业数据的安全。  相似文献   

7.
孙龙  潘娟  马鑫 《现代电信科技》2012,(9):22-26,32
随着移动智能终端的大面积普及,在给用户带来便利的同时,安全问题也日益突显。文章针对移动智能终端的安全威胁以及自身的特性,从不同层面对移动智能终端的安全防护技术进行了分析。  相似文献   

8.
《现代电子技术》2015,(22):51-54
提出一种基于移动设备的USB Key身份认证方案,主要用于解决在移动设备端传统身份认证技术中存在的安全问题。在移动设备端使用USB Key身份认证技术可以很好地提高移动设备对用户身份认证的安全性。主要从两方面进行论述:移动设备端是如何获取USB Key中的数字证书并进行身份认证,从而保证移动设备环境下的安全;移动设备端的用户是如何进行身份认证,从而保证应用服务的安全性。通过安全性分析和实验可得出,这种身份认证技术可有效地抵御移动设备端账户和服务攻击。  相似文献   

9.
3月2日-4日,在东京举行的2005年日本安全系统展览会(Security Show Japan2005)上,全球自动化、传感与控制领域的领先厂商欧姆龙公司展示了其新近推出的世界首款手机用面部识别传感器(OKAO Vision Face Recogni-tion Sensor),此传感器适用于具备拍照功能的P D A、手机和其它移动设备。该产品可以通过面部特征识别这一功能来确认使用者的身份,从而使移动设备及其信息得到了更高的安全保障。具有拍照功能的移动设备在配置OKAO面部识别传感器时不需要其它硬件设施。用户只需注册并对自己进行拍照即可。使用设备时,用户自我拍照,OKAO面…  相似文献   

10.
彭罗生 《电信技术》2004,(12):81-82
手机的用途越来越不只是为了通话,从拍照、MP3、小型PC、掌上电脑到操作系统,移动设备将呈现给用户更多富有创意与实用的功能。驱动这些装置的软件日趋复杂,并越来越多地汲取3G以及其他先进网络的优势。随之而来的负面效应是给用户带来了诸多问题,包括应用程序缺陷以及设备故障。  相似文献   

11.
Mobile cloud computing environments have overcome the performance limitation of mobile devices and provide use environments not restricted by places. However, user information protection mechanisms are required because of both the security vulnerability of mobile devices and the security vulnerability of cloud computing. In this paper, a multifactor mobile device authentication system is proposed to provide safety, efficiency, and user convenience for mobile device use in cloud service architectures. This system improves security by reinforcing the user authentication required before using cloud computing services. Furthermore, to reinforce user convenience, the system proposed increases the strength of authentication keys by establishing multiple factors for authentication. For efficient entries in mobile device use environments, this system combines mobile device identification number entries, basic ID/password type authentication methods, and the authentication of diverse user bio‐information. This system also enhances authentication efficiency by processing the authentication factors of a user's authentication attempt in a lump instead of one by one in the cloud computing service environment. These authentication factors can be continuously added, and this authentication system provides authentication efficiency even when authentication factors are added. The main contribution is to improve high security level by through authentication of mobile devices with multifactors simultaneously and to use the mobile cloud service architecture for its efficient processing with respect to execution time of it. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

12.
沈杰  李斌  常乐 《电信网技术》2013,(12):49-52
移动云计算安全度量是云计算安全中的一个研究领域,主要是研究采用手机等移动终端设备,通过移动互联网使用云计算服务过程中的安全问题及安全度量方法。本文分析了目前移动云计算行业发展过程中存在的安全问题,指出了这些安全问题是阻碍用户使用云计算服务的关键,分析了传统的安全度量方法在移动云计算中的应用的优缺点,并在此基础上提出了一种基于场景的移动云计算安全度量方法,该方法可以有效度量和展示用户正在使用的云计算服务的安全情况,可以解除用户对于安全的顾虑,让用户放心使用。  相似文献   

13.
随着无线通信技术和手持便携设备的飞速发展,移动设备在日常生活中的应用日益广泛,移动用户群呈几何级增长,以移动终端设备为载体的移动分析应用逐渐走进电力企业,并扮演着越来越重要的角色。但移动设备自身的安全机制和接入网络技术都存在着安全隐患,制约着移动应用的发展。文章探讨了移动分析应用在电力企业中的应用价值和面临的挑战,设计了电力企业中的移动分析应用业务框架,并着重研究了电力企业中的移动分析应用安全机制和安全策略。文章中的相关研究成果可为电力企业移动分析应用平台建设提供参考。  相似文献   

14.
李勇 《通信技术》2014,(4):439-444
随着通信技术和互联网技术的深度融合,移动互联网快速发展,无疑已成为业界和学术界共同关注的热点。但伴随着智能移动终端的普及和移动互联网业务的不断创新,移动互联网也面临着新的安全威胁。总结了移动互联网给终端用户、企业信息安全、网络基础设施和国家信息安全带来的威胁,并从入网方式、移动操作系统、移动应用和终端用户四个方面分析移动互联网目前存在的信息安全漏洞,强调整个产业链必须共同努力来构建移动互联网信息安全体系。  相似文献   

15.
Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.  相似文献   

16.
The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.  相似文献   

17.
Content sharing via device‐to‐device (D2D) communications has become a promising method to increase system throughput and reduce traffic load. Due to the characteristic of spectrum sharing in D2D network, confidentiality is becoming a key issue in content transmission. Secure communication in D2D networks is generally guaranteed by a physical‐layer security mechanism. However, this method sacrifices the system transmission rate while ensuring security. Since mobile devices are carried by humans, we can leverage their trust relations to enhance the security of communications. As much, considering the psychology structure and social attributes of mobile users, we build a multidimensional trust evaluation mechanism to evaluate the trust relationship between users, and we pick out the trusted users based on the decision‐theoretic rough sets. By sharing content only between trust users, we can enhance the security of content transmissions without relying on physical‐layer security measures. Meanwhile, content caching is now widely used to improve accessing efficiency and reduce traffic load on cellular networks. However, caching content for other users incurs additional cost, which results in selfish and noncooperative behavior in users. Considering such selfishness, we introduce a cooperative caching game based on multidimensional trust relations to motivate users to cache contents for other devices. In this game, the trust relations and physical distance between two users are considered to formulate the cost function. Furthermore, we introduce an incentive caching algorithm based on social trust to minimize the total cost in the D2D network.  相似文献   

18.
BYOD企业移动设备管理技术   总被引:1,自引:0,他引:1  
提出了中兴通讯自带设备办公(BYOD)解决方案.方案在终端层、接入层、控制层、应用分别解决企业面临的设备安全管理、应用安全管理及数据安全问题.终端层提供BYOD安全套件;接入层提供信令媒体接入网关和统一接入控制服务,提供移动设备安全接入服务,并提供统一的设备鉴权认证及用户鉴权认证;控制层用于控制移动用户及设备的行为模式;应用层用于提供具体的企业移动服务,包括通用的企业通信服务、企业办公应用支撑、虚拟桌面、企业网盘,以及企业业务相关的移动应用.  相似文献   

19.
基于移动互联网的信息技术产品为人们带来随时随地便捷上网的同时,也迫使人们不得不考虑移动互联网对传统安全审计系统的威胁。目前,现有的安全审计系统只能对局域网内部进行监控,无法对具有跨地域、跨网段特点的移动互联网设备进行实时和持续的审计。文中提出了一种针对移动互联网设备的安全审计框架,利用嵌入式智能探针技术,并结合现有云平台和大数据处理技术,提出了跨地区跨网段移动互联网审计云,来应对移动互联网安全审计的新挑战。  相似文献   

20.
The main driving force for the rapid acceptance rate of small sized mobile devices is the capability to perform e-commerce transactions at any time and at any place, especially while on the move. There are, however, also weaknesses of this type of e-commerce, often called mobile e-commerce, or m-commerce. Due to their small size and easy portability mobile devices can easily be lost or stolen. Whereas the economic values and privacy threats protected with Personal Identification Numbers (PIN) are not particularly high for normal voice-enabled mobile phones, this is not true any more when phones have developed to Personal Trusted Devices (PTDs). Still, PINs are used also in this new context for authorization and identification purposes. PINs are currently used both for protection of the devices and for authentication, as well as authorization of the users. It is commonly recognized that not many techniques of storing the PINs into the memory of the device or on the SIM card are safe. Even less sophisticated thieves might uncover the PIN inside the stolen mobile devices and for sophisticated thieves uncovering the PIN stored safely might be possible. In this paper we propose a new scheme to cope with the problem of uncovering the PIN that reduces the risks of m-commerce. The basic idea is that instead of storing the entire PIN digits (or some hash value) in the mobile device, we store part of the PIN in a remote machine in the network. The PIN verification then involves both the mobile device and the remote machine, which must verify their respective parts of the PIN. Also, the improvements of the security over the existing schemes are shown using a probabilistic model. In the best case, where the probability of discovering the PIN irrespective of the storage scheme is negligible in relation to directly uncovering it, the increase in security is over 1000%.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号