首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 609 毫秒
1.
杨燕  谭成翔 《计算机工程》2008,34(6):124-126
针对当前基于无线网络的短消息系统的一系列不安全的因素(如数据包被窃取、截获及丢失),提出基于GSM Modem设备的安全短消息系统,引入安全短消息协议,利用证书以及安全认证因子两种方式对手机终端和安全短信网关进行安全认证,调用加解密算法对短消息数据包进行加密传输。研究表明,安全互认证和包加密这2种方式对短消息系统安全是必要的。  相似文献   

2.
针对当前基于无线网络的短消息系统的一系列不安全的因素(如数据包被窃取、截获及丢失),提出基于CPK的加密短消息系统,引入加密短消息工作过程,利用椭圆曲线ECC加密算法实现对短消息数据包进行加密传输。系统有效地解决了多点通信过程中密钥管理问题。  相似文献   

3.
该文针对当前短消息系统的明文传输方式带来的一系列不安全因素(如数据包被窃取、篡改等),提出基于IPSec VPN的安全短消息系统.将IPSec VPN的安全机制引入短消息系统,研究表明此方法对提高短消息系统的安全性是必要的.  相似文献   

4.
基于XML的短消息增值服务系统   总被引:5,自引:0,他引:5  
短消息增值服务的应用很多,但研究和开发还停留在比较低的水平,复用性和灵活性差。该文提出了以XML描述短消息增值服务的方法,并在此基础上构建出新的短消息增值服务系统。基于XML的短消息增值服务系统具有扩展性好,方便管理维护的特点。  相似文献   

5.
使用面向对象方法设计短消息服务平台系统   总被引:4,自引:0,他引:4  
通过分析短消息系统基本工作流程,在研究GSM短消息协议各层提供的服务及处理过程的同时,用面向对象方法对短消息基本信息服务功能进行了设计说明,然后对信息资源站实体与短消息中心之间的通信方式进行了详细的分析。  相似文献   

6.
随着短消息服务的广泛应用,文中用VB6.0开发了一个短消息控件。此控件可以实现终端(通过串口)自动发送短消息、接收短消息、短消息群发等功能,可以嵌入到各种应用系统中,方便用户进行二次开发。介绍了如何用计算机实现短消息收发的关键技术,主要是串口实现通讯的方法。在此基础上,介绍了实现短消息控件的设计过程以及此短消息控件的基本功能。  相似文献   

7.
移动增值业务从最开始提供数据业务到后来提供短消息、提供语音增值服务一直到现在提供手机的浏览、多媒体邮件、包括下载类的应用以至于现在开始尝试流媒体业务。无线数据业务发展越来越多,像短信服务2005年1-7月份已经达到了760亿条。WAP浏览也达到了2200万次/月。应用主要是以铃声、即时通讯等。联通今年新开展的炫铃业务也是增长很快的,还有掌中宽带,可以看出大家对无线上网的需求也是高速增长。但安全问题也随之而来,为了解决这些安全问题,联通从几大方面进行了考虑。  相似文献   

8.
基于SMS和LonWorks的桥梁健康远程监测系统   总被引:3,自引:0,他引:3  
桥梁健康监测是保障桥梁安全的重要措施,也是近年来国内外工程界和学术界研究的热点之一,提出一种新颖的基于SMS(短消息服务)和LonWorks的桥梁健康远程监测系统的设计.针对桥梁健康监测系统在实际中的应用需求,侧重讨论了桥梁健康监测系统中无线远程监测的设计与实现.  相似文献   

9.
如果恰好手头没有电脑,又有重要的邮件到达怎么办呢?其实,只要您有一部手机就可以自由收发电子邮件了。用手机收发邮件其实也是手机短信息的一种应用,但这种应用由于使用频率较高,而且还比较实用,因此许多用户都想通过手机,做到随时收发电子邮件的目的。下面是具体的操作步骤: 1、首先单击手机的功能键,进入功能界面,在该界面中选择“短消息”或“信箱”命令;开通手机短消息服务(免费开通);  相似文献   

10.
J2ME是SUN公司为了把Java应用于移动通信设备和嵌入式设备而推出的一项技术,也是目前移动通信运营商在部署3G移动增值服务时的首选技术。论述了采用J2ME和西门子移动开发工具包6688i设计开发短消息管理系统的方法和过程,通过12个操作类实现了短消息分组、短消息列表以及短消息内容编辑等短消息管理功能。  相似文献   

11.
Unmanned Aircraft Systems (UAS) emerge as a viable, operational technology for potential civil and commercial applications in the National Airspace System (NAS). Although this new type of aircraft presents great potential, it also introduces the need for a thorough inquiry into its safety impact on the NAS. This study presents a systems-level approach to analyze the safety impact of introducing a new technology, such as UAS, into the NAS. Utilizing Safety Management Systems (SMS) principles and existing regulatory structure, this paper outlines a methodology to determine a mandatory minimum safety baseline for conducting safe operations in the NAS. In this context, a proof-of-concept study, which applies the proposed framework to Federal Aviation Regulations, is presented to demonstrate the feasibility of the methodology at a systems-level.  相似文献   

12.
SMS在远程监控系统中的应用   总被引:2,自引:1,他引:1  
移动通信网络技术已得到越来越多的系统运营商和系统开发商的重视,以移动网络作为数据无线传输接收网络,以短信作为数据无线传输工具,可以开发出多种前景极其乐观的各类应用。本文主要介绍了SMS在远程监控系统中的应用,并详细讨论了通信模块AT命令和微机(单片机)控制通信模块Q2403A收发短信的方法。  相似文献   

13.
Since the first SMS (Short Message Services) message was sent in the UK in 1992, the SMS has become a mass communication tool and has been broadly used in mobile business applications. But the security issue of the SMS has often been considered as a crucial barrier to its application in many fields that need strong authentication and confidentiality, such as mobile-commerce. The Subscriber Identity Module (SIM) inside mobile phones is a tamper resistant device which contains strong authentication mechanism and has been used in remote user authentication system, e.g. WIM1 card in Wireless Application Protocol (WAP). In this contribution, we design and realize a secure SIM card, named PK-SIM card, which is a standard SIM card with additional PKI functionality; based on the PK-SIM card, we present a security framework offering solutions for the development of secure mobile business applications using SMS as bearer. The security framework consists of a client device, in which a PK-SIM card is used to store security credentials, a Secure Access Gateway (SAG) which is used to receive and send secure SMS messages, a trusted third-party, Certification Authority (CA), which provides a public-key certification service and a Mobile Operator which provides the communication infrastructure for the SMS. Then we propose an authentication and session key distribution protocol which provides end-to-end security between the PK-SIM card and the SAG, and give a formal security analysis to the proposed protocol based on BAN authentication logic2. Lastly, we provide a typical application of the security framework in Mobile Police Information System. The evaluations of the system have proved that the security framework is suitable for actual needs both in speed and security.  相似文献   

14.
Nowadays, the SMS is a very popular communication channel for numerous value added services (VAS), business and commercial applications. Hence, the security of SMS is the most important aspect in such applications. Recently, the researchers have proposed approaches to provide end-to-end security for SMS during its transmission over the network. Thus, in this direction, many SMS-based frameworks and protocols like Marko's SMS framework, Songyang's SMS framework, Alfredo's SMS framework, SSMS protocol, and, Marko and Konstantin's protocol have been proposed but these frameworks/protocols do not justify themselves in terms of security analysis, communication and computation overheads, prevention from various threats and attacks, and the bandwidth utilization of these protocols. The two protocols SMSSec and PK-SIM have also been proposed to provide end-to-end security and seem to be little better in terms of security analysis as compared to the protocols/framework mentioned above. In this paper, we propose a new secure and optimal protocol called SecureSMS, which generates less communication and computation overheads. We also discuss the possible threats and attacks in the paper and provide the justified prevention against them. The proposed protocol is also better than the above two protocols in terms of the bandwidth utilization. On an average the SecureSMS protocol reduces 71% and 59% of the total bandwidth used in the authentication process as compared to the SMSSec and PK-SIM protocols respectively. Apart from this, the paper also proposes a scheme to store and implement the cryptographic algorithms onto the SIM card. The proposed scheme provides end-to-end SMS security with authentication (by the SecureSMS protocol), confidentiality (by encryption AES/Blowfish; preferred AES-CTR), integrity (SHA1/MD5; preferred SHA1) and non-repudiation (ECDSA/DSA; preferred ECDSA).  相似文献   

15.
移动环境下的垃圾短信过滤系统的研究   总被引:6,自引:0,他引:6  
邓维维  彭宏 《计算机应用》2007,27(1):221-224
提出了一种分布式的垃圾短信过滤系统,它适合于移动网络,具有自学习能力,能够及时发现垃圾信息源,有效的过滤垃圾短信。在传统以词为属性的贝叶斯过滤算法的基础上,加入了规则和长度信息,利用互信息减小单词属性的个数。实验表明,它在短信过滤方面具有空间占用小和性能更好的特点,适合在移动电话上使用。同时还提出了一种垃圾短信发送者的可能性排名的方法。  相似文献   

16.
Android平台基于MQTT协议的推送机制   总被引:2,自引:0,他引:2  
Android平台的迅速崛起对消息推送技术提出了更严峻的挑战.传统的推送通知方式主要有Polling,SMSPush,IP Push三种,但对Android平台上的应用来说,这些推送方式都有各自的短板.针对该情况,首先对Android平台上几种推送机制进行了分析,之后着重对基于MQTT协议的推送机制进行研究,最后借助IBM提供的开源工具Mosquitto通过编码加以实现.经实验测试,证明基于MQTT协议的推送机制效率高,功耗低,可以稳定地用于Android平台上的应用.  相似文献   

17.
The problem of spam short message (SMS) recognition involves many aspects of natural language processing. A good solution to solving the problem can not only improve the quality of people experiencing the mobile life, but also has a positive role on promoting the analysis of short text occurring in current mobile applications, such as Webchat and microblog. As spam SMSes have characteristics of sparsity, transformation and real-timedness, we propose three methods at different levels, i.e., recognition based on symbolic features, recognition based on text similarity, and recognition based on pattern matching. By combining these methods, we obtain a multi-level approach to spam SMS recognition. In order to enrich the pattern base to reduce manual labor and time, we propose a quasi-pattern learning method, which utilizes quasi-pattern matching results in the pattern matching process. The method can learn many interesting and new patterns from the SMS corpus. Finally, a comprehensive analysis indicates that our spam SMS recognition approach achieves a precision rate as high as 95.18%, and a recall rate of 95.51%.  相似文献   

18.
权限管理是保证数据安全的必要条件。本文在介绍基于角色的权限控制模型的基础上,通过分析SMS的安全需求,提出了一种基于RBAC的网络环境下的SMS权限控制方法,实现了安全的权限控制,取得了较好的效果。文中详细介绍了系统权限控制的设计与实现。  相似文献   

19.
基于Petri网的柔性制造系统一种预防死锁方法   总被引:3,自引:0,他引:3  
基于Petri网的结构特性分析,研究了FMS(柔性制造系统)一种预防死锁方法.提出了 Petri网的一种特殊拓扑结构--基本信标的概念.在Petri网中基本信标的集合是SMS(严格极 小信标)集合的一个真子集.尤其在大型Petri网系统中,基本信标的集合比SMS的集合要小得 多.对于Petri网的一个子类S3PR,只对每一个基本信标添加一个库所使其不被清空,就可实现 预防死锁,也就是说无须控制S3PR的所有SMS而达到无信标被清空的目的.此外,对于S3PR, 还提出了一种求取SMS和基本信标的方法.相对于现在普遍采用的控制所有SMS来预防死锁 的策略,其具三方面优势.1)只需控制少量的SMS即所谓的基本信标.相应地,添加少量的控制 库所和连接弧,就可得到无死锁或活的Petri网.2)不需要先行计算出极小信标的集合.3)明显 地,这种方法更适合大型Petri网系统.我们通过穿插在文中的一个例子来说明这些方法.  相似文献   

20.
移动通信安全是移动电子政务与移动电子商务正常运行的前提,也是一般移动应用大规模开展的前提。移动通信提供的业务有多种,在不被信任的移动通信网络中实现安全通信需要根据不同的业务作出不同的选择,实现特定业务的安全通信有着十分重要的现实意义。文中针对短消息在移动警务系统中的具体应用,设计了一个安全的短信通信系统。首先根据移动警务系统的安全需求,根据现有移动通信业务及其短信业务的安全需要,选择短信作为系统的实施平台,给出了安全短信通信系统的总体结构,并简单介绍了与系统实现相关的技术;然后论述了系统中移动安全通信终端的设计,重点讨论了移动终端采用的安全技术与特点;最后就认证与安全服务器的功能设计进行了简单的讨论。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号