The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash

碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 96 === Due to wireless network infrastructure matures, the wireless network substantial increase while in the value of business applications, it will be one of the consumer''s main types of payment in the future. In the development of mobile devices, portabil...

Full description

Bibliographic Details
Main Authors: Sing-Hung Luh, 盧信宏
Other Authors: Rung-Ching Chen
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/09278855987151759021
id ndltd-TW-096CYUT5396042
record_format oai_dc
spelling ndltd-TW-096CYUT53960422015-11-27T04:04:14Z http://ndltd.ncl.edu.tw/handle/09278855987151759021 The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash 以簡訊與雜湊實作一次性密碼機制之行動身分認證機制 Sing-Hung Luh 盧信宏 碩士 朝陽科技大學 資訊管理系碩士班 96 Due to wireless network infrastructure matures, the wireless network substantial increase while in the value of business applications, it will be one of the consumer''s main types of payment in the future. In the development of mobile devices, portability, performance and bandwidth restrictions have been breakthrough progress on the mobile device with additional functionality. In business applications demand driven, physical network transfer to a wireless network platform step by step. In view of the mobile device to provide diversified services to mobile devices transactions, the verification of security at present, it is needs to purchase entity of equipment the extra confirmation to recognize the status, or importation of complex information. But these complicated solutions will let user give up of inertia, and do not care about the safety. It is imperative for us that how to recognize the other side status in wireless Internet framework. Our method can recognize remote authentication and without the acquisition of additional verify equipments. According certification of mobile devices, GSM Short Message Services, Web Services, and business information systems that transfer in different protocol, It can be avoided theft of information, man in the middle attacks, phishing sites, and other threats. The research of the integrated security trading system is fit to the identification and security. The experiment result prove, the proposed method is really effective enhance the security of transactions system. Rung-Ching Chen 陳榮靜 2008 學位論文 ; thesis 71 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 96 === Due to wireless network infrastructure matures, the wireless network substantial increase while in the value of business applications, it will be one of the consumer''s main types of payment in the future. In the development of mobile devices, portability, performance and bandwidth restrictions have been breakthrough progress on the mobile device with additional functionality. In business applications demand driven, physical network transfer to a wireless network platform step by step. In view of the mobile device to provide diversified services to mobile devices transactions, the verification of security at present, it is needs to purchase entity of equipment the extra confirmation to recognize the status, or importation of complex information. But these complicated solutions will let user give up of inertia, and do not care about the safety. It is imperative for us that how to recognize the other side status in wireless Internet framework. Our method can recognize remote authentication and without the acquisition of additional verify equipments. According certification of mobile devices, GSM Short Message Services, Web Services, and business information systems that transfer in different protocol, It can be avoided theft of information, man in the middle attacks, phishing sites, and other threats. The research of the integrated security trading system is fit to the identification and security. The experiment result prove, the proposed method is really effective enhance the security of transactions system.
author2 Rung-Ching Chen
author_facet Rung-Ching Chen
Sing-Hung Luh
盧信宏
author Sing-Hung Luh
盧信宏
spellingShingle Sing-Hung Luh
盧信宏
The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
author_sort Sing-Hung Luh
title The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
title_short The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
title_full The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
title_fullStr The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
title_full_unstemmed The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
title_sort implementation of one-time password’s mobile devices based on sms and hash
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/09278855987151759021
work_keys_str_mv AT singhungluh theimplementationofonetimepasswordsmobiledevicesbasedonsmsandhash
AT lúxìnhóng theimplementationofonetimepasswordsmobiledevicesbasedonsmsandhash
AT singhungluh yǐjiǎnxùnyǔzácòushízuòyīcìxìngmìmǎjīzhìzhīxíngdòngshēnfēnrènzhèngjīzhì
AT lúxìnhóng yǐjiǎnxùnyǔzácòushízuòyīcìxìngmìmǎjīzhìzhīxíngdòngshēnfēnrènzhèngjīzhì
AT singhungluh implementationofonetimepasswordsmobiledevicesbasedonsmsandhash
AT lúxìnhóng implementationofonetimepasswordsmobiledevicesbasedonsmsandhash
_version_ 1718137308803235840