The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 96 === Due to wireless network infrastructure matures, the wireless network substantial increase while in the value of business applications, it will be one of the consumer''s main types of payment in the future. In the development of mobile devices, portabil...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09278855987151759021 |
id |
ndltd-TW-096CYUT5396042 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096CYUT53960422015-11-27T04:04:14Z http://ndltd.ncl.edu.tw/handle/09278855987151759021 The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash 以簡訊與雜湊實作一次性密碼機制之行動身分認證機制 Sing-Hung Luh 盧信宏 碩士 朝陽科技大學 資訊管理系碩士班 96 Due to wireless network infrastructure matures, the wireless network substantial increase while in the value of business applications, it will be one of the consumer''s main types of payment in the future. In the development of mobile devices, portability, performance and bandwidth restrictions have been breakthrough progress on the mobile device with additional functionality. In business applications demand driven, physical network transfer to a wireless network platform step by step. In view of the mobile device to provide diversified services to mobile devices transactions, the verification of security at present, it is needs to purchase entity of equipment the extra confirmation to recognize the status, or importation of complex information. But these complicated solutions will let user give up of inertia, and do not care about the safety. It is imperative for us that how to recognize the other side status in wireless Internet framework. Our method can recognize remote authentication and without the acquisition of additional verify equipments. According certification of mobile devices, GSM Short Message Services, Web Services, and business information systems that transfer in different protocol, It can be avoided theft of information, man in the middle attacks, phishing sites, and other threats. The research of the integrated security trading system is fit to the identification and security. The experiment result prove, the proposed method is really effective enhance the security of transactions system. Rung-Ching Chen 陳榮靜 2008 學位論文 ; thesis 71 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 96 === Due to wireless network infrastructure matures, the wireless network substantial increase while in the value of business applications, it will be one of the consumer''s main types of payment in the future. In the development of mobile devices, portability, performance and bandwidth restrictions have been breakthrough progress on the mobile device with additional functionality. In business applications demand driven, physical network transfer to a wireless network platform step by step. In view of the mobile device to provide diversified services to mobile devices transactions, the verification of security at present, it is needs to purchase entity of equipment the extra confirmation to recognize the status, or importation of complex information. But these complicated solutions will let user give up of inertia, and do not care about the safety. It is imperative for us that how to recognize the other side status in wireless Internet framework. Our method can recognize remote authentication and without the acquisition of additional verify equipments. According certification of mobile devices, GSM Short Message Services, Web Services, and business information systems that transfer in different protocol, It can be avoided theft of information, man in the middle attacks, phishing sites, and other threats. The research of the integrated security trading system is fit to the identification and security. The experiment result prove, the proposed method is really effective enhance the security of transactions system.
|
author2 |
Rung-Ching Chen |
author_facet |
Rung-Ching Chen Sing-Hung Luh 盧信宏 |
author |
Sing-Hung Luh 盧信宏 |
spellingShingle |
Sing-Hung Luh 盧信宏 The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash |
author_sort |
Sing-Hung Luh |
title |
The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash |
title_short |
The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash |
title_full |
The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash |
title_fullStr |
The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash |
title_full_unstemmed |
The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash |
title_sort |
implementation of one-time password’s mobile devices based on sms and hash |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/09278855987151759021 |
work_keys_str_mv |
AT singhungluh theimplementationofonetimepasswordsmobiledevicesbasedonsmsandhash AT lúxìnhóng theimplementationofonetimepasswordsmobiledevicesbasedonsmsandhash AT singhungluh yǐjiǎnxùnyǔzácòushízuòyīcìxìngmìmǎjīzhìzhīxíngdòngshēnfēnrènzhèngjīzhì AT lúxìnhóng yǐjiǎnxùnyǔzácòushízuòyīcìxìngmìmǎjīzhìzhīxíngdòngshēnfēnrènzhèngjīzhì AT singhungluh implementationofonetimepasswordsmobiledevicesbasedonsmsandhash AT lúxìnhóng implementationofonetimepasswordsmobiledevicesbasedonsmsandhash |
_version_ |
1718137308803235840 |