| In recent years, with the popularity of the Internet, the research of the information security in the computer network gets very great development. However, the information security in wired networks is distinguishes with the information security in wireless network. Study the security of wireless network has become the significant subject in the high popularity of mobile communication today.According to the deep analysis of ECC, the paper discusses the implementation technology and process of ECC based on finite fields. The ECC algorithm has an advantage over RSA, because RSA fails under small decryption exponent attack and it is slower. And tt can support various security services, including key exchange, digital signature, identification and message authentication. Compared with RSA and DSA, it is more secure and is easier to implement. It is more suitable for network communication, intelligent card and wireless communication.The platform independent property of J2ME technology makes it is the top choice of wireless development platform for many years. At the same time, the wonderful design of security makes the applications based on J2ME have the incomparable security feature. So, with the development of mobile equipment and improvement of computing capability, the application prospect of J2ME would be wider. The fat client based of J2ME would be the developing direction of the industry too.According the implementation of ECC based on J2ME platform, the paper discusses the various security services, including key exchange, digital signature, identification and message authentication supported by the ECC algorithm. Meanwhile, propose a secure communication platform and independent CA centre to the mobile e-business, which offered both client authentication and server authentication, dispelled the potential security holes in the electronic trade such as disguising and denying, strengthened the security of communication greatly. |