Font Size: a A A

Design And Implementation Of Mobile IT Emergency Disposal Based On Security Access Control

Posted on:2014-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z G YangFull Text:PDF
GTID:2322330482452534Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Since the "11th five-year plan",the informatization of electric power enterprise developed rapidly, information system has become an important tool in production, marketing, management and other fields. As the requirements for power supply service quality and working efficiency improved,there is a higher requirement for the business system continuity and running quality in the enterprise, and a challenge in real-time monitoring, accurate schedule and timely maintenance. At present, the operations staff cannot learn the running condition of the business systems out of the daily 8 hours working time.In case of emergency, the operations staff cannot go to the scene to repair in time.lt cannot meet the demand of electric power enterprise business system operational continuity in emergency response time. So,we must create a convenient, fast, real-time, remote operations system to get the running condition of the business systems for carrying out the repair timely.This paper mainly introduces the development process of mobile IT emergency disposal system using intelligent mobile terminals such as mobile phone, PAD to realize the data interaction between the business systems in the enterprise. The system is based on security access control technology, using C/S structure, consists of two parts, mobile phone client and server. It is through accessing security access gateway, authentication server, data exchange servers and other hardware devices to realize security authentication and the data exchange between the client and the server through the APN. This paper first introduces the project background, system construction goal and research topic, as well as the paper structure arrangement are presented. And then, the designs of the overall system architecture, security access architecture, database table structure and API architecture are given. In the part of system implementation, it focuses on introducing the implementation of security access between mobile terminal and gateway server, mobile terminal and the company intranet server, expounds the necessity of PKI, SSL VPN and CKBAC technology and gives the methods how the technologies above are used in system. It has achieved expected effect of system security access, data security encryption, equipment security control.Finally, through using the professional test software, we test the mobile terminal and server load, MD5 and BASE64 encryption and the security risks of SSL and SSH access. The results showed that this system can operate normally, and meet the requirements of equipment performance, data encryption and security access, in the expected load cases.
Keywords/Search Tags:information system, emergency disposal, intelligent mobile terminals, security access, PKI, SSL VPN, remote control
PDF Full Text Request
Related items