首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
近场通信(NFC)已成为无线终端的标配功能,工作范围小、抗干扰性和安全性较高的特性使其被广泛应用于终端的移动支付和虚拟卡片等领域。由于近场天线产生的感应磁场会在临近的金属上耦合出反向涡流,并且金属屏蔽物覆盖会降低收发天线间的磁场耦合,紧凑终端中的电池、主板、外壳等金属元件将大幅影响NFC天线性能。本文从近场通信的历史、标准、系统结构出发,以终端NFC天线工作环境中的金属覆盖情况作为分类依据,对终端近场通信天线的研究进展进行了简要介绍。  相似文献   

2.
支持移动多媒体服务中间件的体系结构   总被引:1,自引:0,他引:1  
各种无线网与Internet,PSDN的集成,使移动的多媒体应用越来越受人们欢迎。由此阐述了支持基于下一代移动多媒体服务中间件的体系结构及可能提供的服务。  相似文献   

3.
为了提高NFC技术的安全性,针对Android平台NFC应用进行NDEF协议漏洞挖掘研究,提出了一种基于Fuzzing技术的测试方法。该方法采用手工、生成和变异3种策略构造测试用例,使用报文逆向分析和嗅探2种手段辅助分析并构造报文;然后,利用构造的测试用例对NFC应用目标进行漏洞挖掘并输出结果。根据该方法,开发了一个NFC应用安全漏洞挖掘系统ANDEFVulFinder,采用logcat和进程监控的手段在漏洞挖掘过程中对目标进行监测,并通过模拟标签和触碰操作实现漏洞挖掘过程自动化。最后,通过测试MIUI系统和6个应用,发现了8个漏洞,结果表明了漏洞挖掘方法的有效性。  相似文献   

4.
近场无线通信(NFC)是一种已经被广泛应用的短距无线通信技术.其中最常见的是将NFC技术应用于移动支付和门禁访问控制等应用.从技术上讲,这些应用利用NFC模拟卡模式将NFC设备模拟成银行卡或门禁卡,然后等待外部阅读器验证.在这类应用场景下,选取合适的安全认证方案是非常重要的.首先,介绍了现有的NFC认证系统和安全方案并分析了系统安全需求和潜在的安全风险.然后,采用Hash、AES和口令Key动态更新机制,提出了一种适用于NFC移动设备的双向认证安全方案,并设计了自同步机制.最后,利用GNY逻辑以形式化证明的形式证明了方案的安全性,分析表明该方案能解决伪造、重放攻击、窃听、篡改、异步攻击等安全问题.  相似文献   

5.
移动业务应用中手机地位的演进   总被引:1,自引:0,他引:1  
手机已经成为移动通信市场关注的焦点.在移动业务开发过程中,手机的地位和作用不断增强;在移动开放业务标准中,手机终端的地位和作用也逐步得到强化.业务应用能力成为手机规划设计中越来越重要的指标.同时,手机终端规划设计面临着思维的转变,集中体现在各个业务应用过程中将更多的业务环节直接放在手机终端运行,从而缩短业务开发时间并提高业务的客户体验.  相似文献   

6.
An increasing number of distributed applications will be written for mobilehosts, such as laptop computers, third generation mobile phones, personaldigital assistants, watches and the like. Application engineers have to dealwith a new set of problems caused by mobility, such as low bandwidth, contextchanges or loss of connectivity. During disconnection, users will typicallyupdate local replicas of shared data independently from each other. Theresulting inconsistent replicas need to be reconciled upon re-connection. Tosupport building mobile applications that use both replication andreconciliation over ad-hoc networks, we have designed xmiddle, a mobilecomputing middleware. In this paper we describe xmiddle and show how it usesreflection capabilities to allow application engineers to influencereplication and reconciliation techniques. xmiddle enables the transparentsharing of XML documents across heterogeneous mobile hosts, allowing on-lineand off-line access to data. We describe xmiddle using a collaborativee-shopping case study on mobile clients.  相似文献   

7.
As the technology of mobile devices spreads fast, the price of mobile devices is getting cheaper. Most of the people have mobile devices, and these devices have the technology of near field communication (NFC). With the long time development and research, the mobile devices use NFC technology on the payment and authentication applications, and replace the smartcard, the access control card, and the credit card by using the card emulation mode. It helps the development of NFC applications. In recent years, more and more users begin using NFC technology on mobile payment and authentication. Many researches have proposed the related NFC authentication protocols, but their schemes are still lack of some security properties and functions, which are necessary for NFC authentication protocols. In this paper, we propose a secure and efficient NFC authentication scheme between two NFC devices by the help of the authentication server that provides mutual authentication.  相似文献   

8.
主要介绍中间件的种类、分布式体系结构、技术特点、工作机理及其应用。描述了中间件在优化移动服务网体系结构等方面的作用,重点阐述了移动服务网中几个子系统,如何采用中间件合理实现三层体系架构,探讨了采用中间件技术实现移动服务网扩展性的方式。  相似文献   

9.
胡星波  晏渭川 《电视技术》2011,35(21):84-88
近距离无线通信(NFC)是一种简单的、非触控式的互联技术,在电子消费领域有着广泛的应用。Android是当前最流行的开源移动设备操作系统,NFC技术和Android结合,可以极大促进双方的发展。重点研究了NFC在Android上的实现架构,详细描述了关键点的实现技术,并给出了实际测试结果。  相似文献   

10.
With the development of wireless network, many people want to carry out commerce activity because of its convenience and mobility. It is necessary to build high efficiency and collaborative transaction system due to high delay and burst error in wireless network. Unfortunately, it is difficult for traditional technology to achieve high efficiency in low bandwidth network and new technology is expected. Large analysis of collaborative commerce system shows that there are some common design elem…  相似文献   

11.
Two waves of technology are dramatically changing daily life: cloud computing and mobile phones. New cloud computing services such as webmail and content rich data search have emerged. However, in order to use these services, a mobile phone must be able to run new applications and handle high network bandwidth. Worldwide, about 3.45 billion mobile phones are low end phones;they have low bandwidth and cannot run new applications. Because of this technology gap, most mobile users are unable to experience cloud computing services with their thumbs. In this paper, a novel platform, Thumb-in-Cloud, is proposed to bridge this gap.Thumb-in-Cloud consists of two subsystems: Thumb-Machine and Thumb-Gateways. Thumb-Machine is a virtual machine built into a low end phone to enable it to run new applications. Thumb-Gateways can tailor cloud computing services by reformatting and compressing the service to fit the phone' s profile.  相似文献   

12.
施涛  王琼 《数字通信》2009,36(1):90-92
简述了移动手机支付的基本概念和RFID的工作原理及技术应用的基本原理,分析了RFID技术在手机支付领域的应用前景和制约因素。针对目前RFID技术应用的发展制约因素和瓶颈,从信息产业与传统产业相结合、手机支付的安全性、手机信用体系及手机支付产业链等方面作为切入点提出相关的解决方法。  相似文献   

13.
RFID技术在手机支付领域中的应用   总被引:1,自引:0,他引:1  
王琼  施涛 《电子测试》2009,(6):49-52
随着无线通信技术的快速发展,手机支付作为第三方电子支付手段的市场空间正在迅速扩大。RFID技术作为手机支付的核心,本文简述了移动手机支付的基本概念,RFID的工作原理,功能及技术应用的基本原理,分析了RFID技术在手机支付领域的应用前景和制约因素,并针对RFID技术在手机支付发展领域的广阔前景,从加强信息产业与传统产业相结合,完善手机支付的安全性,健全手机支付信用体系及协调手机支付产业链等方面提出相关方法建议来促进手机支付的快速发展。  相似文献   

14.
Mobile Commerce: Framework,Applications and Networking Support   总被引:16,自引:2,他引:14  
Advances in e-commerce have resulted in significant progress towards strategies, requirements, and development of e-commerce applications. However, nearly all e-commerce applications envisioned and developed so far assume fixed or stationary users with wired infrastructure. We envision many new e-commerce applications that will be possible and significantly benefit from emerging wireless and mobile networks. To allow designers, developers, and researchers to strategize and create mobile commerce applications, we propose a four-level integrated framework for mobile commerce. Since there are potentially an unlimited number of mobile commerce applications, we attempt to identify several important classes of applications such as mobile financial applications, mobile inventory management, proactive service management, product location and search, and wireless re-engineering. We discuss how to successfully define, architect, and implement the necessary hardware/software infrastructure in support of mobile commerce. Also, to make mobile commerce applications a reality, we address networking requirements, discuss support from wireless carriers, and present some open research problems.  相似文献   

15.
This paper introduces an adaptive cache proxy to improve the performance of web access in soft real-time applications. It consists of client proxies and cooperative proxy servers with a server-side pushing schema. The large amount of heterogeneous data will be stored in the proxy servers and delivered to clients through computer networks to reduce the response time and network traffic. The adaptive proxy pre-fetches and replaces heterogeneous data dynamically in consideration of networks cost, data size, data change rate, etc. The simulation results show that the modified LUV algorithm has better performance in terms of hit rate, byte hit rate, and delay saving rate. With the cooperative proxy caching, it is shown that the performance of the proxy caching system is more predictable even if the proxies need to deal with a variety of data. The modified adaptive TTL algorithm has better performance in terms of the combination of temporal coherency and system overheads.
Zhubin ZhangEmail:
  相似文献   

16.
NFC,英文全称是Near Field Communication,它是指近距离无线通信,允许多个电子设备之间进行简单而安全的双向交互.与蓝牙类似,可满足无线连接需求,被广泛应用到了手机产品开发中.而在手机NFC技术实际推广时,为了保证近场通信环境质量和安全,应做好NFC技术的测试工作,更好的发挥其技术优势.本文,首先分析了NFC技术的原理.然后,阐述了NFC手机实现方案.最后,总结了NFC技术的具体测试方法.  相似文献   

17.
Bagrodia  Rajive  Phan  Thomas  Guy  Richard 《Wireless Networks》2003,9(4):311-320
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying platforms. In previous work we have used middleware to perform a new capability, application session handoff, using a single Middleware Server to provide all functionality. However, to improve the scalability of our architecture, we have designed an efficient distributed Middleware Service layer that properly maintains application session handoff semantics while being able to service a large number of clients. We show that this service layer improves the scalability of general client-to-application server interaction as well as the specific case of application session handoff. We detail protocols involved in performing handoff and analyse an implementation of the architecture that supports the use of a real medical teaching tool. From experimental results it can be seen that our Middleware Service effectively provides scalability as a response to increased workload.  相似文献   

18.
文章涉及生活用品技术领域,具体论述了一种防丢卡套,包括卡套主体和设在卡套主体上的防丢器,卡套主体设有一个开口端。防丢器包括由电路连接的蓝牙4.0模块、蜂鸣器、开关和电源。本防丢卡套将智能防丢器的功能与传统卡套相结合,根据使用者不同的使用需求可以实现防丢卡套功能以及便携定位器的功能。同时,该防丢卡套超低功耗,待机时间长达3~5个月,而且具有如NFC能量收集等新功能,可有效延长电池的寿命,无需频繁更换电池,节能环保,实用性强,为防丢器设备的研究提供技术支持。  相似文献   

19.
随着Internet的飞速发展,Web流量迅速增加,高速缓存成为减少用户等待时间和减少网络冗余流量传输的首要技术.随着网上越来越多的图像、音频和视频内容的出现,终端用户对带宽的要求不断增长,卫星以其覆盖面广、带宽高的特点承载了越来越多的Internet业务.本文介绍高速缓存技术的原理和应用,并结合卫星Internet的特点引入一种结合高速缓存的卫星分发系统.  相似文献   

20.
张强 《世界电信》2003,16(3):21-23
欺诈每年都给电信行业带来巨额损失。3G由于其自身的特点和提供的服务的特点,将会面临电信欺诈的巨大威胁。从目前看,尽管3G将会面临各种欺诈风险,但最可能最普遍的是盗窃SIM卡和终端,并采用多种欺诈入网的方式来购买和转售网上商品。运营商应当严格控制销售流程,并建立行之有效的反欺诈管理系统。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号