Security Studies and Implementation on Power Mobile Application in the Internet plus Environment
- https://doi.org/10.2991/icsmim-15.2016.87How to use a DOI?
- Secure access System; encryption card; public key infrastructure; two-factor authentication
Analyze the security risks of traditional power mobile operating system, design and implement a more secure access system and analyze the overall structure and function of the secure access system in detail in the Internet plus environment. The system can process two-way certificate authentication, secure transmission of data, security access control, network isolation and secure data filtering, real-time monitoring and management, and solve the security problem of mobile power operation applications effectively.
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Zaojian Dai AU - Zhipeng Shao AU - Mu Chen PY - 2016/01 DA - 2016/01 TI - Security Studies and Implementation on Power Mobile Application in the Internet plus Environment BT - Proceedings of the 2015 4th International Conference on Sensors, Measurement and Intelligent Materials PB - Atlantis Press SP - 470 EP - 473 SN - 2352-538X UR - https://doi.org/10.2991/icsmim-15.2016.87 DO - https://doi.org/10.2991/icsmim-15.2016.87 ID - Dai2016/01 ER -