{"title":"基于ssl的微应用终端接入权限认证方法","authors":"Fengjuan Ma, Dawei Song","doi":"10.1109/TOCS53301.2021.9688741","DOIUrl":null,"url":null,"abstract":"In today's society, consumer online consumption, online payment between merchants and other business operation models are developing rapidly, and are gradually changing people's lives and work. However, due to the openness of the Internet itself, the security problems brought by it have become a serious problem for Internet-based e-commerce activities and become an important factor hindering e-commerce. At present, the main solution to the security problems of e-commerce activities is based on SSLP and SETP micro-application terminals. This article is mainly based on the analysis of SSLProtocol to design a solution for micro-application terminal access authorization authentication. The mainstream security technology architecture is mainly divided into five levels: network services, encryption technology, security certification, security protocol and system applications. The network service layer is at the first layer. It is mainly responsible for network monitoring and scanning, virus prevention, network intrusion detection and acting as a firewall. The second layer is the encryption layer, and the main encryption methods are symmetric encryption and asymmetric encryption. Each of these five-layer structures is related, and the security protocol is mainly SSLProtocol. Experimental conclusion: This experiment is mainly to use the sslProtocol plan to improve the security performance of e-commerce by more than 50%, make full use of the advantages of Protocol, ensure consumer safety, and improve a healthy and safe network environment.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SSLP-Based Micro-Application Terminal Access Authority Authentication Method\",\"authors\":\"Fengjuan Ma, Dawei Song\",\"doi\":\"10.1109/TOCS53301.2021.9688741\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's society, consumer online consumption, online payment between merchants and other business operation models are developing rapidly, and are gradually changing people's lives and work. However, due to the openness of the Internet itself, the security problems brought by it have become a serious problem for Internet-based e-commerce activities and become an important factor hindering e-commerce. At present, the main solution to the security problems of e-commerce activities is based on SSLP and SETP micro-application terminals. This article is mainly based on the analysis of SSLProtocol to design a solution for micro-application terminal access authorization authentication. The mainstream security technology architecture is mainly divided into five levels: network services, encryption technology, security certification, security protocol and system applications. The network service layer is at the first layer. It is mainly responsible for network monitoring and scanning, virus prevention, network intrusion detection and acting as a firewall. The second layer is the encryption layer, and the main encryption methods are symmetric encryption and asymmetric encryption. Each of these five-layer structures is related, and the security protocol is mainly SSLProtocol. Experimental conclusion: This experiment is mainly to use the sslProtocol plan to improve the security performance of e-commerce by more than 50%, make full use of the advantages of Protocol, ensure consumer safety, and improve a healthy and safe network environment.\",\"PeriodicalId\":360004,\"journal\":{\"name\":\"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TOCS53301.2021.9688741\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TOCS53301.2021.9688741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In today's society, consumer online consumption, online payment between merchants and other business operation models are developing rapidly, and are gradually changing people's lives and work. However, due to the openness of the Internet itself, the security problems brought by it have become a serious problem for Internet-based e-commerce activities and become an important factor hindering e-commerce. At present, the main solution to the security problems of e-commerce activities is based on SSLP and SETP micro-application terminals. This article is mainly based on the analysis of SSLProtocol to design a solution for micro-application terminal access authorization authentication. The mainstream security technology architecture is mainly divided into five levels: network services, encryption technology, security certification, security protocol and system applications. The network service layer is at the first layer. It is mainly responsible for network monitoring and scanning, virus prevention, network intrusion detection and acting as a firewall. The second layer is the encryption layer, and the main encryption methods are symmetric encryption and asymmetric encryption. Each of these five-layer structures is related, and the security protocol is mainly SSLProtocol. Experimental conclusion: This experiment is mainly to use the sslProtocol plan to improve the security performance of e-commerce by more than 50%, make full use of the advantages of Protocol, ensure consumer safety, and improve a healthy and safe network environment.