基于J2ME WTK的2D手机游戏开发(英文文献翻译) 第17页
Research and Implementation of Mobile Payment Based on J2ME
Abstract
Rapidly development of mobile-payment applicationis dues to the combination of mobile ommunicationand Internet. The combination of J2ME and J2EEtechnology provides a good solution for mobilepayment.The characteristics of J2ME and J2EE isresearched based on mobile- payment platform, and awhole series of solutions are proposed, these solutionscan be applied into mobile commerce system ofpassenger transportation and logistics, and so on.Analyzing and designing the structures function of themobile- payment system, including J2EE server-tierand J2ME client-tier. At the same time, connecting thedatabase by JDBC and the security of the system, itwill give some highlights on the construction ofChinese mobile commerce.
1. Introduction
E-commerce has experienced the process from simplicity to complexity, from low-class to up-class.With the development of e-commerce, mobile payment, as a type of new expense balance, has been prevailing among mobile runners, online seller and consumers, because of its convenience. According to the data from information industry ministry, the sum of payment about Chinese online shopping is up to 15.7 billion in 2005, the mobile payment breaks through the period of mildly developing, and enters into a turnpoint of great increase. Norson telecom consultation predicts the scale of mobile payment industry will be up to 32 billion yuan and the number of users reaches more than 1 billion. But the survey shows that more than 80% interviewees express the lack of confidence in online payment and mobile payment. On the precondition of the fast growth of mobile telecom industry, mobile payment is undoubtedly extremely vital. At the same time, security problem is the key of mobile payment. So under the environment of ecommerce,its guarantee of justness and security is worth our researching.This essay is based on discussing the security of J2ME platform and the advantages in development of mobile payment system, and offers the implementation of mobile payment based on J2ME.
2. Related Background Knowledge
2.1 E-commerce
E-commerce is a mode which engages in business activities by using present advanced electronic technology. It can be achieved through a variety of electronic communication modes. E-commerce which is explored presently mainly utilizes EDI and Internet. As the increasingly maturity of Internet, the development of e-commerce will be established on the technology of Internet. The main reason why ecommerce becomes another focus following e-publish and e-mail, is the maturity of Internet and the enhancement of PC’s connection.
2.2 Mobile payment
Mobile commerce is one new e-commerce model, which runs the data transmission through the mobile communication network. And it develops a variety of business activities by using terminals, such as the mobile phone, PAD and laptop. Compared with traditional e-commerce, mobile commerce can really make that anyone can gain the entire network of information and services wherever and any. Mobile payment is a series of related business activities such as shopping, payment and bank transfer accounts, by using SMS, WAP, IVR, and so on. Under the effect of related elements, it’s a kind of trade payment behavior by using cell phone and PDA.
2.3 Advantages of J2ME platform in exploration of mobile
J2ME is JAVA platform provided by America Sun Company, and developed for application of mini limited-resources terminal equipments, and it’s the best project that directs to consumption products and builtin equipments.The security characteristics of J2ME determine that it is more suitable for the exploration of mobile payment system than other exploring techniques. It includes the security of MIDP2.0 (mobile information device profile) which is the framework available for small equipments up to now. Following the CLDC’Stenet, it consumes resources as little as possible.Presently the majority of PDA measures the criterion of MIDP; moreover its security escalates with the developing of MIDP. The present MIDP2.0 in support of HTTPS, can establish Tier-to-Tier SSL connection,so as to protect the security of transport layer. At the same time, it characterizes as transplantablity, low network-resources consumption and low server load,which simplifies the MIDlet program to reduce the expense of downloading MIDlet WTLS through the international roaming. In addition, J2ME Encryption can encrypt for the whole mobile payment. Apart from it, entry dialog will be protected as SSL3.0 in support of WAP and WTLS[1].As the gradual improving of J2ME’s security,widening of wireless channel and upgrading of PDA,the mobile payment system will be the direction of development.
3. Analyses and Designs of Mobile Payment System
3.1 Analyses of Mobile Payment System
The major function of the fulfillment of Mobile Payment System lies in mobile payment. Therefore, the system should at least cover the following functions:
(1) Dealer is permitted to submit detailed payment transaction information, and besides the system can maintain the payment information and the condition of payment transaction;
(2) Dealer can inquire about the payment information and the condition of payment transaction;
(3) Payer is allowed to authorize the payment; the authenticated process of authorization could be completed by the system;
(4) Once the payer finishes the payment authorization, the dealer can submit payment
transaction;
(5) The system will be able to verify the payer’s signature information and the validity of the payer’s certificate;
(6) The system can obtain the payer’s certificate.
Mobile payment ought to take safety factors into account, such as completeness, confidentiality and undeniability if it is about to replace electronic payment in the fields of ecommerce and mobile payment ecommerce. Therefore, mobile payment system has to satisfy those following requirements in terms of its performance:
(1) Make sure the safety of the payer;
(2) Only with the aid of the interface supplied by the system could we visit the system and its database.Any unauthorized entity is not qualified to visit the system;
<< 上一页 [11] [12] [13] [14] [15] [16] [17] [18] [19] 下一页