Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > Local area network (LAN), metropolitan - area network (MAN) > Campus network, enterprise network (Intranet)

Huaiyin Institute of Technology campus card system design and security policy

Author ZhuHaoJie
Tutor YanYunYang;XuMei
School Nanjing University of Technology and Engineering
Course Computer technology
Keywords the campus card system Radio frequency card security polICy middleware technology encrpytion
CLC TP393.18
Type Master's thesis
Year 2011
Downloads 36
Quotes 0
Download Dissertation

With the development of information technology, there are the new opportunities and challenges in the teaching and management of higher education, and information technology has been the direction of modern education. In partICular, in the recent years, with the helping of information tools and technICal tools, integration of educational information resources, integration and sharing of data management and unified control, the increasing of the management level and the overall competitive strength, the universities are undergoing profound changes and adjustments to achieve their continuous development.The information system is one of the cores in digital universities. And the campus card system is the digital foundation engineering, and plays a decisive role in the universities. It is very signifICant to design the card system. And the security is very important in the designing of the card system.In this paper, after reviewing the campus card system, the overall designing of the campus card system is proposed by choosing the case of card system in TechnologICal College of Huaiyin. The paper includes the designing of card’s structure, network architecture, database, and encryption technology. Exploring the Browser/Server and Client/Server combination of two software development model, the paper highlights the security measures after considering the card itself, data collection, data transmission, data storage, data recovery to ensure the whole system is stable, effICient and safe.

Related Dissertations
More Dissertations