File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
http://aspose.com/file-tools
The moose likes Java Micro Edition and the fly likes Is it possible to do a Wireless VPN Application for Mobiles Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login
JavaRanch » Java Forums » Mobile » Java Micro Edition
Bookmark "Is it possible to do a Wireless VPN Application for Mobiles" Watch "Is it possible to do a Wireless VPN Application for Mobiles" New topic
Author

Is it possible to do a Wireless VPN Application for Mobiles

Chamila Dissanayake
Greenhorn

Joined: Sep 17, 2007
Posts: 5
I'm planning to do a mobile VPN application for my BSc final year project. I hav a doubt wheather this can be possible to do so.

The concept of this application is mentioned below

1. GPRS is using as transmission medium
2. Encryption method is using to secure data. (Need to know wheather can be done using phone's processor)
3. Server side application is using for interconnect nodes (phones)

Please reply with any ideas


Chamila Dissanayake
Nicholas Jordan
Ranch Hand

Joined: Sep 17, 2006
Posts: 1282
Most definitely can be done, I loaded an IDE for a popular mobile device and it had all three of these already coded in the java api for use directly by the programmer. I would like to do some of the preliminary work with you for your project.


"The differential equations that describe dynamic interactions of power generators are similar to that of the gravitational interplay among celestial bodies, which is chaotic in nature."
Chamila Dissanayake
Greenhorn

Joined: Sep 17, 2007
Posts: 5
Thank you very much Jordan. I appreciate your helpfulness

Also I need to clarify whether it is possible to implement such application without going into Client-Server architecture.
Also I'm willing to embed an encryption mechanism for a proposed application. Is it possible to do data encryption with phone's processor?

Thanks!!!
Tim Holloway
Saloon Keeper

Joined: Jun 25, 2001
Posts: 16136
    
  21

I'm pretty sure that J2ME comes with a set of encryption services.

I'd be even surer if I wasn't too lazy to check the available JavaDocs.


Customer surveys are for companies who didn't pay proper attention to begin with.
Nicholas Jordan
Ranch Hand

Joined: Sep 17, 2006
Posts: 1282
Also I need to clarify whether it is possible to implement such application without going into Client-Server architecture.
Also I'm willing to embed an encryption mechanism for a proposed application. Is it possible to do data encryption with phone's processor?


Sorry, I have been very busy - I am a senior assistant on a large project and have to attend that duty first. Tim Holloway knows enough about the subject that you may rely on his advice when I am not present and I will attend to any details I wish to make different from his advice at the time of my return. { hey, jr'rs: cool or what ? }

First delete your duplicate posts, I understand your eagerness.

  • 1.   Also I need to clarify whether it is possible to implement such application without going into Client-Server architecture. Client-Server is a way of thinking, and is not the only way to do it. We will receive much criticisim for this thought. Tell them to post those comments in Meaningless Drivel where they belong. Client-Server has a rich history and will serve us well in some places. We will use the Code We Can Understand architecture.
  • 2.   Also I'm willing to embed an encryption mechanism for a proposed application. Is it possible to do data encryption with phone's processor? See below:

  • That was taken from EricGiguere.com > Eric's J2ME Pages > J2ME Security at

    J2ME Security

    which you should read immediately. This is actually what Tim is saying, you should look up some of this stuff yourself. I need to know what you have studied already for the BSc final year project - big impact on how I present my words to you. North American Street English is my native speak but there is no native speak for computer science and the program vary widely from one time and place to another.

    Cryptography is extremely hard to tell apart from useless beginner blunders and we will have plenty of tools in the processor, as you call it.

    Study with great dilligence but no expectations: Learning Path: MIDP Application Security Learning Path: MIDP Application Security which Gathers resources related to application security in general as well as information specific to MIDP.

    The phone has a reasonbly powerful processor and we need to target any of the Open Handset Alliance members:

    ( I will send you a private message with the full list )

    This effort is far more involved than a one-semester final project for a computer-science course. I can make suggestions on how to package the effort for you class. To do this I ( or Tim ) need some idea of how your courses have progressed to date.

    See also: version 1.2.0 of the TableBean from Conjective and see also my proposed Android project: Android anyone ?
    posted by: ( me ) 8 Thursday, November 22, 2007 2:35 PM
    [ December 22, 2007: Message edited by: Nicholas Jordan ]
    Chamila Dissanayake
    Greenhorn

    Joined: Sep 17, 2007
    Posts: 5
    Thank you very much for yor reply JORDAN. That information is very important and valuable for me. Keep informing me about this topic. Again thank you for spending your valuable time for me.
    Nicholas Jordan
    Ranch Hand

    Joined: Sep 17, 2006
    Posts: 1282
    Originally posted by Chamila Dissanayake:
    Thank you very much for yor reply JORDAN. That information is very important and valuable for me. Keep informing me about this topic. Again thank you for spending your valuable time for me.


    Not a problem, have been trying hard to find anyone who is sufficiently interested. I give you your first assignment: Many customers will want to access some sort of web address, it may be that our application does not use this - I want to see how you go about solving the challenge.

    Thus: provide code to look for: "http://" in a string typed in by the user. There are many ways to approach this, I want to see how you go to work on this so that I know how to guage my comments and replies to you.
     
    I agree. Here's the link: http://aspose.com/file-tools
     
    subject: Is it possible to do a Wireless VPN Application for Mobiles