Appendix of Java and SQL Project:

  1. In security in large mediator protocols plz open source code folder and in that  open the quantum.sql file.
  2. Copy all the all the data and follow this procedure.
  3. In that open Start -> All Programs -> MySQL -> MySQL Server 5.0  -> MySql Command Client.
  4. This procedure is given the below page.
  5. After open the MySQL Command Line Client. 
  6. Plz  type the password as tiger and press enter.
  7. After we type following commands whether the Msql database is exist or not.
MySql Command Client
  1. MySQL > show databases;
  2. If MySQL database is exists the we type following command.
  3.       MySQL > use mysql.
  4. After paste the all the data exist on Quantum1.sql file.

After open the MySQL Command Line Client

After open the code1 folder in that open the Tcen.bat and user.bat files.

Tcen

If we double click on Tcen.bat file the following page was displays.

This is Trusted Center Page.

This is Trusted Center Page

Also Double click on user.bat file.

userbat

If U New User Plz click on signup button.

signup button

If u enter the all details after a secret key is generated on server with respect to the user and that key is user to send files to destination. In the signup we give the destination port number and sender name and password.

sender name and password

  1. After we give the details plz click on submit. In this screen the server generates secret key with respect to the user. 
  2. After we login to the system as follows.
  3. After the give details plz click on sign in. If correct user the follow page was displays.  
  4. In that we give the destination port number and choose file  and click on send.
  5. If u click on send button it will ask the secret key. We give the secret key and click ok.  
  6. Click on ok then the server verifies the all details and ask for conformation in each request that is as follows. 
  7. Click on ok. After the details are stored on the trusted center and the server generates the session key and key value as follows. 
  8. After we the follow page also generated. 
  9. In that we give senders  name and click open.
  10. Click on Open it will ask the secret key for conformation.
  11. Click on ok then the server verifies the all details and ask for conformation in each request that is as follows.
  12. Finally the trusted center sents the message to Destination by check the all session keys.
This Paper is written & submitted by Vamshidhar A.