Font Size: a A A

Research On 3G Terminal Security Services

Posted on:2010-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ShengFull Text:PDF
GTID:2178360278457922Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of communication technology, the third generation mobile communication system will soon become an important mean of communication. How to ensure network and business information from network resources safety in 3G system has became an urgent problem to be solved. The security structure of3G system supplies network access, air transmission and network security protection measures for personal communications, but has not effectively provided the client applications with active, visible, optional confidentiality security service measures, the end-users are lack of initiative protection mechanisms.For this problem, that the 3G terminals exist deficiencies of safety communication, this paper analyzes the security infrastructure of terminal environment from theoretical and practical development aspects, and deeply studies the safety mechanism of the 3G communications. This paper first proposes the three-tier security assurance architecture of 3G terminal security communication, which includes infrastructure layer, security service layer and application layer. This paper analyzes a variety of security measures and algorithms, improves the optimization of the security algorithms in accordance with the functional requirements, encapsulates the improved security algorithms to design 3G terminal security service model and to develop system functional modules. Then, provide terminal users with security services in the form of SDK, which will supply users with active and effective channels to protect the individual information security.Compared with the existing technology, the technology can provide users with proactive protection measures, and supplies visual, configurable security services interface, which can strengthen the initiatives defense capability of personal safety communications. At the same time, the developers can directly use software development tools for security services when they carry out the application development in the field of 3G security, without preparaing the underlying functions One by one. For this process, they can improve the reusability of procedures, simplify the development process, and it is conducive to improve software product quality.
Keywords/Search Tags:3G, security algorithm, certification, data encryption, security services
PDF Full Text Request
Related items