Font Size: a A A

The Design And Implementation Of The Security Authentication System For China Unicom

Posted on:2012-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:T YaoFull Text:PDF
GTID:2178330335960784Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At beginning design of internet applications, fatal defects are short of information protection and trusty authentication. Security and trust have been bottle neck of developing internet applications now. As international standards and law confirm method, certificates are used to identify objects, protect transmission of sensitive data, prevent from distorting deal data, create and verify undeniable signatures. It is expensive to build public key infrastructure and, manage key. Almost all authentication providers provide certificates, cannot manage keys, lack of mobile network product researching and developing capability, cannot provide after-sale service at nationwide. It is very important to design system function to load all kind of applications, manage key, release certificate, monitor status, authentication, remote control. Rely on China Unicom network resource and operation support system, build large-scale service capability, provide authentication service to cut down key account investment of IT system, achieve the goal of transfer from telecom carrier to information provider.The presented dissertation summarizes authentication problems of internet applications system。In designing the China Unicom security authentication system, using the theory and method of software engineering, the dissertation starts from the analyses of systematic requirements and proposes major problems to be solved and the construction goal of the system. By means of abstracting and extracting the business flow and the data in the business management, it further determines the system structure and the software architecture of the China Unicom security authentication system, and then differentiates and designs all function modules of the system. According to the basic principle of the database design, both logical and physical structural designs of the system database are completed, and at the same time the solutions are also proposed for the key functions of the system, such as release key, active key, release applications, application authentication, order applications.According to nation standard " Information Security techniques-Public Key Infrastructure-Security supporting platform framework", and privately-owned key release method, realize unified management of application and key, enforce applications share security resource, and large-scale key release,control life cycle of key and certificate, remove hidden danger about data leak from manufacturer, batch key lose. Remote control function provide to client software intelligence update, automatic push application, unlock key, lead to reduce operation cost, convenience of customers. This system has connect Broadband access system, Remote OA, agent management system, e-procurement system, provide authentication service, achieve excellent economic benefits and social effect.
Keywords/Search Tags:Digital Certification, Operation Management, Authentication, Secret Key
PDF Full Text Request
Related items