Font Size: a A A

Research And Design Of The Unified Trust System In Mobile Network Integated Internet

Posted on:2011-11-02Degree:MasterType:Thesis
Country:ChinaCandidate:L KangFull Text:PDF
GTID:2178360308461237Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous innovations of modern Internet technology and driving form consumers'market demand, especially mobile network users explosive growth, Fixed-Mobile convergence(FMC) has been accepted universally by the communication industry as the development trend of NGN. The construction of the mobile network integrate computer network has adopted generic, open technology of network elements or fix. The development of the integrated network, has development for mobile value-added business, has brought new application experience for the new vigor into the users, but also opens a broader space for the mobile communication industry development. But at the same time, the integrated network exposed more loopholes and hidden. It will be brought into the every network security flaws in the new network, which not only bring into the operation of the integrated network of existing security problems, and added some new safety problems after integrated of the network.The mobile network and Internet as a selection object of study, aims to discuss the unified trust system and security mechanism in integration network related issues. The main contents of this thesis are listed as following:1. Designed the background and the system structure of integration network, and then introduces the existing problems of the safe authentication mechanism and solve the security problems, has analyzed the advantages and disadvantages. Then we proposed a security mechanism based on the digital certificate of authentication for integrate of the mobile network and Internet.2. Of digital certificate of authentication mechanism based on the summary design, including:digital certificate authority center system, transmission of certificate and key, and the use of process about users, also made deployment of the network.3. with the thought of authentication strategy based on Ponder language to deploy trust management.4. We designed the overall design scheme, and realization process of development.Finally, a brief conclusion and future works are given.
Keywords/Search Tags:integrated network, digital certificates, security authentication, policy
PDF Full Text Request
Related items