Font Size: a A A

Research On The Design And Implementation Of Border Access Platform In Public Security Network

Posted on:2012-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:J RenFull Text:PDF
GTID:2218330362952241Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In public security bodies, with the deepening construction of information technology, the demand in access services for foreign exchange and sharing of information increases strongly. Under the plan and deployment of the second phase of the "Golden Shield Project" ,which adheres to the three principles of unifying access channels, sharing strategy, and operational management, combining with the current situation and the precondition of ensuring information network security, the public security bodies try to build an internet border access platform, which can achieve access secure external network and efficient exchange of information and manage the border access, so as to provide support and protection in developing the exchange, sharing , and integration of social information.This paper comprises of six chapters. Chapter one gives a detail introduction to the current situation of network security, the imperativeness and significance of constructing border access platform in public security bodies. Chapter two addresses two types of needs in border access, one is to the social enterprises or institutions based on data acquisition and exchange, the other is to police station based on authorization access .Chapter three describes the structure of the border access platform composed of five zones which are correlated with data acquisition, data exchange and access control but still independent: router access zone, border protection zone, application service zone, security Isolation zone, and security detection zone. Chapter four is about the design work of border protection zone, focusing on the design principle, design rational, function module and performance analysis, analyzing the composition of SSL protocol, the record layer protocol in the SSL, and the handshake protocol of SSL. Chapter five elucidates the achievement of accomplishing the function of border protection zone, covering from the selection of development environment, development method, version of protocol, cryptographic schemes, to the working procedure and system implementation. Chapter six gives elaborate description of the border access platform, including such key functions like Identity authentication and data exchange. Chapter seven summarizes the characteristics and the achievements attained in building the system.
Keywords/Search Tags:Boundary Protection, SSL Protocol, OpenSSL, Key Agreement
PDF Full Text Request
Related items