Font Size: a A A

3GVSA System Design And Implementation

Posted on:2013-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:C YangFull Text:PDF
GTID:2248330371476582Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
This topic is of major projects of national science and technology project "TD-SCDMA industry, information technology applications development and industrialization."As3G technology continues to mature,3G video applications become more and more widely. However, due to the openness of wireless networks, the potential security risks to information security and internal network security.3G video real-time and high bandwidth requirements, and higher demands on system processing efficiency. In addition, due to the diversity of3G video services, how to carry out unified management is the focus of developers of the video access.To address the above issues, this paper proposes a new3G video security access system (3GVSA,3G Video the Access Security). The system is based on user identity information, the use of business-related localization of the "white list" of role management mechanism through a proxy mode, alarm blocking means can not bypass application access interface, only through the user authentication within the mandate of the operation, to prohibit unauthorized access to resources and system operation, and to identify the video content, unified access control model to mobile3G video applications.This paper studies the system. Detailed analysis and the VPN technology in the iptables, Netfilter/frameworks, and the iproute2the main function of the technology to achieve the principles and scenarios, and a combination of applied research for Netfilte/iptables, netlink.Secondly, from the perspective of the security system, research and analysis of the security needs of the3GVSA: on the basis of the network layer, application layer, multi-level security requirements, combined with the actual application requirements, functional requirements through3GVSA the overall architecture, business processes and the specific design of the network architecture to meet the user authentication and resources unified access control.Finally, the focus of analysis and research design and implementation of a secure access gateway and video access gateway.Focus on analysis of the Secure Access Gateway, user authentication, management of the memory pool, multi-process, udp multicast mechanism, but also highlights and Video Access Gateway user policy cache, video filtering and video transmission channel principle.
Keywords/Search Tags:3G, White List, Video access, Proxy mode
PDF Full Text Request
Related items