Font Size: a A A

Design And Implementation Of Authentication Subsystem In Capability Open Platform

Posted on:2014-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:H P ZhaoFull Text:PDF
GTID:2248330398470768Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the high-speed development of the Internet, especially the mobile Internet, traditional business of telecom operators has subjected to a great deal of extrusion, they hope to obtain more profits by means of opening network capacities to increase the utilization of network. Therefore, they put forward the concept of capability open gateway. However, to access the capability provided by the capability open gateway of the telecom operators often requires some complex qualification of the service provider, thus large numbers of grassroots teams with technical capabilities and business creativity are rejected.In order to provide an effective solution to the problems mentioned above, telecom operators begin to set up the Capability Open Platform (COP), to take management, control and profits into account and achieve more flexibility in network capability opening as well. In this paper, the functional requirements of COP are analyzed in detail with the description of its architecture. Then the design and implementation of the authentication subsystem in COP are specified in this paper. COP is composed of three major subsystems:access, authentication and management, it provides application developers with unified interfaces to converge Internet capacities, telecommunications capabilities and the third-party capacities. The authentication subsystem is the core subsystem in COP, it offers authentication and billing functions to capacities and applications on the platform to guarantee the security of the operators, product providers and products, and to provide product providers with detailed records for billing.In this paper, the functional requirements of.the. authentication subsystem are first analyzed to state business processes and functions. Then the design of the architecture of the authentication subsystem is specified together with the introduction of its implementation in detail. In the description of the implementation of the authentication subsystem, key technologies used in the development process and the database design are illustrated. In the end, tests on the authentication subsystem are introduced. The test results show that the design and implementation of the authentication subsystem is feasible and could provide high availability.
Keywords/Search Tags:cloud computing, capability open platform, authentication
PDF Full Text Request
Related items