书城经济智能移动终端支撑下的非现场经济
21149100000039

第39章 附录:非现场经济实践案例(3)

When designing a security project and methods of identity distinction,the following aspects should be taken into consideration:

1.security of the macro environment where the entire Digital Library usage takes place,so that it can be free of malicious attacks;

2.guard against malicious downloading or improper usage;

3.A system to distinguish the identities of multilevel users;

4.the after the event trace ability of each incident and conservation of evidence;

5.the decentralization system of the application and calculability of the application's value.

Within the information economy,applications and their security plans track of evolution often reflects information economy's track of advancement in that country or industry,and is also a symbol of the degree of information economy's maturity in that country or industry.

Application demands and means of realization are closely related,that is to say,the realization of demands needs realizable technological means as its support,and so the Digital Library application's integral security plan is built upon the foundation of technological advancement.

2.Integral Solutions to Basic Security Issues of Off-site Activities

2.1 Integral Security Measures of the Digital Library Application

Application terminals within off-site economical activities are changing bit by bit to mobile terminals.Therefore,when designing the application scheme,we must take into consideration the integrity of the terminal,the channel and the platform.

We must start from terminals,the foundation support of and window to off-site information economy,and research into and reflect upon applications,terminals,and the Internet as a whole.

A ****** frame diagram can be used to illustrate the solution to the integral security environment of the Digital Library,one type of the off-site information economy activities:

What we need to clarify here is:

A.The Digital Library’s data bank and the Digital Library application's service system are two mutually independent but closely related platforms;

B.Setting and verifying status level needs to be completed on two synchronized platforms,in order to prevent key players excess reliance;

C.It's necessary to forward-lead environmental security,separate the public network from the private network,and enable professional vendors(such as China Telecom,China Mobile)to be in charge of the private network of shielding the private network with strong firewall settings.

D.This frame diagram represents assumed safety meas ures under the premise that the application's richness and accessibility is guaranteed.It mainly uses two ideas,identity distinction and private network from terminal to internet connection,to achieve secure shielding,and synchronized physical and software methods to effectively shield the private network from the public network.

2.2 Environmental Security Measures of the Digital Library Application

Not long ago,the government promulgated People's Republic of China Decree of State Council,People's Republic of China Central Military Commission No.579 Order,and announced People's Republic of China Regulations on Radio Control,which will be executed starting November 1st,2010.According to this administrative regulation,the government can implement radio control when necessary.

Because of modern information economy’s trend of development,the national economy is relying more and more on radio technology,which is to say with abnormal economic infiltration(such as the Super-Internet-Bank increasing off-site trading),in a certain time interval,governmental radio regulation will increasingly affect citizens life and economic activities,and could even affect citizens daily life and their overall economic situation on a large scale and in all dimensions.For example,during the 7/5 Xinjiang Riot of 2009,the government and relevant parties temporarily shut down the local internet,there by basically paralyzing developing off-site office work and off-site trading within that region.

Under specific conditions,such governmental acts of regulation are unavoidable.The key point of the situation is defining the limits of such temporary regulations,of which there are geological limits,and also network-suitable groups and network usage limits.Under situations when network-suitable groups and network usage cannot be distinguished from one another or the network system cannot be separated technologically,and the government needs to make a decision to regulate,relevant parties can only completely shut down or otherwise regulate all radio establishments.

Therefore,in today's rapidly developing age of information economy,we definitely have the need to separate the network into a specific network for suitable groups and a network for general usage.

This is not only a demand of application security under a particular system,but is also a demand by this particular system in order to achieve continual,stabilized operation within the entire operating environment.