Font Size: a A A

Design And Implementation Of Internet Access Management System

Posted on:2009-08-28Degree:MasterType:Thesis
Country:ChinaCandidate:M LiFull Text:PDF
GTID:2178360245969310Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The rapid development and popularization of the Internet brings revolutionary changes to everybody's life. Information on the Internet provides resources and communication platforms to different users. However, it might also cause negative effects, especially to youth. When we gather useful resources from the Internet, there are unhealthy and harmful contents as well. To protect Internet users from being interrupted by harmful information is a key target.Upon the requests for control strategy based on different visitors on the Internet, Greennet Technology developed "The Internet Access Management System", which assures a correct, safe and efficient access to the Internet. This "green" product includes:1. Filter the information: it can block harmful information, such as pornography, gambling, drugs and forbidden religion websites.2. "Parent Children Accounts": parents can connect to the Internet and visit website freely using a "parent account", from which he can restrict his children's surfing behaviour.3. Provide value-added services for telecom ISP and increase their profit.This product has been adopted by a lot of telecom ISP all over the China, including Zhejiang Telecom, Shanghai Telecom, Henan Netcom, Guangdong Telecom, Beijing Unicom, Jilin Netcom, Chongqing Netcom, Liaoning Netcom, Shanxi Netcom, Heilongjiang Netcom, Hubei Netcom, etc.In this paper, we first introduce the Internet usage in China and some related policies. Then we explain the technology which is used in the Internet Access Management System. After that, we describe the architecture of the Internet Access Management System. Finally, we discuss the value of this system and share experience during this work.This paper can be used for application of Internet value-added services or for a reference of network management.
Keywords/Search Tags:Information Security, Access Management, System Design, System Implementation
PDF Full Text Request
Related items