| Currently, the domestic telecom operators have entered a new stage of full-service operation, and they gradually transform from the pursuit of the extensive scale into intensive cultivation of clients’requirements, to provide users with subtle services. However, with the high-speed development of the Mobile-Internet industry, the telecom operators’ positions in the traditional value chain are increasingly shaken. One of the reasons is that the performance of the traditional telecommunications value-added services development framework can’t respond quickly to users’needs, is not well adapted to the development of flexible and rich, innovative applications, and the qualifications, technical threshold of entrance into traditional telecommunications business hold back individual developers to participate in providing innovative and segmenting value-added telecommunication applications. Under the circumstances, China Mobile has launched open platform which is designed to attract developers involved in new telecommunication services, thereby creating a win-win situation.This paper relies on the open mobile-Internet platform Authentication subsystem project, and it mainly analysis and responses to the security threat from time and space; it designed OMP_AUTH protocol for ordering applications with reference to OAUTH protocol, and the author jointly submit an application for patent in written; In the end, the paper implements Web Service based on SOAP protocol to satisfy GMCC.The paper designs and implements the security module of its authentication subsystem. The first chapter is the introductions, it introduces the thesis background and the development of open platform both in and abroad. Then it introduces the open mobile internet platform project, and the authentication subsystem security module which is one important part of the project. The second chapter describes the overall design of the authentication subsystem security module. At the same time it introduces the key technologies involved in the security module design. The third chapter describes typical process of detailed design of the security module. The fourth chapter describes the realization of the security module. Chapter five is mainly to verify the security module in the production environment. Chapter six describes summarizations of this paper, as well as the project’s perspective. |