Please wait a minute...

Current Issue

    15 September 2010, Volume 26 Issue 9
    Special planning: mobile payment technology and application
    Construction of“Anytime-Anywhere,Credit-Guaranteed”Environment of Electronic Payment Services
    Xiaoqin Chen,Shoulian Qian
    2010, 26(9):  1-5.  doi:10.3969/j.issn.1000-0801.2010.09.001
    Asbtract ( 870 )   HTML ( 10)   PDF (1130KB) ( 595 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The paper introduces and analyzes how to establish credit-guaranteed and electronic payment environment for Telecom Carrier.Based on four different actor of payment services,the paper brings up carrier's payment platform frame on the OSI rule,which is the technical foundation of innovation and developing to go with the national conditions of China。

    Business Model of Mobile Payment Products in Telecom Operators
    Ting Liu,Hao Hua,Junmin Yao,Jianyu Zhang
    2010, 26(9):  6-11.  doi:10.3969/j.issn.1000-0801.2010.09.002
    Asbtract ( 888 )   HTML ( 11)   PDF (1619KB) ( 965 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article,by discuss the traditional industry's business model which is generally accepted,summary of Shanghai Telecom“mobile payment”products and successful operation experience on“e ·Phone card payment”official release,analysis nine elements of China Telecom“mobile payment”which are products value proposition,target groups of consumers,distribution channels,customer relationships value configurations,core competencies,partner networks,cooperation and win-win mode.It identifies the characteristics of the mobile telecom operator's payment,difference from current public payment services and the improvement brought.At last,farther analysis of China Telecom their own resources,emphasis on the mobile payment products value chain,target customers and the customers wish,it introduce China Telecom“mobile payment”each sub-product business model design.

    Comparative Analysis of Mobile Contactless Payment Technology Standard
    Hong Chen,Zhen Li,Mingjie Zhang,Zhenghan Lin
    2010, 26(9):  12-15.  doi:10.3969/j.issn.1000-0801.2010.09.004
    Asbtract ( 851 )   HTML ( 18)   PDF (518KB) ( 678 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The use of RFID technology,mobile contactless payment business has become a value-added services focused on telecom operator.This paper describes RFID technology,analyzes the advantages of the development of mobile payment RFID by telecom operator,and currently the main application examples and some techniques were analyzed,proposes the current mainstream RFID mobile payments development for telecom operators.

    Full Service Payment System Architecture of Operator Based on Unified Account
    Zhen Li,Mingjie Zhang,Zhongde Xi
    2010, 26(9):  16-19.  doi:10.3969/j.issn.1000-0801.2010.09.005
    Asbtract ( 890 )   HTML ( 11)   PDF (1182KB) ( 980 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Now operators have entered full service operation time,in order to enhance user stickiness,while operators provide integrated services,it also need to provide users with convenient and powerful payment.By analysising the advantages of operators to provide full service payment,this paper provides full service payment system architecture by unified account.Based on this architecture and use the advantage of resources,operators can provide users with a variety of full service payment products by multi-account and multi-access mode.Finally,we provides full service payment development proposals for operators.

    Research of Security and Authentication System for e Surfing Payment Based on 2.4 GHz Carrier Wave
    Feng Li,Xiaoqin Chen,Shoulian Qian
    2010, 26(9):  20-25.  doi:10.3969/j.issn.1000-0801.2010.09.006
    Asbtract ( 874 )   HTML ( 8)   PDF (1870KB) ( 667 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on an experiment 2.4 GHz NFC(near field communication)payment service of Shanghai Telecom Corporation,the paper presents a new method of more secret and managed to build a framework of authentication application system on the basis of existed communication network,terminal mechanism and security protocol.As for a payment security model in the complex changeful network setting,the method can satisfy the level of payment security and support the load of the improved mobile phone payment system,and provide use for reference of 2.4 GHz mobile phone payment application.

    Functional Scheme of Mobile Payment Platform
    Shudong Wang,Wei Ke,Yanan Dong
    2010, 26(9):  26-30.  doi:10.3969/j.issn.1000-0801.2010.09.007
    Asbtract ( 904 )   HTML ( 14)   PDF (1300KB) ( 1008 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article describes the construction of Shanghai Telecom's mobile payment platform and function scheme,China Telecom's network ensure high quality and provide safe and reliable payment services.During the construction of mobile payment platform,we need to focus more on the abstract,to achieve a variety of different forms of access,and ensure the platform is stable,secure,anytime,anywhere for customer service.Then introduced the Shanghai Telecom mobile payment platform and features,the program-building considers the development of telecommunication services,while taking into account the characteristics of the user at any time,and with the telecom support systems form a good docking mechanism,taking into account the risk control,to avoid for users to use mobile payment and the resulting security issues.Described in this article and functional mobile payment platform in China by First Street,Nanjing Road,which verifies the mobile payment system architecture is reasonable.

    Topics: operation and marketing of 3 g era
    Platform Strategy of Telecom Operators in 3G Era Based on Value Chain Perspective
    Lijuan Sun,Yisong Fang
    2010, 26(9):  31-36.  doi:10.3969/j.issn.1000-0801.2010.09.008
    Asbtract ( 832 )   HTML ( 14)   PDF (1787KB) ( 599 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper analyzes platform from the value chain perspective,including concept,property,element and evolution, and summarizes the general thinking of platform operation and the necessity of platform strategy carried out by telecom operators in 3G era,and which also applied to analyze on the platform strategy of mobile internet for China Mobile.

    Fine Channel Operation Support in 3G Era
    Bohan Liang,Xiaoyan Ke
    2010, 26(9):  37-41.  doi:10.3969/j.issn.1000-0801.2010.09.009
    Asbtract ( 754 )   HTML ( 12)   PDF (1920KB) ( 429 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper describes a few innovation directions of channels,which include customer preferences applications,channel GIS geographic information applications,regional grid marketing offensive and defensive systems,co-channel experience marketing.The last,this paper presents the future outlook for channel operation support on the convenience of business hall,the richness and individuation of electronic channels,the normalization of new channels expansion and the integration of multi-channel.

    Discuss of 3G Handset Distributing Organization in Chinese Domestic Market
    Jianwei Li
    2010, 26(9):  42-45.  doi:10.3969/j.issn.1000-0801.2010.09.010
    Asbtract ( 731 )   HTML ( 6)   PDF (744KB) ( 364 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Chinese domestic market of 3G handset is in primary development.3G handset distributing organization is following 2G handsetˊs,which is unfit for 3G handset distributing.This article analyses the problems of the existing 3G handset distributing organization,and discusses the improvements.

    Study of Mobile Terminal Information Application in Mobile Service Marketing
    Xiaoyan Ke,Bohan Liang
    2010, 26(9):  46-51.  doi:10.3969/j.issn.1000-0801.2010.09.011
    Asbtract ( 750 )   HTML ( 9)   PDF (2541KB) ( 528 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This study illustrated two methods of getting mobile terminal information,and explored mobile terminal information application in the areas of new mobile services marketing,terminal precise marketing,re-entry identification,marketing decision supporting,business service pre-launch,customer service ad hoc query,against fraud and theft monitoring.In the end,some recommendations of mobile terminal information application in marketing were given.

    Open Innovation System of User Participation in 3G Services Development
    Tingquan Zhang
    2010, 26(9):  51-55.  doi:10.3969/j.issn.1000-0801.2010.09.012
    Asbtract ( 910 )   HTML ( 10)   PDF (1294KB) ( 409 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Telecom operators want to competitive advantage in 3G market competition and all business operation,need to establish product system of open innovation by user full and deeply participation.At concept development,prototyping,product development and other phases,to end-users throughout depth of participation,realize truly products "come from the user,go to the users".

    Precise Marketing Practice of 3G Mobile Value-Added Services
    Zhijing Chen,Bohan Liang
    2010, 26(9):  56-59.  doi:10.3969/j.issn.1000-0801.2010.09.013
    Asbtract ( 793 )   HTML ( 8)   PDF (1604KB) ( 589 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mainly basing on the practical experience of mobile value-added service marketing projects,this study stated the advantages of precise marketing in the 3G mobile value-added marketing,and presented four key steps of precise marketing,which were potential target customer identification,marketing strategy adaptation,complication control and marketing assessment as well as optimization.Last but not least,this study introduced two scientific and effective method and tool,which were collaborative filter data mining model and precise marketing of mobile value-added services support system.

    Performance Assessment of Telecom Operator's Business Office in 3G Era
    Hui'e Li,Xiaoyan Ke
    2010, 26(9):  60-63.  doi:10.3969/j.issn.1000-0801.2010.09.014
    Asbtract ( 907 )   HTML ( 9)   PDF (459KB) ( 434 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Business office is the main channel of telecom operators.With the arrival of 3G,competition becomes more and more severe,the business office of the telecom operators plays a more and more important role.For the management of business office,assessment of operating results and performance,this paper provides a new method which divides the business offices into four kinds by function and assesses the performance kind by kind.

    Cloud computing column
    Key Security Technologies on Cloud Computing
    Yunyong Zhang,Qingjin Chen,Songbai Pan,Jinwu Wei
    2010, 26(9):  64-69.  doi:10.3969/j.issn.1000-0801.2010.09.015
    Asbtract ( 1483 )   HTML ( 34)   PDF (1332KB) ( 3464 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing is a new method sharing infrastructure which provides the usage of service,application,information and infrastructure composed of “resource pool”computing,network,information and storage.The features of cloud computing directly impact the security threats of its environment and relative security policies,which include the self-service on demand,broadband access,visualization resource pool,quick elastic architecture,measurable services and multi-tenant.Cloud computing could definitely introduce positive effect because it has multiple benefits from scale economy to application availability.Nowadays,more and more enterprise users are ready to be involved in the cloud circle with the support of cloud computing providers and advocates.However,cloud computing also brings some new security issues.The security problem is very important since a large number of users share the IT infrastructure.In this paper,the specific cloud computing security requirement and solution are analyzed.The current status of international and domestic research and products are presented.

    Research on Key Management Framework of Cloud Computing
    Lei Sun,Zishan Dai,Jindi Guo
    2010, 26(9):  70-73.  doi:10.3969/j.issn.1000-0801.2010.09.016
    Asbtract ( 921 )   HTML ( 14)   PDF (910KB) ( 1002 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Following the analysis of cloud computing security in the paper,in which is laid a strong emphasis on the study of data security.A key management framework of cloud computing is proposed,which provides consistent standard model.Furthermore,the mechanism of the framework is introduced and analyzed in the end.

    Study on Cloud Computing Services and Mass Customization Applications
    Qinglie Wu,Yu Guo,Zhong Wu
    2010, 26(9):  74-78.  doi:10.3969/j.issn.1000-0801.2010.09.017
    Asbtract ( 928 )   HTML ( 13)   PDF (646KB) ( 806 )   Knowledge map   
    References | Related Articles | Metrics

    Cloud computing is a new computing model for adapting the new requirements of IT applications.Mass customization is a new production or service model for adapting the customer individual requirements.In this paper,some characters of cloud computing services and mass customization is discussed and the interactions between the cloud computing services and mass customization is analyzed,on the basis of this,the necessity of mass customization in cloud computing services,then how to use the cloud computing services to supply the applications of mass customization,and finally some intelligence supports for interaction process responding customers' requirements of mass customization in the environment of cloud computing are discussed.

    Research Security for Online Backup Based on Cloud Storage
    Guoping Liu,Guoquan Tan,Mingchuan Yang
    2010, 26(9):  79-83.  doi:10.3969/j.issn.1000-0801.2010.09.019
    Asbtract ( 845 )   HTML ( 7)   PDF (1850KB) ( 677 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The layered security model to the online backup based on the cloud storage is proposed on the basis of the analysis of the architecture of the online backup and OSI layered security model.The security mechanism for the online backup based on the cloud storage and its implement process of deploying on the practical application are discussed.The potential security problems caused by the cloud storage and the available countermeasures are described in the end.

    Handwriting Recognition System Based on Cloud Computing Platform
    Cong He,Lianwen Jin,Guibin Zhou
    2010, 26(9):  84-89.  doi:10.3969/j.issn.1000-0801.2010.09.020
    Asbtract ( 757 )   HTML ( 10)   PDF (2009KB) ( 421 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    We design and implement a cloud handwriting recognition system based on enomaly virtualization cloud technology.In addition to providing efficient,high accurate recognition services,our system can support orientation free and user adaptive service,which need high computing and storage resources.Our experiment show that,using traditional C/S model,the server would reached its capacity limit when 300 concurrent users are requesting service.While using cloud-based architecture,our handwriting recognition system can easily handle 1000 concurrent users' request.In dealing with 300 concurrent users,the access rate was 100%,much higher than the traditional C/S model of the access rate(82.7%),the average recognition processing time is only 16 ms,significantly lower than the traditional C/S model of the processing time(340 ms).

    Live Migration and Its Application in Cloud Computing
    Yuqing Lan,Qian Shen,Ming Liu
    2010, 26(9):  90-94.  doi:10.3969/j.issn.1000-0801.2010.09.022
    Asbtract ( 764 )   HTML ( 9)   PDF (1350KB) ( 772 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Live migration has a very wide range of applications in virtualization.At present most of the mainstream live migration tools relies on the physical hosts with centralized and shared external memory device.But in the cloud computing environment,many computer systems own local external memory independently,which brings some limitions to the live migration applications in the cloud computing environment.Based on the research of cloud computing and live migration,this paper analyzed the principles and limitations of live migration in cloud computing,advanced whole-system live incremental migration's design and implementation based on Xen.At last,it discussed the performance of whole-system live migration through experiments and summarized some of the ways to optimize the performance of migration.The whole-system live incremental migration gets rid of the original migration technology to the external memory equipmentˊs dependence,has further expanded the application scope in the cloud computing environment.

    A Security Model Adapted in Cloud Computing
    Guoyuan Lin,Shan He
    2010, 26(9):  95-99.  doi:10.3969/j.issn.1000-0801.2010.09.024
    Asbtract ( 838 )   HTML ( 10)   PDF (894KB) ( 732 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper,we analyzed some security problems in cloud computing.Based on Chinese wall model(BN model),a new security model named CCBN(cloud computing BN)was put forward,which can be used to protect data integrity and secrecy in private cloud.Then,we explained the elements and configuration scheme in cloud computing with CCBN model.

    research and development
    Study on Mobile Network Complaint Support Platform Based on NGOSS
    Jianhua Guo,Hua Xiang
    2010, 26(9):  100-105.  doi:10.3969/j.issn.1000-0801.2010.09.025
    Asbtract ( 762 )   HTML ( 15)   PDF (2008KB) ( 523 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aimed to improve the customer perception and processing efficiency of customer complaint about mobile network,referring by NGOSS,a network complaint support platform is built on operation support system to automatically analyse the causes of complaints.End to end business flow and shared information and data model are built between department of customer service and that of network management.Then,a technology neutral software architecture is proposed based on component.With the operation support systems of a certain telecom coporation,the platform is implemented and integrated.Application indicated that,with the aid of the network complaint support platform,customer service can quickly find causes of network complaints and get explain sentences,formally record and complete network complaints at one time.

    DDoS Attack Detection Algorithm
    Song Yang,Zonglin Li
    2010, 26(9):  106-110.  doi:10.3969/j.issn.1000-0801.2010.09.027
    Asbtract ( 881 )   HTML ( 17)   PDF (1420KB) ( 451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    DDoS attack is hard to detect in backbone network,for the reason that attack flows are distributed in multiple links and prone to be masked by tremendous amounts of background traffic.To solve this problem,a detection method based on global abnormal correlation analysis is proposed.The change of correlation between traffic caused by attack flows is exploited for attack detection,the correlation between potentially anomalous traffic is extracted by principle component analysis,and its change degree is used as an indicator of attack.Evaluation shows its effectiveness and proves that it overcomes the difficulties in detecting relatively low volume of DDoS attack transiting in backbone network.Comparing with existing network-wide detection method,it achieves higher detection rate.

    Performance Impact of Virtual Carrier Sensing Mechanism on EDCA
    Mu Zhang,Junrong Yan
    2010, 26(9):  118-122.  doi:10.3969/j.issn.1000-0801.2010.09.030
    Asbtract ( 783 )   HTML ( 8)   PDF (1545KB) ( 438 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Negative effect of virtual carrier sensing mechanism on EDCA mechanism is elaborated.Network allocation vector (NAV)of virtual carrier sensing mechanism is indicated that which waste channel resource in the case of uncompleted RTS/CTS four-way handshake.Then the key parameters which effect on the performance of EDCA are discussed and the value of the parameters are deduced under the condition of NAV settings with or without NAV clear mechanism,without consideration of NAV negative effect.At last,simulations show the throughput of EDCA in different access categories(AC).Apparently the NAV settings of virtual carrier sensing mechanism brought big effect on the throughput of EDCA,and that with NAV clear mechanism is better than that without NAV clear mechanism.

    Dual-Network Collaborative Communications Business Model and Architecture Design
    Yonghong Liao
    2010, 26(9):  123-128.  doi:10.3969/j.issn.1000-0801.2010.09.032
    Asbtract ( 788 )   HTML ( 10)   PDF (1464KB) ( 311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Intelligent gateway based on multimedia phone is an optimal solution for the digital home.Based on the video-communications business,expanding into interactive TV,multi-media video services,digital home,remote monitoring,the multi-business applications,and other value-added services,research the multi-win business model,the project of dual-network collaborative (PSTN + ADSL/IP)communications and its multi-business applications is proposed,focus on the dual-network integration,analysis of its characteristics and advantages is down,and the project strategy and technical route is introduced.Based on the dual-network integration switch system,the business services architecture and implementation with SaaS (software-as-a-service)mode is designed,the media transport architecture and P2P technology by multi-media video telephone is given.

    Research on Emotion Recognition with Physiological Signals Based on Hybrid Intelligent Optimization Algorithm
    Haining Wang,Shouqian Sun,Jianfeng Wu
    2010, 26(9):  129-135.  doi:10.3969/j.issn.1000-0801.2010.09.034
    Asbtract ( 846 )   HTML ( 14)   PDF (1531KB) ( 587 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Developing a machine's ability to recognize emotion states is one of the hallmarks of emotional intelligence and important prerequisite for high-level human computer interaction(HCI).Recording and recognizing physiological signals of emotion has become an increasingly important field of research in affective computing and HCI.For the problem of feature redundancy of physiological signals-based emotion recognition and low efficiency of traditional feature reduction algorithms on great sample data,a hybrid intelligent optimization algorithm based on the simulated annealing algorithm and particle swarm optimization algorithm(SA-PSO)was proposed to solve the problem of emotion feature selection.Then a weighted discrete-KNN classifier(WD-KNN)was presented to classify features by making full use of emotion sample information.The recognition rate and efficiency was increased and the algorithm's validity was verified through the analysis of experimental simulation data and the comparison of several recognition methods.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: