共查询到20条相似文献,搜索用时 93 毫秒
1.
出于国家安全的需要,在移动通信系统部署LI(合法侦听)是非常必要的。如何有效、经济地建立满足LI需求的电信网络,是各国电信业界面临的问题。许多国家和国际上一些机构都提出了自己的法案、规范。文中分析了移动通信中LI最新的国际动态和成熟标准,并提出:执法机构与电信设备提供商、电信运营商共同商定LI规范,对我国电信业的发展有着非常积极的意义。 相似文献
2.
软交换网络合法侦听的研究 总被引:3,自引:0,他引:3
为了协助执法部门打击网络犯罪活动,有必要在软交换网络中部署合法侦听功能。参考了国际上主要的标准化组织所公布的合法侦听方面的最新成果,给出了合法侦听基本概念(包括合法侦听的功能需求、实施侦听的前提条件、部署侦听功能的3条假设等)。在分析国际分组通信论坛(IPCC)所提出的软交换网络合法侦听参考模型的基础上,指出了该模型与美国电信工业委员会(TLA)所提出的参考模型之间的差异。最后,给出了标准化接口上侦听消息的定义、呼叫内容分组的传送格式以及侦听结果的传送方法。 相似文献
3.
4.
5.
6.
网络的迅速发展,对语音的合法侦听的需求愈加迫切,尤其是对软交换语音的合法侦听更是下一代网络发展不可或缺的,建立相应的语音合法侦听系统已经迫在眉睫。文章首先介绍了语音合法侦听系统的相关技术,在此基础上重点论述了一个基于SIP协议的合法侦听系统的设计及实现。 相似文献
7.
根据相关合法侦听标准接口,从IP网络数据传输模型出发给出了3个层次上的侦听解决方案,并对3种侦听点设置和应用场合进行了比较。考虑到侦听数据传输的有效性和安全性,最后对IP网络中侦听数据的传送提出了具体要求,并且给出了接入网下设置侦听点的侦听数据在网络中的传递模型。 相似文献
8.
9.
10.
11.
Bachelu C. Lefebvre M. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》1993,1(4):566-571
A leaf-cell layout methodology for harnessing the potential of the local interconnect (LI) layer in digital CMOS circuits is presented. Based on the line-of-diffusion layout style, LI is used for selected connections, typically at the output of logic gates, in order to free up the metal-one layer in congested areas. Experimental results based on a variety of logic cells which demonstrate the benefit of the LI in terms of cell area and routing flexibility are presented. Simulation results indicate that this benefit is without any detrimental effect on electrical performance 相似文献
12.
2018年,地缘政治摩擦不断助长网络攻击的规模和复杂性,一系列接踵而来的网络安全事件凸显网络安全对国家安全的深刻影响。美、欧、澳、日等西方大国及我国周边国家纷纷开启网络空间实战化布局,攻防对抗态势升级,预示着国际网络空间格局正在发生重大变化。与此同时,伴随信息化与工业化融合水平不断提升,国民经济运转对信息系统依赖日渐加深,新技术应用转化为新兴产业支撑经济增长势头愈加迅猛,我国内网络安全形势暗涌不断,中美贸易争端裂隙持续蔓延,信息化应用发展背后的深层次安全矛盾趋于显现,而威胁风险此消彼长,漏洞隐患普遍存在,产业发展步伐缓慢,我国网络安全总体形势依然严峻。 相似文献
13.
Rahardja S. Falkowski B.J. Lozano C.C. 《IEEE transactions on circuits and systems. I, Regular papers》2005,52(9):1832-1844
New classes of linearly independent (LI) transforms that possess fast forward and inverse butterfly diagrams and their corresponding polynomial expansions over Galois Field (2) [GF(2)] are introduced in this paper. The transforms have the smallest computational complexity among all known LI transforms and therefore can be calculated in shorter time when the computation is done by software. Alternatively, the transforms can also be calculated easily and efficiently using hardware. Here, the recursive definitions and fast transform calculations of four basic fastest LI transforms are first given. The definitions are then extended to generate a larger family of LI transforms with the same computational cost through reordering and permutation. Various properties of the transforms and relations between them are presented followed by their hardware implementations as well as experimental results for some binary benchmark functions. 相似文献
14.
15.
A highly dynamic control scheme with very low torque ripple-direct self control (DSC) with torque hysteresis control-for very high-power medium-voltage induction motor drives fed by a double three-level inverter (D3LI) is presented. In this arrangement, two three-level inverters that are connected in parallel at their DC sides are feeding the open motor windings. The DSC, well known from two- and three-level inverters, is adapted to the D3LI and optimized for a minimum torque ripple. An 18-corner trajectory is chosen for the stator flux of the induction machine since it is approaching the ideal circle much better than the hexagon known from DSC for two-level inverters, without any detriment to the torque ripple. The machine and inverter control are explained and the proposed torque quality and dynamics are verified by measurements on a 180-kW laboratory drive. 相似文献
16.
A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication
Kyusuk Han Chan Yeob Yeun Taeshik Shon Jonghyuk Park Kwangjo Kim 《International Journal of Communication Systems》2011,24(4):461-472
Key escrowing is one of the core technologies for the lawful interception (LI) of secure communications in the wired and wireless networks. Although many previous studies on the key escrowing have been done before, they are insufficient to be deployed in practical networks due to conflicts with the LI requirements. Moreover, there is lack of consideration on the LI of ID‐based cryptosystem (IDBC)‐based secure communication because the interest of the LI was moved to the industries and IDBC has the inherent key escrowing property. However, the inherent property of IDBC cannot prevent ‘illegal’ eavesdropping of all the communications in the networks from the law enforcement agency with the ‘legally’ obtained key. Thus, we propose a new key escrow model that satisfies the requirements of LI and overcomes the potential threats of IDBC. Our contributions enable the scalable and efficient key escrowing for the LI of secure one‐way and two‐pass communication in the mobile networks. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
17.
18.
A distributed node localization scheme for wireless sensor networks (WSNs) is presented in this paper, and it includes three
generic phases: (1) determine node-beacon distances, (2) compute node positions, and (3) refine the positions. Different from
previous researches, we propose an algorithm combination Min–max + LI for the position derivation and SD method for the refinement
in our scheme. Simulation shows that our proposed scheme can perform more robust than some representative distributed node
localization schemes presented in previous researches in terms of the trade-off among accuracy, coverage, computation cost,
and communication overhead. 相似文献
19.
本从安全的含义与安全威胁、安全服务与安全机制、安全体系、安全技术、管理法规等方面,对网络安全进行了阐述;并介绍了一些网络安全产品。 相似文献
20.
光生物调节作用研究进展 总被引:1,自引:0,他引:1
激光或单色光的强度可以分为低、中和高三个等级,其生物调节作用称为光生物调节作用。从内稳态的角度综述相应的研究进展。功能内稳态是维持功能充分稳定发挥的负反馈机制,它可以抵抗低于阈值的内外干扰,但被高于阈值的应激所打破。处于内稳态的应激称为成功应激,远离内稳态的应激称为慢性应激。成功应激打破一个功能内稳态之后,能够建立另一个功能内稳态。弱光可以调节慢性应激,但对成功应激或处于功能内稳态的功能无效。细胞的多种膜蛋白可以协同介导低强度单色光的自适应调节。内源性光敏剂介导中强度单色光的调节作用。弱光可以用于诊断功能内稳态或成功应激本身和其形成过程。并讨论了光生物调节作用在外科快速康复中的应用。 相似文献