Font Size: a A A

Design And Implementation Of A Identity Based Desktop Protection System

Posted on:2008-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2178360242973261Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the widespread and thorough use of information technology in the economical society, the security of the non-server side personal operation system, i.e. the desktop operation system, is gradually becoming a vulnerable node in the whole information security management. It is because that a good many of aspects such as the security management system, the establishment of security policy, and the use habits of individuals are all involved in the security problem. It is becoming a burning critical problem in the current information security work that to enhance the ability of security protection of the desk operation system and protect the information in the computer from being accessed illegally, misappropriated, tampered, or destroyed, through effective management methods and technology. According to the requirements of society, a system is developed to protect the desktop operation system in this thesis. It provides some effective methods for the users to guide them to use their computers properly and to avoid the menace and hidden trouble.The desk protection system is a system based on hard ware identify. The main aim of the desk protection system is to make the computer resources (software, hardware and data) be used legally by its user safely, and thereby, the hardware, software and date can be protected from being destroyed, tampered and leaked. Even if the computer is lost or stolen, it can protect the information from leaking. The system mainly achieved the functions below:·Log in the Windows system using the USB key. When the system detects that the key is pulled out, the keyboard and mouse of the computer will be locked by the locking module to prevent the computer from illegal using.·A virtual safe disk was constructed through the USB key by using files special coded in the Windows system. The virtual safe disk is used completely same as normal disks, but all of the files on it are needed to be coded and decoded when accessing and storing is done.·A "file safe" is established for each user. The USB key will transfer important files and data to the "file safe" automatically to protect the information from being accessed and modified illegally. In another way, the coding key will be generated by inputting the users' password, which will code and decode specified files by the user, so the user can protect the files needed to share with others.·The management of the intelligent key module is mainly charged with the functions of the management of users' passwords, backing up of the intelligent cipher keys and so on. In order to keep the important files of the legal users from leaked or lost when hardware failure or other unexpected situation happens, the management of intelligent key module also provides recovery functions for the certificates and keys.In this thesis, the background and the important practical meanings of the deskprotection system applications are brought out at first. Based on the system aim and framework of the system, the thesis puts emphasis on the implement of the system. This system is a kind of computer security protection software based on the USB key. This thesis explains in detail the five function modules of the system: logging on boot-strap; virtual secure disk; system locking; coding and decoding files; management of the intelligent cyphier key. A summary is brought out about the desk protection system and the meaning of generalization is expatiated in the end. There is also some work left to do to fulfill the system. Further efforts should be made to handle the no determinacy of the application environment and the stability and reliability of the intelligent cipher key.
Keywords/Search Tags:Desktop Operation System, Desktop Protection System, Symmetric Cipher Algorithm, Intelligent Cipher Key (USB Key)
PDF Full Text Request
Related items