Font Size: a A A

Design And Implement Of Diskencrypt System

Posted on:2012-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:S C ShenFull Text:PDF
GTID:2178330332499901Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the government and the development of enterprise information, information work of the focus has gradually shifted from infrastructure building business systems, more and more people are using the computer, the Internet and other advanced means of information technology as the representative, the agency online operations and management processes to achieve all business data (including number of classified and sensitive information) through the system processing, rapid formation of the financial statements required management, development planning, electronic contracting, design drawings and other documents and reports in various forms of electronic presented. In-house electronic data becoming the main information storage and organization of internal and external exchange of information between the major carriers. How to ensure the safety of these information assets, more and more attention by people.In recent years, due to the loss of laptops and other equipment and the use of poor, frequently caused by the leak occurred, which brought to the agency social impact and economic losses. My Government therefore increasing emphasis on the host storage security, and through the secret, government agencies and companies involved in the public interest in information classification and regular security checks to prevent the host storage security incidents. The standards promulgated by the State Secrecy Bureau BMB17-2006 specifically requested classified information "outside the system used in computers, laptops, personal digital terminals and removable storage devices, and data should be taken to the password authentication measures to ensure that classified data is not from unauthorized view. " Local governments, various industries such as electricity, tobacco, and telecommunications have also introduced the corresponding technical requirements of information security and management practices, including protection against the host has a data storage requirements.In this paper, the host data storage protection of customer needs, design and develop a set of full disk encryption system DiskEncrypt (hereinafter referred to as "DiskEncrypt"), with full disk encryption, authentication, hard disk status view, system backup features.DiskEncrypt system deployed in the user terminal computer or notebook, including the operating system can be realized, including the entire hard drive encryption, encryption is completed, the user's use of transparent, does not affect the user's operating habits, and to complete the first operating system authentication , after certification by the operating system can lead with high strength authentication, install and use and simple for users to create a safe, simple, transparent storage environments. To protect the hard disk data security provide the basis for the static solution, reduce the loss of laptops and other mobile devices caused by the wealth of data theft risk.DiskEncrypt system of the upper part of the interface using C # language design and implementation, simple interface, installation is simple, are based on the virtual disk filter driver technology, including the operating system where the partition of the overall transparent encryption and decryption, using the most advanced high-strength AES symmetric encryption algorithm, the key length can be flexibly configured to meet customer demand different levels of security.DiskEncrypt system uses the hierarchical structure, modular design, the upper interface, including windows interface and console interface for system recovery disk recovery program for the console interface BootLoader boot program, the lowest level is a transparent disk encryption I / O modules, the use of virtual disk filter technology, the driver layer, the middle layer disk information query module, key management module, a comprehensive encryption and decryption module, the cryptographic library module, system backup module and the authentication module.DiskEncrypt can be widely used in government agencies, military, defense, energy, manufacturing, design institutes, scientific research, IT, finance, telecommunications and other organizations and personal computer equipment.
Keywords/Search Tags:Disk Encrypt, Transparent encryption and decryption, Identity authentication
PDF Full Text Request
Related items