Font Size: a A A

Research On Key Technologies For Data Security Managing System Based On Trusted Cryptography Module

Posted on:2011-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z L ChenFull Text:PDF
GTID:2178330338989860Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the development of process of digital and information, the security issues of data in computer have been paid more and more attention. The more the degree of informatinization, the more that business rely on information system and therefore the higher the importance of data. Whether these data can be effectively saved, read, and protected become the key factor of business stability and development. Traditional information security system mainly consists of firewall, anti-virus software and intrusion detection system. Although traditional information security system can prevent the invasions of virus and Trojan in some condition, it is to prevent threaten outside and lack of the protection of data itself.Rise of the research of trusted computing provides a good idea to solve security management of critical data. Trusted Computing refers to a trusted component, which means behavior of operation and process is predictable in any condition and can very well resist damage caused by bad code or some physical disturbance. The security features that Trusted Computing provides are: Terminal Authentication, Data Integrity Verification, User Authentication, User Rights Legitimacy, Port Control and Management, Data Encrypted Storage, and Hardware Protection of Critical Information. Trusted Computing embeded in data security management system can protect critical data from the original source and prevent the loss of leakage incidents in the greatest degree.This subject, based on trusted hardware (Trusted cryptography module), through the design of associated software (Data Security Management System), ensure the data security of entire intranets system. Through trusted server startup, it ensures the server trusted. Through the file system protection module based on filter driver, it achieve client landing trusted and applications running trusted, so as to ensure the security of important data on the client. Through trusted disk module, it achieve the partition of internal disk and external disk, whick ensure removable storage media trusted.
Keywords/Search Tags:Tursted Computing, Data security, Filter driver, Disk protection
PDF Full Text Request
Related items