Font Size: a A A

Information Protection System Based On Thread Monitoring

Posted on:2008-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:H T WangFull Text:PDF
GTID:2178360212994050Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, more and more data is stored in the form of electronic information documents, and the subsequent security problems appear more and more. The issue that how to protect the safety of our electronic information data has stood out before us, many companies and units of our country such as manufacturing designation finance etc have put forward strong demands of electronic information protection. Combined with the market requirements, design and implements the information protect system based on thread monitor.This article discusses the whole procedure of the information protection system development from the angle of software engineering, following the guidance of the engineering ideas, giving attention to the reliability and flexibility of the system function, using the methods of program modularization develop and complete the system. This system consists modules which are identification authentication dynamic encrypt and decrypt log audit system management. This system uses the mechanism of thread monitor to protect the security of electronic information which including the legal use and the real time encrypt and decrypt of electronic information .And it forms a transparent protection layer to make the primary use of our users unchanged.Three contributions have been offered in this thesis. First, design and implement the module of identification authentication integrated with the USB KEY to identify the user and ensure the validity of the user. Second it designs and implements the module of dynamic encrypting and decrypting to monitor the file I/O operation of the application programs. And it implements the dynamic encrypting and decrypting, consequently it keeps the data secretly. Third, designing and implementing the module of log audit to record the user's operation in the form of log to the database. It provides the functions of log retrieving and backup, and it can make reports in any forms. So it is convenient for the user to restore and look up the log, and it makes it conveniently for the user to track the incident of information leaking. Fourth, the system uses the central management. The System administrator can manage the system by graphical operation interface including certificate management of the users and key management and setting up the system's relative parameters. So system administrator can manage the user and update the secret key conveniently, and ensure the system's security in the maximum limit. Fifth, it uses the modularization developing method so that it reduces the difficulties of the system developments and improves the system's repeated usability.We employ Hook API and file system filtering driver technology in the implement of the system. And the system can encrypt and decrypt the data in the real time and protect the vital information efficiently.
Keywords/Search Tags:thread monitor, USBKEY, dynamic encrypting and decrypting, log audit
PDF Full Text Request
Related items