Font Size: a A A

The Application And Research Of Security Technology In CAD System

Posted on:2007-11-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y MaiFull Text:PDF
GTID:2178360242461055Subject:Mechanical design and theory
Abstract/Summary:PDF Full Text Request
Towards the security defects of current popular CAD systems, this paper brings forward the concept of the Security CAD System ( SCADS ) and gives an appropriate implementation of the system. Combining CAD systems and PDM System, applying data encryption and digital signature, the implementation constructs a security CAD System based on the runtime encryption, provides effective protection of important enterprise CAD data.First, this paper briefly reviews the history of CAD systems, analyses the current application states of CAD systems, points out the security defects of these CAD systems, clarifies the importance of the data security research in CAD systems. Discuss the research results, relative theories and the security measures in current enterprise applications. Point out the security requirement of CAD systems and problems must be solved.Second, according to the security requirements of CAD systems, combing the actual enterprise application, bring forward the concept of security CAD system (SCADS). Based on the concept, construct a general, safe security CAD system platform. Present the system architecture. Determine the functions of each system module.Third, focus on the core technology of the new system, Runtime Encryption. Discuss its importance in security CAD system, analyses some mechanism about the technology, give out the implementation, and evaluate the technical feasibility. Towards the security requirement, introduce security technology, present system security strategy and analyses the security implementation.Last, for practice, according to the actual enterprise circumstance, point out the defects of the new system and the relative solution, bring forward some expectations about Security CAD System.
Keywords/Search Tags:CAD System, Data Encryption, Digital Signature, Runtime Encryption PDM System
PDF Full Text Request
Related items