Font Size: a A A

Study And Implement Of Dynamic Encryption And Decryption Technology In Document Security Management System

Posted on:2009-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:J XiangFull Text:PDF
GTID:2178360242985240Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the arrival of the comprehensive information era in enterprises, electronic documents have become a major storage way of enterprise information and an important carrier of information exchange between the corporate internal and external. These electronic documents have been the damage-and-theft target of hackers, malicious destruction of saboteurs, and the industrial espionage. How to use necessary technical means to control accessing, to do security management about electronic documents, to technically prevent internal staff or outsiders from intentional or unintentional operations resulting state secrets and internal sensitive data leakage, has growing cause the concern of countries institutions and enterprises, and it has also become one of the most popular study topics in the field of information security.Dynamic Encryption and Decryption Technology is that encrypt and decrypt files by controlling the file system filter driver in the core layer .This paper firstly presents the background of the document safety management system, and introduces the study objectives and the study content. Then it analyzes in detail the existing security document management system products at home and abroad, in response to their existing problems and shortcomings, pointing out that a combination of the core layer dynamic encryption and access control technical competence is one of the focus of the study of current network security products, and that dynamic encryption technology has important study value.The paper mainly explains the principle and its concrete realization about the dynamic encryption technology; it includes the following three aspects:(1) The principle of filter driver, as well as its development methods.(2) The design of kernel layer dynamic encryption and decryption modules in the security document management system, including functional requirements, module structure, data flow diagram, key data structure, and several issues that should pay attention when design filter driver.(3) The concrete realization of core dynamic encryption and decryption modules. Including the initialization of the driver, the three most important assignment example: Create, Read, Write, the realization of the application layer and the drive communications module.
Keywords/Search Tags:File System, File System Filter Driver, Dynamic Encryption and Decryption, IRP
PDF Full Text Request
Related items