Font Size: a A A

Universal Terminal Environment Removable Storage Media Information Secure Channel Design And Realization

Posted on:2013-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2218330371959735Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Mobile storage mediums have become popular for their small volume and convenience, resulting that information threat is more and more serious, which is another subject in the field of computer security. They have caused multiple accidents such as information leakage.The reason is that it's hard to manage the local access in general PC machines, as well as their weak safety protection ability. This paper aims to construct a safe information channel from PC to Mobile storage mediums inside a group, which can put forwarding common information, find out the secret ones and actively protect them form going out from PC. Firstly, we introduce the key technology in the field of computer security management, and study on the different methods and their differences. Then, we design a safety computer terminal system which has a trusted filter module, and does not change the terminal operation environment. We put forward the design of a content filtering module which connects to the terminal through a device interface, and is based on embedded trusted computing platform. In face of the features of Chinese classified information in a local computer network environment and an embedded platform, we give a flexible information filtering model based on Boolean model, which includes the whole text feature analysis and does not rely on statistical methods. We choose the WM algorithm to finish multi pattern matching, for its smaller memory overhead. At the same time, we make an improvement in both successfully match time and memory utilization, through a two level structure of pattern string storing and expansion of the PREFIX table, with an experimental validation. This system realizes a user-transparent information security protection method, and we can make active protection when using a mobile storage medium, by information filtering.
Keywords/Search Tags:Mobile storage medium, information security, trust, content filtering
PDF Full Text Request
Related items