| With the increasing application of computer network, computer terminal has become the starting point for most of the events in the network and source, only through perfect terminal protecting can various occurrence of securiy incidents be controlled at the source, internal network attacks and damages be stopped.Terminal system security problem is very difficult to software to solve alone. In order to solve the safety problems of the existing terminal, fundamentally improve the credibility, TCG is proposed based on trusted computing of TPM. The trusted computing hardware products (including China’s independent intellectual property rights of TCM) trusted password module field has made remarkable achievements, but did not give full play to its function in practice, more functions of TCM is not fully used up. Development on the basis of TCM of the upper application can better service for the safety of the classified terminal.In this paper, on the basis of TCM, Active Control Techniques Research on Illegal Internet Connection of Classified Terminal and AES-NI technology was studied, making the function and performance test. The main achievements are as follows:1. In terms of illegal outreach active control, implements classified terminal can’t get to the Internet, need to pass through the specified server to connect function of specified on the network;2. In terms of speed of improve performance, using AES-NI encryption technology rapid white list, do not need to users because of take up system or network resources while waiting for a long time;3. To trusted computing technology standards in China, domestic trusted password module as the foundation, the security of the upper application software and protocol design, considering the safety at the same time, both compatibility and expansibility of the system. |