Font Size: a A A

The Design And Implementation Of Trusted Terminal Access Control System

Posted on:2013-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2298330452461132Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Accompanied by the rise of the domestic enterprises, the degree of information,the vast majority of companies in the business operations and information assets, arefacing increasing security threats.Although various corporate investment ininformation security has increased year by year, but in the face of growing maliciouscode and hacker vandalism and other security issues, hard to detect, is still in a verypassive stage, let alone active defense.If no clear object of protection and the scope ofinformation security is of no value. The internal organization of the enterpriseinformation, employee information, as well as corporate customers, business partners,information and data, etc., is the basis for enterprise survival, the need to protectimportant assets.Most of the security threats facing enterprises from inside thesethreats mostly caused by the internal variety of illegal acts and violations of operating,almost all corporate executives are upset enterprise terminal security management.The paper engaged the terminal access control system construction projectprovided by the China Guangdong Nuclear basic processes and requirements for thedata source and the basis of the corresponding demand for research and analysis,analysis of the China Guangdong Nuclear internal terminal management issues of key,and then come tofinal functional and performance requirements of the trustedterminal access control systems.On this basis, the progressive realization of apredetermined terminal multifactor authentication, the terminal force integritychecking, and optimization of the trusted computing for terminal access, fromactually solve the difficult problem of the internal terminal management.The trusted terminal access control system is mostly used for the management ofthe internal network computer terminal, access management, integrity checks andtrusted computing.The trusted terminal access control system through the first of theauthentication subsystem terminal double authentication including networkauthentication system authentication, hardware certification.Terminal accessauthentication process by forcing the integrity check subsystem, terminal operatingsystem patches, anti-virus software, essential software set to check that themandatory integrity check.By trusted computing through the terminal, system fileintegrity check on the terminal, registry integrity check signature process, so that theinternal terminal to access credible, enterprise information security protection, andenhance the level of enterprise information.
Keywords/Search Tags:Trusted terminal, Two-factor authentication, Integrity checks, TrustedComputing, The process of Signature
PDF Full Text Request
Related items