Font Size: a A A

Digital Content In The Leak Prevention System Research And Implementation Of Key Technologies

Posted on:2016-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:W ZhangFull Text:PDF
GTID:2298330467491813Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of information technology, all walks of life in production, management informationization level.is increasing day by day, to save the business confidential data in the form of electronic document has become an important asset for the enterprise. Electronic documents are easy to use on the one hand, at the same time, also exist obvious safety problems. Electronic document is easy to save, spread, modify, providing convenience for informatization office also left behind potential dangers for illegal dissemination of information. In view of the electronic document leak problem, more and more enterprises, the company began to pay attention to the secrecy of confidential information, but mainly rely on the compliance of management system and workflow, at the same time, to a certain extent, depend on the management of occupational moral constraints, but cannot fundamentally ensure data security. Digital content security is in the field of information security in recent years the rise of the research direction, research data security and confidentiality, related to this system is called the leak prevention system.In this paper, the author of the existing implementation method for the leak prevention system technology principle, research, comparative analysis of their advantages and disadvantages, found the leak prevention system based on transparent encryption technology, able to adapt to the company, unit office environment, support the common data format documents, and don’t need to user training. However, the system also has obvious drawbacks:first, to limit access to internal staff, easy to cause the internal personnel unauthorized use, thus data leaks; Second, the system for lack of a unified method of key management, and therefore cannot be classified data flow within the unit, thus cause users to use inconvenience; Third, this also is at present all the leak prevention system of a defect, is unable to support, in the absence of the deployment of the leak prevention system terminal safely use classified data from the leak prevention system.In this paper, according to the defects of leak prevention system, put forward a set of key technology improvements, and to implement. First of all, the leak prevention system in the internal users against unauthorized use of the problem, in this paper, by using the Windows Hook (Hook) technology combined with injection technology, to intercept call WindowsAPI function controlled process, to achieve the effect of access control. Second, in view of the classified data does not flow between terminal problem, this paper puts forward the support document circulation key exchange method and documents for examination and approval mechanism, from the angles of technology and management solved the problem of the classified data flow. Third, according to classified data cross-domain communication problem, through research software plus shell theory, this paper puts forward the concept document packers, the method of using "shell transport document" solve the problem of the cross-domain communication of the classified data.
Keywords/Search Tags:Data prevent leaks, Transparent encryption, Digitalcopyright protection, Windows Hook
PDF Full Text Request
Related items