Font Size: a A A

Research And Implementation Of Electronic Document Security Management System

Posted on:2015-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2298330467956751Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, we have stepped into aninformation society which renovates human being’s life style and behavior concepts.Internet not only makes our works and lives more convenient, but also brings varioussocial sectors with more business opportunities. As network behaviors becomeincreasingly frequent and popularized, especially with increasingly regular onlineoffice and trade activities in people’s lives, information security has turned into afocus concern inevitably. With the rapid development of communication industry,industrial information, as an intangible resource like customer information, similarlyneeds to be protected. The information forms of the mobile communication industryrelate to many aspects including marketing policies, network security system, humanresource system, financial auditing and budgeting, etc. For any enterprise, theinformation resources from all of the sectors and specialities are part of its corecompetiveness. Therefore, it is essential to provide a reliable and private networkenvironment for each enterprise. The subject of this study aims at ensuring thenetwork security of information sources by preventing information from leakingthrough encrypting electronic documents.Based on the practical requirements of the mobile communication industry,many technical approaches as follows are applied in this study to manage theelectronic documents effectively and safely.1. It is necessary to carry out authentication upon entering the system and there aretwo kinds of users, i.e. system administrator and regular user with different levels of authorities and privileges.2. Detailed and reasonable document management system is built. The system iscomposed of5modules: login, basic information management, documentmanagement, document encryption&decryption and system setup. Throughthese modules, the documents can be managed according to different units andcategories, thus not only realizing clearly structured management, but alsoconforming to our daily utilization habits.3. The design of encryption and decryption is realized by adopting AES technologyand an AES class is designed based on AES theory. With this design, when adocument is encrypted or decrypted,it is only necessary to call the memberfunction in the class. The data block is128bits and the key length is128bits. Inaddition, the document content is encrypted as well.4. There is a log record function in the system. It can be used to record the systemoperations in details and is convenient to be tracked and checked.5. The electronic document security management system was verified through aseries of tests.The electronic document security management system designed in this studyachieved good application effects in the unit to which it was applied. The applicationeffects mainly represent in the following aspects. Firstly, by using the system in allsectors of our company, each sector can manage their own documents strictly andregularly, thus preventing authorized documents from being copied and spread theand only enabling valid users to use the information including adding, deleting andmodifying document users. Secondly, after logging in the system, a user can managethe documents according to different units and categories systematically andreasonably. Thirdly, only authorized user can use encryption and decryptionfunctions. Otherwise, the documents will be shown in garbled characters. Finally, alog inquiry function is established to make for tracking and inquiry of the records.It is verified through a series of tests that the system has obtained practically good operation effects. It is not only operated conveniently and simply, but alsoconforms to the document encryption security management demands of the mobilecommunication industry. Particularly, it is useful for the confidentiality of enterprisemarketing strategy programs and capable of preventing trade secrets from beingstolen by competitors. Meanwhile, it can play certain roles in protecting theinformation from other inner daily works as well.
Keywords/Search Tags:electronic document security management, digital copyright management, AES
PDF Full Text Request
Related items