Font Size: a A A

Research Of Isolation And Protection Technology Of Sensitive Information In The Mobile Terminal

Posted on:2015-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:R F CaiFull Text:PDF
GTID:2308330464468686Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the use of important and sensitive information in enterprises,which have country and even overseas branches, is becoming more and more extensive, the information exchange between open net and enterprises intranet by traveling employees is increasing. Therefore, researching isolation protection technology for sensitive information in the mobile terminal has a higher theoretical significance and practical value.Firstly, we made a detailed analysis of the research status of isolation protection technology, including domestic and international existing information security protection system, trusted computing technology, existing isolation switching technology, as well as the core isolation switching equipment HAIPE in US GIG network. Then we analyzed the main forms of attack which the sensitive information in the mobile terminal may face. Next, we mainly study the application scenario of transmission of sensitive information between the mobile terminals and enterprises intranet,according to the application scenario, we establish a security model for the sensitive information which need isolation and protection in the mobile terminal, and we made a detailed design for the model. Then on the basis of the grasp the design principles, we put forward the isolation and protection technology of sensitive information in the mobile terminal. Using the trusted computing technology provide the underlying security, design a custom protocol for the isolation of internal transport channel, by splitting and restructuring of data and using the different transport channels in order to reduce possible vulnerabilities.Finally, we programmed and implemented the critical technology include of the authentication and key negotiation process, data separation and restructuring. We also analyzed the mechanisms against the attack and the safety and protective mechanisms from the both software and hardware, thus proving a high security of this scheme.
Keywords/Search Tags:Mobile Terminal, Sensitive Information, Secure Model, Isolation and Protection
PDF Full Text Request
Related items