Font Size: a A A

Desigin And Implementation Of An Embedded Electronic Document Security Management System

Posted on:2016-12-11Degree:MasterType:Thesis
Country:ChinaCandidate:J T RenFull Text:PDF
GTID:2308330473454102Subject:Electronic communication and engineering
Abstract/Summary:PDF Full Text Request
With the development of China’s economy and society, electronic document has become the important carrier for daily office in government and enterprise. It brings a lot of convenience to us, meanwhile, it also brings some problems on security management. For example, unauthorized access, illegal copying, illegal tampering, unauthorized transfer, unauthorized printing, unauthorized burning and so on.Aiming at above-mentioned problems, this thesis combed carefully and summarized the most typical security management requirements on electronic document. According to research on public key cryptography technology, electronic document content marking technology and terminal control technology, this thesis discussed and studied detailed on security management of electronic document. The main contents are as follows:1. Researching on password security technology and key management technology which are mature and reliable now, aim at security management of electronic document, select appropriate technology road map and solutions, and construct the security architecture of the entire business application system. For the direction of the thesis, it’s the comprehensive utilization of symmetric and asymmetric cryptography technology. Specifically, it adopts asymmetric cryptographic algorithm, symmetric ciphers and digital certificates to achieve the full encrypted electronic document, in addition to ensure that the sender of the electronic document and the designated recipient of any third party who are unable to get the status of the plain text data;And all the key used to encrypt data should be produced, stored and managed by center end cryptographic devices.2. Currently, the main stream technology and method of electronic document content marks include: first, with simple password tools and technology to ensure that the security classification marking and document content are not tampered and indivisible. Second, converting security classification marking to information flow, then implant it to electronic document by hiding algorithm to achieve security classification marking and content of the document as a whole unity. Third, after converting electronic document into a specific format, it implants attribute of security classification marking in document structure to achieve security classification marking and content of the document as a whole unity. However, the reality is that the electronic document format and applied environment are diverse, it’s better to develop one middleware technology to realize compatible unity of various electronic document content marking by hierarchical division.3. Researching on computer terminal integrated management and control technology, it adopts technology of “Hook” to realize monitoring function of computer terminal specific registry entry. It adopts program of filter driver to realize monitoring file operation. It adopts technology of SPI(Service Provider Interface, SPI)in SPI(Service Provider Interface, SPI)to realize monitoring network behavior. It adopts interception broadcast information of the operation system to realize monitoring external equipment. According to the above-mentioned technology and method, it can achieve effectively for the security control of computer terminal.
Keywords/Search Tags:Electronic Document, Security Management System, Security Classification, Terminal Control, Implementation
PDF Full Text Request
Related items