Font Size: a A A

Design And Implementation Of USB Border Protection System Based On Identity Recognition

Posted on:2018-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y X ZhangFull Text:PDF
GTID:2348330518450886Subject:Full-time Engineering
Abstract/Summary:PDF Full Text Request
While the rapid development of high technology and informatization has profoundly affected all areas of the society,government departments and research institutes has paid more attention to information data,which is considered as core basis for normal operation and decision-making.USB with its "plug and play" convenient features has been a common standard for computer and peripheral interface,carrying the important task of information exchange.In this way,information security issues have also come to an end.In companies involved with secret information,computer peripherals with all kinds of USB interface have been widely used for its convenience and other features.While making research and production convenient,the USB equipment has also brought the confidential work some hidden dangers.In recent years,events with secret leak have occurred occasionally when companies involved with secret information were using USB flash drive.In order to eliminate such events,the relevant state departments are now spreading products such as "three in one" in companies involved with secret information.Even though greatly reducing such leak incident,"three in one" product is facing deployment problem which make not control the illegal use USB device radically.Based on demands,the design and development of the USB border protection system based on a set of identification is aimed to solve the current USB storage device management problems.This paper has taken USB border protection system as an example.Under the premise of fully understanding the design requirements,USB border protection system will be designed and developed from two aspects of hardware and software.In the hardware design,the system will choose Samsung Exynos 4412 quad-core Cortex-A9 processor with high performance as the core controller and use HD3SS6126 high-performance passive switch as the control circuit of the core switch.On the basis of the core hardware to be chosen,we will complete circuit schematic design of USB border protection system.In the software design,we will develop the switch,led lights and other drivers according to the GPIO driver development process,and use Netlink hot plug monitoring technology to achieve fast,accurate and efficient detection of USB devices with access to system,protecting the correct analysis of the equipment.At the same time,the system will analyze the device descriptor and string descriptor of the USB storage device as a device uniqueness identifier to provide the basis for identity recognition.USB border protection system is very easy to install and use.Based on testing,the system has met design requirements,improved the supervision of secret computers,non-confidential machines and test machines.Besides,the system which changed protection approach form passiveness to activeness has reduced the loss of assets due to human negligence,and improved the level of information security.
Keywords/Search Tags:information security, core controller, Netlink hot plug monitoring, identification
PDF Full Text Request
Related items