Font Size: a A A

Design And Implementation Of Key Technologies On TPM Based Security USB Disk System

Posted on:2011-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:C ChenFull Text:PDF
GTID:2178360308460936Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Because of the small size, large capacity, carring easily, store and exchange information quickly, removable storage device is very popular to all over the world. Even it gives us facility on work and life but it still brings a great security risk, or even leading to a very serious consequence. In 2007, a large number of leak cases investigated and found by national authorities are all due to the use of mobile storage devices. Some important information, such as the business secrets, achievement from science department, even the various kinds of research from military will cause a very big damage when it's lost or stolen. That is why the use of removable storage media in some companies which need a high qulity of security has been widely debated.So, in order to achive the security of mobile storage devices, this paper proposes a security USB disk system based on Trusted Computing Platform Module TPM. TPM based security USB disk system has access control functions, to maximize control over the use of USB disk. TPM based security USB disk system encrypts information data and stors the ciphertext in order to protect data. TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems. TPM based security USB disk could prevent the problem of leaking information caused by lossing removable USB device and cross-useing removable USB device.This paper has completed the following work:First, this paper presents the background and research significance, and describes the main research contents of this topic. Second, this paper introduces some currently used device encrypt technology, introduces Trusted Computing and Trusted Computing Platform Module TPM, puting forward an effective solution,that is TPM based security USB disk system. Thirdly, the article describes the architecture design of TPM based security USB disk, introducing the overall system functionality and the detailed function of each sub-module. Fourth, the article shows the key technology used and by the security USB disk module, and demonstrate the result of TPM based security USB systems. Finally, this paper gives a brief summary of the TPM-based security USB disk system, while analysis of the deficiencies of this system, as well as future research topics and research directions.
Keywords/Search Tags:Trusted computing, Trusted Platform Module, Removable storage device encryption, Security USB
PDF Full Text Request
Related items