| The rapid popularization of personal computers, notebook portable and more to promote this process, and now, more and more intelligent hand-held terminals, anytime, anywhere access, to bring people convenience and happiness by these devices, they often forget the individuals Data security risks that may cause harm. The event of data loss happen to them every day, or next to, data leakage also occurs, Trojans, wanton spread of the virus, these security risks to our data security sounds the alarm. Therefore, in using the computer, intelligent terminal equipment at the same time, not only to regulate their own habits, to prevent the virus has an opportunity, but also to prevent the unintended loss or disclosure of data after the loss. To prevent data loss or disclosure of prior preparedness, loss of data leakage is the last line of defense after the treatment, this line of defense is necessary.By using a variety of techniques and management methods, we can make network systems work well to ensure the availability, integrity and confidentiality of data. Therefore, the establishment of network security protection methods ensures the exchange through the network data transmission. Increase modification, loss and leakage and so on will not occur. Encryption can protect data security, by encrypting the data can be disrupted, and only people have permission can access the data. So the data can be more confidential. Encryption process the original data (or known plaintext) and the key to get an unreadable data.This project examines a low-cost, high security document protection programs, with windows driver framework, based on the file system filter driver transparent encryption and decryption programs. After generating a custom document protection rules, no longer requires user involvement. File encryption and decryption key is updated dynamically, alternating convergence of old and new key is valid, just download the key material, key updates without user involvement. These operations are transparent to users, without affecting the normal operation of the user, but also security of data play a role. |