Font Size: a A A

Research Of Peripherals Control System Based On Trusted Cryptography Module

Posted on:2015-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z XiaoFull Text:PDF
GTID:2268330425476218Subject:Information security
Abstract/Summary:PDF Full Text Request
The development of information technology stimulated the updates of computer peripheral equipment from the traditional series of parallel port to popular USB interface, which improved the man-machine interaction experience and meanwhile, brought great risks. How to monitor peripherals effectively and safely has been discussed in the field of information security.Most control softwares in the market have achieved the controlling functions just at the application level, problems like simple principles, easy to be cracked, and mechanization of choices still not been solved. In this paper, we realized the access control at the drivers-level based on the reference to the merits of similar products. And we accessed the control management at the application layer, thus, promoted the control authorities as freely as possible. At the same time, Trusted Computing technology was introduced to be combined with access control on a prototype implementation. Furthermore, this paper achieved the functions like integrity verification and secure storage of important documents, by using the application of Key Management, Symmetric Key, Hashing Algorithms supplied by TCM(trusted computing module), which protected the security of the system from the underlying platform upwards. To be added, we achieved the secure storage of the original Hash value of important documents based on the storage capabilities of UKey devices, and improved the coupling level between modules by combining the identity authentication and file integrity verification together.We have made following contributions:1. Achieved memory access control device prototype at the driver layer. Not only a kind of device control, but also a specific memory access control for a device that solves the issues of simplify of memory access control method and pattern.2. Realized the Encryption, Integrity Checking and Key Management base on TCM (trusted cryptography module), which would help reduce risks of manipulation and damages of documents.3. Achieved highly coupled system of each module combined with UKey equipment to improve system security.
Keywords/Search Tags:Trusted computing, Filter Driver, UKey
PDF Full Text Request
Related items