| In recent years,the Internet has been used by the hostile forces as an important way for information acquisition in our country. By implanting Trojan horse,etc., political and administrative organs and confidential units have been invaded for acquisition of political, military and economy intelligence, which brings about great losses to our country. Meanwhile, with the fast development of information, though, related management system has not been performed well, and confidential consciousness is not deep in several administrative staff, who often store, process, and transmit confidential information through internet against confidential laws, and bring about serious threat to national security. To prevent frequent internet confidential leakage, confidential inspection of internet has been held by confidential administrative departments of each level, in order to improve staff confidential consciousness and regulate their behavior. One tool that can effectively searching on stored an processed confidential information by easy operation, is required for great improvement of working efficiency and quality. Based on these, a searching tool for confidential information is designed in the thesis, and the main functions include:1.Analysis and acquisition of computer operation. Through research on computer operation and detailed operation means, OS installation time, IP address, MAC address, hard-disc serial no., internet traces, document processing traces, etc. can be acquired.2.Data recovery. Normal recovery and deep recovery are both designed for recovery of deleted files by different operations. Effective discovery of deleted and cleaned data by confidential searching tool is cooperated with trace acquisition function for discovery of potential risk of computer.3.Document parse and fast searching of text. Text acquisition of both DOC and PDF files are performed. Based on AC algorithm, manual input of key word and fast quick of text information is implemented.4.Searching of mailbox, QQ chatting record. Mailbox searching is based on mailbox client software for analysis, and acquisition of local stored mail is designed; By parsing on stored file of QQ chatting record and related decryption algorithm, text content of chatting record is retrieved for the searching of QQ chatting record.5.Anti-virus U-disk. Based on ONFLASH 5188 for USB main control chip, anti-virus U-disk is designed. And the technology is used by confidential information searching tool to prevent itself from infection of malicious program. And hardware support of USB main control chip is provided for confidential information searching tool to perform reading and writing of private storage area.Based on the functions above, confidential searching tool can be widely used in the confidential inspection at confidential administrative departments and authority units, and the functions mainly include the main content of confidential technology inspection. With easy carrying and operation, U-disk is used as a medium for discovery of bug and searching of hidden danger, and will be one of great significance for improvement of computer confidential inspection and confidential management. |