首页 | 官方网站   微博 | 高级检索  
     

基于TCM的商业机密信息保护技术研究
引用本文:郭白璐,彭双和,陈勋.基于TCM的商业机密信息保护技术研究[J].信息安全与通信保密,2014(3):80-84.
作者姓名:郭白璐  彭双和  陈勋
作者单位:北京交通大学计算机与信息技术学院,北京100044
摘    要:违规外联技术一直都是研究领域的热门话题,现有的系统大多只能解决非法外联或非法接入,且无论是采用C/S架构还是双机架构都会对系统或网络性能造成很大影响.文中使用了TCM模块和AES-NI实现了主动防止非法外联/非法接入技术,这种方法不会占用系统或网络资源,也不会因监测时间轮询而造成延迟外联现象,有助于减轻加解密运算负荷,从而大幅度提升了整体访问企业内网终端时明文进行加解密的速度.

关 键 词:TCM  违规外联  AES—NI加解密  身份认证

Commercial Confidential Information Protection Technology Research based on TCM
GUO Bai-lu,PENG Shuang-he,CHEN Xun.Commercial Confidential Information Protection Technology Research based on TCM[J].China Information Security,2014(3):80-84.
Authors:GUO Bai-lu  PENG Shuang-he  CHEN Xun
Affiliation:(School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China)
Abstract:Illegal External Link technology has been brought to the attention of the researchers, while most of the existing systems can only solve the illegal outreach or illegal access. Whether it adopts C/S architecture or double machine architecture will cause great influence on system or network performance. In this paper, TCM module and AES-NI are used to prevent illegal outreach/illegal access technology initiatively, without engrossing system or network resources, nor any delay caused by monitoring time polling outreach phenomenon. So it is helpful to reduce load encryption arithmetic, thus to greatly enhance the classified terminal access to encryption speed of plaintext.
Keywords:TCM  Illegal External Link  AES-NI  identity authentication
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号