期刊文献+

计算机键盘电磁信息泄漏及其防护研究 被引量:2

Study on electromagnetic compromising emanations of computer keyboard and its protection
下载PDF
导出
摘要 在研究PS/2键盘控制模块的时钟与数据信号接口电路结构特征的基础上,利用电路等效的方法研究了键盘电磁泄漏发射与信息还原机理,通过测试实验验证了该方法的有效性;进一步提出了两种电磁泄漏防护方式,具体设计了一种电磁泄漏防护方案。实验测试结果表明,该方案能够有效抑制键盘的电磁发射,防止按键信息通过电磁发射被还原。 This paper studied the circuit structure characteristic of data and clock signal interface in the PS/2 keyboard’s control module.On this basis,it used the method of equivalent circuit to research the electromagnetic compromising emanations and its information recovery mechanism,the effectiveness of which was test and verified by a later measurement experiment.Furthermore,it proposed two different ways of security protection,and designed a shielding protection method against compromising emanations of keyboard.It is demonstrated by the result of the experiment that electromagnetic emission of keyboard is suppressed effectively and good protection effect against keystroke recovery is reached.
作者 王利涛 郁滨
出处 《计算机应用研究》 CSCD 北大核心 2012年第7期2708-2711,共4页 Application Research of Computers
关键词 电磁信息泄漏 信息安全 下降沿 安全防护 electromagnetic compromising emanations information security falling edge security protection
  • 相关文献

参考文献15

  • 1YOUNG J. NSA tempest documents[EB/OL].http://cryptome.info/0001/nsa-tempest.htm,2010. 被引量:1
  • 2Van ECK W. Electromagnetic radiation from video display units:an eavesdropping risk[J].Computers and Security,1985,(04):269-286. 被引量:1
  • 3韩放.计算机信息电磁泄漏与防护[M]北京:科学出版社,1993. 被引量:1
  • 4KUHN M G. Compromising emanations:eavesdropping risks of computer displays[EB/OL].http://www.cl.cam.ac.uk/TechReports/UCA M-CL-TR-577.pdf,2010. 被引量:1
  • 5KUHN M.G. Security limits for compromising emanations[A].Beilin:Springer-Verlag,2005.265-279. 被引量:1
  • 6董士伟,许家栋.CRT显示器信息电磁泄漏保熵性研究[J].电子与信息学报,2004,26(3):405-409. 被引量:2
  • 7张洪欣,吕英华,贺鹏飞,王海侠.计算机电磁信息泄漏文字再现[J].西南交通大学学报,2007,42(6):653-658. 被引量:8
  • 8TOSAKA T,TAIRA K,YAMANAKA Y. Electromagnetic security for electromagnetic disturbance that contains information[A].2006. 被引量:1
  • 9TOSAKA T,TAIRA K,YAMANAKA Y. Feasibility study for reconstruction of information from near field observations of the magnetic field of a laser printer[A].2006.630-633. 被引量:1
  • 10SMULDER S P. The threat of information theft by reception of electromagnetic radiation from RS-232 cables[J].Computers and Security,1990,(01):53-58. 被引量:1

二级参考文献22

  • 1张洪欣,吕英华,韩宇南,车树良,贺鹏飞.多导体连接器孔隙电磁辐射信息泄漏效应研究[J].哈尔滨工程大学学报,2004,25(4):517-520. 被引量:2
  • 2张洪欣,吕英华,邱玉春,车树良.计算机电磁信息泄漏阈值效应研究[J].通信学报,2004,25(10):87-92. 被引量:5
  • 3ZHANGHong-xin,LUYing-hua,QIUYu-chun,CHENDa-qing.The Study of the Recognizability of Electromagnetic Leakage Information Arising from Computer[J].The Journal of China Universities of Posts and Telecommunications,2004,11(2):80-85. 被引量:5
  • 4董文彬 殷明 康四军.并行复合源电磁信息泄漏的非保熵性[A]..微波电磁兼容及超高频移动通信技术第三届全国学术会议论文集[C].湖南张家界,Oct1996.45-52. 被引量:1
  • 5R.米特拉著 金元松译.计算机技术在电磁学中的应用[M].北京:人民邮电出版社,1983.197-207. 被引量:2
  • 6DURAK B. Hidden data transmission by controlling electromagnetic emanations of computers [ EB/OL ]. [ 2000-08-02 ]. http://altern, org/berke/tempest. 被引量:1
  • 7KUHM M G, ANDERSON R J. Soft TEMPEST: hidden data transmission using electromagnetic emanations[ EB/OL]. [2000-08-02]. http://www, cl. cam. ac. uk. 被引量:1
  • 8LU Ling, NIE Yan, ZHANG Hongjin. The electromagnetic leakage and protection for computer [ C ] . 1997 International Symposium on Electromagnetic Compatibility Proceedings. Beijing: IEEE Press, 1997: 378-382. 被引量:1
  • 9van ECK W. Electromagnetic radiation form video display units: an eavesdropping risk? [ J]. Computers & Security, 1985, 4(4) : 269-286. 被引量:1
  • 10SMULDERS P. The threat of information theft by reception of electromagnetic radiation form RS-232 cables[ J]. Computers & Security, 1990, 9(1) : 53-58. 被引量:1

共引文献8

同被引文献10

  • 1张洪欣,吕英华.电磁信息泄漏技术及其发展[J].安全与电磁兼容,2004(6):39-43. 被引量:16
  • 2HATCH A, WILLIAMS resonance mechanism of gas breakdown[J]. IEEE 1954, 25(4): 417-423. H. The secondary electron low-pressure high-frequency Journal of Applied Physics,. 被引量:1
  • 3SHITVOV A P, ZELENCHUK D E, SCHUCHINSKY A G V. Passive intermodulation in printed lines[J]. lET Miceow. Antennas Propag., 2007, 3(2)= 260-268. 被引量:1
  • 4YU M. Power-handling capability for rf filters[J].Microwave Magazines, 2007, 8(5): 88-97. 被引量:1
  • 5B STANDAROS. Space engineering: Multipacting design and test, vol. ECSS-20-01A[R]. The Netherlands: ESA Publication Division, ESA-ESTEC, 2003. 被引量:1
  • 6LI J, CAO R G, LI S Z. The development of EML technology in China [J]. IEEE Transactions on Plasma Science, 2013, 41(5): 1-5. 被引量:1
  • 7Y YAMAMOTO, KUGA N. Short-circuit transmission line method for PIM evaluation of metallic materials[J]. IEEE Journal and Magazine, 2007, 49(3) : 682-688. 被引量:1
  • 8YU X M, TANG X H, TANG D. High-stability connection method for the inner conductor of high- power vacuum coaxial resonator[J]. PIERL, 41(1)~ 1-10. 被引量:1
  • 9沈家楠.谈谈TEMPEST技术[J].系统工程与电子技术,1990,12(10):53-60. 被引量:2
  • 10孙德刚.TEMPEST:隐蔽通道的信息泄漏与防护[J].计算机安全,2002(19):16-19. 被引量:1

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部