首页 | 本学科首页   官方微博 | 高级检索  
     

计算机系统的TEMPEST技术研究
引用本文:张大为,孙雷,张海鹰.计算机系统的TEMPEST技术研究[J].现代电子技术,2011(23):88-90,97.
作者姓名:张大为  孙雷  张海鹰
作者单位:海军航空工程学院控制工程系;西北工业大学电子信息学院;
摘    要:针对计算机的电磁泄漏问题,利用经典的麦克斯韦方程组对计算机电磁信息辐射原理进行了分析,并引入偶极子计算电磁信息辐射场的频谱与场强,在对计算机电磁信息辐射接收机接收性能进行研究的基础上,详细计算了辐射场强与接收机带宽、噪声系数、接收天线定向性及增益之间的数值关系,阐述了计算机电磁信息泄露的方式和途径,概括了基于实际的计算机应用中电磁信息安全与防护的主要手段,为军事信息的反窃取研究工作奠定了基础。

关 键 词:TEMPEST  电磁泄漏  信息安全  电磁防护

Research on TEMPEST Technology of Computer System
ZHANG Da-wei,SUN Lei,ZHANG Hai-ying.Research on TEMPEST Technology of Computer System[J].Modern Electronic Technique,2011(23):88-90,97.
Authors:ZHANG Da-wei  SUN Lei  ZHANG Hai-ying
Affiliation:ZHANG Da-wei1,SUN Lei2,ZHANG Hai-ying1(1.Department of Control Engineering,Naval Aeronautical and Astronautical University,Yantai 264001,China,2.College of Electronics and Information,Northwestern Polytechnical University,Xi'an 710129,China)
Abstract:Aiming at the electromagnetic leakage problem of computers,electromagnetic information radiation principle of computers is analyzed by using the classic Maxwell's equations.What's more,dipole is introduced to calculate spectrum and field intensity in electromagnetic information radiation field.Based on studying the receiving performance of computer electromagnetic radiation receiver,the radiation field intensity,the receiver bandwidth,the noise coefficient,the receiving antenna directional sex and the numer...
Keywords:TEMPEST  electromagnetic leakage  information safety  electromagnetic protection  
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号