資源描述:
《自主可控信息技術(shù)發(fā)展現(xiàn)狀與應用分析》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在行業(yè)資料-天天文庫。
1、第34卷第4期飛行器測控學報Vol.34No.42015年8月JournalofSpacecraftTT&CTechnologyAugust2015引用格式:萬俊偉,趙輝,鮑忠貴,等.自主可控信息技術(shù)發(fā)展現(xiàn)狀與應用分析[J].飛行器測控學報,2015,34(4):318-324.WanJunwei,ZhaoHui,BaoZhonggui,etal.Analysisofdevelopmentstatusandapplicationofproprietaryandcon-trollableinformationtechnolo
2、gy[J].JournalofSpacecraftTT&CTechnology,2015,34(4):318-324.自主可控信息技術(shù)發(fā)展現(xiàn)狀與應用分析*萬俊偉,趙輝,鮑忠貴,陳洪雁,汪琦(北京跟蹤與通信技術(shù)研究所·北京·100094)摘要:針對進口信息產(chǎn)品帶來的安全隱患,系統(tǒng)地梳理了自主可控信息技術(shù)發(fā)展現(xiàn)狀,提出了相應的應用策略及過渡策略,分析了自主可控存在的主要問題并提出了相應解決方法?!袄忡R門”事件暴露出進口信息產(chǎn)品存在后門、漏洞、邏輯炸彈等潛在安全危害,其根本解決方法是采用自主可控技術(shù)。經(jīng)過近些年在核心器件、高端芯
3、片、基礎(chǔ)軟件等領(lǐng)域的迅速發(fā)展,我國已經(jīng)具備建立自主可控信息系統(tǒng)的條件和基礎(chǔ),可遵循“頂層規(guī)劃、強制推行;統(tǒng)一部署,分步實施;加強測評,充分驗證”的思路,切實推行國產(chǎn)自主可控核心裝備的使用。在全面實現(xiàn)自主可控的過渡期內(nèi),可采用可信計算、內(nèi)核加固、強化管理等措施,有效降低非自主可控信息產(chǎn)品帶來的安全隱患。關(guān)鍵詞:自主可控;棱鏡門;后門;邏輯炸彈;可信計算;內(nèi)核加固中圖分類號:TP311.5;TP309文獻標志碼:A文章編號:1674-5620(2015)04-0318-07DOI:10.7642/j.issn.1674-562
4、0.2015-04-0318-07AnalysisofDevelopmentStatusandApplicationofProprietaryandControllableInformationTechnologyWANJunwei,ZHAOHui,BAOZhonggui,CHENHongyan,WANGQi(BeijingInstituteofTrackingandTelecommunicationsTechnology,Beijing100094)Abstract:Thispaperisasystematicrevie
5、wofthedevelopmentstatusofproprietaryandcontrollableinformationtechnologyinviewofsecurityrisksbroughtbyimportedinformationproducts.Applicationstrategyandtransitionstrategyarepresentedandthemainexistingproblemsinproprietaryandcontrollableinformationtechnologyandcorr
6、espondingsolutionsarerecommended.The“PrismGate”eventexposedthatimportedinformationproductsmaybringpotentialsecurityriskssuchasbackdoor,loophole,logicbombandsoonandtheradicalsolutionistouseproprietaryandcontrollableinformationtechnology.Asaresultofrapiddevelopmenti
7、ncoredevices,high-endchips,basicsoftwareandotherfieldsinrecentyears,ourcountryalreadyhasthefoundationandconditionsfores-tablishingproprietaryandcontrollableinformationsystems.Topromotetheuseofdomesticproprietaryandcon-trollablecoredevices,weshouldfollowthethinking
8、of“top-levelplanning,enforcement,unifieddeployment,step-by-stepimplementation,strengtheningevaluation,andfullvalidation”.Duringthetransitionperiodpriort