CN1306357C - A computer system for guaranteeing information security - Google Patents
A computer system for guaranteeing information security Download PDFInfo
- Publication number
- CN1306357C CN1306357C CNB2004100775603A CN200410077560A CN1306357C CN 1306357 C CN1306357 C CN 1306357C CN B2004100775603 A CNB2004100775603 A CN B2004100775603A CN 200410077560 A CN200410077560 A CN 200410077560A CN 1306357 C CN1306357 C CN 1306357C
- Authority
- CN
- China
- Prior art keywords
- hard disk
- computer system
- key
- information security
- usb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The present invention relates to a computer system for guaranteeing information security, which comprises universal components for assembling a personal computer of which the hard disk is integrated with an embedded type intelligent processing system which comprises a processor, a microkernel operating system and a memory. A module of a hardware logic encrypted circuit is integrated in a driving circuit of the hard disk, and the operation of data encrypting and decoding is completed by the hardware logic encrypted circuit called by instructions of the processor and the microkernel operating system. In the process of the use of the computer system of the present invention for guaranteeing information security, a user is only in need of setting initial functions according to operational prompts in the process of powering on the computer so as to realize functions of hard disk protection, hard disk isolation, network isolation, data encryption, encryption key secure storage, user identity forced certification, identity protection in operational process, user authority management, electromagnetic protection, etc., and the operation is simple and easy in use. The present invention is suitable for users who are comparatively in urgent need of computer data safety, such as scientific research institutions, financial departments, government departments, national defense departments, etc.
Description
Technical field
The present invention relates to a kind of computer system, relate in particular to a kind of computer system that ensures information security.
Background technology
Thereby existing Computer Architecture imperfection has caused the leak of information security.At present, the file ciphering technology of PC is normally finished through the participation of software and operating system, be after the interior encryption software of PC carries out software or encrypted card encryption to file, by operating system (software), be deposited in the permanent storage media (as hard disk), this encryption method is dangerous, for example, the Hacker Program that is hidden in the system can obtain key with after the file comparison process before and after encrypting, with whole document deciphering.Therefore occurred a kind of by the medium method of encrypting, for example the patent No. is ZL99113164.9, denomination of invention is a kind of Chinese patent literature of encrypting computer hard disc device, it discloses a kind of encrypting computer hard disc method and device, on the Basis of Computer Engineering of routine, form encrypted circuit by encryption chip, encryption chip is made up of control unit circuit, encryption/decryption element circuit, RAM storer and gauge tap K, to the data stream hardware encipher optionally of turnover hard disk, thereby realized that so-called medium encrypts.Even illegally obtain hard disk, there is not legal key, also can only read the file after the encryption, can't decode; Legitimate secret is arranged, not on the same group, though can see D: dish, also because the decoding process difference still can not obtain useful information.Realize encrypting computer hard disc, increased the confidentiality of computing machine.But the cryptographic algorithm of this type can not be changed, so its security is not high yet.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of reinforcement that the data of hard disk are carried out encryption and decryption, and has the computer system that ensures information security of hard disk protection.
The technical matters that the present invention further will solve is to provide a kind of computer system that ensures information security that hard disk is isolated that has.
The technical matters that the present invention further will solve is to provide a kind of computer system that ensures information security with Network Isolation.
For solving the problems of the technologies described above; the technical solution adopted in the present invention is: a kind of computer system that ensures information security is provided; it comprises the universal component of forming personal computer; embedded intelligence disposal system that the hard disk of this computing machine is integrated; comprise processor; Mach and storer; and also integrated hardware logic encrypted circuit module in the hard drive circuit; to data encryption and decryption process is to call the hardware logic encrypted circuit under the instruction by processor and Mach to finish; this computer system is forced the magnetic head biasing of hard disk by hardware circuit; with hard disk partition is protected location and corresponding two parts of MIRROR SITE; the protected location is at negative magnetic track; the user can't visit; this computing machine also comprises an intelligent usb key system; it is one and has data processor; the system of storer and microoperation kernel and cryptographic algorithm program, it is having the judgement of oneself and is replying interaction mechanism with disk C PU communication process.
This computer system is divided into several zones with a hard disk by space specified, when the user starts shooting by the virtual hard disk administrative skill, eject start boot section choice menus, one of them then is set to negative magnetic track with other two for the start master boot sector and when activating in elected, does not allow user capture.
This computer system also disposes outside network security separate card, and the hard drive circuit is drawn row's physical signal link line and is connected to this network security separate card.
The invention has the beneficial effects as follows: since the hard disk of computing machine of the present invention integrated an embedded intelligence disposal system, comprise processor, Mach and storer, therefore its cryptographic algorithm can be changed, therefore the existing medium of the present invention is encrypted, can change cryptographic algorithm again, so its safety coefficient height; In addition, because computing machine of the present invention also comprises an intelligent usb key system, intelligence usb key system itself has the safety encipher function, the judgement of oneself being arranged and reply interaction mechanism with disk C PU communication process, therefore can strengthen the safe reliability of computer system of the present invention; The computer system that ensures information security of the present invention in use user only need be carried out the Elementary Function setting according to the operation indicating of start process and can be realized functions such as data encryption, hard disk protection, hard disk isolation, Network Isolation, is simple and easy to use.Satisfy the user more urgent, as scientific research institutions, finance and demands such as government and national defence to Computer Data Security.
Description of drawings
Fig. 1 is the computer working process flow diagram that ensures information security of the present invention.
Fig. 2 is the ram mode of the computer system that ensures information security of the present invention and the implementation method process flow diagram of flexible protected mode.
Fig. 3 is that the protected location subregion and the MIRROR SITE of the computer system that ensures information security of the present invention realized principle schematic.
Fig. 4 is the encryption synoptic diagram of the computer system that ensures information security of the present invention.
Fig. 5 is the hard disc physical sequestered partition synoptic diagram of the computer system that ensures information security of the present invention.
Fig. 6 is the annexation topology diagram that the network security separate card of the computer system that ensures information security of the present invention is connected with different user.
Fig. 7 is the hard disk isolated area of the computer system that ensures information security of the present invention and the corresponding relation synoptic diagram of physical isolation card.
Fig. 8 be the USB driving circuit of the computer system that ensures information security of the present invention with to user interface topology interface chart.
Fig. 9 is the usb key of the computer system that ensures information security of the present invention and the process flow diagram that system sets up communication.
Embodiment
The computer system that ensures information security of the present invention comprises that (1) prevents the maskable casing and the outside data cable that is connected of electromagnetic exposure; (2) has the hard disk of data image, data encryption special circuit; (3) line and the interface of the USB device that provides of hard drive circuit; (4) the intelligent USB KEY (key) of user identity forcible authentication; (5) other universal component of network security separate card and composition personal computer.
Improvement of the present invention concentrates on hard disk and two critical components of usb key, and respectively integrated embedded intelligence disposal system comprises processor (CPU), Mach (COS) and storer in two parts.Purpose is to guarantee that two closely bound up subsystems can safety communications, and provides easier operating interactive platform for the user on function structure basis separately.Mainly comprise the improvement of the following aspects:
(1). integrated hardware logic encrypted circuit module in the hard drive circuit, all write the data of hard disk and all pass through encryption, on the contrary the data of reading also are decrypted operation;
(2). in firmware (Firmware), increased the cipher authentication program, cannot the access hard disk data by authentication;
(3). make hard disk areas isolate and the virtual management system constructing virtual mirror image operation zone by hardware circuit;
(4). the hard disk internal storage areas is isolated, structure multi-user master boot sector;
(5). the hard drive board design goes out a short distance USB line and interface;
(6). an intelligent usb key system;
(7). external network connects isolation card;
(8). prevent the maskable casing and the external connection line cable of electromagnetic exposure; Casing and external connection line cable have increased the shielding processing that prevents EMI radio magnetic wave information leakage; Power supply has strengthened and has prevented the EMI circuit that conducts.
See also Fig. 1, the computer working flow process that ensures information security of the present invention may further comprise the steps:
101. main frame start and self check;
102.HDD initialization;
103. judge whether to insert usb key, if then execution in step 104, if not then execution in step 111;
104.USB cryptographic key identification;
105.HDD mode of operation configuration;
106. read MBR;
107.OS start;
108.OS normal operation;
109. judge whether usb key is normal, if normal, then return step 108, if undesired, then execution in step 110;
110. wait for that usb key is normal, step 109 is returned in the halt system operation then;
111. the user identity password identification, execution in step 105 to 108 then;
Computer information safe of the present invention system mainly contains following technology.
1. hard disk protection technology
The present invention realizes that the method for hard disk protection is to utilize hard disk to add the characteristic that Electrical heads makes zero, and forces the magnetic head biasing by hardware circuit, is protected location and corresponding two parts of MIRROR SITE with hard disk partition, and the protected location is at negative magnetic track, and the user can't visit; Use the virtual hard disk storage management system, allow the user be actually MIRROR SITE, do not touch true protected location by the data field of the read-write operation under the normal condition; Just can the write protection district when authority is carried out " backup " and operated; Carrying out " recovery " operation just can be with current system whole " refreshing ".The existence of protected location can prevent that any deletion, virus damage, format even low-level formatting operation from destroying, and reaches protection hard disc data purpose.
Hard disk protection has ram mode and two kinds of flexible protected modes.
These two kinds of pattern implementation methods determine that in system's initial setting up detailed step and setting operation process flow diagram are as shown in Figure 2 by authorized user.
The implementation method of ram mode and flexible protected mode may further comprise the steps:
201. main frame start and self check;
202. and hard disk is set up handshake;
203. hard disk micro-kernel program obtains control;
204. eject user function setting operation combination hot key;
205. judge whether to carry out initial setting up, if then execution in step 206, if not, then detect user identity, judge then whether identity is correct,, then read hard disk MBR information if correct, if the OS of load operation system then incorrect, then returns the detection user identity;
206. ejection setup menu;
207. enter password;
208. judge whether password is correct, if incorrect, then re-execute step 208, if correct, then execution in step 209;
209. input parameter;
210. judge whether to preserve change is set, if then execution in step 211, if not, then re-execute step 210;
211. main frame restarts.
After operating process is the system boot self check, host B IOS sends order to HDD, detect whether ready signal of hard disk feedback, readyly then enter next step, detect the initialization information of hard disk and loading the Firmware information of hard disk, give hard disk control with control, the core component of frameworks such as CPU and internal memory on mainboard having that exchanges data all is subjected to hard disk with hard disk and micro-system (COS) gets involved and controls; The COS user oriented ejects " Ctr+Alt+M " interactive operation hot key, carries out the back and ejects the detailed functions setup menu; The user is by menu and import the authentication password; Press the operation of helping prompt execution initial configuration, hard disk partition is become shielded main partition (PrimaryMaster) C, generate mirror image virtual area C ' simultaneously automatically, and the configuration whether affirmation will be changed is preserved.Seeing also Fig. 3, is that protected location subregion and MIRROR SITE are realized principle schematic.
Remaining space is arranged, and system is changed to remainder automatically from subregion (Primary Slave).
The difference of two patterns is authority differences, and the user of ram mode only reads the authority of hard disc data, can not preserve data change; Flexibly the user of protected mode has increased to enjoy except above authority and has write the storage authority temporarily.
It is very similar that the backup of this design and hard disk protecting card and the embedded procedure operation of mainboard recovers software function; but it is with the obvious advantage to be based on hard disk low layer design proposal, show compatibility, reliability, stability, whether take main frame resource, carry out aspects such as efficient and cost.
2. data encrypting and deciphering technology
The implementation method of data encrypting and deciphering is that all data that write hard disk all are to encrypt automatically through 8 groups of eight bit register hardware logic encrypted circuits, and all data of reading are deciphered automatically, and decipher circuit is as the turnover outpost of the tax office of control data.Encrypt synoptic diagram, as shown in Figure 4.
To data encryption and decryption process is to finish by calling the hardware logic encrypted circuit under processor and Mach (COS) instruction, transparent fully to the user.File is encrypted forever on disk and is deposited, and DISK to Image is exactly a complete encrypt file from this view point.Even it is stolen that purpose is that machine appears in computing machine, can not make data content be decrypted state yet, reach the secret purpose of hard disc data.
Compare with the dedicated hard disk data encoded card, integrated designing technique has increased system reliability, stability and compatible; Mainboard is walked around in the encryption and decryption operation and BIOS directly controls the gateway of hard disk, reduces the probability that password is cracked and detours and open by intercepting and capturing greatly, has strengthened confidentiality.
Decrypting process is its inverse process, and principle is identical.
3. identity identifying technology
Authentication of the present invention comprises two kinds, and a kind of is password authentication identification; Another kind is usb key identification.
3.1 password authentication method of identification
The implementation method of password authentication method of identification is to enable three grades of identity and authority is provided with safety management, and implementation is to login with password.Three level of identity are domestic consumer, system manager, safe Administrative Manager.
Main authority defines, and reads the hard disc data authority with the user of domestic consumer's password login and can guidance system enter the OS operating platform, perhaps can have backup and recover read-write operation authority (being determined by highest line political affairs rank); The system manager can enjoy whole authorities of domestic consumer, has the password authority of change self and domestic consumer in addition.Safe Administrative Manager answers the user to increase, and is the highest level user, and main effect is to prevent from that password from losing to wait the password under the accident situation to nullify and the registration management activity.
But operating process frame of reference process flow diagram.
3.2USB key method of identification
The implementation method of usb key method of identification be when detecting the usb bus interface, detected after the start usb key equipment and ready after, call driving and the two communication protocol of usb key by hard disk, realize and the communication of usb key; Then usb key sends the dark text key of process encryption to hard disk, after hard disk is received the dark text key, call the algorithm of storing among the ROM (identical) and untie the dark text key and verify, feed back to a string new key character of usb key after qualified, as next encrypted secret key with cryptographic algorithm in the usb key.All different for the key that guarantees to send, the method for employing is that each key string that sends has one at least with last time different.Usb key carries out encrypting storing after receiving key, waits for and reads use once more.
The method that tracking and supervising in adopting the start process forcible authentication and use operating process in the usb key recognition methods combines.If the encryption of hard disk control authentication failure then sends the order of reading key once more, triplicate failure, the locked no longer response request of usb key then, stop supplies key.
The identification success and enter operating system after, uninterruptedly scan the presence of key port and legal key by application software-card sending system, then quit work less than key if detect, and locked hard disc data goes out inbound port.
4. hard disk memory region is isolated with a plurality of master boot sectors and is deposited technology
Hard disk memory region isolation and a plurality of master boot sectors and the implementation method of depositing are to allow the virtual hard disk administrative skill, and a hard disk is divided into several zones (being no more than 3 at most) by space specified.When the user starts shooting, eject start boot section choice menus, elected in one of them for the start master boot sector and when activating, then be set to negative magnetic track with other two, do not allow user capture.
Characteristics are that each zone can realize that the master boot sector realization installation of state of activation separately guides (can be dissimilar) operating system and normal OS operating environment separately.Be illustrated in figure 5 as hard disc physical sequestered partition synoptic diagram.
5. Network Isolation technology
The implementation method of external network isolation features is under the prerequisite of hard disk internal insulation function, disposes the network security separate card of an outside again, just different user can be connected to different external networks.Topological structure such as Fig. 6 of annexation show.
Implementation method is the method that bundlees one to one with different isolation boot sections and each RJ-45 port of network security separate card, realizes internal insulation district and isolation card RJ-45 mouth (passage) one-to-one relationship.Hardware design is to draw row's physical signal link line by the hard drive circuit to be connected to isolation card, after the start when the different boot section of the each selection of user system discern and send a signal goes the gating correspondence to the microrelay toggle switch of isolation card network interface passage automatically.When carrying out different passage change action, force host computer system to reset again to empty the data in dynamic storage (internal memory) and the network adapter.
Wherein hard disk and card to be connected topological relation as follows, on the basis of hard disk internal zone dividing isolation features, cooperating external network to connect isolation card, carry out the principle that the port of each isolated area and each isolation card is bound one to one.Be illustrated in figure 7 as the corresponding relation synoptic diagram of hard disk isolated area and physical isolation card.
6.USB driving circuit and connection line technology
The USB driving circuit is with more ingenious to the design of user interface overall topology, topology connects as shown in Figure 8, and implementation method is the usb bus driving governor is integrated into the hard drive circuit board and draws the USB port line from the circuit board of hard disk and directly insert usb key to the user.Simultaneously cabinet makes it the USB exit position of forward as far as possible panel when the hard disk bracket location layout designs, and it is the shortest to reach the hard disk USB line that goes between between the cabinet panel USB interface.Connection cable carries out electromagnetic screen to be handled.
Purpose is to avoid increasing the probability of being intercepted and captured because general usb key identification authentication system is connected on mainboard (BIOS) participation at present.
7.USB the technology of key
Safe usb key implementation method is a system that has data processor (CPU), storer and microoperation kernel (COS) and cryptographic algorithm program, itself has the safety encipher function, the judgement of oneself is being arranged and replying interaction mechanism with disk C PU communication process, purpose is that enhancing is safe and reliable.
USB has micro OS (COS) and does not have the senior key that carries cryptographic algorithm of COS to compare, not encrypting with the product of own COS is that a software algorithm routine call that is stored in the key is come out, and (CPU and RAM) realizes cryptographic operation by extraneous hardware platform; Having the product of COS that the CPU of oneself and the key of micro OS (COS) are arranged is ownly independently to finish to the data cryptographic calculation, does not have intermediate link safer.
The process flow diagram that key and system set up communication as shown in Figure 9, the method that key and system set up communication may further comprise the steps:
301. authentication;
302. detect USB line and port device physical connection;
303. judge whether to be ready to, if be ready to, then execution in step 304, if be not ready to, then point out checkout facility and connection line, and then return step 302;
304. system sends order and reads USB port equipment;
305. prompting input key password;
306. judge whether password is correct, if incorrect, then return step 305, if correct, then execution in step 307;
307.USB device responds rreturn value;
308. driving, the system call USB device sets up communication protocol;
309. read key dark text key;
310. system decrypts is handled
311. it is legal to judge whether, if illegal, and then locked system, if legal, then system generates the key of a string new random string as next authentication;
312. send to usb key, load OS, whether key detection new character strings is effective simultaneously, if effectively, then encryption, and saving result becomes dark text.
8. electromagnetic protection technology
The electromagnetic protection disposal route of computer information safe of the present invention system is to utilize prior aries such as pressing down source method or containment method to take measures from the emission source, electromagnetic radiation is dropped to minimum, suppresses the electrical network conduction in conjunction with filtering technique simultaneously.Mainly be that the data line and the increase shield external layers such as usb key and hard disk connecting line of data line call wire, keyboard, mouse between main frame and display casing, display and the main frame are handled, the high power switching power supply of main frame and display is strengthened filtering circuit (PFC) processing, and the I/O port connector of keyboard, mouse and video data line and main frame sensitivity selects for use inner band to increase the connector of filtering guard or conductive processing.
Claims (8)
1; a kind of computer system that ensures information security; it comprises the universal component of forming personal computer; it is characterized in that: embedded intelligence disposal system that the hard disk of this computing machine is integrated; comprise processor; Mach and storer; and also integrated hardware logic encrypted circuit module in the hard drive circuit; to data encryption and decryption process is to call the hardware logic encrypted circuit under the instruction by processor and Mach to finish; this computer system is forced the magnetic head biasing of hard disk by hardware circuit; with hard disk partition is protected location and corresponding two parts of MIRROR SITE; the protected location is at negative magnetic track; the user can't visit; this computing machine also comprises an intelligent usb key equipment; it is one and has data processor; the system of storer and microoperation kernel and cryptographic algorithm program, it is having the judgement of oneself and is replying interaction mechanism with disk C PU communication process.
2. the computer system that ensures information security as claimed in claim 1, it is characterized in that: this computer system is by the virtual hard disk administrative skill, a hard disk is divided into several zones by space specified, when the user starts shooting, eject start boot section choice menus, one of them then is set to negative magnetic track with other two for the start master boot sector and when activating in elected, does not allow user capture.
3. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computer system also disposes outside network security separate card, and the hard drive circuit is drawn row's physical signal link line and is connected to this network security separate card.
4. the computer system that ensures information security as claimed in claim 1 is characterized in that: the usb bus driving governor of this computer system is integrated into the hard drive circuit board and draws the USB port line from the circuit board of hard disk and directly insert usb key to the user.
5. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computer system comprises that password authentication is discerned and usb key is discerned this two kinds of identity identifying methods.
6. the computer system that ensures information security as claimed in claim 5, it is characterized in that: the implementation method of this usb key method of identification be when detection usb bus interface, detected after the start usb key equipment and ready after, call the driving and the two communication protocol of usb key by hard disk, realize communication with usb key; Then usb key sends the dark text key of process encryption to hard disk, after hard disk is received the dark text key, calling the algorithm of storing among the ROM unties the dark text key and verifies, feed back to a string new key character of usb key after qualified, as next encrypted secret key, usb key carries out encrypting storing after receiving key, waits for and reads use once more.
7. the computer system that ensures information security as claimed in claim 1 is characterized in that: the main frame of this computer system and display casing and outside to be connected data cable all be to handle by shield external layer.
8. the computer system that ensures information security as claimed in claim 7, it is characterized in that: the high power switching power supply of this main frame and display is all handled by strengthening filtering circuit, and the I/O port connector of keyboard, mouse and video data line and main frame sensitivity is the connector that inner band increases filtering guard or conductive processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100775603A CN1306357C (en) | 2004-12-15 | 2004-12-15 | A computer system for guaranteeing information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100775603A CN1306357C (en) | 2004-12-15 | 2004-12-15 | A computer system for guaranteeing information security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1632709A CN1632709A (en) | 2005-06-29 |
CN1306357C true CN1306357C (en) | 2007-03-21 |
Family
ID=34847018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100775603A Active CN1306357C (en) | 2004-12-15 | 2004-12-15 | A computer system for guaranteeing information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1306357C (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101038568B (en) * | 2007-04-16 | 2010-05-19 | 丁万年 | Method and device for encrypting date of external computer hard disk |
CN102768646A (en) * | 2012-07-06 | 2012-11-07 | 王景春 | Serial port hard disk encryption and decryption device |
CN103051963B (en) * | 2012-11-30 | 2018-02-13 | 北京视博数字电视科技有限公司 | A kind of method of controlling security of digital-television terminal equipment |
CN105468893B (en) * | 2014-09-26 | 2019-06-21 | 希森美康株式会社 | Assist the computer system, program and method for sending out diagnosis of risk again of colorectal cancer |
CN104751036B (en) * | 2015-04-10 | 2018-08-24 | 陕西理工学院 | A kind of computer information safe system |
DE102015210539A1 (en) * | 2015-06-09 | 2016-12-15 | Robert Bosch Gmbh | Memory protection unit, memory management unit and microcontroller |
US10900084B2 (en) | 2015-09-16 | 2021-01-26 | Sysmex Corporation | Method for supporting diagnosis of risk of colorectal cancer recurrence, treatment of colorectal cancer, and administration of anticancer drug |
CN107018583B (en) * | 2017-05-08 | 2023-12-29 | 武汉中元通信股份有限公司 | Data transmission module integrating CDMA/LTE two communication systems |
CN109714426A (en) * | 2019-01-09 | 2019-05-03 | 田凤香 | Network program automatic downloading method |
CN112487383B (en) * | 2020-11-17 | 2023-08-08 | 重庆第二师范学院 | Computer system for guaranteeing information security and control method thereof |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0911738A2 (en) * | 1997-10-22 | 1999-04-28 | Calluna Technology Limited | Disk drive with embedded data encryption |
US6292899B1 (en) * | 1998-09-23 | 2001-09-18 | Mcbride Randall C. | Volatile key apparatus for safeguarding confidential data stored in a computer system memory |
CN1340765A (en) * | 2000-08-29 | 2002-03-20 | 廖瑞民 | Method for dividing one hard disk into more partitions separated fully |
JP2002175210A (en) * | 2000-12-07 | 2002-06-21 | Toyo Commun Equip Co Ltd | Method of transferring and copying, and enciphering and deciphering data |
WO2003027816A1 (en) * | 2001-09-28 | 2003-04-03 | High Density Devices As | Method and device for encryption/decryption of data on mass storage device |
CN1109300C (en) * | 1997-07-31 | 2003-05-21 | 周恽 | Method and appts. of transparent protection for computer rigid disk storage contents |
CN2754136Y (en) * | 2004-12-15 | 2006-01-25 | 中国长城计算机深圳股份有限公司 | Computer system for ensuring information security |
-
2004
- 2004-12-15 CN CNB2004100775603A patent/CN1306357C/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1109300C (en) * | 1997-07-31 | 2003-05-21 | 周恽 | Method and appts. of transparent protection for computer rigid disk storage contents |
EP0911738A2 (en) * | 1997-10-22 | 1999-04-28 | Calluna Technology Limited | Disk drive with embedded data encryption |
US6292899B1 (en) * | 1998-09-23 | 2001-09-18 | Mcbride Randall C. | Volatile key apparatus for safeguarding confidential data stored in a computer system memory |
CN1340765A (en) * | 2000-08-29 | 2002-03-20 | 廖瑞民 | Method for dividing one hard disk into more partitions separated fully |
JP2002175210A (en) * | 2000-12-07 | 2002-06-21 | Toyo Commun Equip Co Ltd | Method of transferring and copying, and enciphering and deciphering data |
WO2003027816A1 (en) * | 2001-09-28 | 2003-04-03 | High Density Devices As | Method and device for encryption/decryption of data on mass storage device |
CN2754136Y (en) * | 2004-12-15 | 2006-01-25 | 中国长城计算机深圳股份有限公司 | Computer system for ensuring information security |
Also Published As
Publication number | Publication date |
---|---|
CN1632709A (en) | 2005-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11188652B2 (en) | Access management and credential protection | |
US20200301764A1 (en) | Operating system on a computing system | |
US9672360B2 (en) | Secure computer architectures, systems, and applications | |
CN100565457C (en) | The system and method for safety input is provided to the system with high-security execution environment | |
Wu et al. | Security threats to mobile multimedia applications: Camera-based attacks on mobile phones | |
EP2904743B1 (en) | Secure computer architectures, systems, and applications | |
US8335931B2 (en) | Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments | |
US20160099960A1 (en) | System and method for scanning hosts using an autonomous, self-destructing payload | |
TWI431501B (en) | Cryptographic key containers on a usb token | |
US20040073809A1 (en) | System and method for securing a user verification on a network using cursor control | |
US20050066165A1 (en) | Method and system for protecting confidential information | |
CN1716199A (en) | System and method for protected operating system boot using state validation | |
CN101667232B (en) | Terminal credible security system and method based on credible computing | |
Petracca et al. | {AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings | |
Pham et al. | Universal serial bus based software attacks and protection solutions | |
TW201539247A (en) | Password input and verification method and system thereof | |
CN1306357C (en) | A computer system for guaranteeing information security | |
CN102195940A (en) | Virtual-machine-technology-based data security input and submission method and system | |
CN104933361A (en) | Device and method for protecting login password | |
CN202632281U (en) | Electronic data privacy protection system and mobile storage device with privacy protection function | |
CN2754136Y (en) | Computer system for ensuring information security | |
Creutzburg | The strange world of keyloggers-an overview, Part I | |
Lu et al. | Badusb-c: Revisiting badusb with type-c | |
CN101924765B (en) | Single-system and single-network computer communication method | |
CN101777102B (en) | Security audit method and system for kernel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong Patentee after: China the Great Wall science and technology group Limited by Share Ltd Address before: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong Patentee before: China Changcheng Computer Shenzhen Co., Ltd. |
|
CP01 | Change in the name or title of a patent holder |