CN1306357C - A computer system for guaranteeing information security - Google Patents

A computer system for guaranteeing information security Download PDF

Info

Publication number
CN1306357C
CN1306357C CNB2004100775603A CN200410077560A CN1306357C CN 1306357 C CN1306357 C CN 1306357C CN B2004100775603 A CNB2004100775603 A CN B2004100775603A CN 200410077560 A CN200410077560 A CN 200410077560A CN 1306357 C CN1306357 C CN 1306357C
Authority
CN
China
Prior art keywords
hard disk
computer system
key
information security
usb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2004100775603A
Other languages
Chinese (zh)
Other versions
CN1632709A (en
Inventor
孙治成
石明
贾兵
童广胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China the Great Wall science and technology group Limited by Share Ltd
Original Assignee
China Great Wall Computer Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Great Wall Computer Shenzhen Co Ltd filed Critical China Great Wall Computer Shenzhen Co Ltd
Priority to CNB2004100775603A priority Critical patent/CN1306357C/en
Publication of CN1632709A publication Critical patent/CN1632709A/en
Application granted granted Critical
Publication of CN1306357C publication Critical patent/CN1306357C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to a computer system for guaranteeing information security, which comprises universal components for assembling a personal computer of which the hard disk is integrated with an embedded type intelligent processing system which comprises a processor, a microkernel operating system and a memory. A module of a hardware logic encrypted circuit is integrated in a driving circuit of the hard disk, and the operation of data encrypting and decoding is completed by the hardware logic encrypted circuit called by instructions of the processor and the microkernel operating system. In the process of the use of the computer system of the present invention for guaranteeing information security, a user is only in need of setting initial functions according to operational prompts in the process of powering on the computer so as to realize functions of hard disk protection, hard disk isolation, network isolation, data encryption, encryption key secure storage, user identity forced certification, identity protection in operational process, user authority management, electromagnetic protection, etc., and the operation is simple and easy in use. The present invention is suitable for users who are comparatively in urgent need of computer data safety, such as scientific research institutions, financial departments, government departments, national defense departments, etc.

Description

A kind of computer system that ensures information security
Technical field
The present invention relates to a kind of computer system, relate in particular to a kind of computer system that ensures information security.
Background technology
Thereby existing Computer Architecture imperfection has caused the leak of information security.At present, the file ciphering technology of PC is normally finished through the participation of software and operating system, be after the interior encryption software of PC carries out software or encrypted card encryption to file, by operating system (software), be deposited in the permanent storage media (as hard disk), this encryption method is dangerous, for example, the Hacker Program that is hidden in the system can obtain key with after the file comparison process before and after encrypting, with whole document deciphering.Therefore occurred a kind of by the medium method of encrypting, for example the patent No. is ZL99113164.9, denomination of invention is a kind of Chinese patent literature of encrypting computer hard disc device, it discloses a kind of encrypting computer hard disc method and device, on the Basis of Computer Engineering of routine, form encrypted circuit by encryption chip, encryption chip is made up of control unit circuit, encryption/decryption element circuit, RAM storer and gauge tap K, to the data stream hardware encipher optionally of turnover hard disk, thereby realized that so-called medium encrypts.Even illegally obtain hard disk, there is not legal key, also can only read the file after the encryption, can't decode; Legitimate secret is arranged, not on the same group, though can see D: dish, also because the decoding process difference still can not obtain useful information.Realize encrypting computer hard disc, increased the confidentiality of computing machine.But the cryptographic algorithm of this type can not be changed, so its security is not high yet.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of reinforcement that the data of hard disk are carried out encryption and decryption, and has the computer system that ensures information security of hard disk protection.
The technical matters that the present invention further will solve is to provide a kind of computer system that ensures information security that hard disk is isolated that has.
The technical matters that the present invention further will solve is to provide a kind of computer system that ensures information security with Network Isolation.
For solving the problems of the technologies described above; the technical solution adopted in the present invention is: a kind of computer system that ensures information security is provided; it comprises the universal component of forming personal computer; embedded intelligence disposal system that the hard disk of this computing machine is integrated; comprise processor; Mach and storer; and also integrated hardware logic encrypted circuit module in the hard drive circuit; to data encryption and decryption process is to call the hardware logic encrypted circuit under the instruction by processor and Mach to finish; this computer system is forced the magnetic head biasing of hard disk by hardware circuit; with hard disk partition is protected location and corresponding two parts of MIRROR SITE; the protected location is at negative magnetic track; the user can't visit; this computing machine also comprises an intelligent usb key system; it is one and has data processor; the system of storer and microoperation kernel and cryptographic algorithm program, it is having the judgement of oneself and is replying interaction mechanism with disk C PU communication process.
This computer system is divided into several zones with a hard disk by space specified, when the user starts shooting by the virtual hard disk administrative skill, eject start boot section choice menus, one of them then is set to negative magnetic track with other two for the start master boot sector and when activating in elected, does not allow user capture.
This computer system also disposes outside network security separate card, and the hard drive circuit is drawn row's physical signal link line and is connected to this network security separate card.
The invention has the beneficial effects as follows: since the hard disk of computing machine of the present invention integrated an embedded intelligence disposal system, comprise processor, Mach and storer, therefore its cryptographic algorithm can be changed, therefore the existing medium of the present invention is encrypted, can change cryptographic algorithm again, so its safety coefficient height; In addition, because computing machine of the present invention also comprises an intelligent usb key system, intelligence usb key system itself has the safety encipher function, the judgement of oneself being arranged and reply interaction mechanism with disk C PU communication process, therefore can strengthen the safe reliability of computer system of the present invention; The computer system that ensures information security of the present invention in use user only need be carried out the Elementary Function setting according to the operation indicating of start process and can be realized functions such as data encryption, hard disk protection, hard disk isolation, Network Isolation, is simple and easy to use.Satisfy the user more urgent, as scientific research institutions, finance and demands such as government and national defence to Computer Data Security.
Description of drawings
Fig. 1 is the computer working process flow diagram that ensures information security of the present invention.
Fig. 2 is the ram mode of the computer system that ensures information security of the present invention and the implementation method process flow diagram of flexible protected mode.
Fig. 3 is that the protected location subregion and the MIRROR SITE of the computer system that ensures information security of the present invention realized principle schematic.
Fig. 4 is the encryption synoptic diagram of the computer system that ensures information security of the present invention.
Fig. 5 is the hard disc physical sequestered partition synoptic diagram of the computer system that ensures information security of the present invention.
Fig. 6 is the annexation topology diagram that the network security separate card of the computer system that ensures information security of the present invention is connected with different user.
Fig. 7 is the hard disk isolated area of the computer system that ensures information security of the present invention and the corresponding relation synoptic diagram of physical isolation card.
Fig. 8 be the USB driving circuit of the computer system that ensures information security of the present invention with to user interface topology interface chart.
Fig. 9 is the usb key of the computer system that ensures information security of the present invention and the process flow diagram that system sets up communication.
Embodiment
The computer system that ensures information security of the present invention comprises that (1) prevents the maskable casing and the outside data cable that is connected of electromagnetic exposure; (2) has the hard disk of data image, data encryption special circuit; (3) line and the interface of the USB device that provides of hard drive circuit; (4) the intelligent USB KEY (key) of user identity forcible authentication; (5) other universal component of network security separate card and composition personal computer.
Improvement of the present invention concentrates on hard disk and two critical components of usb key, and respectively integrated embedded intelligence disposal system comprises processor (CPU), Mach (COS) and storer in two parts.Purpose is to guarantee that two closely bound up subsystems can safety communications, and provides easier operating interactive platform for the user on function structure basis separately.Mainly comprise the improvement of the following aspects:
(1). integrated hardware logic encrypted circuit module in the hard drive circuit, all write the data of hard disk and all pass through encryption, on the contrary the data of reading also are decrypted operation;
(2). in firmware (Firmware), increased the cipher authentication program, cannot the access hard disk data by authentication;
(3). make hard disk areas isolate and the virtual management system constructing virtual mirror image operation zone by hardware circuit;
(4). the hard disk internal storage areas is isolated, structure multi-user master boot sector;
(5). the hard drive board design goes out a short distance USB line and interface;
(6). an intelligent usb key system;
(7). external network connects isolation card;
(8). prevent the maskable casing and the external connection line cable of electromagnetic exposure; Casing and external connection line cable have increased the shielding processing that prevents EMI radio magnetic wave information leakage; Power supply has strengthened and has prevented the EMI circuit that conducts.
See also Fig. 1, the computer working flow process that ensures information security of the present invention may further comprise the steps:
101. main frame start and self check;
102.HDD initialization;
103. judge whether to insert usb key, if then execution in step 104, if not then execution in step 111;
104.USB cryptographic key identification;
105.HDD mode of operation configuration;
106. read MBR;
107.OS start;
108.OS normal operation;
109. judge whether usb key is normal, if normal, then return step 108, if undesired, then execution in step 110;
110. wait for that usb key is normal, step 109 is returned in the halt system operation then;
111. the user identity password identification, execution in step 105 to 108 then;
Computer information safe of the present invention system mainly contains following technology.
1. hard disk protection technology
The present invention realizes that the method for hard disk protection is to utilize hard disk to add the characteristic that Electrical heads makes zero, and forces the magnetic head biasing by hardware circuit, is protected location and corresponding two parts of MIRROR SITE with hard disk partition, and the protected location is at negative magnetic track, and the user can't visit; Use the virtual hard disk storage management system, allow the user be actually MIRROR SITE, do not touch true protected location by the data field of the read-write operation under the normal condition; Just can the write protection district when authority is carried out " backup " and operated; Carrying out " recovery " operation just can be with current system whole " refreshing ".The existence of protected location can prevent that any deletion, virus damage, format even low-level formatting operation from destroying, and reaches protection hard disc data purpose.
Hard disk protection has ram mode and two kinds of flexible protected modes.
These two kinds of pattern implementation methods determine that in system's initial setting up detailed step and setting operation process flow diagram are as shown in Figure 2 by authorized user.
The implementation method of ram mode and flexible protected mode may further comprise the steps:
201. main frame start and self check;
202. and hard disk is set up handshake;
203. hard disk micro-kernel program obtains control;
204. eject user function setting operation combination hot key;
205. judge whether to carry out initial setting up, if then execution in step 206, if not, then detect user identity, judge then whether identity is correct,, then read hard disk MBR information if correct, if the OS of load operation system then incorrect, then returns the detection user identity;
206. ejection setup menu;
207. enter password;
208. judge whether password is correct, if incorrect, then re-execute step 208, if correct, then execution in step 209;
209. input parameter;
210. judge whether to preserve change is set, if then execution in step 211, if not, then re-execute step 210;
211. main frame restarts.
After operating process is the system boot self check, host B IOS sends order to HDD, detect whether ready signal of hard disk feedback, readyly then enter next step, detect the initialization information of hard disk and loading the Firmware information of hard disk, give hard disk control with control, the core component of frameworks such as CPU and internal memory on mainboard having that exchanges data all is subjected to hard disk with hard disk and micro-system (COS) gets involved and controls; The COS user oriented ejects " Ctr+Alt+M " interactive operation hot key, carries out the back and ejects the detailed functions setup menu; The user is by menu and import the authentication password; Press the operation of helping prompt execution initial configuration, hard disk partition is become shielded main partition (PrimaryMaster) C, generate mirror image virtual area C ' simultaneously automatically, and the configuration whether affirmation will be changed is preserved.Seeing also Fig. 3, is that protected location subregion and MIRROR SITE are realized principle schematic.
Remaining space is arranged, and system is changed to remainder automatically from subregion (Primary Slave).
The difference of two patterns is authority differences, and the user of ram mode only reads the authority of hard disc data, can not preserve data change; Flexibly the user of protected mode has increased to enjoy except above authority and has write the storage authority temporarily.
It is very similar that the backup of this design and hard disk protecting card and the embedded procedure operation of mainboard recovers software function; but it is with the obvious advantage to be based on hard disk low layer design proposal, show compatibility, reliability, stability, whether take main frame resource, carry out aspects such as efficient and cost.
2. data encrypting and deciphering technology
The implementation method of data encrypting and deciphering is that all data that write hard disk all are to encrypt automatically through 8 groups of eight bit register hardware logic encrypted circuits, and all data of reading are deciphered automatically, and decipher circuit is as the turnover outpost of the tax office of control data.Encrypt synoptic diagram, as shown in Figure 4.
To data encryption and decryption process is to finish by calling the hardware logic encrypted circuit under processor and Mach (COS) instruction, transparent fully to the user.File is encrypted forever on disk and is deposited, and DISK to Image is exactly a complete encrypt file from this view point.Even it is stolen that purpose is that machine appears in computing machine, can not make data content be decrypted state yet, reach the secret purpose of hard disc data.
Compare with the dedicated hard disk data encoded card, integrated designing technique has increased system reliability, stability and compatible; Mainboard is walked around in the encryption and decryption operation and BIOS directly controls the gateway of hard disk, reduces the probability that password is cracked and detours and open by intercepting and capturing greatly, has strengthened confidentiality.
Decrypting process is its inverse process, and principle is identical.
3. identity identifying technology
Authentication of the present invention comprises two kinds, and a kind of is password authentication identification; Another kind is usb key identification.
3.1 password authentication method of identification
The implementation method of password authentication method of identification is to enable three grades of identity and authority is provided with safety management, and implementation is to login with password.Three level of identity are domestic consumer, system manager, safe Administrative Manager.
Main authority defines, and reads the hard disc data authority with the user of domestic consumer's password login and can guidance system enter the OS operating platform, perhaps can have backup and recover read-write operation authority (being determined by highest line political affairs rank); The system manager can enjoy whole authorities of domestic consumer, has the password authority of change self and domestic consumer in addition.Safe Administrative Manager answers the user to increase, and is the highest level user, and main effect is to prevent from that password from losing to wait the password under the accident situation to nullify and the registration management activity.
But operating process frame of reference process flow diagram.
3.2USB key method of identification
The implementation method of usb key method of identification be when detecting the usb bus interface, detected after the start usb key equipment and ready after, call driving and the two communication protocol of usb key by hard disk, realize and the communication of usb key; Then usb key sends the dark text key of process encryption to hard disk, after hard disk is received the dark text key, call the algorithm of storing among the ROM (identical) and untie the dark text key and verify, feed back to a string new key character of usb key after qualified, as next encrypted secret key with cryptographic algorithm in the usb key.All different for the key that guarantees to send, the method for employing is that each key string that sends has one at least with last time different.Usb key carries out encrypting storing after receiving key, waits for and reads use once more.
The method that tracking and supervising in adopting the start process forcible authentication and use operating process in the usb key recognition methods combines.If the encryption of hard disk control authentication failure then sends the order of reading key once more, triplicate failure, the locked no longer response request of usb key then, stop supplies key.
The identification success and enter operating system after, uninterruptedly scan the presence of key port and legal key by application software-card sending system, then quit work less than key if detect, and locked hard disc data goes out inbound port.
4. hard disk memory region is isolated with a plurality of master boot sectors and is deposited technology
Hard disk memory region isolation and a plurality of master boot sectors and the implementation method of depositing are to allow the virtual hard disk administrative skill, and a hard disk is divided into several zones (being no more than 3 at most) by space specified.When the user starts shooting, eject start boot section choice menus, elected in one of them for the start master boot sector and when activating, then be set to negative magnetic track with other two, do not allow user capture.
Characteristics are that each zone can realize that the master boot sector realization installation of state of activation separately guides (can be dissimilar) operating system and normal OS operating environment separately.Be illustrated in figure 5 as hard disc physical sequestered partition synoptic diagram.
5. Network Isolation technology
The implementation method of external network isolation features is under the prerequisite of hard disk internal insulation function, disposes the network security separate card of an outside again, just different user can be connected to different external networks.Topological structure such as Fig. 6 of annexation show.
Implementation method is the method that bundlees one to one with different isolation boot sections and each RJ-45 port of network security separate card, realizes internal insulation district and isolation card RJ-45 mouth (passage) one-to-one relationship.Hardware design is to draw row's physical signal link line by the hard drive circuit to be connected to isolation card, after the start when the different boot section of the each selection of user system discern and send a signal goes the gating correspondence to the microrelay toggle switch of isolation card network interface passage automatically.When carrying out different passage change action, force host computer system to reset again to empty the data in dynamic storage (internal memory) and the network adapter.
Wherein hard disk and card to be connected topological relation as follows, on the basis of hard disk internal zone dividing isolation features, cooperating external network to connect isolation card, carry out the principle that the port of each isolated area and each isolation card is bound one to one.Be illustrated in figure 7 as the corresponding relation synoptic diagram of hard disk isolated area and physical isolation card.
6.USB driving circuit and connection line technology
The USB driving circuit is with more ingenious to the design of user interface overall topology, topology connects as shown in Figure 8, and implementation method is the usb bus driving governor is integrated into the hard drive circuit board and draws the USB port line from the circuit board of hard disk and directly insert usb key to the user.Simultaneously cabinet makes it the USB exit position of forward as far as possible panel when the hard disk bracket location layout designs, and it is the shortest to reach the hard disk USB line that goes between between the cabinet panel USB interface.Connection cable carries out electromagnetic screen to be handled.
Purpose is to avoid increasing the probability of being intercepted and captured because general usb key identification authentication system is connected on mainboard (BIOS) participation at present.
7.USB the technology of key
Safe usb key implementation method is a system that has data processor (CPU), storer and microoperation kernel (COS) and cryptographic algorithm program, itself has the safety encipher function, the judgement of oneself is being arranged and replying interaction mechanism with disk C PU communication process, purpose is that enhancing is safe and reliable.
USB has micro OS (COS) and does not have the senior key that carries cryptographic algorithm of COS to compare, not encrypting with the product of own COS is that a software algorithm routine call that is stored in the key is come out, and (CPU and RAM) realizes cryptographic operation by extraneous hardware platform; Having the product of COS that the CPU of oneself and the key of micro OS (COS) are arranged is ownly independently to finish to the data cryptographic calculation, does not have intermediate link safer.
The process flow diagram that key and system set up communication as shown in Figure 9, the method that key and system set up communication may further comprise the steps:
301. authentication;
302. detect USB line and port device physical connection;
303. judge whether to be ready to, if be ready to, then execution in step 304, if be not ready to, then point out checkout facility and connection line, and then return step 302;
304. system sends order and reads USB port equipment;
305. prompting input key password;
306. judge whether password is correct, if incorrect, then return step 305, if correct, then execution in step 307;
307.USB device responds rreturn value;
308. driving, the system call USB device sets up communication protocol;
309. read key dark text key;
310. system decrypts is handled
311. it is legal to judge whether, if illegal, and then locked system, if legal, then system generates the key of a string new random string as next authentication;
312. send to usb key, load OS, whether key detection new character strings is effective simultaneously, if effectively, then encryption, and saving result becomes dark text.
8. electromagnetic protection technology
The electromagnetic protection disposal route of computer information safe of the present invention system is to utilize prior aries such as pressing down source method or containment method to take measures from the emission source, electromagnetic radiation is dropped to minimum, suppresses the electrical network conduction in conjunction with filtering technique simultaneously.Mainly be that the data line and the increase shield external layers such as usb key and hard disk connecting line of data line call wire, keyboard, mouse between main frame and display casing, display and the main frame are handled, the high power switching power supply of main frame and display is strengthened filtering circuit (PFC) processing, and the I/O port connector of keyboard, mouse and video data line and main frame sensitivity selects for use inner band to increase the connector of filtering guard or conductive processing.

Claims (8)

1; a kind of computer system that ensures information security; it comprises the universal component of forming personal computer; it is characterized in that: embedded intelligence disposal system that the hard disk of this computing machine is integrated; comprise processor; Mach and storer; and also integrated hardware logic encrypted circuit module in the hard drive circuit; to data encryption and decryption process is to call the hardware logic encrypted circuit under the instruction by processor and Mach to finish; this computer system is forced the magnetic head biasing of hard disk by hardware circuit; with hard disk partition is protected location and corresponding two parts of MIRROR SITE; the protected location is at negative magnetic track; the user can't visit; this computing machine also comprises an intelligent usb key equipment; it is one and has data processor; the system of storer and microoperation kernel and cryptographic algorithm program, it is having the judgement of oneself and is replying interaction mechanism with disk C PU communication process.
2. the computer system that ensures information security as claimed in claim 1, it is characterized in that: this computer system is by the virtual hard disk administrative skill, a hard disk is divided into several zones by space specified, when the user starts shooting, eject start boot section choice menus, one of them then is set to negative magnetic track with other two for the start master boot sector and when activating in elected, does not allow user capture.
3. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computer system also disposes outside network security separate card, and the hard drive circuit is drawn row's physical signal link line and is connected to this network security separate card.
4. the computer system that ensures information security as claimed in claim 1 is characterized in that: the usb bus driving governor of this computer system is integrated into the hard drive circuit board and draws the USB port line from the circuit board of hard disk and directly insert usb key to the user.
5. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computer system comprises that password authentication is discerned and usb key is discerned this two kinds of identity identifying methods.
6. the computer system that ensures information security as claimed in claim 5, it is characterized in that: the implementation method of this usb key method of identification be when detection usb bus interface, detected after the start usb key equipment and ready after, call the driving and the two communication protocol of usb key by hard disk, realize communication with usb key; Then usb key sends the dark text key of process encryption to hard disk, after hard disk is received the dark text key, calling the algorithm of storing among the ROM unties the dark text key and verifies, feed back to a string new key character of usb key after qualified, as next encrypted secret key, usb key carries out encrypting storing after receiving key, waits for and reads use once more.
7. the computer system that ensures information security as claimed in claim 1 is characterized in that: the main frame of this computer system and display casing and outside to be connected data cable all be to handle by shield external layer.
8. the computer system that ensures information security as claimed in claim 7, it is characterized in that: the high power switching power supply of this main frame and display is all handled by strengthening filtering circuit, and the I/O port connector of keyboard, mouse and video data line and main frame sensitivity is the connector that inner band increases filtering guard or conductive processing.
CNB2004100775603A 2004-12-15 2004-12-15 A computer system for guaranteeing information security Active CN1306357C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100775603A CN1306357C (en) 2004-12-15 2004-12-15 A computer system for guaranteeing information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100775603A CN1306357C (en) 2004-12-15 2004-12-15 A computer system for guaranteeing information security

Publications (2)

Publication Number Publication Date
CN1632709A CN1632709A (en) 2005-06-29
CN1306357C true CN1306357C (en) 2007-03-21

Family

ID=34847018

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100775603A Active CN1306357C (en) 2004-12-15 2004-12-15 A computer system for guaranteeing information security

Country Status (1)

Country Link
CN (1) CN1306357C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038568B (en) * 2007-04-16 2010-05-19 丁万年 Method and device for encrypting date of external computer hard disk
CN102768646A (en) * 2012-07-06 2012-11-07 王景春 Serial port hard disk encryption and decryption device
CN103051963B (en) * 2012-11-30 2018-02-13 北京视博数字电视科技有限公司 A kind of method of controlling security of digital-television terminal equipment
CN105468893B (en) * 2014-09-26 2019-06-21 希森美康株式会社 Assist the computer system, program and method for sending out diagnosis of risk again of colorectal cancer
CN104751036B (en) * 2015-04-10 2018-08-24 陕西理工学院 A kind of computer information safe system
DE102015210539A1 (en) * 2015-06-09 2016-12-15 Robert Bosch Gmbh Memory protection unit, memory management unit and microcontroller
US10900084B2 (en) 2015-09-16 2021-01-26 Sysmex Corporation Method for supporting diagnosis of risk of colorectal cancer recurrence, treatment of colorectal cancer, and administration of anticancer drug
CN107018583B (en) * 2017-05-08 2023-12-29 武汉中元通信股份有限公司 Data transmission module integrating CDMA/LTE two communication systems
CN109714426A (en) * 2019-01-09 2019-05-03 田凤香 Network program automatic downloading method
CN112487383B (en) * 2020-11-17 2023-08-08 重庆第二师范学院 Computer system for guaranteeing information security and control method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0911738A2 (en) * 1997-10-22 1999-04-28 Calluna Technology Limited Disk drive with embedded data encryption
US6292899B1 (en) * 1998-09-23 2001-09-18 Mcbride Randall C. Volatile key apparatus for safeguarding confidential data stored in a computer system memory
CN1340765A (en) * 2000-08-29 2002-03-20 廖瑞民 Method for dividing one hard disk into more partitions separated fully
JP2002175210A (en) * 2000-12-07 2002-06-21 Toyo Commun Equip Co Ltd Method of transferring and copying, and enciphering and deciphering data
WO2003027816A1 (en) * 2001-09-28 2003-04-03 High Density Devices As Method and device for encryption/decryption of data on mass storage device
CN1109300C (en) * 1997-07-31 2003-05-21 周恽 Method and appts. of transparent protection for computer rigid disk storage contents
CN2754136Y (en) * 2004-12-15 2006-01-25 中国长城计算机深圳股份有限公司 Computer system for ensuring information security

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1109300C (en) * 1997-07-31 2003-05-21 周恽 Method and appts. of transparent protection for computer rigid disk storage contents
EP0911738A2 (en) * 1997-10-22 1999-04-28 Calluna Technology Limited Disk drive with embedded data encryption
US6292899B1 (en) * 1998-09-23 2001-09-18 Mcbride Randall C. Volatile key apparatus for safeguarding confidential data stored in a computer system memory
CN1340765A (en) * 2000-08-29 2002-03-20 廖瑞民 Method for dividing one hard disk into more partitions separated fully
JP2002175210A (en) * 2000-12-07 2002-06-21 Toyo Commun Equip Co Ltd Method of transferring and copying, and enciphering and deciphering data
WO2003027816A1 (en) * 2001-09-28 2003-04-03 High Density Devices As Method and device for encryption/decryption of data on mass storage device
CN2754136Y (en) * 2004-12-15 2006-01-25 中国长城计算机深圳股份有限公司 Computer system for ensuring information security

Also Published As

Publication number Publication date
CN1632709A (en) 2005-06-29

Similar Documents

Publication Publication Date Title
US11188652B2 (en) Access management and credential protection
US20200301764A1 (en) Operating system on a computing system
US9672360B2 (en) Secure computer architectures, systems, and applications
CN100565457C (en) The system and method for safety input is provided to the system with high-security execution environment
Wu et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
EP2904743B1 (en) Secure computer architectures, systems, and applications
US8335931B2 (en) Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments
US20160099960A1 (en) System and method for scanning hosts using an autonomous, self-destructing payload
TWI431501B (en) Cryptographic key containers on a usb token
US20040073809A1 (en) System and method for securing a user verification on a network using cursor control
US20050066165A1 (en) Method and system for protecting confidential information
CN1716199A (en) System and method for protected operating system boot using state validation
CN101667232B (en) Terminal credible security system and method based on credible computing
Petracca et al. {AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
Pham et al. Universal serial bus based software attacks and protection solutions
TW201539247A (en) Password input and verification method and system thereof
CN1306357C (en) A computer system for guaranteeing information security
CN102195940A (en) Virtual-machine-technology-based data security input and submission method and system
CN104933361A (en) Device and method for protecting login password
CN202632281U (en) Electronic data privacy protection system and mobile storage device with privacy protection function
CN2754136Y (en) Computer system for ensuring information security
Creutzburg The strange world of keyloggers-an overview, Part I
Lu et al. Badusb-c: Revisiting badusb with type-c
CN101924765B (en) Single-system and single-network computer communication method
CN101777102B (en) Security audit method and system for kernel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong

Patentee after: China the Great Wall science and technology group Limited by Share Ltd

Address before: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong

Patentee before: China Changcheng Computer Shenzhen Co., Ltd.

CP01 Change in the name or title of a patent holder