Unlock instant, AI-driven research and patent intelligence for your innovation.

Information safety computer

An information security, computer technology, applied in computer security devices, computing, protection of internal/peripheral computer components, etc., can solve problems such as inability to start, fail to do, efficiency impact, etc., to achieve cost control, high communication efficiency, and convenient use. Effect

Inactive Publication Date: 2011-02-09
瑞达信息安全产业股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These practices, to a certain extent, have played a safe management function for devices under the basic input and output system chip (BIOS) and super input and output chip (Super I / O), and are suitable for many occasions. However, for more and For occasions with higher requirements, there are deficiencies, because these security control modules are inserted into the entire system as a side branch in the original computer system structure, and software cooperation is required. Effects that cannot be activated
In addition, the security module's control of the basic input and output system chip (BIOS) and the super input and output chip (Super I / O) of the equipment needs to be sent indirectly through the south bridge, and they cannot be directly controlled, which has a certain impact on efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety computer
  • Information safety computer
  • Information safety computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Embodiment 1: as figure 1 , Figure 5 Shown is an embodiment of the present invention, described information security computer, and it wherein has a main board, central processing unit, north bridge chip, memory; A safety control system is arranged on this main board: wherein there is a south bridge chip, a super input Output chip (Super I / O), a basic input and output system chip (BIOS) and security chip; Described security chip is an integrated circuit chip that has 2 LPC interfaces and also has SPI interface simultaneously, and its one end is used for Connect the LPC interface of the South Bridge chip, the other end of the LPC interface is connected to the LPC interface of the Super I / O chip (Super I / O), and there is another SPI interface connected to the SPI interface of the basic input and output system chip (BIOS). The chip is responsible for the security management of the Super I / O chip (Super I / O) and the Basic I / O system chip (BIOS).

Embodiment 2

[0022] Embodiment 2: Different from the above Embodiment 1, the LPC interface at the other end of the security chip is connected to the LPC interface of the Super I / O chip (Super I / O) and the Basic I / O system chip (BIOS).

Embodiment 3

[0023] Embodiment 3: different from above-mentioned embodiment 1, further say, described basic input output system chip (BIOS) has SPI interface; Safety chip is a RISC processor with safety coprocessor and basic memory, the Interface on the RISC processor: one of the upper LPC interfaces is connected to the LPC interface of the South Bridge, used as an LPC device interface, and one of the lower ones is an LPC interface, which is connected to the interface of the Super I / O chip (Super I / O). Used as an LPC host interface, there is another SPI interface, which is connected to the SPI interface of the basic input and output chip.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information safety computer, which belongs to the technical field of computer safety, particularly suitable for using on occasion with strict requirement to computer information safety. The invention comprises a central processing unit and a mainboard, wherein the mainboard is provided with a safety control system which includes a south bridge chip, a super input output chip, a basic input output system chip and a safety chip, the safety chip is an integrated circuit chip which is equipped with an LPC interface or simultaneously with an SPI interface, one end of the integrated circuit chip is used to connect with the LPC interface of the south bridge chip, the other end of the integrated circuit chip is connected with the super input output chip and the basic input output chip. The invention has the advantages that the LPC interface on the mainboard is safely controlled, thereby in particular simultaneously the invention realizes real-time for equipment under the basic input output system chip and the super input output chip in a structural manner of pure hardware. As a result, the computer information safety is more effectively realized.

Description

technical field [0001] The invention relates to an information security computer, which belongs to the technical field of computer security and is particularly suitable for use in occasions with strict computer information security requirements. Background technique [0002] Existing general-purpose computers (see figure 2 ), it is completely open to access to any standard equipment, such as the equipment under the basic input and output system chip (BIOS) and the super input and output chip (SuperI / O), such as mouse, keyboard, floppy drive and connected to the parallel port or Devices such as printers on the serial port, etc. The reading and writing methods and communication protocols of these devices are open, which allows any user to directly access these devices. Since this open structure makes some malicious attacks possible, there are great computer security risks. The basic input and output system chip (BIOS), as an important part of booting the system, is often th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/70
Inventor 刘毅张英辉张行健韩勇桥罗志强邓忠红
Owner 瑞达信息安全产业股份有限公司