Safe network terminal based on single CPU dual bus

A security network, dual bus technology, applied in the field of network terminal devices, can solve problems such as information security problems that cannot be fundamentally solved, and achieve the effects of solving information security problems, having strong expansion functions, and preventing network intrusions

Inactive Publication Date: 2008-11-05
QINGDAO UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These technologies have solved the problem of information theft to a certain extent, but the current researc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe network terminal based on single CPU dual bus
  • Safe network terminal based on single CPU dual bus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0011] Examples:

[0012] This embodiment relates to a novel implementation architecture of a single-CPU dual-bus secure network terminal, which is a secure network terminal with intrusion-free, information and data security. The architecture includes: safe and non-safe areas with independent system buses A and B; the Internet interface is only connected to the non-safe area bus 15; the bus bridge 7 (BUS Bridge) controls the CPU8 and the two buses through an agreed mechanism The connection between A and B; the main (protected) memory is only connected to the bus (bus A) in the secure area; the shared device is connected to the bus A or bus B through a dual-port circuit for the sharing of basic input and output devices and Internal and external communications, etc.

[0013] The unit components that implement the architecture of this embodiment include memory 1, hard disk 2, other input / output devices 3 and 12, clock 5, crossbar 6, bus bridge 7, CPU8, input / output 9, flash memory 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a novel safe network terminal based on single CPU double-bus. The novel safe network terminal provides resistance function to the known or unknown network instruction by physical insulation and access control, adopts a single CPU and a safe area system bus and a non-safe area system bus isolated physically, the bus bridge controls the dynamic connection of the CPU and the system bus, and realizes the physical insulation of the two system buses; the related internet communication apparatus is only connected to one bus, while the related safe data memory apparatus is connected to the other system bus; one sharing bus is used to share the bus communication between the keyboard, mouse and the other input/output equipment, and the inside and outside system. The invention can effectively prevent the network instruction, guarantee information safety, and have advantages of low cost, strong spreading functional, safety and reliability, and the like.

Description

Technical field: [0001] The present invention relates to a new type of secure network terminal based on single CPU and dual bus, in particular, it can provide resistance function to known or unknown network intrusion through physical isolation and access control, and improve the reliability, stability and security of the Internet network terminal device. Background technique: [0002] Existing computer networks, especially the Internet, have openness, interconnectivity, diversity of connection methods, and uneven distribution of network terminals. The security loopholes in network communication protocols and operating systems, coupled with human negligence, make the network easy to Victims from computer viruses, hackers or malware. Sensitive information stored in computers (such as keys, credit cards, bank accounts, network accounts, and personal privacy information, etc.) is easily stolen by hackers or malicious software without the user's knowledge. [0003] Traditional ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/20G06F13/40H04L29/12G06F21/57
Inventor 邵峰晶于忠清王双宝张乐刁克刚
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products