Credible safety computer
A safe computer and safe technology, applied in the computer field, can solve the problems of functional limitations, emergency destruction of key data without integration, low coupling degree, etc., to achieve the effect of increasing difficulty and solving real-time encrypted storage problems
Inactive Publication Date: 2008-12-17
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
0 Cites 29 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses a reliable and safe computer, which comprises an IC card reader (4), and further comprises a safe main board platform (5), a safe hard disk (7), a safe U disk (8), an operating system security isolation module (12) and a user management module (13) which are connected in sequence. When the reliable and safe computer is started, an SOPC security chip drive unit (17), a safe hard disk authentication unit(14), a BIOS level user identification authentication unit (14), a BIOS level hardware integrity measuring unit (18), a BIOS level I/O interface control unit (16) and an operating system security loading unit(19) in a safe enhanced BIOS system (11) are loaded in sequence. After the safe enhanced BIOS system (11) finishes starting, each security control unit in the operating system security isolation module (12) is loaded. The reliable and safe computer can know, manage and control the security state of the entire system.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Simulated training system for martial art
ActiveCN108939485AImprove interactivityIncrease the difficultyGymnastic exercisingTraining effectEngineering
Owner:CHONGQING UNIV OF ARTS & SCI
Malicious file detection method based on composite feature code
ActiveCN102902918AFalse NegativeIncrease the difficultyPlatform integrity maintainanceFeature codeSoftware
Owner:XIAMEN FUYUN INFORMATION TECH CO LTD
Household garbage incineration flying dust electrode melting treatment and resourceful utilization method
ActiveCN107089795AIncrease investmentIncrease the difficultyGas treatmentDispersed particle filtrationBoiling pointHeavy metals
Owner:TIANJIN YIMING ENVIRONMENTAL TECH CO LTD
Method for realizing block cipher multiple S-boxes for resisting differential power attack
ActiveCN107204841AIncrease attack difficultyIncrease the difficultyEncryption apparatus with shift registers/memoriesCryptographic attack countermeasuresDifferential methodData processing
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Classification and recommendation of technical efficacy words
- Increase the difficulty
Method for generating picture verification codes and system thereof
InactiveCN101976430AReduce the chance of identical captchasIncrease the difficulty2D-image generationImage data processing detailsMachine identificationTheoretical computer science
Owner:SHENZHEN YUCHU NETWORK TECH CO LTD
Method, device and system for carrying out service access control on third-party application
ActiveCN104283841AIncrease the difficultyImprove securityTransmissionMedia access controlThird party
Owner:ALIBABA GRP HLDG LTD
Locker management method and locker management device
ActiveCN106204948AIncrease the difficultyImprove securityApparatus for meter-controlled dispensingSpoof detectionCurrent timeManagement functions
Owner:SENSETIME GRP LTD
Lawn maintenance method, system and apparatus
ActiveUS20130333342A1Increase speedIncrease the difficultyMowersGuiding agricultural machinesLawnLandscaping
Owner:KESKI LUOPA MAUNO +2