Credible safety computer
A safe computer and safe technology, applied in the computer field, can solve the problems of functional limitations, emergency destruction of key data without integration, low coupling degree, etc., to achieve the effect of increasing difficulty and solving real-time encrypted storage problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0019] A trusted and secure computer, including a monitor 1, a keyboard 2, a mouse 3, an IC card reader 4, and also includes a secure motherboard platform 5, a secure hard disk 7, a secure U disk 8, a secure electronic lock 9, and a dedicated self-destruct key 10 , Operating system security isolation module 12 and user management module 13, where the security motherboard platform 5 includes SOPC security chip 6 and security enhanced BIOS system 11, security enhanced BIOS system 11 includes a secure hard disk authentication unit 14, a BIOS-level user identity authentication unit 15. BIOS-level I / O interface control unit 16, SOPC security chip drive unit 17, BIOS-level hardware integrity measurement unit 18, and operating system security loading unit 19, operating system security isolation module 12 includes user identity authentication unit 20, hardware resources The control unit 21, the software resource control unit 22, the safety network communication unit 23, and the system qui...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap