Credible safety computer

A safe computer and safe technology, applied in the computer field, can solve the problems of functional limitations, emergency destruction of key data without integration, low coupling degree, etc., to achieve the effect of increasing difficulty and solving real-time encrypted storage problems

Inactive Publication Date: 2008-12-17
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these trusted computers have the following deficiencies: the transmission rate of the TPM security chip based on the LPC bus is low, and it is impossible to realize real-time encrypted storage of large files; Information computing services; hard disk and other storage media have a low degree of coupling with the BIOS system; the emergency destruction function of key data is not integrated, which cannot prevent the leakage and theft o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible safety computer
  • Credible safety computer
  • Credible safety computer

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0019] A trusted and secure computer, including a monitor 1, a keyboard 2, a mouse 3, an IC card reader 4, and also includes a secure motherboard platform 5, a secure hard disk 7, a secure U disk 8, a secure electronic lock 9, and a dedicated self-destruct key 10 , Operating system security isolation module 12 and user management module 13, where the security motherboard platform 5 includes SOPC security chip 6 and security enhanced BIOS system 11, security enhanced BIOS system 11 includes a secure hard disk authentication unit 14, a BIOS-level user identity authentication unit 15. BIOS-level I / O interface control unit 16, SOPC security chip drive unit 17, BIOS-level hardware integrity measurement unit 18, and operating system security loading unit 19, operating system security isolation module 12 includes user identity authentication unit 20, hardware resources The control unit 21, the software resource control unit 22, the safety network communication unit 23, and the system qui...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reliable and safe computer, which comprises an IC card reader (4), and further comprises a safe main board platform (5), a safe hard disk (7), a safe U disk (8), an operating system security isolation module (12) and a user management module (13) which are connected in sequence. When the reliable and safe computer is started, an SOPC security chip drive unit (17), a safe hard disk authentication unit(14), a BIOS level user identification authentication unit (14), a BIOS level hardware integrity measuring unit (18), a BIOS level I/O interface control unit (16) and an operating system security loading unit(19) in a safe enhanced BIOS system (11) are loaded in sequence. After the safe enhanced BIOS system (11) finishes starting, each security control unit in the operating system security isolation module (12) is loaded. The reliable and safe computer can know, manage and control the security state of the entire system.

Description

technical field [0001] The invention relates to a computer, in particular to a trusted security computer. Background technique [0002] Trusted computers are an important basis for realizing the trustworthiness of terminals and network platforms. At present, many computer manufacturers at home and abroad have started the development of trusted computers and corresponding software systems. These trusted computers are similar to the trusted computers defined by the Trusted Computing Organization. That is, the TPM security chip is integrated on the general-purpose computer motherboard hardware platform, and the security protection capability of the computer terminal is enhanced through the security features provided by the TPM security chip. However, these trusted computers have the following deficiencies: the transmission rate of the TPM security chip based on the LPC bus is low, and it is impossible to realize real-time encrypted storage of large files; Information computing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/06G06F21/24G06F21/45
Inventor 王斌陈志浩王晓程杜中平姚智慧刘学文胡建军周晓俊王旭于吉科马书磊王吕大张运萍
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products