Portable trustworthy private information processing system

An information processing system and portable technology, applied in the field of private information processing systems, can solve problems such as security efficiency discount

Active Publication Date: 2011-09-14
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the above security protection modes are passive defense modes. In the face of endless system attacks, traditional s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable trustworthy private information processing system
  • Portable trustworthy private information processing system
  • Portable trustworthy private information processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with accompanying drawing and embodiment:

[0037] Such as figure 1 As shown, the physical composition of the portable reliable private information processing system includes a security chip, a Flash memory chip and a security COS. The security chip is connected with the USB port of the computer through the USB interface to complete the high-speed communication with the computer. At the same time, the security chip is connected with the Flash storage chip through the memory interface to realize the security storage function. The security chip can physically resist physical attacks, and logically the security function of the portable and reliable private information processing system is realized by the security COS.

[0038] Such as figure 2 As shown, the logical composition of the portable trusted private information processing system includes four partitions, a boot area, a USB smart key area, a h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a portable trustworthy private information processing system. The system physically comprises a safety chip, a Flash memory chip and a safety COS (Chip Operating System), and logically comprises a starting region, a USB (Universal Serial Bus) intelligent key region, a hidden region and an encryption region. When a computer terminal is set to be booted from a USB port and is started to run through the system, an entire computing environment is guaranteed to be trustworthy through trusted boot and measurement; and when the computer terminal is not started and booted from the system, the system can be independently used as an encrypted U disk. Through the system, the problem of safety for personal private information processing is solved, and the trustworthy computing environment is constructed.

Description

technical field [0001] The invention relates to a private information processing system, in particular to a portable and reliable private information processing system. Background technique [0002] The security of private information has increasingly become a hot security issue that units, enterprises and individuals are concerned about. Users always hope to process sensitive information in a reliable computing environment, such as unit official document information processing, business information processing, personal financial management and personal information (such as pictures, videos and documents), etc. However, in most cases, the simplified structure of the computing platform hardware and software environment for processing private information leads to arbitrary use of resources, especially the executable code can be modified, malicious programs can be implanted, and security threats such as Trojan horses, viruses, and hackers always exist ; What is more serious is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/34G06F21/57G06F21/85
Inventor 常朝稳秦晰赵国磊韩培胜刘熙胖梁松涛王一宁王曙光韩秀德
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products