Double-host security computer based on satellite system

A security and security, satellite system technology, applied in the direction of transmission system, electrical components, etc., can solve the problems of the integrated security computer security security function is not perfect, leaking, affecting the computer running speed and other problems

Inactive Publication Date: 2014-12-17
闫晓红
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this integrated confidential computer has an integrated structure, it is easy to use, and it has unique security protection functions such as timely image comparison, satellite positioning, self-destruction of the confidential hard disk, and access function restrictions. It can automatically identify users, and can safely perform data transmission. It has a strong ability to deal with leaks caused by theft, but it still depends on normal operation to perform the confidentiality function
If the thief disassembles the computer and connects the secret-related hard disk to another computer for decryption after the power is cut off, it will still lead to leaks
At the same time, due to the large amount of information collected by uninterrupted and timely moving portraits, two host computers are required for analysis and calculation, which will seriously affect the running speed of the computer and reduce the efficiency of the computer.
Therefore, the security and confidentiality function of the integrated security computer is obviously not perfect, and there are still significant defects in the use efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-host security computer based on satellite system
  • Double-host security computer based on satellite system
  • Double-host security computer based on satellite system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] A kind of dual-host security computer based on satellite system, such as Figures 1 to 6As shown: including the mainframe and the casing 1, there are two mainframes, which are classified host 3 and non-secretized host 5 (named classified host 3 and non-secretized host 5, of course, it can also be named the first host 3 and the second host 5), the confidential host 3 and the non-secret host 5 are respectively connected with a physical switch 8, and the physical switch 8 is connected with a smart board 10, and the smart board 10 is interconnected and data transmission through the PCI-E bus control components . The secret-involved host 3 includes a first motherboard, a first CPU, a first RAM, a first sound card, a first network card and a first graphics card, and the secret-involved host 3 is connected with a secret-involved hard disk 4, which is a solid-state hard disk. The secret-related host 5 includes a second motherboard, a second CPU, a second RAM, a second sound ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computers, relates to a security computer, and particularly relates to a double-host security computer based on a satellite system. The double-host security computer comprises hosts and an enclosure, wherein the number of the hosts is two, and the hosts are respectively a secrecy-involved host and a non-secrecy-involved host, the two hosts are isolated by a way of physical shielding isolation, the secrecy-involved host and the non-secrecy-involved host are respectively connected with a physical switcher, the physical switcher is connected with an intelligent plate, and the intelligent plate controls the interconnection and data transmission of components through a PCI-E bus. The computer disclosed by the invention both can be applied to the industrialized production of integrated desk computers and the industrialized production of portable computers, and has a triple illegal-start-preventing function, a one-way information transformation function and a power-cut active or passive self-destruct preventing function, and the like, therefore, the double-host security computer has a good application prospect in the technical field of computers, and makes contributions to departments such as party and government organizations, military departments, national defense departments, scientific research institutions and the like.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to a safe and confidential computer, in particular to a dual-master safe and confidential computer based on a satellite system. The invention can be used not only in the industrialized production of the integrated desktop computer, but also in the industrialized production of the portable computer. Background technique [0002] With its large amount of information storage and fast information processing speed, computers have given wings to government management, scientific and technological research and development, military construction and enterprise development. Especially portable computers have created unparalleled opportunities for people to process information outside the office and work in different places Now it is hard to imagine how a government department or a modern company would function without computers. However, with the rapid development of the Internet, computer ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李闽榕李予温李晨星李孟晨
Owner 闫晓红
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products