A Method for Realizing the Isolation of Computer Peripheral Devices
A technology for external devices and computers, applied in the protection of internal/peripheral computer components, instruments, electrical digital data processing, etc., can solve the problems of inability to isolate peripheral devices, low security, hidden dangers, etc., to prevent malicious tampering and isolation. , the effect of maintaining information security and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:
[0029] The invention discloses a method for realizing the isolation of computer peripheral equipment, such as figure 1 , figure 2 As shown, the system architecture includes a user selection center, a state selection input module, a control conversion module, and peripherals; the control conversion module is equipped with a hardware interrupt processing module, a state latch module, a selection state controller, and a peripheral controller. It is connected with the state selection input module, the state selection input module is connected with the selection state controller in the control conversion module, the selection state controller, the peripheral controller, the state latch module, and the peripherals are connected in turn, and the peripheral controller has multiple , each peripheral controller is connected to a peripheral device through a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

