Secure computer architecture based on dual-hard-disk cold switching operation
A secure computer and dual hard disk technology, applied in the field of network security transmission, can solve the problems of not being able to make full use of the convenience and low efficiency of data communication, and achieve the effect of preventing plaintext data transmission and defending against network attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] This embodiment provides a secure computing architecture based on the cold switching operation of dual hard disk software systems, specifically as follows:
[0081] The safe computer architecture based on the cold switching operation of the dual hard disk software system is as follows: figure 1 As shown, it consists of a common hard disk software system and a secure hard disk software system connected to the same computer motherboard. These two sets of hard disk software systems cannot be started at the same time, and only one of the hard disk software systems can be started by cold switching. The common hard disk software system provides a common computing environment, and the secure hard disk software system provides a secure computing environment.
[0082] The secure computer is based on four security mechanisms of cold switching operation of two hard disk software systems, file data block hash tag mechanism, file random split encrypted transmission, and single func...
Embodiment 2
[0098] This embodiment is on the basis of embodiment 1:
[0099] This embodiment provides a security mechanism implemented by a secure computer architecture
[0100] The design goal of the secure computer architecture is to establish a safe and fully controlled operating environment that is strictly isolated from the public Internet, and meets the application requirements for safe and secure processing of sensitive files in each process including generation, transmission, copying, storage, and editing.
[0101] In order to achieve this safe application goal, the present invention designs a secure computing rack based on dual hard disk system cold switching and encrypted hash tag protection, which realizes strict password isolation between the secure computing environment and the public Internet environment. By adopting a transmission protection mechanism based on file randomization and split encryption, a file security exchange mechanism based on data block cryptographic hash ...
Embodiment 3
[0138] This embodiment is on the basis of embodiment 2:
[0139] This embodiment provides a sensitive file copy control processing workflow, specifically as follows:
[0140] The file safety copy control software running in the safe operating environment executes the sensitive file copy control process between the safe hard disk and the USB memory.
[0141] 1.1 Sensitive file copy output processing workflow
[0142] When a sensitive file needs to be copied and exported through the safe USB interface, the file safety copy control software performs the following processing steps (all encryption / decryption and hash operations are completed by the file encryption / decryption software module calling the cryptographic algorithm operation software function):
[0143] Step 1 If the security computer is in the normal hard disk software running state, switch the power switch of the hard disk to the security hard disk and start the security hard disk software system.
[0144] The second...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com