Supercharge Your Innovation With Domain-Expert AI Agents!

A security computer implementation method and security computer

A technology of a secure computer and an implementation method, applied in the field of secure computer implementation methods and secure computers, can solve problems such as single, inability to achieve comprehensive protection, and inability to enforce forced isolation of hardware systems, and achieve the effect of ensuring integrity and confidentiality.

Active Publication Date: 2022-01-11
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the existing technology cannot realize the mandatory isolation of the hardware system in the integrated security computer of the internal and external network, and the simple method of isolation and security by password is relatively simple, and the requirement of comprehensive protection cannot be realized
And the security of its communication link is difficult to be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security computer implementation method and security computer
  • A security computer implementation method and security computer
  • A security computer implementation method and security computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0056] figure 1 is a flowchart of a first preferred embodiment of the secure computer-implemented method of the present invention. Such as figure 1 As shown, in step S1, an encryption chip is arranged between the hard disk and the mainboard so as to encrypt the data written into the hard disk and decrypt the data flowing out of the hard disk in real time. In a preferred embodiment of the present invention, the boot KEY is welded on the motherboard, and the encryption card is directly inserted into the hard disk interface; the hard disk data cable is used to connect the motherboard and the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for implementing a secure computer, comprising: setting an encryption chip between a hard disk and a mainboard to encrypt data written into the hard disk and decrypt data flowing out of the hard disk in real time; Data encryption directional import and export between network systems; control directional data transmission between intranet computers; control directional data export from the internal network system to the external network. The invention also relates to a secure computer. Implementing the secure computer implementation method and the secure computer of the present invention can realize hardware encryption and software encryption conveniently and quickly, thereby realizing mandatory isolation of the hardware system from both hardware and software aspects, ensuring the integrity and confidentiality of information, and realizing security Computers and USB devices, secure communication within the intranet network and with the external network.

Description

technical field [0001] The present invention relates to the field of secure computers, more specifically, to a method for implementing a secure computer and a secure computer. Background technique [0002] The performance of the storage system is closely related to the performance of the hard disk used. Common computers have been equipped with hard disks of different gears for storage systems with different performances before leaving the factory, so as to improve the performance of the system. While the integrated security computer guarantees the advantages of system performance, it also needs to improve the confidentiality level of the hard disk and the communication control technology, so as to ensure the basic requirements of the internal and external network isolation of the security computer and the security requirements of information, improve the stability of the system, and ensure the security of the system. reliable operation. [0003] The common method of communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/64G06F21/72
CPCG06F21/602G06F21/606G06F21/64G06F21/72
Inventor 戚建淮崔宸唐娟曾昌鹏刘建辉
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More