Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety computer with information safety management unit

A technology of secure computer, management unit, applied in the field of computer information security

Inactive Publication Date: 2005-06-29
瑞达信息安全产业股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The object of the present invention is to provide a kind of information security computer and its protection method in order to solve and improve the information security problem existing in the existing computer system, aiming at solving the security performance problem of the general computer system, using the main board of the general computer system as the base, adding a Security Management Unit, which can be an Embedded Security Module (ESM)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety computer with information safety management unit
  • Safety computer with information safety management unit
  • Safety computer with information safety management unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Safety computer embodiment 1 of the present invention: as figure 1 , figure 2As shown, it has peripheral equipment, central processing unit, memory, safe computer motherboard; Its proprietary user identity information input device 1 is an IC card, and it can also be a sampling device of fingerprint, sound, image, iris, Or information storage devices such as smart cards, one or more of them; the exclusive user identity information input device interface 2 is connected with the exclusive user identity information input device 1 . The information security management unit 5 includes: a central processing unit (CPU) 5.1 for security management; a storage unit 5.2 which includes its own running program, the storage unit 5.2 is a rewritable memory, and can also be a read-only memory and a data A memory for processing, which may be a random access memory; a control signal generating unit 5.3.

[0030] Such as figure 1 , figure 2 As shown, in Embodiment 2 of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety computer with an information safety management unit. The security computer includes an identity information input device interface, an information security management unit, a security control execution unit, a power-on circuit unit, a computer peripheral switch circuit unit, and a computer motherboard unit, and the security management unit in the security computer can also be made into a security module (ESM). The utility model has the advantages of self-inspection, verification, and control and management information from the underlying hardware, thereby solving and improving the security protection problem of computer information.

Description

technical field [0001] The invention relates to a safety computer with an information safety management unit, which belongs to the technical field of computer information safety and is especially suitable for users with strong computer information safety and confidentiality. Background technique [0002] The existing computer information security technical measures mainly consider the following security threats: [0003] 1. Virus problem. This is the broadest computer security problem in existence. Because computer virus programs are easy to make and transmit, computer viruses are extremely destructive. [0004] 2. Illegal access and destruction (hacking). The current computer security technology still lacks effective countermeasures and tracking methods against computer network crimes. "Hacker" attacks are the main threat to computer information security. [0005] 3. Lack of management means, including leakage of security information on the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F12/16
Inventor 刘毅吕永康张焕国
Owner 瑞达信息安全产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products