CN100363861C - Computer information leakage protection - Google Patents

Computer information leakage protection Download PDF

Info

Publication number
CN100363861C
CN100363861C CNB2004100152335A CN200410015233A CN100363861C CN 100363861 C CN100363861 C CN 100363861C CN B2004100152335 A CNB2004100152335 A CN B2004100152335A CN 200410015233 A CN200410015233 A CN 200410015233A CN 100363861 C CN100363861 C CN 100363861C
Authority
CN
China
Prior art keywords
computing machine
leakage information
undesired signal
information
amplifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100152335A
Other languages
Chinese (zh)
Other versions
CN1645292A (en
Inventor
龙德浩
骞惠民
陈志清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2004100152335A priority Critical patent/CN100363861C/en
Publication of CN1645292A publication Critical patent/CN1645292A/en
Application granted granted Critical
Publication of CN100363861C publication Critical patent/CN100363861C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Shielding Devices Or Components To Electric Or Magnetic Fields (AREA)

Abstract

The present invention relates to a computer information leakage protection method which uses time varying, non-linear, non-stationary, and noncorrelation jamming signals for scrambling and protecting computer leakage information. In addition, the method simultaneously protects the radiation leakage information of a computer host and a computer displayer, conduction leakage information of a computer non-maskable network twisted pair line, and leakage information of a computer power supply line. Meanwhile, the method protects the leakage information of the computer power supply line by that the time-varying, non-linear, non-stationary, and noncorrelation jamming signals are simultaneously leaked to the external power supply line by a computer power supply.

Description

A kind of method of computing machine leakage information protection
Technical field
The present invention relates to a kind of method of computing machine leakage information protection, refer to a kind of method especially by scrambling method protection computing machine leakage information.
Background technology
As everyone knows, at present the leakage of computerized information mainly contains three approach: the 1) radiation leakage by graphoscope and main frame; 2) conduction by non-shielding network twisted-pair feeder (UTP) leak, 3) leak by power lead.In order to protect the computerized information of leakage, industry has been invented the method for various computing machine leakage information protections, is exactly wherein a kind of as adopting the computer video protector.
Conclusion is got up, and the method for active computer leakage information protection at present mainly contains following principal feature:
1) function singleness.For example " computer video protector " can protect the radiation leakage information of computer display and main frame, and can not protect the conduction leakage information on the non-shielding network of the computing machine twisted-pair feeder;
2) method of Gan Raoing is a relevant interference.The signal that promptly certain signal of the undesired signal of interference source generation and computing machine itself is carried out certain mathematical operation and produce is as the undesired signal of protection computing machine leakage information;
3) interference properties is white noise or pseudo noise;
4) with regard to interference level, its interfere with electromagnetic field is higher by force, easily disturbs electronic communication terminals such as mobile phone.
Simultaneously, there is following shortcoming in the method for active computer leakage information protection:
(1) useful information of computing machine is easy to be detectd receipts.
(2) can not multipath protection computing machine leakage information.Because present already present various computing machine leakage information protector function singlenesses, institute thinks that realization can protect simultaneously from the computerized information of above-mentioned three approach leakage, and a computing machine must be equipped with many computing machine leakage information protectors with difference in functionality.For example, the radiation information of desire protection main frame and display screen, a computing machine just must dispose a computer video protector; Desire is protected the conduction leakage information on the non-shielding network twisted-pair feeder, just must dispose a non-shielding network twisted-pair feeder conduction leakage information protector again.So, protection equipment is too much, operation inconvenience.All the more so for the computing machine that needs move.
(3) can not effectively protect the information of leaking from the computer power supply line.
Protection at present will be adopted filter method from the information spinner that the computer power supply line leaks.With reference to figure 1, the principal character of this method is the low-pass filter of a 220V of configuration on computing machine leakage information protector.Information Scomp on computing machine and the display power supply line thereof is leaked to the input end of alternating current 220V power supply low-pass filter LP by computer power supply, become information Scomp1, again by this power supply low-pass filter LP further after the decay, be leaked to and become information Scomp2 on the external power circuit.As long as LP is enough good to the attenuation characteristic greater than 50Hz, the information Scomp2 that then is leaked on the external power circuit is just enough little.As long as Scomp2, has just reached the purpose of protection computer power supply reveal information less than the sensibility in practice of detecing receiving unit.The basic process of power filter method that Here it is protection computer power supply reveal information.
But, use filter method to protect the power supply reveal information of computing machine to have the hidden danger of significantly giving away secrets.Because in fact be very easy to find: when the attaching plug of computing machine leakage information protector contacts with supply socket well, during the I/O impedance (being the input impedance of computer power supply) of power circuit wave filter coupling, it is effective that filter method suppresses the power lead leakage information; Otherwise then effect is bad even invalid.Because attaching plug contacts with supply socket whether whether good elasticity, the degree of oxidation, grafting main and the socket phosphorus bronze sheet put in place, or the like factor relevant, whether the promptly actual power-supply filter that uses is complementary with the input impedance of computer power supply and has above-mentioned uncertain factor.Though thereby feasible in theory with the reveal information on the filter method protection computer power supply line, in use be insecure.
(4) easily disturb other telecommunications terminals, environment is impacted
Because some computing machine leakage information protector radiation level are higher,,, and environment impacted as the normal use of mobile phone and mobile telephone so it not only easily disturbs other electronic communication terminal.
In view of this, a kind of method of improved computing machine leakage information protection is proposed in fact for necessary.
Summary of the invention
Based on the deficiency of active computer leakage information guard method, one of the object of the invention is to provide a kind of method of computing machine leakage information protection, can effectively protect the leakage information of computing machine.
Two of the object of the invention is to provide a kind of method of computing machine leakage information protection, but the leakage information of multipath protection computing machine.
Three of the object of the invention is to provide a kind of method of computing machine leakage information protection, can effectively protect the information of leaking from the computer power supply line.
The present invention is achieved in that
The method of a kind of computing machine leakage information protection, the information of become when this method is used, non-linear, non-stationary, non related interference signals scrambling protection leaking by computing machine.This method is protected the conduction reveal information of the non-shielding network of radiation leaks information, the computing machine twisted-pair feeder of main frame and display simultaneously; perhaps the information of simultaneously the conduction reveal information of the non-shielding network of computing machine twisted-pair feeder and computer power supply line being leaked is protected, and perhaps simultaneously the conduction reveal information of the non-shielding network of radiation leaks information, the computing machine twisted-pair feeder of main frame and display and the information that the computer power supply line leaks is protected.In the present invention, this method is protected the radiation leaks information of an above main frame and display simultaneously.
In the present invention, the connotation that becomes the time is: the algorithm that 1) produces undesired signal is relevant with the time.Therefore, each starts computing machine constantly, and the undesired signal that computing machine leakage information protective device produces all is inequality; 2) the distribution function family of undesired signal and statistic thereof are also relevant with the time.
Nonlinear connotation is: the algorithm that produces undesired signal is non-linear.
The connotation of non-stationary is: the statistical distribution and the associating statistical distribution thereof of undesired signal all are inequality constantly for each.
Uncorrelated connotation is: computing machine leakage information protective device do not utilize any signal of computing machine and the time become non-linear non-stationary undesired signal and carry out any relevant treatment; but the time become non-linear non-stationary undesired signal and directly amplify, as the undesired signal of computing machine leakage information protective device.
Wherein, described to the method for protecting from the radiation leaks information of main frame and display be become when adopting one, non-linear, non-stationary, non related interference signals amplify; and through antenna matching network it is gone out from aerial radiation, form one approach ball-type (omnidirectional) the time become, non-linear, non-stationary, irrelevant electromagnetic interference (EMI) field protect the radiation leaks information from main frame and display.Described to the method for protecting from the conduction reveal information of the non-shielding network of computing machine twisted-pair feeder be become by another of interference source output the time, non-linear, non-stationary, non related interference signals; through conversion and the Manchester's cde of making zero; and amplify through amplifier, be connected to the standby end of non-shielding network socket and line to protecting from the conduction reveal information of the non-shielding network of computing machine twisted-pair feeder.The described method that the information of leaking from the computer power supply line is protected be with the time become, non-linear, non-stationary, the dynamo-electric as calculated source of non related interference signals leak into external power cord simultaneously and protect the information of leaking from the computer power supply line.
In addition; the method of a kind of computing machine leakage information of the present invention protection, the method that the information of leaking from the computer power supply line is protected are to adopt the dynamo-electric as calculated source of undesired signal is leaked into external power cord simultaneously to protect the information of leaking from the computer power supply line.Become when wherein, described undesired signal is, non-linear, non-stationary, non related interference signals.
After adopting the present invention, at first because change when having used, non-linear, non-stationary, non related interference signals, so the useful information of computing machine is difficult for being detectd and receives and decode; Secondly, this method can be protected the computerized information by the leakage of following three paths simultaneously: 1) the radiation leakage information of main frame and display; 2) the conduction leakage information on the non-shielding network twisted-pair feeder; 3) leakage information on the power lead; Once more, this method employing leaks into external power cord simultaneously with the dynamo-electric as calculated source of undesired signal and protects the information of leaking from the computer power supply line, causes power lead to reveal the hidden danger of computerized information thereby eliminated power circuit wave filter mismatch.At last; because the non-correlation of described undesired signal; the computing machine leakage information protective device of realizing the inventive method within the specific limits can a tractor serves several purposes, and promptly computing machine leakage information protective device can be protected the radiation leaks information of several main frames and display simultaneously.
Description of drawings
Fig. 1 is the schematic diagram of existing protection from computer power supply line leakage information method;
Fig. 2 is the physical arrangement schematic diagram that is used to realize the device of computing machine leakage information of the present invention guard method;
Become when Fig. 3 and Fig. 4 produce for the present invention, the schematic diagram of non-linear, non-stationary, non related interference signals;
Fig. 5 is the schematic diagram of computer power supply line leakage information of the present invention guard method.
Embodiment
Further set forth the method for computing machine leakage information protection of the present invention below in conjunction with accompanying drawing.
The method of a kind of computing machine leakage information of the present invention protection, the information of become during use, non-linear, non-stationary, non related interference signals scrambling protection leaking by computing machine.Described method is protected the conduction reveal information of the non-shielding network of radiation leaks information, the computing machine twisted-pair feeder of main frame and display simultaneously; perhaps the information of simultaneously the conduction reveal information of the non-shielding network of computing machine twisted-pair feeder and computer power supply line being leaked is protected, and perhaps simultaneously the conduction reveal information of the non-shielding network of radiation leaks information, the computing machine twisted-pair feeder of main frame and display and the information that the computer power supply line leaks is protected.
With reference to figure 2; the device (computing machine leakage information protective device) of realizing computing machine leakage information method of the present invention comprises undesired signal generator, coding module, first amplifier and second amplifier; the antenna matching network module; wherein the undesired signal generator links to each other with first amplifier and coding module respectively; antenna matching network module one end links to each other with first amplifier; the other end links to each other with antenna, and second amplifier, one end links to each other with coding module, and its other end connects network socket.In one embodiment of the invention, when can producing, described undesired signal generator becomes, non-linear, non-stationary, non related interference signals.Described coding module is conversion and the Manchester's cde module of making zero.
In one embodiment of the invention, described computing machine leakage information protective device is fastened in the main frame of computing machine or is fastened in the display.In another embodiment, described computing machine leakage information protective device is inserted in the expansion slot of computing machine.
Principle of work of the present invention is: on the one hand described undesired signal generator the time become, non-linear, non-stationary, non related interference signals amplify through ultra broadband amplifier 1; then again through antenna matching network; amplified the time become, non-linear, non-stationary, non related interference signals go out from aerial radiation effectively; form one approach ball-type (omnidirectional) the time become, non-linear, non-stationary, irrelevant electromagnetic interference (EMI) field, promptly with the radiation leaks information of scrambling method protection main frame and display.Simultaneously; become during another of interference source output, non-linear, non-stationary, irrelevant jam signal; through conversion and the Manchester's cde of making zero; and amplify by amplifier 2; the standby end and the line that are connected to non-shielding network socket are right, promptly protect non-shielding network twisted-pair feeder conduction reveal information with the scrambling method.
Because the radiation leaks signal of computing machine has extremely strong correlation properties, therefore, the optimum reception method of computerized information is correlation reception.Correlation reception and gordian technique one self-adaptive digital signal thereof are handled (DSP), and be quite ripe for white noise, can believe/making an uproar under the strong jamming situation than negative tens dB and normally carrying out correlation reception; Yet, for the time become non-linear nonstationary noise, the correlation reception performance sharply descends.In other words; before the optimum reception theory in still unresolved anti-" time become non-linear non-stationary noncoherent jamming "; become non-linear non-stationary noncoherent jamming during employing, can---satisfy under the condition of EMC---information of passing through aforementioned three approach radiation of protection computing machine with lower interference level.
In detail, this interference just can destroy the condition of work that is widely used in correlation reception and Adaptive Signal Processing with lower interference level, makes the relevant peaks reduction of modern correlation reception even is lower than secondary lobe; " study " of self-adaptation DSP restrains too slow even can not restrain, " tracking " is difficult to synchronously even can not be synchronous, thereby could protect the radiation leakage information of computing machine (main frame and display) with the low interference level (1) that does not disturb the electronic communication terminal; (2) the conduction reveal information on the non-shielding network of the protection computing machine twisted-pair feeder; (3) leakage information on the protection computer power supply line.Become non-linear non-stationary, non related interference signals in the time of just and make that just the method for the invention is able to Project Realization.
In a specific embodiment of the present invention, become when described, non-linear, non-stationary, non related interference signals are great with imperial moral, clear two scholars of Chen Zhi propose " become initial value, become the accurate chaos algorithm of structure " and generation.The computing machine leakage information protective device of realizing the inventive method on EDA (electric design automation) platform, adopt VHDL (VHSIC Hardware Description Language) hardware description language and VLSI (very large scale integrated circuit) to develop, be encapsulated in the PGA element.
With reference to figure 3 and Fig. 4, described " become initial value, become the accurate chaos algorithm of structure " generates each and disturbs byte all to upgrade the structure and the initial value of a chaos algorithm, and " become just value-based algorithm 1, become structure algorithm 1, become initial value, become the accurate chaos algorithm 1 of structure " in actual applications and " become just value-based algorithm 2, become structure algorithm 2, become initial value, the accurate chaos algorithm 2 of change structure " all is highly non-linear, thereby this is a kind of non-linear non-stationary Discrete Stochastic undesired signal that becomes when typical.Because each byte is all upgraded the initial value and the structure of a chaos algorithm, become non-linear non-stationary undesired signal when therefore desire suppresses this " become initial value, become the accurate chaos of structure ", detect receiving unit and just must in the time that generates a byte, finish " study " and " tracking ".Become non-linear non-stationary undesired signal optimum reception theory when not setting up inhibition " change initial value, the accurate chaos of change structure " before, this is impossible.
Under the condition of existing optimum reception theory, can become the condition of work that non-linear non-stationary noncoherent jamming level destroys correlation reception and Adaptive Signal Processing when lower, make modern correlation receiver relevant peaks low even be lower than secondary lobe; " study " of self-adaptation DSP is difficult to convergence even can not restrains, " tracking " is difficult to synchronously even can not be synchronous, thereby can protect the radiation information of computing machine (main frame and display) with the low interference level (1) that does not disturb mobile phone and mobile telephone; (2) conducts information on non-shielding network twisted-pair feeder of protection and the power lead.
In the present invention, the device of realizing the guard method of computing machine leakage information is by main amplifier (being equivalent to amplifier 1 among Fig. 2) and antenna matching network, so that antenna can be efficiently the time become non-linear non-stationary non related interference signals omnidirectional eradiation and go out, with protection computing machine radiation leaks information; Simultaneously through the amplifier of associating (being equivalent to the amplifier 2 among Fig. 2); through making zero conversion and Manchester's cde the time become non-linear non-stationary non related interference signals and amplify; be connected to the standby end of network socket (RJ45 interface), to protect non-shielding network twisted-pair feeder conduction reveal information.
The present invention still adopts the scrambling method to protect the leakage information of computing machine on power lead; one of its gordian technique; be to leak into " time become non-linear non-stationary non related interference signals " dynamo-electric as calculated source on the external power cord simultaneously; that is to say the useful leakage signal of existing computing machine on the external power cord; also have built-in computing machine leakage information protective device the time become non-linear non-stationary noncoherent jamming leakage signal, detect from power lead and receive the computing machine useful information to destroy other people.
On physical arrangement, be exactly the present invention realize the guard method of computing machine leakage information device must with computing machine common-battery source.Like this, not only eliminate power circuit wave filter mismatch and caused power lead to reveal the hidden danger of computerized information, simplified the structure of described device simultaneously, reduced cost.But it should be noted that described device is fastened in main frame or the display or is inserted on the expansion slot of main frame and computing machine common-battery source, all must satisfy electromagnetic compatibility (EMC) property of computing machine, otherwise can not use.For this reason, the present invention becomes non-linear non-stationary interference source in the time of must adopting, to reduce interference strength.
With reference to figure 5; as one embodiment of the invention; the device of described realization computing machine leakage information guard method is provided with PCI and inserts the card pin; the electrical specification of this pin and mechanical property be the technical manual of the general insertion card of accord with PCI all; thereby; when this device inserts the pci expansion slot of computing machine; just with computing machine common-battery source; and open and close with computing machine; useful signal Scomp on the computer power supply and the time become non-linear non-stationary non related interference signals Sjam and be leaked on the external power cord in dynamo-electric as calculated source simultaneously; the useful signal Scomp1 that existing computing machine is revealed on the external power cord; have also that described device reveals the time become non-linear non-stationary non related interference signals Sjam1, thereby effectively protected the information of revealing by the conduction of computer power supply line.
In the present invention, the device of described realization computing machine leakage information guard method also is provided with the working condition that LED light is used to indicate described device.The red LED pilot lamp is used for the situation of indication " time become non-linear non-stationary undesired signal " from aerial radiation: when radiation just often, red light is bright; (do not connect or the antenna connecting line has broken as antenna) when the output impedance mismatch of antenna and amplifier, the red light spy is bright.This is a danger signal! Antenna must connect, otherwise impedance mismatching, radiation of power is not gone out, and burns out power amplifier easily.The green LED pilot lamp is used to indicate the working condition of the non-shielding network twisted-pair feeder conduction of protection leakage: green light is used to indicate the non-shielding network twisted-pair feeder of protection to conduct the situation of revealing: working properly when green light is bright, otherwise, lost efficacy.Wherein, described indicator signal is extracted and treated and form from the output terminal of amplifier respectively.
The present invention's can be applicable to need protection relating computer of computing machine radiation information and conducts information, it can protect the leakage information of three approach of computing machine: computer power supply line leakage information 1) the radiation leakage information, 2 of main frame and display) the conduction leakage information, 3 of the non-shielding network of computing machine twisted-pair feeder).
In the present invention; the algorithm of described generation undesired signal is to the time; particularly to sensitivity height, the nonlinear degree height in the initial moment; make self-adaptation DSP " study " be difficult to restrain even can not restrain; " tracking " is difficult to synchronously even can not be synchronous; therefore the device radiation of described realization computing machine leakage information guard method is low, does not disturb mobile phone and mobile telephone at least.
Above disclosed only is the preferred embodiment of the method for computing machine leakage information protection of the present invention, so can not limit the present invention's interest field with this, and therefore the variation of doing according to the present patent application claim such as grade still belongs to the scope that the present invention is contained.

Claims (7)

1. computing machine leakage information guard method is characterized in that, described method adopts computing machine leakage information protective device to carry out the protection of leakage information; Described computing machine comprises: antenna, network socket RJ45 and line are right; Described computing machine leakage information protective device comprises: undesired signal generator, coding module, first amplifier, second amplifier, antenna matching network module; Wherein the undesired signal generator links to each other with first amplifier and coding module respectively, antenna matching network module one end links to each other with first amplifier, the other end links to each other with antenna, and second amplifier, one end links to each other with coding module, and its other end connection network socket RJ45 and line are right; Described method comprises the steps:
Become when described undesired signal generator produces, first undesired signal of non-linear, non-stationary;
Described first amplifier directly amplifies described first undesired signal;
First undesired signal of described antenna matching network after with described amplification radiate and forms the electromagnetic interference (EMI) field of approaching ball-type;
Become when described undesired signal generator produces, second undesired signal of non-linear, non-stationary;
Described coding module is directly to described second undesired signal make zero conversion and Manchester's cde;
Second undesired signal of described second amplifier after with described conversion and coding directly amplified, and it is right to be connected to network socket RJ45 and line;
Described computing machine leakage information protective device and computing machine adopt same power supply.
2. the method for a computing machine leakage information as claimed in claim 1 protection; it is characterized in that; this method is protected the conduction leakage information of the non-shielding network of radiation leakage information, the computing machine twisted-pair feeder of main frame and display simultaneously; perhaps the information of simultaneously the conduction leakage information of the non-shielding network of computing machine twisted-pair feeder and computer power supply being leaked is protected, and perhaps simultaneously the conduction leakage information of the non-shielding network of radiation leakage information, the computing machine twisted-pair feeder of main frame and display and the information that the computer power supply line leaks is protected.
3. the method for a computing machine leakage information protection as claimed in claim 1 is characterized in that this method is protected the radiation leakage information of an above main frame and display simultaneously.
4. the method for a computing machine leakage information as claimed in claim 2 protection, it is characterized in that, describedly become when the method for protecting from the radiation leakage information of main frame and display is comprised the steps: that described undesired signal generator produces, first undesired signal of non-linear, non-stationary; Described first amplifier directly amplifies described first undesired signal;
First undesired signal of described antenna matching network after with described amplification radiate, and become when forming one, non-linear, non-stationary, uncorrelated electromagnetic interference (EMI) field protect the radiation leakage information from main frame and display.
5. the method for a computing machine leakage information as claimed in claim 2 protection is characterized in that, described the method for protecting from the conduction leakage information of the non-shielding network of computing machine twisted-pair feeder is comprised the steps:
Become when described undesired signal generator produces, second undesired signal of non-linear, non-stationary;
Described coding module is directly to described second undesired signal make zero conversion and Manchester's cde;
Second undesired signal of described second amplifier after with described conversion and coding directly amplified, and it is right to be connected to network socket RJ45 and line.
6. the method for a computing machine leakage information as claimed in claim 2 protection; it is characterized in that; the described method that the information of leaking from the computer power supply line is protected is that described computing machine leakage information protective device and computing machine are adopted same power supply power supply, with described undesired signal generator produce the time become, non-linear, non-stationary undesired signal directly leaks into external power cord simultaneously and protects from the information of computer power supply line leakage in dynamo-electric as calculated source.
7. the method for a computing machine leakage information protection is characterized in that, described method adopts computing machine leakage information protective device to carry out the protection of leakage information; Described computing machine comprises: antenna, network socket RJ45 and line are right; Described computing machine leakage information protective device comprises: undesired signal generator, coding module, first amplifier, second amplifier, antenna matching network module; Wherein the undesired signal generator links to each other with first amplifier and coding module respectively, antenna matching network module one end links to each other with first amplifier, the other end links to each other with antenna, and second amplifier, one end links to each other with coding module, and its other end connection network socket RJ45 and line are right; Described method comprises the steps:
Become when described undesired signal generator produces, the undesired signal of non-linear, non-stationary;
Described computing machine leakage information protective device and computing machine adopt same power supply;
The described method that the computing machine leakage information is protected is the direct dynamo-electric as calculated source of undesired signal to be leaked into external power cord simultaneously protect the information of leaking from the computer power supply line.
CNB2004100152335A 2004-01-19 2004-01-19 Computer information leakage protection Expired - Fee Related CN100363861C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100152335A CN100363861C (en) 2004-01-19 2004-01-19 Computer information leakage protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100152335A CN100363861C (en) 2004-01-19 2004-01-19 Computer information leakage protection

Publications (2)

Publication Number Publication Date
CN1645292A CN1645292A (en) 2005-07-27
CN100363861C true CN100363861C (en) 2008-01-23

Family

ID=34867975

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100152335A Expired - Fee Related CN100363861C (en) 2004-01-19 2004-01-19 Computer information leakage protection

Country Status (1)

Country Link
CN (1) CN100363861C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104168279A (en) * 2014-08-18 2014-11-26 昆腾微电子股份有限公司 Electromagnetic analysis attack resistance device and method for safety equipment
CN107317651A (en) * 2017-06-06 2017-11-03 李瑞峰 What a kind of computerized information was revealed prevents device and method
CN108267647B (en) * 2017-12-19 2021-04-27 中国电子科技网络信息安全有限公司 Detection method and device for power conduction electromagnetic leakage protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5243648A (en) * 1989-11-10 1993-09-07 Data Protection S.R.L. Protective device for computers and the like
CN2192051Y (en) * 1994-03-18 1995-03-15 北京电子技术研究所 Video frenquency radiation information interference unit for computer
CN1361610A (en) * 2002-01-18 2002-07-31 张程霞 Electromagnetic interference method of network
CN1372380A (en) * 2001-02-28 2002-10-02 上海慧康信息技术有限公司 Electromagnetic transmission disturber

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5243648A (en) * 1989-11-10 1993-09-07 Data Protection S.R.L. Protective device for computers and the like
CN2192051Y (en) * 1994-03-18 1995-03-15 北京电子技术研究所 Video frenquency radiation information interference unit for computer
CN1372380A (en) * 2001-02-28 2002-10-02 上海慧康信息技术有限公司 Electromagnetic transmission disturber
CN1361610A (en) * 2002-01-18 2002-07-31 张程霞 Electromagnetic interference method of network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
变结构/变初值准混沌滚动密钥产生器. 陈志清,龙德浩.电讯技术,第37卷第6期. 1997 *

Also Published As

Publication number Publication date
CN1645292A (en) 2005-07-27

Similar Documents

Publication Publication Date Title
CN207182284U (en) Integrated circuit and IC system
CN100363861C (en) Computer information leakage protection
CN106547717A (en) Shell circuit, micro USB seats operation circuit and terminal
US8060019B2 (en) Asymmetric ESD protection for FM transmitter
CN109040896A (en) A kind of earphone and apart from detection cut-in method
CN206098950U (en) Electronic device
CN2672706Y (en) Leaking information protector for computer
TWI366964B (en) Portable electronic instrument including at least one input/output terminal for establishing a communication with an electronic unit arranged within said instrument
CN104701625B (en) Possesses the antenna module of decoupling function, decoupling method conciliates coupled system
US8797044B2 (en) MXM interface test system and connection apparatus thereof
CN107612571A (en) Terminal and its control circuit of multipurpose Kato, prevent SIM card from burning the method for card
WO2013167048A2 (en) Data card, connector, method for reducing interference on sensitivity of antenna of data card
CN113612875B (en) Radiation control circuit and communication equipment
CN105979422A (en) Mobile terminal, and earphone base control system and method thereof
CN201444577U (en) Multistage intensive video monitoring lightning protector
CN201199350Y (en) Serial port static protector
CN105913814B (en) A kind of display screen
CN209170362U (en) A kind of radio frequency component, conduction test equipment and terminal
CN210405295U (en) Dual-signal output mobile phone signal amplifier
CN207782804U (en) Power carrier isolator
Calcagnini et al. Electromagnetic interference to infusion pumps. Update2008 from GSM mobile phones
CN215529010U (en) Internet of things communication module
KR100828568B1 (en) Apparatus and method for emi test
CN220493104U (en) Two-wire indoor unit based on network transmission
CN201838869U (en) External network connecting device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080123

Termination date: 20100219