CN103473516A - Confidential computer unavailable for network technology - Google Patents
Confidential computer unavailable for network technology Download PDFInfo
- Publication number
- CN103473516A CN103473516A CN2013103783719A CN201310378371A CN103473516A CN 103473516 A CN103473516 A CN 103473516A CN 2013103783719 A CN2013103783719 A CN 2013103783719A CN 201310378371 A CN201310378371 A CN 201310378371A CN 103473516 A CN103473516 A CN 103473516A
- Authority
- CN
- China
- Prior art keywords
- computer
- network
- network technology
- unavailable
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a confidential computer unavailable for the network technology and belongs to the field of computers. The computer is unavailable for network connection and network application and is provided with no network operating system or network interface. The computer can serve as an office computer for government agencies and enterprise and public institutions to prevent confidential information stored in the computer for government agencies and enterprise and public institutions from being stolen by hostile forces through the network, and prevent workers in government agencies and enterprise and public institutions from chatting online with the computer and playing online games, in terms of computer hardware.
Description
Technical field
The invention belongs to computer realm, especially design a kind of secure computer that can not use network technology.
Background technology
21 century has entered computer age, people utilize computer treatmenting information, greatly improved work efficiency, particularly the combination of computer networking technology and computing machine, accelerated speed of information exchange, realizes that information resources are shared, yet, computer networking technology is also brought serious threat to computer information security, and the many security informations of China are utilized network to steal by hostile force, and national information is taken a bath safely.Traditional computer is provided with the corresponding interface and the network operating system of using for network technology, the office computer of many government offices and enterprises and institutions is connected with internet, a few thing personnel confidential notions are thin, non-concerning security matters office computer consciously or unconsciously stores secret information, steal secret to hostile force by network especially condition is provided, so need a kind of secure computer that can not use network technology, using it as government offices and the office computer of enterprises and institutions use, the stored information of office computer that prevents government offices and enterprises and institutions is utilized network to steal by hostile force, and during stopping government offices and the staff of enterprises and institutions working, computer hardware chats on line with office computer, the network that knits a net game.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of secure computer that can not use network technology, and computing machine does not possess interconnection network and uses the condition of network.
For solving above technical matters, technical scheme of the present invention is as follows:
A kind of secure computer that can not use network technology, computing machine can not connect and use network, it is characterized in that: described computing machine does not arrange network operating system, and network interface is not set.
The invention has the beneficial effects as follows: the office computer that the present invention can be used as government offices and enterprises and institutions is used, prevent that the secret information that government offices and enterprises and institutions' office computer store from being utilized network to steal by hostile force, and with office computer, chat on line during computer hardware is stopped government offices and the staff of enterprises and institutions working, the network that knits a net game.
Embodiment
Below in conjunction with example, the present invention will be further described: a kind of secure computer that can not use network technology, computing machine can not connect and use network, it is characterized in that: described computing machine does not arrange network operating system, and network interface is not set.
Example:
Certain government offices is utilized internet to steal for preventing the stored information of staff's computing machine by other people, and stop with office computer, to chat on line during staff's working, the network that knits a net game, can not use the office computer of the secure computer of network technology as the staff thereby purchased, can not use the secure computer of network technology there is no network operating system and network interface, the staff can't use network, the stored information of its office computer has been avoided the possibility by other people utilize network to steal, the staff can't play with this computer internet chat and the network that knits a net, solved the problem of addiction network during the staff goes to work.
Claims (2)
1. the secure computer that can not use network technology, computing machine can not connect and use network, it is characterized in that: described computing machine does not arrange network operating system.
2. a kind of secure computer that can not use network technology according to claim 1, is characterized in that: network interface is not set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013103783719A CN103473516A (en) | 2013-08-19 | 2013-08-19 | Confidential computer unavailable for network technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013103783719A CN103473516A (en) | 2013-08-19 | 2013-08-19 | Confidential computer unavailable for network technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103473516A true CN103473516A (en) | 2013-12-25 |
Family
ID=49798361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013103783719A Pending CN103473516A (en) | 2013-08-19 | 2013-08-19 | Confidential computer unavailable for network technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103473516A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1021163A (en) * | 1963-06-03 | 1966-03-02 | Monsanto Co | Computer |
US3399401A (en) * | 1964-06-29 | 1968-08-27 | Army Usa | Digital computer and graphic input system |
CN101582771A (en) * | 2009-07-02 | 2009-11-18 | 济宁盛世光明软件技术有限公司 | Method of identity recognition of computer internet under mode of multi-stage routers |
-
2013
- 2013-08-19 CN CN2013103783719A patent/CN103473516A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1021163A (en) * | 1963-06-03 | 1966-03-02 | Monsanto Co | Computer |
US3399401A (en) * | 1964-06-29 | 1968-08-27 | Army Usa | Digital computer and graphic input system |
CN101582771A (en) * | 2009-07-02 | 2009-11-18 | 济宁盛世光明软件技术有限公司 | Method of identity recognition of computer internet under mode of multi-stage routers |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107968839A (en) | Electronic government affairs system based on block chain technology | |
WO2008119959A3 (en) | Computer network | |
JP2015524952A5 (en) | ||
CN106302357A (en) | The ownership altering system of GID and application process thereof | |
Kahn et al. | Women's representativeness in the South African public service | |
Li | Think national, blame local: central-provincial dynamics in the Hu era | |
CN103473516A (en) | Confidential computer unavailable for network technology | |
CN104079472A (en) | Method for mobile game products to achieve real-time social contact functions | |
CN105187374A (en) | Method accessing secret account number through one account number | |
CN202854902U (en) | Online attendance system | |
CN106789846A (en) | A kind of LAN wide area network isolation software | |
CN205622644U (en) | Network system of nuclear power plant | |
Schwartz | Identity management and privacy: A rare opportunity to get it right | |
Soesanto | The limits of like-mindedness in cyberspace | |
Scott-Hayward | Security-focused Networks of the Future | |
CN202838461U (en) | Face-online type attendance system | |
CN105117893A (en) | Cooperative office information system | |
CN103747011A (en) | High-bandwidth network safety system | |
Chow | Trade and Human Security in ASEAN: Toward Deeper Linkage? | |
CN203193648U (en) | Encryption device applied for personal online bank login passwords and based on cloud computing | |
CN106447289A (en) | Building project coordination management method based on wechat | |
Cheng et al. | Network forum based on blockchain structure: a new anonymous community conception | |
Mian | Challenges and prospects for Pak‐Russia relations in the evolving multi polar world | |
Li et al. | Predicaments and Countermeasures of Local Government in China Coping with Public Crisis in the Internet Era | |
Ni | Research on the Information Management for College Social Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131225 |