CN103473516A - Confidential computer unavailable for network technology - Google Patents

Confidential computer unavailable for network technology Download PDF

Info

Publication number
CN103473516A
CN103473516A CN2013103783719A CN201310378371A CN103473516A CN 103473516 A CN103473516 A CN 103473516A CN 2013103783719 A CN2013103783719 A CN 2013103783719A CN 201310378371 A CN201310378371 A CN 201310378371A CN 103473516 A CN103473516 A CN 103473516A
Authority
CN
China
Prior art keywords
computer
network
network technology
unavailable
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103783719A
Other languages
Chinese (zh)
Inventor
谢珍文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2013103783719A priority Critical patent/CN103473516A/en
Publication of CN103473516A publication Critical patent/CN103473516A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a confidential computer unavailable for the network technology and belongs to the field of computers. The computer is unavailable for network connection and network application and is provided with no network operating system or network interface. The computer can serve as an office computer for government agencies and enterprise and public institutions to prevent confidential information stored in the computer for government agencies and enterprise and public institutions from being stolen by hostile forces through the network, and prevent workers in government agencies and enterprise and public institutions from chatting online with the computer and playing online games, in terms of computer hardware.

Description

Can not use the secure computer of network technology
Technical field
The invention belongs to computer realm, especially design a kind of secure computer that can not use network technology.
Background technology
21 century has entered computer age, people utilize computer treatmenting information, greatly improved work efficiency, particularly the combination of computer networking technology and computing machine, accelerated speed of information exchange, realizes that information resources are shared, yet, computer networking technology is also brought serious threat to computer information security, and the many security informations of China are utilized network to steal by hostile force, and national information is taken a bath safely.Traditional computer is provided with the corresponding interface and the network operating system of using for network technology, the office computer of many government offices and enterprises and institutions is connected with internet, a few thing personnel confidential notions are thin, non-concerning security matters office computer consciously or unconsciously stores secret information, steal secret to hostile force by network especially condition is provided, so need a kind of secure computer that can not use network technology, using it as government offices and the office computer of enterprises and institutions use, the stored information of office computer that prevents government offices and enterprises and institutions is utilized network to steal by hostile force, and during stopping government offices and the staff of enterprises and institutions working, computer hardware chats on line with office computer, the network that knits a net game.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of secure computer that can not use network technology, and computing machine does not possess interconnection network and uses the condition of network.
For solving above technical matters, technical scheme of the present invention is as follows:
A kind of secure computer that can not use network technology, computing machine can not connect and use network, it is characterized in that: described computing machine does not arrange network operating system, and network interface is not set.
The invention has the beneficial effects as follows: the office computer that the present invention can be used as government offices and enterprises and institutions is used, prevent that the secret information that government offices and enterprises and institutions' office computer store from being utilized network to steal by hostile force, and with office computer, chat on line during computer hardware is stopped government offices and the staff of enterprises and institutions working, the network that knits a net game.
Embodiment
Below in conjunction with example, the present invention will be further described: a kind of secure computer that can not use network technology, computing machine can not connect and use network, it is characterized in that: described computing machine does not arrange network operating system, and network interface is not set.
Example:
Certain government offices is utilized internet to steal for preventing the stored information of staff's computing machine by other people, and stop with office computer, to chat on line during staff's working, the network that knits a net game, can not use the office computer of the secure computer of network technology as the staff thereby purchased, can not use the secure computer of network technology there is no network operating system and network interface, the staff can't use network, the stored information of its office computer has been avoided the possibility by other people utilize network to steal, the staff can't play with this computer internet chat and the network that knits a net, solved the problem of addiction network during the staff goes to work.

Claims (2)

1. the secure computer that can not use network technology, computing machine can not connect and use network, it is characterized in that: described computing machine does not arrange network operating system.
2. a kind of secure computer that can not use network technology according to claim 1, is characterized in that: network interface is not set.
CN2013103783719A 2013-08-19 2013-08-19 Confidential computer unavailable for network technology Pending CN103473516A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103783719A CN103473516A (en) 2013-08-19 2013-08-19 Confidential computer unavailable for network technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103783719A CN103473516A (en) 2013-08-19 2013-08-19 Confidential computer unavailable for network technology

Publications (1)

Publication Number Publication Date
CN103473516A true CN103473516A (en) 2013-12-25

Family

ID=49798361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103783719A Pending CN103473516A (en) 2013-08-19 2013-08-19 Confidential computer unavailable for network technology

Country Status (1)

Country Link
CN (1) CN103473516A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1021163A (en) * 1963-06-03 1966-03-02 Monsanto Co Computer
US3399401A (en) * 1964-06-29 1968-08-27 Army Usa Digital computer and graphic input system
CN101582771A (en) * 2009-07-02 2009-11-18 济宁盛世光明软件技术有限公司 Method of identity recognition of computer internet under mode of multi-stage routers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1021163A (en) * 1963-06-03 1966-03-02 Monsanto Co Computer
US3399401A (en) * 1964-06-29 1968-08-27 Army Usa Digital computer and graphic input system
CN101582771A (en) * 2009-07-02 2009-11-18 济宁盛世光明软件技术有限公司 Method of identity recognition of computer internet under mode of multi-stage routers

Similar Documents

Publication Publication Date Title
CN107968839A (en) Electronic government affairs system based on block chain technology
WO2008119959A3 (en) Computer network
JP2015524952A5 (en)
CN106302357A (en) The ownership altering system of GID and application process thereof
Kahn et al. Women's representativeness in the South African public service
Li Think national, blame local: central-provincial dynamics in the Hu era
CN103473516A (en) Confidential computer unavailable for network technology
CN104079472A (en) Method for mobile game products to achieve real-time social contact functions
CN105187374A (en) Method accessing secret account number through one account number
CN202854902U (en) Online attendance system
CN106789846A (en) A kind of LAN wide area network isolation software
CN205622644U (en) Network system of nuclear power plant
Schwartz Identity management and privacy: A rare opportunity to get it right
Soesanto The limits of like-mindedness in cyberspace
Scott-Hayward Security-focused Networks of the Future
CN202838461U (en) Face-online type attendance system
CN105117893A (en) Cooperative office information system
CN103747011A (en) High-bandwidth network safety system
Chow Trade and Human Security in ASEAN: Toward Deeper Linkage?
CN203193648U (en) Encryption device applied for personal online bank login passwords and based on cloud computing
CN106447289A (en) Building project coordination management method based on wechat
Cheng et al. Network forum based on blockchain structure: a new anonymous community conception
Mian Challenges and prospects for Pak‐Russia relations in the evolving multi polar world
Li et al. Predicaments and Countermeasures of Local Government in China Coping with Public Crisis in the Internet Era
Ni Research on the Information Management for College Social Security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131225