CN1423203A - Safety computer with information safety management unit - Google Patents

Safety computer with information safety management unit Download PDF

Info

Publication number
CN1423203A
CN1423203A CN 01138250 CN01138250A CN1423203A CN 1423203 A CN1423203 A CN 1423203A CN 01138250 CN01138250 CN 01138250 CN 01138250 A CN01138250 A CN 01138250A CN 1423203 A CN1423203 A CN 1423203A
Authority
CN
China
Prior art keywords
computer
unit
safety management
fail
management unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 01138250
Other languages
Chinese (zh)
Other versions
CN1208728C (en
Inventor
刘毅
吕永康
张焕国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JETWAY Information Security Industry Co., Ltd.
Original Assignee
WUHAN RUIDA ELECTRONIC CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN RUIDA ELECTRONIC CO Ltd filed Critical WUHAN RUIDA ELECTRONIC CO Ltd
Priority to CN 01138250 priority Critical patent/CN1208728C/en
Publication of CN1423203A publication Critical patent/CN1423203A/en
Application granted granted Critical
Publication of CN1208728C publication Critical patent/CN1208728C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The safety computer comprises the device interface for inputting the identification information, the information safety management unit, the safety control execution element, the starting up circuit unit, the circuit unit for switching computer peripherals and the computer main board unit. The safety management unit in the safety computer can be prepared as the element of the safety module. The invention possesses the advantages of providing the functions of the self-checking and the validation. The management information is controlled from the botton layer of the hardware so as to solve the improve the issue of the safety and the protection of the computer information.

Description

Fail-safe computer with information safety management unit
Technical field
The present invention relates to a kind of fail-safe computer, belong to the computer information safety technique field, be particularly suitable for the extremely strong user of computer information safe confidentiality and use with information safety management unit.
Background technology
Existing computer information security technical measures, mainly consider following security threat:
1, virus problems.This is the computer security issue the most widely that has existed.Because computer-virus program is easy to make and transmit, therefore, computer virus has great destructiveness.
2, unauthorized access and destruction (assault).Present computer security technique also lacks at computer network crime fruitful counterattack and means of tracking, and " hacker " attacks is the main threat of computer information safe.
3, the shortcoming of ladder of management comprises that the internal staff reveals the security information on the computing machine, and the external staff intercepts and captures the leakage that causes the security information on the computing machine by illegal means, and the poor information to need to be keep secret in computer system is effectively monitored.
4, the leak of the defective of computer network and computer software.Particularly the sharing of internet and opening make online information security have inborn deficiency, and its TCP/IP computer communication protocol of depending on for existence lacks corresponding security mechanisms.
In order to solve and improve the problem of the security threat of computerized information; existing safety practice comprises: realize the safeguard protection of the information on the computing machine in the mode of computer software; comprising: add firewall software; intrusion detection; anti-virus software etc.; this computer security mode on disposal route with computer operating system software have comparatively close related, but the invador still can enter computing machine by the leak of manipulation operations system, thereby walk around securing software.In addition; also there is easily the shortcoming by other people break through in securing software itself; this safeguard protection mode is the safeguard measure that is based upon on the basis of upper level applications of computer operating system; when the invador promptly can enter system through after the simple authentication; and can operate arbitrarily computer system arbitrarily; and the computing machine validated user can't effectively be managed and control each pith of computer system, can't fundamentally solve the information security issue of computer system.
Summary of the invention
The objective of the invention is to; overcome the information security issue that existing computer system exists for solving and improving; a kind of information safety computer and guard method thereof are provided; be intended to solve the security performance problem of multi-purpose computer; mainboard based on general-purpose computing system; add the safety management unit, it can be embedded safety module (ESM).Begin computer system information is carried out safeguard protection from hardware bottom layer, the form that combines with software and hardware ensures the information security of computer system.
Technical scheme with fail-safe computer of information safety management unit of the present invention is: it comprises the peripherals of computing machine, central processing unit (CPU), storer, fail-safe computer mainboard; This fail-safe computer mainboard comprises: the identity information input equipment interface 2 that can connect proprietary subscriber identity information input equipment 1; Information to above-mentioned identity information input interface 2 is verified, and is exported the information safety management unit 5 of the control signal relevant with identity information by control signal generating unit 5.3 wherein; The security control performance element 6 that the control signal relevant with identity information of above-mentioned information safety management unit 5 outputs carried out; Whether the execution control signal decision according to 6 outputs of security control performance element permits the boot-strap circuit unit 7 that the user starts computer system; A computer peripheral equipment on-off circuit unit 9 that determines the rights of using of the operable associated peripheral 11 of this user according to the relevant execution control signal of user profile of security control performance element 6 outputs; Whether one be subjected to 9 controls of boot-strap circuit unit 7 and computer peripheral equipment on-off circuit unit to open or shut down computer and whether open the multi-purpose computer board unit 8 of associated peripheral 11.
Principle of work of the present invention is as shown in Figure 1:
1, when the user presses the start button 4 of trusted computer system, what at first power on is information safety management unit 5, as module (ESM) part.Information safety management unit 5 at first starts and carries out self check, and by self control system of information safety management unit 5 security module is carried out initialization operation, then external unit is detected.If external unit has unusually, then report to the police by security module.
2, when information safety management unit 5 self checks and by the operating system of self information safety management unit 5 is carried out initialization and finishes after, read user's identity information again by private user identity information input equipment 1.User's identity information will partly be detected user's password and authority by password in the information safety management unit 5 and proof of identity, after obtaining correct information, by information safety management unit 5 user is set this system is just used scope and authority.
3, the security control signal that sends of information safety management unit 5 sends to security control performance element 6, and the relevant various piece of the multi-purpose computer board unit 8 that will be controlled by 6 pairs of security control performance elements is controlled.
4, after control signal is sent, the starting-up signal of sending multi-purpose computer board unit 8 for security control performance element 6 by information safety management unit 5 is just opened multi-purpose computer board unit 8 this moment again.That is to say, before the formal startup of computer system, had the user capture of 5 pairs of computing machines of information safety management unit partly to carry out the control of hardware, and these control signals come from information safety management unit 5 fully.The user can't operate control circuit by the upper application software of system after entering computer operating system so, also just can't revise own access rights and the access profile that is had.
5,6 pairs of computer peripherals 11 of security control performance element are as the control of keyboard, mouse, printer etc., can't transmit required maintaining secrecy and vital document that he haves no right to take away himself by peripherals with the user that guarantees not have authority.
6, in order to prevent different user file security each other, a file encryption system can also be arranged among the present invention, the user can be to oneself thinking that important file carries out encryption.And the principle of encrypting is that the file that will encrypt passes to information safety management unit 5 by encrypted tunnel 3, allow file in information safety management unit 5, carry out encryption, encrypted secret key is retained in the information safety management unit 5, encrypts good file and sends back preservation in the multi-purpose computer board unit 8 again.Other users can't enter security module and obtain key, also just can't correctly open the file of having encrypted.
7, when user oneself will open the file of having encrypted, the decrypting process of encrypt file also is to carry out in information safety management unit 5.The transmission passage of key then is imbedded in the internal layer of hardware mainboard, and other staff also just can't obtain others' key by the means of measuring.
8, after the user is entering operating system, if the operation of the computer system that resets then should receive security system earlier in operation, security system will judge earlier whether this signal normally provides, otherwise can not carry out reset operation to computer system.If the operation that again computer system is resetted behind the then first check system is introduced into system to avoid the user, carry out again avoiding safety detection and the control function of security system behind the reset operation to computer system.
The invention has the advantages that:
1, owing to adopted 5 pairs of computing machines of information safety management unit to manage, begins computing machine is protected, the invador can't be deciphered by software mode from bottom;
2, information safety management unit 5 can be security module (ESM), has self-checking function, promptly before computer starting, and log-on message safety management unit (ESM) 5 in advance.Information safety management unit 5 also detects user's identity information except that carrying out the self check operation, judge whether this user is validated user, and also whether the external unit of detection computations machine is normal in addition.After user identity was verified, information safety management unit 5 also instructed a plurality of equipment self-authentications, had only after all verify information safety management unit 5 ability instruction unpack relevant hardware equipment.
3, in legal users colony, its identity information input interface 2 by legal proprietary user inputs in the identity information of information safety management unit 5, to comprise its rights of using and rank, user for different authorities, security system will be opened different peripherals 11, for its use.Since this moment peripherals 11 shutoff with open, undertaken by hardware fully, so, even different rights and the level other user enter system, also can't enter other authorities and the level other user use the zone to operate.
4, after information safety management unit 5 self check successes and user's proof of identity was finished, the startup command of multi-purpose computer board unit 8 was just exported in safety management unit 5, and multi-purpose computer board unit 8 is carried out self check and started the operating system.
5, since among the present invention each peripherals 11 be to carry out physics mode and the external world isolates by bottom hardware, therefore can comprehensively take precautions against the invasion of illegal use and virus.
6, after the user enters computer system, can be to the vital document of needs encryption, by data transmission encrypted tunnel 3, be sent in the information safety management unit 5, after by the encryption section in the information safety management unit 5 this document being encrypted fully, send back storage unit 5.2 storages again, other users can't correctly open this document under the situation that does not obtain allowing.Have only legal users having under the situation of password, just can correctly open this document after being decrypted by information safety management unit 5 again.Because above-mentioned advantage of the present invention makes the safety computing machine can be widely used in finance, government bodies and security department.
Description of drawings
Fig. 1 is the framework synoptic diagram of fail-safe computer.
Fig. 2 is the information safety management unit theory diagram.
The corresponding name of each figure number is called among the figure: 1, proprietary subscriber identity information input equipment, 2, proprietary subscriber identity information input equipment interface, 3, encrypted tunnel, 4, user's button of starting shooting, 5, information safety management unit (ESM), 5.1, central processing unit (CPU), 5.2, storage unit, 5.3, the control signal generating unit, 5.4, cipher processor and coprocessor, 6, the security control performance element, (can in security module ESM), 7, the boot-strap circuit unit, 8, the multi-purpose computer board unit, 9, computer peripheral equipment on-off circuit unit, 10, the fail-safe computer mainboard, 11, computer peripheral.
Embodiment
Fail-safe computer embodiment 1 of the present invention: as shown in Figure 1 and Figure 2, it has peripherals, central processing unit, storer, fail-safe computer mainboard; Its proprietary subscriber identity information input equipment 1 is an IC-card, can also be information storing devices such as fingerprint, sound, image, the sample devices of iris, or smart card, is wherein one or more; Proprietary subscriber identity information input equipment interface 2 is to be connected with proprietary subscriber identity information input equipment 1.Information safety management unit 5 comprises: a central processing unit (CPU) 5.1 that is used for safety management; It comprises the self-operating program storage unit 5.2, and this storage unit 5.2 is scratch pad memories, can also be ROM (read-only memory) and the storer that data are handled, and this storer can be a random access memory; A control signal generating unit 5.3.
As shown in Figure 1 and Figure 2, the embodiment of the invention 2, its information safety management unit 5 also has increases following parts on embodiment 1 basis: the real time clock circuit unit, or/and the warning circuit unit, or/and the watchdog circuit unit.Information safety management unit 5 also has Cipher Processing and association's processing unit 5.4; Information safety management unit 5 is independent security module (ESM), and this module is a flush bonding module.
Another embodiment: information safety management unit 5 is security module (ESM) independently, and this module also comprises security control performance element 6, is flush bonding module.
The foregoing description as shown in the figure, boot-strap circuit unit 7 is the on-off circuit unit that are used to control multi-purpose computer board unit 8 switch general-purpose computing systems; Computer peripheral equipment on-off circuit unit 9 is on-off circuit unit of other peripherals 11 operations of control computer; Computer peripheral equipment on-off circuit unit 9 mainly is made up of at least one on-off element, comprises it can being that one or more of keyboard, mouse, printer, serial port, hard disk, PCI groove etc. are connected with described peripherals 11; Identity information input equipment interface 2 also with between the multi-purpose computer board unit 8 is communicated with encrypted tunnel 3, and what this passage adopted is the PCI passage, can also be the USB passage, one or more of general input, output port etc.
In a word, Fig. 1, the invention described above fail-safe computer embodiment illustrated in fig. 2 are to embed security module (ESM) to handle all safe operations relevant with safety on the universal safety computing machine.This security module comprises central processing unit, storage unit, subscriber identity information input block, control outlet and trap door and file transfer passage.In addition, this security module has own independently operating system for operating system.
Shown in Figure 2 is the theory diagram of information safety management unit 5, below is described further:.
This security module (ESM) is that information safety management unit 5 is independently made a module, and this module includes central processing unit 5.1, memory cell 5.2, control signal generating unit 5.3, trap door 3, cipher processor and coprocessor 5.4.Central processing unit can be various and the processor X86 compatibility.The security control port can be the PCI passage, USB passage, universal input and output port.Encrypted tunnel 3 can be the PCI passage, USB passage, universal input and output port.Proprietary user's identity information input equipment can be an IC-card, smart card, fingerprint recognition system and corresponding pattern recognition system.
Computer peripheral 11 can be the external unit that links to each other with computing machine of various standards, such as, printer, magnetic tape station etc.Information safety management unit 5 functions can be from proprietary subscriber identity information input equipment 1, read subscriber identity information and in addition information processing to judge whether to start the unit that responds in computing machine and the control computer system.

Claims (10)

1, a kind of fail-safe computer with information safety management unit, it is characterized in that: it comprises the external unit of computing machine, central processing unit (CPU), storer, fail-safe computer mainboard; This fail-safe computer mainboard comprises:
The identity information input equipment interface (2) that can connect proprietary subscriber identity information input equipment (1);
Information to above-mentioned identity information input interface (2) is verified, and is exported the information safety management unit (5) of the control signal relevant with identity information by control signal generating unit (5.3) wherein;
The security control performance element (6) that the control signal relevant with identity information of above-mentioned information safety management unit (5) output carried out;
Whether the execution control signal decision according to security control performance element (6) output permits the boot-strap circuit unit (7) that the user starts computer system;
A computer peripheral equipment on-off circuit unit (9) that determines the rights of using of the operable associated peripheral of this user (11) according to the relevant execution control signal of user profile of security control performance element (6) output;
Whether one be subjected to the control of boot-strap circuit unit (7) and computer peripheral equipment on-off circuit unit (9) to open or shut down computer and whether open the multi-purpose computer board unit (8) of associated peripheral (11).
2, fail-safe computer according to claim 1, it is characterized in that: described proprietary subscriber identity information input equipment (1) can be sample devices fingerprint, sound, image, iris, or smart card, IC-card digital information memory device, be wherein one or more, described proprietary identity information input interface (2) is connected with identity information input equipment (1).
3, fail-safe computer according to claim 1 is characterized in that: described information safety management unit (5) comprising:
A central processing unit (5.1) that is used for safety management;
A storage unit (5.2) comprises the storer of self-operating program, and this storer can be the electrically-erasable storer, or ROM (read-only memory), and the storer that data are handled, and this storer can be a random access memory;
A control signal generating unit (5.3).
4, fail-safe computer according to claim 3 is characterized in that: described information safety management unit (5) also comprises the real time clock circuit unit, or/and the warning circuit unit, or/and the watchdog circuit unit.
5, fail-safe computer according to claim 3 is characterized in that: described information safety management unit (5) also comprises Cipher Processing and association's processing unit (5.4).
6, according to claim 1 or 3 or 4 or 5 described fail-safe computers, it is characterized in that: described information safety management unit (5) is independent security module (ESM), and this module is a flush bonding module.
7, according to claim 1 or 3 or 4 or 5 described fail-safe computers, it is characterized in that: information safety management unit (5) is security module (ESM) independently, and this module also comprises security control performance element (6), is flush bonding module.
8, fail-safe computer according to claim 1 is characterized in that: described boot-strap circuit unit (7) is the on-off circuit unit that is used to control multi-purpose computer board unit (8) switching computer system; Peripheral hardware on-off circuit unit (9) is the on-off circuit unit of other peripherals of control computer (11) operation.
9, fail-safe computer according to claim 8, it is characterized in that: described computer peripheral equipment on-off circuit unit (9) mainly is made up of at least one on-off element, comprises it can being that one or more of keyboard, mouse, printer, serial port, hard disk, PCI groove etc. are connected with described peripherals (11).
10, fail-safe computer according to claim 1, it is characterized in that also with encrypted tunnel (3), it can be the PCI passage between described identity information input equipment interface (2) and the multi-purpose computer board unit (8), the USB passage, one or more of universal input and output port etc.
CN 01138250 2001-12-05 2001-12-05 Safety computer with information safety management unit Expired - Fee Related CN1208728C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01138250 CN1208728C (en) 2001-12-05 2001-12-05 Safety computer with information safety management unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01138250 CN1208728C (en) 2001-12-05 2001-12-05 Safety computer with information safety management unit

Publications (2)

Publication Number Publication Date
CN1423203A true CN1423203A (en) 2003-06-11
CN1208728C CN1208728C (en) 2005-06-29

Family

ID=4674467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01138250 Expired - Fee Related CN1208728C (en) 2001-12-05 2001-12-05 Safety computer with information safety management unit

Country Status (1)

Country Link
CN (1) CN1208728C (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100591071C (en) * 2003-12-30 2010-02-17 联想(新加坡)私人有限公司 Apparatus, system, and method for shared access to secure computing resources
CN101025769B (en) * 2006-02-22 2010-10-13 联想(北京)有限公司 Multi-user safety chip resource allocation method and muiti-user safety system
CN101556634B (en) * 2008-04-11 2011-11-30 鸿富锦精密工业(深圳)有限公司 Method and system for managing and controlling using authority of external apparatus
CN102789621A (en) * 2011-05-19 2012-11-21 中国银行股份有限公司 Preparation and check methods of online bank service application form of enterprise, and preparation and check devices
CN104751036A (en) * 2015-04-10 2015-07-01 陕西理工学院 Computer information security system
CN107358124A (en) * 2017-06-14 2017-11-17 北京多思技术服务有限公司 A kind of processor
CN107368754A (en) * 2017-06-16 2017-11-21 天津青创科技有限公司 A kind of method for protecting computer system security
CN111562999A (en) * 2020-04-27 2020-08-21 安创生态科技(深圳)有限公司 Watchdog data processing method and device based on configurable protection mechanism

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100591071C (en) * 2003-12-30 2010-02-17 联想(新加坡)私人有限公司 Apparatus, system, and method for shared access to secure computing resources
CN101025769B (en) * 2006-02-22 2010-10-13 联想(北京)有限公司 Multi-user safety chip resource allocation method and muiti-user safety system
CN101556634B (en) * 2008-04-11 2011-11-30 鸿富锦精密工业(深圳)有限公司 Method and system for managing and controlling using authority of external apparatus
CN102789621A (en) * 2011-05-19 2012-11-21 中国银行股份有限公司 Preparation and check methods of online bank service application form of enterprise, and preparation and check devices
CN102789621B (en) * 2011-05-19 2016-08-17 中国银行股份有限公司 Making, method of calibration and the equipment thereof of enterprise's Net silver service request table
CN104751036A (en) * 2015-04-10 2015-07-01 陕西理工学院 Computer information security system
CN104751036B (en) * 2015-04-10 2018-08-24 陕西理工学院 A kind of computer information safe system
CN107358124A (en) * 2017-06-14 2017-11-17 北京多思技术服务有限公司 A kind of processor
CN107358124B (en) * 2017-06-14 2020-05-22 北京多思安全芯片科技有限公司 Processor
CN107368754A (en) * 2017-06-16 2017-11-21 天津青创科技有限公司 A kind of method for protecting computer system security
CN111562999A (en) * 2020-04-27 2020-08-21 安创生态科技(深圳)有限公司 Watchdog data processing method and device based on configurable protection mechanism

Also Published As

Publication number Publication date
CN1208728C (en) 2005-06-29

Similar Documents

Publication Publication Date Title
US10922441B2 (en) Device and method for data security with a trusted execution environment
US11947688B2 (en) Secure computing system
US8677482B2 (en) Hardware security for software processes
US10162975B2 (en) Secure computing system
Parno Bootstrapping Trust in a" Trusted" Platform.
CN100447763C (en) Safety chip and information safety processor and processing method
Xu et al. Data-provenance verification for secure hosts
CN107567630A (en) The isolation of trusted input-output apparatus
CN108595982B (en) Secure computing architecture method and device based on multi-container separation processing
Götzfried et al. Mutual authentication and trust bootstrapping towards secure disk encryption
CN1208728C (en) Safety computer with information safety management unit
Shekhtman et al. EngraveChain: Tamper-proof distributed log system
WO2001073533A1 (en) System and method for safeguarding electronic files and digital information in a network environment
CN2526907Y (en) Information safety computer
Fournaris et al. Trusted hardware sensors for anomaly detection in critical infrastructure systems
Zaharis et al. Live forensics framework for wireless sensor nodes using sandboxing
CN2553439Y (en) Safety computer with user identity information input equipment
CN114024705A (en) Trust architecture aiming at node dynamics
Landwehr 10 Engineered Controls for Dealing with Big Data
RU200051U1 (en) Rugged, modular, versatile hardware platform
Apostol et al. Android Fingerprint Sensor: Pitfalls and Challenges
Yang et al. Seccmp: A secure chip-multiprocessor architecture
US11783027B2 (en) Systems and methods for managing state
Bishop UNIX security in a supercomputing environment
Samarati et al. Data security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: WUHAN RUIDA INFORMATION SAFETY INDUSTRY CO., LTD.

Free format text: FORMER NAME OR ADDRESS: RUIDA ELECTRONICS CO., LTD., WUHAN

CP03 Change of name, title or address

Address after: 430070 Hubei Province, Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 27 floor

Patentee after: Ruida Electronics Co., Ltd., Wuhan

Address before: 430070 Hubei Province, Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 28 floor

Patentee before: Wuhan Ruida Electronic Co., Ltd.

C56 Change in the name or address of the patentee

Owner name: JETWAY INFORMATION SECURITY INDUSTRY CO., LTD.

Free format text: FORMER NAME: WUHAN JETWAY INFORMATION SECURITY INDUSTRY CO., LTD.

CP01 Change in the name or title of a patent holder

Address after: 430070 Hubei Province, Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 27 floor

Patentee after: JETWAY Information Security Industry Co., Ltd.

Address before: 430070 Hubei Province, Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 27 floor

Patentee before: Ruida Electronics Co., Ltd., Wuhan

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Safety computer with information safety management unit

Effective date of registration: 20110622

Granted publication date: 20050629

Pledgee: Chongqing Three Gorges guarantee Group Co., Ltd. Yichang branch

Pledgor: JETWAY Information Security Industry Co., Ltd.

Registration number: 2011990000234

PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20121010

Granted publication date: 20050629

Pledgee: Chongqing Three Gorges guarantee Group Co., Ltd. Yichang branch

Pledgor: JETWAY Information Security Industry Co., Ltd.

Registration number: 2011990000234

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Safety computer with information safety management unit

Effective date of registration: 20121010

Granted publication date: 20050629

Pledgee: Chongqing Three Gorges guarantee Group Co., Ltd. Wuhan branch

Pledgor: JETWAY Information Security Industry Co., Ltd.

Registration number: 2012990000592

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20141028

Granted publication date: 20050629

Pledgee: Chongqing Three Gorges guarantee Group Co., Ltd. Wuhan branch

Pledgor: JETWAY Information Security Industry Co., Ltd.

Registration number: 2012990000592

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Safety computer with information safety management unit

Effective date of registration: 20141204

Granted publication date: 20050629

Pledgee: Bank of China, Limited by Share Ltd, Wuhan, Hongshan branch

Pledgor: JETWAY Information Security Industry Co., Ltd.

Registration number: 2014990001026

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050629

Termination date: 20181205