CN2754136Y - Computer system for ensuring information security - Google Patents

Computer system for ensuring information security Download PDF

Info

Publication number
CN2754136Y
CN2754136Y CN 200420102957 CN200420102957U CN2754136Y CN 2754136 Y CN2754136 Y CN 2754136Y CN 200420102957 CN200420102957 CN 200420102957 CN 200420102957 U CN200420102957 U CN 200420102957U CN 2754136 Y CN2754136 Y CN 2754136Y
Authority
CN
China
Prior art keywords
computer system
hard disk
information security
function
usb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 200420102957
Other languages
Chinese (zh)
Inventor
孙治成
石明
贾兵
童广胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Great Wall Computer Shenzhen Co Ltd
Original Assignee
China Great Wall Computer Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Great Wall Computer Shenzhen Co Ltd filed Critical China Great Wall Computer Shenzhen Co Ltd
Priority to CN 200420102957 priority Critical patent/CN2754136Y/en
Application granted granted Critical
Publication of CN2754136Y publication Critical patent/CN2754136Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model relates to a computer system for ensuring information security, which comprises universal components used for forming a personal computer. A hard disk of a computer is integrated with an embedded intelligent processing system which comprises a processor, a microkernel operating system, and a memory, a hard disk drive circuit is also integrated with a hardware logic encrypted circuit module and the encrypted and decrypted process for datum is completed by that a hardware logic encrypted circuit is invoked under the instructions of the processor and the microkernel operating system. When the computer system for ensuring information security of the utility model is used, a user only needs to set the initial function according to the operating prompts in the starting process, and the utility model can realize a hard disk protecting function, a hard disk isolating function, a network isolating function, a data encrypting function, a key security storage function, a user's identity forcing certification function, an identity protection function in the operational process, a user authority managing function, and an electromagnetic protection function, etc. The utility model is simple and can be operated easily. The utility model is suitable for users crying for the computer data security, such as scientific research institutions, finance, governments, national defence, etc.

Description

A kind of computer system that ensures information security
Technical field
The utility model relates to a kind of computer system, relates in particular to a kind of computer system that ensures information security.
Background technology
Thereby existing Computer Architecture imperfection has caused the leak of information security.At present, the file ciphering technology of PC is normally finished through the participation of software and operating system, be after the interior encryption software of PC carries out software or encrypted card encryption to file, by operating system (software), be deposited in the permanent storage media (as hard disk), this encryption method is dangerous, for example, the Hacker Program that is hidden in the system can obtain key with after the file comparison process before and after encrypting, with whole document deciphering.Therefore occurred a kind of by the medium method of encrypting, for example the patent No. is ZL99113164.9, the utility model name is called a kind of Chinese patent literature of encrypting computer hard disc device, it discloses a kind of encrypting computer hard disc method and device, on the Basis of Computer Engineering of routine, form encrypted circuit by encryption chip, encryption chip is made up of control unit circuit, encryption/decryption element circuit, RAM storer and gauge tap K, to the data stream hardware encipher optionally of turnover hard disk, thereby realized that so-called medium encrypts.Even illegally obtain hard disk, there is not legal key, also can only read the file after the encryption, can't decode; Legitimate secret is arranged, not on the same group, though can see D: dish, also because the decoding process difference still can not obtain useful information.Realize encrypting computer hard disc, increased the confidentiality of computing machine.But the cryptographic algorithm of this type can not be changed, so its security is not high yet.
The utility model content
Technical problem to be solved in the utility model is to provide a kind of reinforcement the data of hard disk to be carried out the computer system that ensures information security of encryption and decryption.
The technical matters that the utility model further will solve is to provide a kind of computer system that ensures information security with hard disk protection.
The technical matters that the utility model further will solve is to provide a kind of computer system that ensures information security with Network Isolation.
For solving the problems of the technologies described above, the technical scheme that the utility model adopted is: a kind of computer system that ensures information security is provided, it comprises the universal component of forming personal computer, embedded intelligence disposal system that the hard disk of this computing machine is integrated, comprise processor, Mach and storer, and also integrated hardware logic encrypted circuit module in the hard drive circuit is to call the hardware logic encrypted circuit under the instruction by processor and Mach to finish to data encryption and decryption process.
This computer system forces the magnetic head of hard disk to be setovered by hardware circuit, is protected location and corresponding two parts of MIRROR SITE with hard disk partition, and the protected location is at negative magnetic track, and the user can't visit.
This computer system also disposes outside network security separate card, and the hard drive circuit is drawn row's physical signal link line and is connected to this network security separate card.
The beneficial effects of the utility model are: since the hard disk of computing machine of the present utility model integrated an embedded intelligence disposal system, comprise processor, Mach and storer, therefore its cryptographic algorithm can be changed, therefore the existing medium of the utility model is encrypted, can change cryptographic algorithm again, so its safety coefficient height, even it is stolen that machine appears in computing machine, can not make data content be decrypted state yet, reach the secret purpose of hard disc data, compare with the dedicated hard disk data encoded card, integrated designing technique has increased system reliability, stable and compatible; Mainboard is walked around in the encryption and decryption operation and BIOS directly controls the gateway of hard disk, reduces the probability that password is cracked and detours and open by intercepting and capturing greatly, has strengthened confidentiality; The computer system that ensures information security of the present utility model in use user only need be carried out the Elementary Function setting and can be realized functions such as data encryption, hard disk protection, Network Isolation according to the operation indicating of start process, be simple and easy to use.Satisfy the user more urgent, as scientific research institutions, finance and demands such as government and national defence to Computer Data Security.
Description of drawings
Fig. 1 is the computer working process flow diagram that ensures information security of the present utility model.
Fig. 2 is the ram mode of the computer system that ensures information security of the present utility model and the implementation method process flow diagram of flexible protected mode.
Fig. 3 is that the protected location subregion and the MIRROR SITE of the computer system that ensures information security of the present utility model realized principle schematic.
Fig. 4 is the encryption synoptic diagram of the computer system that ensures information security of the present utility model.
Fig. 5 is the hard disc physical sequestered partition synoptic diagram of the computer system that ensures information security of the present utility model.
Fig. 6 is the annexation topology diagram that the network security separate card of the computer system that ensures information security of the present utility model is connected with different user.
Fig. 7 is the hard disk isolated area of the computer system that ensures information security of the present utility model and the corresponding relation synoptic diagram of physical isolation card.
Fig. 8 be the USB driving circuit of the computer system that ensures information security of the present utility model with to user interface topology interface chart.
Fig. 9 is the KEY of the computer system that ensures information security of the present utility model and the process flow diagram that system sets up communication.
Embodiment
The computer system that ensures information security of the present utility model comprises that (1) prevents the maskable casing and the outside data cable that is connected of electromagnetic exposure; (2) has the hard disk of data image, data encryption special circuit; (3) line and the interface of the USB device that provides of hard drive circuit; (4) the intelligent USB KEY of user identity forcible authentication; (5) other universal component of network security separate card and composition personal computer.
Improvement of the present utility model concentrates on hard disk and two critical components of USB KEY, and respectively integrated embedded intelligence disposal system comprises processor (CPU), Mach (COS) and storer in two parts.Purpose is to guarantee that two closely bound up subsystems can safety communications, and provides easier operating interactive platform for the user on function structure basis separately.Mainly comprise the improvement of the following aspects:
(1). integrated hardware logic encrypted circuit module in the hard drive circuit, all write the data of hard disk and all pass through encryption, on the contrary the data of reading also are decrypted operation;
(2). in firmware (Firmware), increased the cipher authentication program, cannot the access hard disk data by authentication;
(3). make hard disk areas isolate and the virtual management system constructing virtual mirror image operation zone by hardware circuit;
(4). the hard disk internal storage areas is isolated, structure multi-user master boot sector;
(5). the hard drive board design goes out a short distance USB line and interface;
(6). an intelligent USB Key system;
(7). external network connects isolation card;
(8). prevent the maskable casing and the external connection line cable of electromagnetic exposure; Casing and external connection line cable have increased the shielding processing that prevents EMI radio magnetic wave information leakage; Power supply has strengthened and has prevented the EMI circuit that conducts.
See also Fig. 1, the computer working flow process that ensures information security of the present utility model may further comprise the steps:
101. main frame start and self check;
102.HDD initialization;
103. judge whether to insert USB KEY, if then execution in step 104, if not then execution in step 111;
104.USB KEY key identification;
105.HDD mode of operation configuration;
106. read MBR;
107.OS start;
108.OS normal operation;
109. judge whether USB KEY is normal, if normal, then return step 108, if undesired, then execution in step 110;
110. wait for that USB KEY is normal, step 109 is returned in the halt system operation then;
111. the user identity password identification, execution in step 105 to 108 then;
Computer information safe of the present utility model system mainly contains following technology.
1. hard disk protection technology
The utility model realizes that the method for hard disk protection is to utilize hard disk to add the characteristic that Electrical heads makes zero, and forces the magnetic head biasing by hardware circuit, is protected location and corresponding two parts of MIRROR SITE with hard disk partition, and the protected location is at negative magnetic track, and the user can't visit; Use the virtual hard disk storage management system, allow the user be actually MIRROR SITE, do not touch true protected location by the data field of the read-write operation under the normal condition; Just can the write protection district when authority is carried out " backup " and operated; Carrying out " recovery " operation just can be with current system whole " refreshing ".The existence of protected location can prevent that any deletion, virus damage, format even low-level formatting operation from destroying, and reaches protection hard disc data purpose.
Hard disk protection has ram mode and two kinds of flexible protected modes.
These two kinds of pattern implementation methods determine that in system's initial setting up detailed step and setting operation process flow diagram are as shown in Figure 2 by authorized user.
The implementation method of ram mode and flexible protected mode may further comprise the steps:
201. main frame start and self check;
202. and hard disk is set up handshake;
203. hard disk micro-kernel program obtains control;
204. eject user function setting operation combination hot key;
205. judge whether to carry out initial setting up, if then execution in step 206, if not, then detect user identity, judge then whether identity is correct,, then read hard disk MBR information if correct, if the OS of load operation system then incorrect, then returns the detection user identity;
206. ejection setup menu;
207. enter password;
208. judge whether password is correct, if incorrect, then re-execute step 208, if correct, then execution in step 209;
209. input parameter;
210. judge whether to preserve change is set, if then execution in step 211, if not, then re-execute step 210;
211. main frame restarts.
After operating process is the system boot self check, host B IOS sends order to HDD, detect whether ready signal of hard disk feedback, readyly then enter next step, detect the initialization information of hard disk and loading the Firmware information of hard disk, give hard disk control with control, the core component of frameworks such as CPU and internal memory on mainboard having that exchanges data all is subjected to hard disk with hard disk and micro-system (COS) gets involved and controls; The COS user oriented ejects " Ctr+Alt+M " interactive operation hot key, carries out the back and ejects the detailed functions setup menu; The user is by menu and import the authentication password; Press the operation of helping prompt execution initial configuration, hard disk partition is become shielded main partition (PrimaryMaster) C, generate mirror image virtual area C ' simultaneously automatically, and the configuration whether affirmation will be changed is preserved.Seeing also Fig. 3, is that protected location subregion and MIRROR SITE are realized principle schematic.
Remaining space is arranged, and system is changed to remainder automatically from subregion (Primary Slave).
The difference of two patterns is authority differences, and the user of ram mode only reads the authority of hard disc data, can not preserve data change; Flexibly the user of protected mode has increased to enjoy except above authority and has write the storage authority temporarily.
It is very similar that the backup of this design and hard disk protecting card and the embedded procedure operation of mainboard recovers software function; but it is with the obvious advantage to be based on hard disk low layer design proposal, show compatibility, reliability, stability, whether take main frame resource, carry out aspects such as efficient and cost.
2. data encrypting and deciphering technology
The implementation method of data encrypting and deciphering is that all data that write hard disk all are to encrypt automatically through 8 groups of eight bit register hardware logic encrypted circuits, and all data of reading are deciphered automatically, and decipher circuit is as the turnover outpost of the tax office of control data.Encrypt synoptic diagram, as shown in Figure 4.
To data encryption and decryption process is to finish by calling the hardware logic encrypted circuit under processor and Mach (COS) instruction, transparent fully to the user.File is encrypted forever on disk and is deposited, and DISK to Image is exactly a complete encrypt file from this view point.Even it is stolen that purpose is that machine appears in computing machine, can not make data content be decrypted state yet, reach the secret purpose of hard disc data.
Compare with the dedicated hard disk data encoded card, integrated designing technique has increased system reliability, stability and compatible; Mainboard is walked around in the encryption and decryption operation and BIOS directly controls the gateway of hard disk, reduces the probability that password is cracked and detours and open by intercepting and capturing greatly, has strengthened confidentiality.
Decrypting process is its inverse process, and principle is identical.
3. identity identifying technology
Authentication of the present utility model comprises two kinds, and a kind of is password authentication identification; Another kind is USB KEY identification.
3.1 password authentication method of identification
The implementation method of password authentication method of identification is to enable three grades of identity and authority is provided with safety management, and implementation is to login with password.Three level of identity are domestic consumer, system manager, safe Administrative Manager.
Main authority defines, and reads the hard disc data authority with the user of domestic consumer's password login and can guidance system enter the OS operating platform, perhaps can have backup and recover read-write operation authority (being determined by highest line political affairs rank); The system manager can enjoy whole authorities of domestic consumer, has the password authority of change self and domestic consumer in addition.Safe Administrative Manager answers the user to increase, and is the highest level user, and main effect is to prevent from that password from losing to wait the password under the accident situation to nullify and the registration management activity.
But operating process frame of reference process flow diagram.
3.2 USB KEY method of identification
The implementation method of USB KEY method of identification be when detecting the usb bus interface, detected after the start USB KEY equipment and ready after, call driving and the two communication protocol of KEY by hard disk, realize and the communication of KEY; Then KEY sends the key dark text of process oneself and algorithm for encryption to hard disk, after hard disk is received the dark text key, call the algorithm of storing among the ROM (identical) and untie the dark text key and verify, feed back to a string new key character of KEY after qualified, as next encrypted secret key with cryptographic algorithm among the KEY.All different for the key that guarantees to send, the method for employing is that each key string that sends has one at least with last time different.KYE carries out encrypting storing after receiving key, waits for and reads use once more.
The method that tracking and supervising in adopting the start process forcible authentication and use operating process in USB KEY recognition methods combines.If the encryption of hard disk control authentication failure then sends the order of reading key once more, triplicate failure, the locked no longer response request of KEY then, stop supplies key.
The identification success and enter operating system after, uninterruptedly scan the presence of KEY port and legal KEY by application software one card sending system, then quit work less than KEY if detect, and locked hard disc data goes out inbound port.
4. hard disk memory region is isolated with a plurality of master boot sectors and is deposited technology
Hard disk memory region isolation and a plurality of master boot sectors and the implementation method of depositing are to allow the virtual hard disk administrative skill, and a hard disk is divided into several zones (being no more than 3 at most) by space specified.When the user starts shooting, eject start boot section choice menus, elected in one of them for the start master boot sector and when activating, then be set to negative magnetic track with other two, do not allow user capture.
Characteristics are that each zone can realize that the master boot sector realization installation of state of activation separately guides (can be dissimilar) operating system and normal OS operating environment separately.Be illustrated in figure 5 as hard disc physical sequestered partition synoptic diagram.
5. Network Isolation technology
The implementation method of external network isolation features is under the prerequisite of hard disk internal insulation function, disposes the network security separate card of an outside again, just different user can be connected to different external networks.Topological structure such as Fig. 6 of annexation show.
Implementation method is the method that bundlees one to one with different isolation boot sections and each RJ-45 port of network security separate card, realizes internal insulation district and isolation card RJ-45 mouth (passage) one-to-one relationship.Hardware design is to draw row's physical signal link line by the hard drive circuit to be connected to isolation card, after the start when the different boot section of the each selection of user system discern and send a signal goes the gating correspondence to the microrelay toggle switch of isolation card network interface passage automatically.When carrying out different passage change action, force host computer system to reset again to empty the data in dynamic storage (internal memory) and the network adapter.
Wherein hard disk and card to be connected topological relation as follows, on the basis of hard disk internal zone dividing isolation features, cooperating external network to connect isolation card, carry out the principle that the port of each isolated area and each isolation card is bound one to one.Be illustrated in figure 7 as the corresponding relation synoptic diagram of hard disk isolated area and physical isolation card.
6.USB driving circuit and connection line technology
The USB driving circuit is with more ingenious to the design of user interface overall topology, topology connects as shown in Figure 8, and implementation method is the usb bus driving governor is integrated into the hard drive circuit board and draws the USB port line from the circuit board of hard disk and directly insert USB KEY to the user.Simultaneously cabinet makes it the USB exit position of forward as far as possible panel when the hard disk bracket location layout designs, and it is the shortest to reach the hard disk USB line that goes between between the cabinet panel USB interface.Connection cable carries out electromagnetic screen to be handled.
Purpose is to avoid increasing the probability of being intercepted and captured because general USB KEY identification authentication system is connected on mainboard (BIOS) participation at present.
7.USB the technology of KEY
Safe USB KEY implementation method is a system that has data processor (CPU), storer and microoperation kernel (COS) and cryptographic algorithm program, itself has the safety encipher function, the judgement of oneself is being arranged and replying interaction mechanism with disk C PU communication process, purpose is that enhancing is safe and reliable.
USB has micro OS (COS) and does not have the senior KEY that carries cryptographic algorithm of COS to compare, not encrypting with the product of own COS is that a software algorithm routine call that is stored in the Key is come out, and (CPU and RAM) realizes cryptographic operation by extraneous hardware platform; Having the product of COS that the CPU of oneself and the KEY of micro OS (COS) are arranged is ownly independently to finish to the data cryptographic calculation, does not have intermediate link safer.
The process flow diagram that KEY and system set up communication as shown in Figure 9, the method that KEY and system set up communication may further comprise the steps:
301. authentication;
302. detect USB line and port device physical connection;
303. judge whether to be ready to, if be ready to, then execution in step 304, if be not ready to, then point out checkout facility and connection line, and then return step 302;
304. system sends order and reads USB port equipment;
305. prompting input KEY password;
306. judge whether password is correct, if incorrect, then return step 305, if correct, then execution in step 307;
307.USB device responds rreturn value;
308. driving, the system call USB device sets up communication protocol;
309. read KEY key dark text;
310. system decrypts is handled
311. it is legal to judge whether, if illegal, and then locked system, if legal, then system generates the key of a string new random string as next authentication;
312. send to USB KEY, load OS, whether KEY detection new character strings is effective simultaneously, if effectively, then encryption, and saving result becomes dark text.
8. electromagnetic protection technology
The electromagnetic protection disposal route of the utility model computer information safe system is utilize to press down prior aries such as source method or containment method to take measures from the emission source, electromagnetic radiation is dropped to minimum, suppresses the electrical network conduction in conjunction with filtering technique simultaneously.Mainly be that the data line and the increase shield external layers such as USB KEY and hard disk connecting line of data line call wire, keyboard, mouse between main frame and display casing, display and the main frame are handled, the high power switching power supply of main frame and display is strengthened filtering circuit (PFC) processing, and the I/O port connector of keyboard, mouse and video data line and main frame sensitivity selects for use inner band to increase the connector of filtering guard or conductive processing.

Claims (10)

1, a kind of computer system that ensures information security, it comprises the universal component of forming personal computer, it is characterized in that: embedded intelligence disposal system that the hard disk of this computing machine is integrated, comprise processor, Mach and storer, and also integrated hardware logic encrypted circuit module in the hard drive circuit is to call the hardware logic encrypted circuit under the instruction by processor and Mach to finish to data encryption and decryption process.
2. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computer system forces the magnetic head of hard disk to be setovered by hardware circuit, is protected location and corresponding two parts of MIRROR SITE with hard disk partition.
3. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computing machine also comprises an intelligent USB Key system, and it is a system that has data processor, storer and microoperation kernel and cryptographic algorithm program.
4. the computer system that ensures information security as claimed in claim 1 is characterized in that: this computer system also disposes outside network security separate card, and the hard drive circuit is drawn row's physical signal link line and is connected to this network security separate card.
5. the computer system that ensures information security as claimed in claim 4 is characterized in that: each RJ-45 port of different isolation boot sections and network security separate card bundlees one to one.
6. the computer system that ensures information security as claimed in claim 3 is characterized in that: the usb bus driving governor of this computer system is integrated into the hard drive circuit board and draws the USB port line from the circuit board of hard disk and directly insert USB KEY to the user.
7. the computer system that ensures information security as claimed in claim 6, it is characterized in that: hard disk bracket is near the USB exit position of case front panel, this hard disk USB connection cable that goes between between the cabinet panel USB interface is the shortest, and this connection cable is handled through electromagnetic screen.
8. the computer system that ensures information security as claimed in claim 1 is characterized in that: the main frame of this computer system and display casing and outsidely be connected data cable and all have shield external layer.
9. the computer system that ensures information security as claimed in claim 8 is characterized in that: the high power switching power supply of this main frame and display has the reinforcement filtering circuit.
10. the computer system that ensures information security as claimed in claim 8 is characterized in that: the I/O port connector of keyboard, mouse and video data line and main frame sensitivity increases the connector of filtering guard or conductive processing for inner band.
CN 200420102957 2004-12-15 2004-12-15 Computer system for ensuring information security Expired - Lifetime CN2754136Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200420102957 CN2754136Y (en) 2004-12-15 2004-12-15 Computer system for ensuring information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200420102957 CN2754136Y (en) 2004-12-15 2004-12-15 Computer system for ensuring information security

Publications (1)

Publication Number Publication Date
CN2754136Y true CN2754136Y (en) 2006-01-25

Family

ID=35926244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200420102957 Expired - Lifetime CN2754136Y (en) 2004-12-15 2004-12-15 Computer system for ensuring information security

Country Status (1)

Country Link
CN (1) CN2754136Y (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1306357C (en) * 2004-12-15 2007-03-21 中国长城计算机深圳股份有限公司 A computer system for guaranteeing information security
CN102891835A (en) * 2011-07-20 2013-01-23 桂林长海科技有限责任公司 Security isolation method for multi-network access of computer terminal
WO2022266831A1 (en) * 2021-06-22 2022-12-29 华为技术有限公司 Data processing method and processor

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1306357C (en) * 2004-12-15 2007-03-21 中国长城计算机深圳股份有限公司 A computer system for guaranteeing information security
CN102891835A (en) * 2011-07-20 2013-01-23 桂林长海科技有限责任公司 Security isolation method for multi-network access of computer terminal
WO2022266831A1 (en) * 2021-06-22 2022-12-29 华为技术有限公司 Data processing method and processor

Similar Documents

Publication Publication Date Title
US20200301764A1 (en) Operating system on a computing system
US11188652B2 (en) Access management and credential protection
CN101529366B (en) Identification and visualization of trusted user interface objects
US9672360B2 (en) Secure computer architectures, systems, and applications
CN100565457C (en) The system and method for safety input is provided to the system with high-security execution environment
US9342711B2 (en) Systems and methods for controlling access to peripherals of a computer system by software applications
CN103620612B (en) Comprise the computing equipment of port and guest domain
TWI431501B (en) Cryptographic key containers on a usb token
CN1146813A (en) Proboot protection for a data security system
WO2018223797A1 (en) Data response method, terminal apparatus, and server
WO2009154705A1 (en) Interconnectable personal computer architectures that provide secure, portable and persistent computing environments
Petracca et al. {AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
CN104246698A (en) Computer with flexible operating system
Pham et al. Universal serial bus based software attacks and protection solutions
TW201539247A (en) Password input and verification method and system thereof
CN1306357C (en) A computer system for guaranteeing information security
CN104933361A (en) Device and method for protecting login password
CN202632281U (en) Electronic data privacy protection system and mobile storage device with privacy protection function
CN103853991A (en) Method and device for preventing computer device screen keyboard from being laterally recorded
CN2754136Y (en) Computer system for ensuring information security
CN101924765B (en) Single-system and single-network computer communication method
CN101727557B (en) Secrecy isolation hard disk and secrecy method thereof
CN101777102B (en) Security audit method and system for kernel
CN101079090A (en) Apparatus for reproducing personal application environment
WO2019209893A1 (en) Operating system on a computing system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CX01 Expiry of patent term

Expiration termination date: 20141215

Granted publication date: 20060125