EP1348153A2 - Personal computer - Google Patents

Personal computer

Info

Publication number
EP1348153A2
EP1348153A2 EP01271570A EP01271570A EP1348153A2 EP 1348153 A2 EP1348153 A2 EP 1348153A2 EP 01271570 A EP01271570 A EP 01271570A EP 01271570 A EP01271570 A EP 01271570A EP 1348153 A2 EP1348153 A2 EP 1348153A2
Authority
EP
European Patent Office
Prior art keywords
φ
μ
jj
cq
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01271570A
Other languages
German (de)
French (fr)
Inventor
Adolf Flüeli
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Flueeli Adolf
Original Assignee
Adolf Flüeli
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CH252400 priority Critical
Priority to CH25242000 priority
Application filed by Adolf Flüeli filed Critical Adolf Flüeli
Priority to PCT/CH2001/000738 priority patent/WO2002050646A2/en
Publication of EP1348153A2 publication Critical patent/EP1348153A2/en
Application status is Withdrawn legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Abstract

The invention relates to a personal computer and its portable versions, such as laptops and handheld computers, comprising at least two independent subsystems (8) in addition to a microprocessor (2). Each existing subsystem (8) is based on a separate, independent classification of the data contained therein as a result of the latter's security-specific sensitivity. Each subsystem (8) comprises at least one individual physical and/or virtual storage medium (9). Each subsystem (8) contains at least one individual integrated operating system (10). According to requirements, the subsystems (8) can be started and prepared for operation, or switched to standby mode jointly or independently of one another, or started and operated jointly or independently of one another, or switched to standby mode from operational mode, or shutdown jointly or independently of one another, or shutdown from standby mode jointly or independently of one another.

Description

personal computer

The present invention relates to a personal computer, including its portable variants, such as laptop computers.

By the term "personal computer" for the purposes of the present invention all devices and / or devices for personal computing and data storage understood as trong under the generic term "personal workstation" as auto-, microprocessor-based, stationary or mobile

Single-user systems are summarized. These individual workstations are referred to, depending on their provenance and literature in general as "PC" (personal computer), "workstation", "Macintosh" etc.. be their miniaturized, mobile embodiments as "Labtop", "laptop", "subnotebook", "handheld computer", "palmtop computer", "Personal Digital Assistant" PDA, "Pencomputer", "Organizer", "Notepad" , called "minicomputers" etc.. All of the aforementioned forms of these individual workstations allow for both individual data processing and storage of data.

Such personal computers usually include in their stationary designs a housing, the power required for the operation and power supplies, the required primary computing device, peripheral storage devices such as hard disks, as basic elements for use, and possibly zwerkanbindungen Ne, as well as for the operation required additional peripheral devices such as the monitor, keyboard, computer mouse, and possibly other peripheral data read and storage devices. Such personal computers usually include in their mobile versions, such as "Labtop", "laptop", "subnotebook", usually a specially trained case. In this case the above basic elements, a keyboard and a folding screen usually are integrated. Furthermore, a mostly designed as a touchpad computer mouse and various interfaces may be present. These interfaces are used for connecting peripheral device-th, for example devices for communication, especially for mobile telephony.

Such personal computers usually include in their miniaturized mobile versions, for example, as so-called "handheld computer", "palmtop computer", "Personal Digital Assistant" PDA, "Organizer", a specifically shaped housing. In this case the said basic elements and other miniaturized or multi-functional elements are integrated. An example of such an element is a screen on which the data input by means of a so-called "digital pen" can be carried out, so that no separate keypad is needed for data entry. Further, various interfaces may be present. These interfaces are used to connect pe RIPH ren devices, such as communications equipment, in particular for mobile telephony.

In further generations of such miniaturized mobile versions of personal computers, interfaces and devices for mobile communications are integrated together with the above basic elements and the multifunctional elements. This enables a permanent integration of such a personal computer, the term "always on" in the communication channels. The result is a fusion of cell phone and "minicomputer" to the "Ubiquitous Computer".

Personal computer, hereinafter abbreviated part with PC, have become standard in the working and private use. In connection with its increasing use in combination with modern means of communication such as Internet and other forms of networks and other data transmission channels, diving diverse security problems, in particular concerning the access by third parties via the internet respectively network connections to the data stored in the PC data. In the context of the increasingly attractive compounds, especially for the home ternetzugriff via cable networks, such as cable television, or grids (Powerline Cu munication, PLC) which actually correspond to a dedicated line, these risks getting increasingly more important. In addition, the increasingly extensive internal net- ke represent another latent growing risk potential both by the growing complexity and through their increased use.

One current philosophy is to store a lot of data as central as possible. If necessary, these data are accessed remotely via networks and processed. This requires, depending on Sensitivitat data corresponding encryption and also opportunities for secure identification of people accessing the data people. With the continuous expansion of the networks and the risk that sensitive data over time and at all times to protect against access by unauthorized third parties to rise. The permanent storage of the most extensive user data, the Anwendersof software and operating systems of a PC is usually on at least one disk fixed, also called hard disk or on hard drives that are installed in exchange carriers or add-on devices. The storage of user data can also on another, usually for this purpose in the PC respectively its drives made individually be inserted disks, called pheriphäre disk, for example, specific embodiments of compact discs such as CD-R, CD-RW, Digital Versatile Disk, DVD, floppy disks, memory sticks, etc., and possibly also to tape drives for backup.

The media mentioned above for permanent

Storage of large amounts of data are grouped under the umbrella term "serial access memory".

In another PC equipped with a variety of working storage and caching, even register, cache or Main Store called, which are used for internal data processing of the core system and which are summarized as storage category under the generic term "random access memory" RAM. In these stores both program user data during their processing are sequentially latched by the PC and recalled.

An essential feature of the so-called volatile memory, RAM, consists in the complete loss of data in case of a power break. More volatile data memory, CMOS, reached during a power interruption an indifferent memory state, and are preferably actively delete them. In addition, PCs also have at least one other storage element as ROM, EPROM or EEPROM or its further developments, such as flash ROM, etc., into a rule directly so reasonable on the mainboard that certain for commissioning / start-up of PC necessary basic data, respectively based programs, such as the so-called "Basic input / output system", BIOS, the system time, etc., are stored permanently.

A key feature of the so-called fixed data memory, ROM, is to preserve the stored last time is data, even in case of a power breakdown.

In general, the said main memory, working memory and the intermediate memory, Ll cache and L2 cache, and the processor, CPU, with their tightly coupled components, such as the resident memory management MMU, connected to each other as the core system using a fast bus and are together with other controllers and components, for example the socket for I / O boards, disposed on a motherboard, the motherboard, and, together with other elements, such as graphic systems, the primary computer unit.

The necessary for commissioning / start-up and use of the PC's operating system is in the

Typically installed on a long-term, so-called bootable storage medium such as a hard disk, or in the presence of a plurality of hard disks usually on a primary hard disk.

These hard disks are after startup of the

OS generally free selectable. but it is also possible that at least called a hard disk or a portion of a hard disk, partition is software- moderately protected against access, for example via a password.

Substantially at an Internet or internal

is networking of the PC that the necessary configuration and the associated specific software, such as the driver for the modem, the drivers for the ISDN card, respectively, the drivers for the network card for making a connection from the PC to a network or the cable Internet, is permanently installed on one of the hard disks or on the primary hard disk of the PC in question.

This has the disadvantage that theoretically always viewed at built-up network connection all data on the in service PC with corresponding effort indirectly through appropriate software or unnoticed to the interested parties via spyware, for example via "Trojan" or "cookies" from PC users can be outsourced or can be shipped directly from this site PC by itself unauthorized third parties will be after overcoming a possible access protection.

There are various software solutions such as "firewalls" etc., to prevent such external interference and attacks. These software solutions can not guarantee absolute security access, given the state of the so-called hacker software and the methodology of hacker makes a particular potential advantage on the side of the attacker, respectively crackers always, for example, by the use of new, unknown viruses. In the further need software solutions beispiels- ω o tto σι Π o LΠ rr <CD N a> -3 P. d = d cn ≤ p o. J ≤ H Φ Φ CQ CQ i CO ≤ cn> ^ ≤ f D f D P Φ dd φ P he a 0 P) 0 a Φ a PJ a H H H 0 J ^ 0 dd Φ a ti a H LQ rr Φ Φ α- p a ≤ n 3 P CD aa Mi rr <CD he rr a a H

≤ P. Φ N (- ■ ι-i D • d Φ Φ Φ Φ Φ cn rr rr N H LQ d cα

N N PJ he φ 3 P he -s cn Φ daa H Φ O CD. φ & Φ Φ PJ rr φ c (- D. d 0 = K φ a 2 Φ n Φ rr H Hi <J cn dg Φ a H-

Rr P- IQ LΩ ii P T a 0 H- Φ Φ iQ d MH a he rr Φ H. Φ * P H 0> u d f D M φ ι-ii P he Φ H a H cn Φ s: Φ ii φ - 1 Φ

P a CD cn

P a φ φ aaa H α. cn φ H IQ it a PJ 3 NH cn "rr Φ 0 H J rr l- LΩ fD Mi D. P a P-I-1 Φ Φ Ω Φ he cn cn H- H rr H- Φ 0 = d ii a ≤ φ I- 1 H-

- a Mi cn Φ rr ω H H a j Φ a PJ rr φ Φ H- N a cn p. ii H-

CD rr co a Φ d Φ Φ a H N

<Φ Φ rr cn H- H- d = PJ 3 d α d Φ d Φ N dd rr <he d cn he ^ o Φ P- a rr rr he N d 3 P- Φ 3 a tu dd & a = PJ H fD • a d φ φ Φ H- 1 a CG N α J cn cn rr Φ Φ cn LQ PJ ii

H a Φ LQ rr li

"P. ii H o P- • d H cn rr cn ω • dd ii Φ d Φ 3 H- IQ P) = Φ 3

CD fD φ Mi a α Φ Φ t Φ Φ Φ H Ω ι-i H- Ω Φ d = aaa CG. rr h- 1 D. Φ

Ω Ω Ω CD rr a

PJ aa P o Λ aa Φ a 'J he a CD cn LQ Φ PJ N Mi he d H • d • he he ET 3 & rr - aada ι-i rr rr CΛ H σ dad (- • PJ = Φ rr Φ ii li a fD rr PJ Φ φ H- Φ cn α P> = rr cn d J Ω a Φ N d Hl H- (- "Ξ Ω Φ 0

P N a P KH a "d P Φ φ a 3 <a H d> dae & Φ H H H a ≤ Ω he IQ

LQ P p. IQ φ ** Φ a rr Λ Φ LQ? cn cn H IQ d H 3 φ LQ J r H fi he li d f D f D d fd l rr 0 H d H Φ rr rr cn Ω φ φ li CD a LQ? r cn O PJ a H- 1 aa IQ he Φ cn φ Φ Φ he ≤. a J Ω PJ NO <! PJ rr Φ rr O J P. a d 3

IQ H "LΩ Φ LΩ Φ 0 = Φ H H" ad Φ Φ a- CQ (- Φ ad ü LQ Hi 3 f D ω cn φ P H aa rr aac J ι Φ-i cn u Ω M CD St. PJ PJ φ H Φ a 0. Φ a Ω cn H "Φ Φ H iQ 0 because) he Mi Ω H £ <H-

- a LQ

P- ii fr • ö P a 0) a Φ cn d 3 2 P. PJ Φ φ d = J CD he M φ φ Φ J fD Φ μ, d = d = P- Ω cn Φ Φ H- ada d φ IQ t 1 a LQ li

P a - N

Ω Φ rr er er φ ≥; P * rr oa CQ Ω Ω a cn - he H φ α PJ Φ CD> ada he he P- N Φ Φ Φ Φ Φ P IQ IQ a j H a * ^ PJ Φ ii d 3 Ω a rr H- H

P rr rr a ti cn a rr K Φ Φ a J cn Φ a H H li cn Hi ≤ Ω he Φ ≤ Φ a f D P. He Ξ N φ H a H H- <H- φ H Φ cn 0 H- Φ rr PJ = a ω fD 1-5 LΩ cn Φ φ σ ≤ M d = cn a Φ Φ a Φ a φ 1 l- ad = a - Φ H-

Ü N do α P p PJ Φ • l • d H iQ cn cn cn Φ PJ a IQ above sea Φ cn Di since Ω as St. PJ a cn rr H d Φ a Φ φ cn rr rr tu PJ Lr <P * rr H Φ a cn d "d CD he

? »IQ rr φ Φ ra K he a H H H H PJ 1 φ Φ Φ φ aa retd H Φ f D N Φ ≤; PJ Ό a Φ? 3 H H H a j he (rr li H a Φ H - LQ PJ <{Q as PJ d SU Mi aa PJ PJ a φ Ω Φ H cn CD H aad rr φ CD fD co li Ω cn d = 0 Φ a P- CQ tr a 0 ≤ d = rr tu a & cn a Di Φ rr l-> 0): Φ ET lh cn cn rr Φ ii D. d Ω er 3 0 = a 3 PJ d Φ Φ cn LQ rr H- cn N d φ rr = d 3 ≤ Φ P- N aa he J rr 0 Φ Hi H N a rr D rr PJ CD Φ d - 1 a l fD N ii JD: o P- he la φ rr d iQ he = d H

, a Φ J d LQ H PJ CD • d • cn D. He CD P H Φ D. Φ rr Φ H Mi CQ PJ a li. H o = H PJ φ d fD P- p. CO Φ rr cn H- PJ a NH H "rr Φ o rr he d Q PJ 0 • H daa Ω P- P- Φ rd N a he cn Φ Φ CD ii M he PJ rr LQ Φ iQ 3 tsi

Ml he Φ iQ <d P d Mi Cd CD & J a rr a P ii φ H rr * d H li co H

PJ Φ a iQ 3 H H d H d J = li & H- H- H- d 0 J 0 H CO he P- φ ü D- 3 he s e MH rα rr X a cn Ω Φ Φ O rr Ω a 3 Wed 0 he fD u s: H- he rr Φ a Ω Φ H J CQ rr a J H D a Φ he CD3 r D. H

CD a CD Hl D. PJ Φ cn rr H- Hi H- tr HJ 0 rr ι-i d Ω H Φ φ H- Φ

0 = rr o H "Φ rr Mi a Φ a CD aa cn he • o & Φ a CD PJ M

Rr Φ P- P- Φ ω r H H ω • fl o PJ = sd LQ 0 H- H- do d cn Ω P- a 3 IQ d Φ 3 H- because it a HP) ≤ a a Φ a H- a 0 Φ e

LQ rr a D. 3 a Φ Φ PJ Φ li ii 0 LQ CD a α Φ h- 1

LQ rr d IQ rr φ H 1 Φ

He ml o =

I

the form of passwords are given and crackers preferred vulnerabilities. Also are certain groups of people, such as the system administrator with the access permissions in principle accessible to all data stored in the corresponding network for inspection generally. The accessibility is particularly given when the appropriate PC is in operation. Accessibility is also given in an indirect way, when the PC is not in use, for example, by accessing the backup data to be collected centrally through automated periodic backups.

The backup solutions exist for PCs, which are integrated into networks, usually centralized solutions. Mobile PCs can be incorporated for this purpose periodically networks. As long as the PC without data loss or without loss of hard disk drives, HDD, runs, but this is up to the already mentioned security problems in dealing with sensitive data any particular problems. As soon as a partial loss of data or an HDD failure occurs, in particular the mobile use of PC's a remedy immediate disorder or access the backup data and the immediate return of lost data without the help of a system specialists usually do not lend possible. Such a failure can endings due to the resulting loss of time and by the necessary Zusatzauf cause enormous damage to the elimination of the breakdown.

In addition, in PC's, which are bound off in networks, depending on the configuration of the network and the PC during the operation of the PC for the user are not visible, and thus not more conscious te the user in the background unnoticed running data transfers) tt HH o (Jl o cn O (l

P. ^ 3 J li CD rr <cn LQ 3N he D- cn Ω he 3 CD P- P- P- li li CD a PJ d = d Φ Φ φ φ d 0 cn φ φ P Φ φ φ Φ P 0 Φ Φ 0 = rr a φ Φ P a P Φ d he a P- he "i P aa P 3 P P P Ω, H P a 3 cn a LQ φ rr CD CD Φ Ω 3 Ω Φ

CD LQ rr Φ LΩ LΩ a he rr φ Ό CO Di J Pi Φ cn α er er P

3 Φ Φ cn ≤ φ P CD * φ "d 3 Φ P P <: <φ Φ rr • U

M Φ P- P- aa D PJ PJ Φ • PJ P- Φ rr Ω φ Φ 0 P a P n 1 p.

Φ a Λ rr <; Ii Φ 3 P- CD dd X φ 3 Φ li he a P- P- Φ 1 M J

PQ d cn P ii CO PJ φ rr Hi Cd Ω φ φ Φ - PJ = P d P P Ω CD

Φ Φ φ P 3a rr he cn cn CD ti a P J ada φ it a

<P cn P Ω Φ JH € rr iQ CD CD td H "D. 3 he ω LQ α 12! O <3 St. 0 Ω he a d α α Φ LQ he Φ 0 d φ N CD P CD φ Hi P Φ a <3 Φ o Φ li hi PJ PJ he φ P St. rr φ Φ P P a a Φ P PJ = ao Φ Hi rr

LQ a tu Ω rr P> ≥! He P rr φ Φ a P- CD PJ Pi Pi "d P Di) a Pi Ω PJN

He Φ PJ he cn ≤ a j φ Φ Pi ad = Φ a φ cn d J LQ P- he d σ a ≤

CD α he Φ J Φ Φ rr a <P Pi LQ> St. li P rr CD Ω s ii aa P iQ Φ

Φ PJ N 3 N N li a P- rr φ φ Φ rr PJ he d = 3 a 0, it P-. P- LQ a P he rr = d Φ d Φ cn rr Hi Φ Ξ HH li h-> Mi Pi P- Φ ≤ cn Ω Φ φ Pi X

Φ φ LQ 3 a CD P- Φ PJ PJ = α φ HN PJ PJ φ P- 0 Φ Ω P- P- P- he d φ Φ PJ = 1 aa P- rr PJ H IQ HP) P q d = d = P a P a li he X he cn a cn Ω a 3

Φ P D. P cn P dx Φ rr he Φ a cn LQ LQ IQ P rr rr φ Hi Φ rr he Q 0 ad Ω Φ a cn <St. Φ Φ Φ ii he rr φ ti a Φ Φ 0 P φ rr LQ a he ii φ P φ Ξ aa P a X d P M φ • t he P li a Hi P- CD φ

CO DH LΩ a PJ rr φ Ω a P Φ <Φ Φ a 3 CD - a Φ rr rr P-

Ω P. IQ Φ a PJ he d N μ Φ LQ he ≤ Ω a Φ ü Hl φ φ Φ Φ ti N N Ω Φ he ii a α Pi Φ ad - P- Φ φ rr he P 3 as it P- X 5 he he d Φ PJ li O = J Ξ cn aa Q li Pi Φ PJ he ≤ Q <he Pi LQ φ rr rr Φ • K cn cn tu rr Hi P- <d Φ Φ P PJ PJ D. a rr φ <; PJ Φ φ a ^ ii

N Pf cn rr φ Φ d = μ J PJ Φ Φ 3 li d ii \ -> H 1 CO Φ Φ ii 0 pa a * M

3 l_J. D. Φ P LQ a P rd M aa cn rr rr a he a he ≤ Φ a

PJ Φ φ a LΩ Φ • rr Ω CD φ α oo 0 d rr PJ P- ≥ d tu; PJ Φ co Φ φ cn ≤ a * PJ Φ Ω ti D. Di aa Φ H- "a 'Z a φ Φ Pi Pi li cn Φ rr Φ P- α aa E li e P- φ P Ω φ rr td CQ φ CD D. Di a rr. φ φ P- P- a PJ PJ φ a PJ rr HP he add φ rr d N ii li 3

PJ Hi he tu Mi i Φ a Φ α Hi rr cn φ Pi ≤ a a a N PJ PJ rr ≤ P- P- Φ CD he od = d φ ii PJ Hi Φ φ Φ Φ o cn φ Pi LQ d ≤ d N Φ 3 rr he? d

3 ad li li H a φ rr Φ P- P- P- PJ a P Ω Φ φ Ω Φ Φ φ li

Φ a PJ Hi rr Ω a Φ aa rr rr φ Ω PJ Λ he af er er Φ € £ 5 LQ ao rr P P. he H "LQ a. Φ d rr Φ d? D φ Φ Φ

• P because P PJ i P € H φ φ St. N a N d PJ φ aa Φ P CD rr

€ 0 rr rr φ φ ≤ 0 Φ cn a PJ = d u ≤ rr ada P- P- P- rr CD Ω

Φ Φ a P- P- CD he he 0 φ a he co Φ a tsi he P P - Ω Ω a Φ rr he P- aad cd li <; CD Φ = "li LQ φ Ω H 0 rr Φ he he Q p> Φ CQ

D. D a φ Pi Φ μ o N Φ Φ he P? R rr Φ PJ St. <≤ rr rr rr 3 Φ Φ a

P- Φ J D. a LΩ a 3 He daa rr ≤ Φ ≤ P d rr Φ φ he a 0

LΩ ü dd Pi φ P LQ D. - PJ Φ r P P IQ h 1 0 0 d Ω φ φ Ω Pi Hi rr rr P li CQ ii D. Ω J a Φ <rr Ml Ω he he a he P-> -i Φ a CD he d = N Φ P 0 rr PJ P ^ Φ P he d Φ d = er aa Pi co 3

he Φ φ a Hi Hi d d ii a cn Hi P- he d LQ Φ Φ Φ Φ rr 0 3

> A N li PH LQ rr d St. Hi ii rr cn LQ LQ a 0 tida St. P> a cn d rr P Φ Ξ a cn Ns he Φ Φ pi Ω as CD -ζ c φ Hi rr a

:> P Φ a PJ iQ LQ 3 Φ Φ Φ (- "he he LQ LQ o Φ P Φ ≤

Φ rr Φ P- PJ he P 3 φ o = ii rr cn H "), Pi D ii Ξ P- P- P- P- daa CD φ a aa PJ Φ φ LQ J N 0 Φ φ Φ rr P- d o rr rr Φ a a

<J a Di φ a 3 daa rr P φ St. he Φ Φ Pi Pi T P-

Φ Φ φ P> LQ PJ = Hl Mi n Φ a Φ Φ H l

) To t o LΠ o LΠ HP 1 LΠ o he D Pi Ω φ PJ Ml tu a ≤ 3 t 1X1 t σ Pi P- co he d ≤ P- PJ d ≤ Pi O ti

P rr he φ P, Φ φ P d P o Φ Φ Φ P li rr Φ Φ a PJ aad Φ Φ P. Ξ a Φ a Φ Φ rr rr a CD - P a Φ P Φ CQ D. CD ■; rr Φ Φ i a CD ü Ü P 1 d ti J Φ LQ Ω rr rr cn d = rr rr rr Φ LQ CD td i ii P- d u H he a P- Φ he he - tp ^ rr rr CD ≥ ! d Φ Φ Φ ü ü tu rr rr a Q Φ Φ cn cn φ CD dd TSJ. J Φ Φ ar 0 0 H "a Φ £ Φ Q - P o rr he Φ a Ξ a φ rr rr • LQ Φ rr rr a_ J Φ φ μ.

≤ rr rr P CD Φ P LQ φ X ti CD »i N ti ti X φ LΩ P-

P φ Ω ti d P N a rr PJ tu o = x ≤ φ • * rr rr 3 μ- rr a u tu d <! he rr rr LΩ Φ Ω Ω φ d CD Φ PJ P- P- Φ Φ Φ a

0 Φ φ d tu • Pi P e Φ a CD he CQ ü aa he <a P) he μ, P> O φ Φ aa cn i cn P a φ μ. He φ Φ o? a Φ Φ CD3 Φ Ω H "

P- a μ P. P- d φ Hi LQ Φ rr φ ≤ a ti P- O • u 3 he cn

Φ - cn 3 σ μ Ω a P φ P 0 3 Di CD Φ φ CQ 2! Φ o N t ^ rr μ-

0 o = PJ rr> he LΩ CD i tr a Φ Φ Di CQ Ό Φ? d o rr PJ

3 3 P-> LΩ rr rr ^ a Φ μ d LQ li PJ "i cn Φ Φ Φ P rr rr CD CD 3 PJ do P -> Φ s; Di ti PJ Φ φ a CD CO t ti a P- a φ cn NJ 3 a Hi

& P- rr a P- Φ Φ φ Φ Pi P- he a CD rr rr Ω rr Di ≤ d 3 P cn d

P ^ φ Ω aa cn P rr rr Φ Φ Φ a CD he I- 1 CQ Φ Φ a 3 Ω a φ μ € a CD he d Pi> -3 aax ti di d = a rr φ P €. ti ti μ- Pi he H a φ, Φ a Φ cn a he ii Ω 0 HJ Ω PJ D. Φ ti Ω Φ Φ X a X a p P. φ Pi Φ J he a ti Φ Φ N CD CD aa σ σ X φ he he he P-

^ Φ t d> d it ti J rr P-

Ω Φ. CD a he P- P- Φ rr a PJ Φ μ- CQ CQ φ Φ φ Φ μ. PJ Φ rr he he LΩ CQ P- 0 α a μ φ a ii. rr P cn a P-M Φ t 0 a P Φ μ. φ

0 Φ 0 3 a d PJ PJ: Pi PJ Φ Ω td he rr 3 J LQ P- 0 a

3 3 ai rr φ adoada he P x ​​co 2t d = Φ PJ rr X a φ d

3 P. e Φ Φ LQ Ω Pi 3 Φ μ- rr P CQ 0 = J he? a rr rr 3 cn CD ad Ξ Φ P- φ 3 ta he d rr Φ P- P- ti a ad = Ω Φ PJ φ μ- ti P- 3 α a PJ Φ rr Pi ii a cn O ti PJ as a X a Ω he ti aa <! rr Φ P d

he he P- Φ ti Φ Φ 3 p ai a <0 Φ rr rr Φ rr a a μ- rr x = PJ ti Φ <P- P- a CQ 0 D a φ Φ 2 Φ rr Φ rr ai α Φ

PJ P ≤ Φ 3 CΩ ti 0 X CD rr Hi 3 P Di a μ- 0 a Φ <φ d rr Φ P Ω Φ €. rr ti PJ J = tu Φ φ Φ P- 1 er d tz; a PJ o li

P- P- ax ec ti Φ Φ rr 3 W P ü he CO H σ J μ- a tu φ a Φ

0 CD CD P- CO P- P- PJ rr cn φ Φ PJ P- P- 1 a P- rr rr rr N PJ Φ φ a * PJ Φ φ a J 0 μ> P- 3 tsi ii α D. PJ X φ a N d Φ a μ. F

- nd it because Φ LΩ a P rr X d Φ PJ d P ti ti 0 σ Ξ aa Q o =

Φ St. Hi rr P φ Ω P Φ Ω N rr ti ti P 3 P Φ Φ Φ μ- cn

€. P ti P aa Φ he Φ a φ he d Φ Ω LΩ a 3 P a t i o CD he ad

P- P- Φ Ω φ adi Pi P- φ 1 'P- cn rr Φ d Φ Pi he a X Ω rr 3 J a

Φ Φ μ. FT Φ P- Ω CO φ a CD P- a φ J aa 3 d φ Φ rr Φ he LΩ μ aa he a 3 LQ Φ Φ P- LΩ 3 μ- Φ μ- i Di aaa Φ

<ti

M CQ) t Φ Φ Φ O μ, a 3 rr 3 aa PJ X t LΩ Pi AOA X a Φ Φ tS] since he O tu he Di Φ φ rr φ CQ CQ PJ Φ CD Φ P- J rr li d Hl he ti d P "he aa μ- μ- CD CQ rr LΩ φ P tp φ CD a

Φ rr St. LΩ Φ "d CD Hl a H- 1 d CD he Φ Ω rr a μ- ti P P a ii Φ ≥: a ii cn = d ti Pi Pi a Φ P Φ a rr <u PJ he he rr Φ Φ d 0 μ- a CQ oaa Φ a LQ P P P d> a Φ a PJ P π a 3 aa Hi Φ J LQ he Φ rr J

D Φ Φ Hi rr 3 rr Φ = d Pi ad he LQ rr Hi CD CD Φ Φ ti X N d rr P- Hi a tsi PJ μ. dt he P- he u Φ X CD CD rr ≤ Ω

Φ LΩ CO Φ aoa CD o Φ 0 P P d Φ dr LQ P - 3 PJ = 0 Ό φ P td he Φ

PJ P ii Φ eta LQ cn μ. P a φ a J oa <! rr O li td CΩ there - a CD Qj: φ rr Ω a X ti PJ = P "- Pi NX Φ

P Φ St. rr Φ P. - a rr rr CD Φ St. μ- a 1 Φ P Φ rr d = Φ Φ Φ aa he ti

φ LΩ CD CD LΩ σ φ Di d = 3 CD CD Pi Ξ α D. LΩ φ Φ CQ CD CD CD J <P t ^ d CD

P d rr rr Φ J P he Φ Φ 0 P Φ • d J Φ d μ- a Φ 0 d 0 0 0 Φ CQ P aaa Φ φ z rr aa Φ a φ μ ü he ti rr aa a H> Hi O ti

Φ LQ 3 P "PJ = Φ φ i cn Pi Φ Φ LQ φ cn cn he Hl ^ he ^ cn φ it aa X rr 3 φ Φ Ω μ- N CQ> d μ- Φ φ * • P d = d Φ 0

Hi 1 er i = 0 li P- CQ H a he Φ LQ rr μ it P- Φ LΩ 2 μ Pi H Pi 1 ι-3 Φ a PJ rr - φ Φ CQ Φ a CD P- • a 5 d P- φ φ φ d 3 Ξ φ φ φ a LQ Λ CD a 0 rr rr CD Ω <φ 0 a? r ti μ- μ- a φ P- P- cn φ d d φ φ s i H rr PJ he φ Ö 3 he Φ LΩ J tu

P> rr μ> cn aaa Φ 0 Φ a PJ Φ rr Φ a μ- Φ ti rr Φ H

≤ tu rr PJ CD LQ rr a CD he a tu φ μ- a Φ Φ P- P- rr a Q LU

PJ = i Ξ Φ CD Φ cn a CD I t μ- Φ a Φ P- 0 1 CD i α a tsi Φ CD Φ P- OH he rr rr P. a CD ≤ 1 O P- P- rr rr ^ a a PJ Φ i rr φ P- CD μ- a Φ rr 0 ii φ CΩ ii φ P- Φ CO Pi PJ = a rr Φ CQ CQ CD aa rr φ Ω PJ he O P- Φ ii he d φ <μ- P-α ≤ li O Φ rr Φ CQ • N 0 3 it a

PJ? 7 he he cn φ 3 Φ a Ω φ P H 1 φ PJ Φ Φ St. a Φ μ he li P CO Φ ti o φ Φ rr a CD μ- he D- φ a CD rr ti a Φ a φ Φ PJ H 1 rr J rr

Φ 3 3 μ-. φ PJ ^ CQ Φ μ- cn rr rr rr Ω CQ μ -

3 P- ι-3 LQ ad east Pi CQ Φ a Φ P- TJ O Φ P- Φ ti he o rr tla D. ≤ a Φ Φ P- o Ω D. J Φ rr a CQ CD lc PJ φ ≤ aa a CD *

Φ a P- P- cn LQ Φ 3 he Φ rr N Φ CD t - CQ - ^ <μ J a Pi Φ CD 3 O

P- P- he φ Φ 3 a Φ Φ 3 P- he φ CD CD Φ Pi Φ σ ti μ- £ he a rr Ω Φ x CD a H dd = aa rr rr Φ P- 3 Pi Φ ti PJ D. P- Φ rr μ- α PJ he t cn •; d = μ. a ≥! he rr P P P Ω CQ Φ Φ Φ rr dda Φ cn Ω φ

PJ rr p Φ o CQ he Φ P φ Φ Φ ri P <0 he rr ii 3 μ. a φ a 0 he d p a 3 a Φ rr X rr μ a. μ. PJ φ φ Φ a Hl CD Ω Pi i a - a rr Φ φ 0 J he D. φ PJ ii a N 3 CD 0 ≤ a ti er \ Pi Φ μ- CD ti A II a P ≤ Φ 3 rr d s: Φ 0 = Φ Φ Φ Φ d J o P- φ Φ Φ rr Pi td 3 cn Φ li a CD D. a P- Φ P- LΩ O Ö a ti P- LQ a Pi Φ μ- J li P - ti Φ

PJ 3 D- a Φ Φ LQ 0 μ ad PJ LΩ Ω Φ Φ Φ φ CD CD P rr Φ a J d P d P (_l. Aa X P a3 he rr a Φ μ a. ^ cn Φ Ω Φ d

CO rr a LQ cn Φ Φ φ Ω PJ P. o Φ Φ φ Φ P CD a he ≤ Φ Φ u

CO rr LΩ CD μ- Φ d 3 aa he he a H 3 P 3 a Pi rr Φ φ CD he μ- P- CD φ Φ rr Φ a a μ rr P- P- 0 P- Φ 3 a Φ 0 φ μ- ti a he Ω φ ii P ti Φ <; rr d Φ Pi P 1 = φ tio N 3 σ 3 rr d Ω PJ he μ- aatio CD rr a ti €. Φ φ Φ P- 3 Φ μ- P- LΩ a he CQ ti Φ rr cn o tu Φ Φ Φ Φ Φ μ- D. li aaa 0 he a LΩ <; LΩ Φ rr Φ a φ O ti P- D. a P- 1 H CD P- rr Φ Φ rr φ Φ φ he J 3 a ^ "rr t P- Φ rr N> CD a -ζ i 3 tU li Ω P- ti CD 'a rr Φ PJ Φ Φ P- t d 0 H- Φ H 0 n J he a P- PJ 3> d ii Φ μ- α d = d p p a li <3 rr Φ μ - Φ rr he Φ Φ Φ Φ σ d 3 P 0 J he Ω

Φ Ω σ φ O 3 μ- P- P- rr tu μ- CD d ti he Φ rr PJ 0 = rr aa Φ er er er <φ <PJ CD; a φ H 1 P- P- "J ≤: φ P- a N Ω rr Φ LΩ p j = φ μ rr rr φ Φ a LΩ ii cn φ a LΩ d Φ d LΩ he Φ P- 1 ti a Φ.

LΩ φ P ti da φ Φ ■; Φ Hi μ. Ό φ o tu a Φ a P- a μ- Φ φ> a φ St. 3 CD cn a CD CD 3 CO i he a P- LΩ μ> Ω Φ "i 3 μ- a

CD p d = μ, d = Hi Ω α Φ rr Φ Φ P- 0 d N a Ό rr N He d 0 = φ Φ φ li er er = LQ PJ PJ Φ rr rr Φ μ- ö ad cn cn Pi φ rr φ rr Pi t LQ φ ι-3 dad = rr tsi PJ 3 Ω μ- tsi ao ti rr J P ≤ a Ω μ * 3 J tsi a φ LQ rr φ rr rr Ω φ CQ he d rr PJ CD rr Φ φ P- O ≤ r rr rr μ- LQ he μ N a Φ Φ N a er 3 0 o <a CD N li ti he φ Ω D- tsi CO

Hi ti he P- -s. ad LΩ ti Φ * d Φ P- Φ PJ i μ, P he d Φ ocd = PJ PJ Ω Q CD CD 1 Di Φ ti ti Φ 0 Pi he u Φ ti ti Di

Φ ti 1; Φ he i φ μ. PJ tu rr a • P Hi "i Φ a Φ 0 ad ii 1 1 Φ cn 1 3 o rr φ d = rr rr φ 1 CD

1 a 1 1 1 aa

the can. Thus, the location of the location of the PC can be prevented, whereas the use of the PC over those subsystems that do not gungs- in the data transmission and communication means are involved, is still possible.

It should be provided in particular a PC, wherein a transport safeguard is incorporated which can be selectively turned on and operated for a freely selectable time period and operated. Thus, a location of the PC is to enable the theft monitoring for appropriate operating mode, for example via a coupling with Global Positioning System (GPS) data of a transport vehicle.

It should be made in particular a PC available, which is equipped with active and / or passive communication and / or positioning devices. These communications and / or location devices are optional visualization directly on a PC or via Fernsteue-, for example by radio, be switched on or switched off. Thus, the PC should be locatable with a corresponding mode.

It should be made in particular a PC available, wherein the display of the selected subsystem is carried by a mechanical indicator, for example in the form of a switch or by partial variation of the shape of the PC, in particular by displacing or turning of a part of the PC. This should allow the user a clear, visible and / or tactile verification of the selected subsystem. This will permanently call the applicable Sensitivitat concerning the data security awareness and recall the user. This can be paraphrased industry specifically, the term "WYSWYG" (what you see what you get) or "ygwys" (you get what you see).

It should be provided especially a PC, in which the complete separation of the data contained in the individual subsystems is absolutely guaranteed. This is to be achieved, that the appropriate data neither the networks nor provide overviews of the PC connections, bus, nor be introduced into the peripheral data read and data storage devices individual storage media, such as floppy disks, replaced by a subsystem to another subsystem are kön- nen, both within a single PC and in combination of analog-equipped pCs.

It should be provided especially a PC, with which the user has the option to operate this PC either as an independent individual workplaces space-design or as an embedded in a network or multiple networks workplace design.

It should be made in particular a PC available, with which the optional integration is possible in any of various, mutually independent, classified according to their degree of confidentiality and hardware separate, autonomous networks.

It is overall a particular PC are available with which a data access over network connections in safety-related data in terms of the ongoing integration of a PC in proactive networks, known by the term "always on", is rendered impossible up.

It is overall a particular PC will provide will be in which the any hardware configuration and operating status of the autonomous network concerned visualized and monitored for changes.

It is overall a particular PC are available, can be in which the operating status of the other PC's, connected to which the PC through an autonomous network, visualized and monitored for changes provides.

It is overall a particular PC is available to with which it is possible to view specific data in individualized and personalized form in full to different analog-equipped PCs to further process to mutate, to save and delete.

It should be provided especially a PC, with which it is possible to combine specific data in individualized, personalized and miniaturized form such that only a minimal transport costs to physically secure way is necessary for the decentralized use.

It should be provided especially a PC, which allows the integral data backup of sensitive data within a subsystem. Here should be forced Licher neither a user nor a Systemverantwort- to transfer a portion of or the total of the existing data in different periods lot about a subsystem boundary. It should 's be used as independent solution within a subsystem, preferably in an automated form, enables a new form of backup. Such backups to be permanent permits in place without the help of a system administrator accordingly.

It should be particularly pointed a mobile PC available, with which is a new philosophy of backup, so-called backup 's, sensitive data allows. The immediate availability of the current sensitive data in a redundant form, and secondly the immediate availability of staggered stored historical data at any time in place on the same mobile PC is to enable as an integral solution of a hand.

It should be particularly pointed a mobile PC is available with which the new functionalities can be implemented without significant additional space requirements and without significant weight gain.

It should be provided especially a PC available, which allows the physical separation of the data due to their sensitivities from the perspective of the user. This is not to protect against unauthorized access all of the existing data, but only selected subsets of data. This protection should therefore be economical and practical ässig.

The equipment, respectively, upgrading an existing PC's supposed to be much more cost effective to come as the possible purchase of a second PC for this purpose. Here are the essential and expensive components of a PC, for example, the core system with the microprocessor (CPU), the main and / or memory (Main Memory) of the core system and the screen sequentially can be used more than once or individually to the various requirements of the subsystems are optimized.

The inventive PC, these aims are cost-effective and user-friendly achieved MAINLY gender using conventional hardware, conventional components and conventional software. An increase is partially changed some components and parts of the known hardware and system architecture and supplementing only.

The inventive personal computers, one of which eventually portable versions as laptop computers, handhelds comprising

- the necessary peripheral devices, such as screen, housing and means for data input, and other components,

- at least one core system la, lb, lc, called in English Core system comprising

- at least one microprocessor 2, in English Central Processing Unit, called CPU, and where appropriate

- at least one BIOS 3a, 3b, 3c, Basic Input Output System, and / or - at least one main and / or working memory 4a, 4b, 4c, called in English Main Memory, and / or

- at least one intermediate memory 5a, 5b, 5c, in English called cache memory, and / or

- the associated storage management 6a, 6b, 6c, in English memory management unit, MMU, called, and

- at least one subsystem 7a, 7b, 7c, comprehensively

- at least one graphics controller, and / or

- at least one SCSI controllers, small computer system interface, and / or

- at least a RAID controller, Redundant

Array of Inexpensive Disks,

characterized in that the personal computer

- at least two mutually independent sub-systems 8, wherein each existing subsystem 8 is based on a separate, independent classification of the data contained therein due to their security enforcing Sensitivitat either

- for all subsystems 8 a central core system la is present, or - lb a common core system for a first subset of sub-systems 8, and for any other subsets of sub-systems 8 are either each individual core system lc or at least one further common core system lb is present, or

- is present for each subsystem 8 are each an individual core system lc,

- each subsystem comprises at least 8 an individual physical and / or virtual memory medium 9

- each subsystem 8, at least an individual integrated operating system 10 includes either

- for all existing subsystems 8 A central BIOS 3a is present, or

- for a first subset of sub-systems 8, a common BIOS 3b and for any other subset of subsystems 8 each either an individual BIOS 3c or at least one further common BIOS 3b is present, or

- for each subsystem 8 are each an individual BIOS 3c is present, either

- for all existing subsystems 8, a central main and / or working memory 4, a central latch 5a and a central memory management 6a is present, or - for a first subset of sub-systems 8, a common master and / or main memory 4b, a common latch 5b and a common memory management 4b 6b, and for any further partial quantities of sub-systems 8, either per an individual main and / or RAM 4c, an individual latch 5c, and an individual memory management 6c or at least one further joint main and / or working memory, a common buffer memory 5b and a common memory management 6b is present, or

- one individual main and / or RAM 4c, an individual latch 5c and 6c an individual memory management is available for each subsystem 8,

- the sub-systems 7a, 7b, 7c, either in a core system la, lb, lc or in a subsystem 8 are included or are arranged between a core system la, lb, lc and a subsystem 8, wherein either

- for all existing subsystems 8 a central subsystem 7a is provided at least, or

- for a first subset of sub-systems 8 at least one common subsystem 7b and for any other subset of subsystems each having at least 8 either an individual subsystem 7c or at least one further common subsystem 7b is present, or

- each individual subsystem 7c is for each subsystem 8 at least present, - the subsystems 8 selectively either can be independently started up and ready for operation or put in a standby mode in common or different,

- the subsystems 8 selectively either can be set in operation and operated together or independently of one another,

- the subsystems 8 selectively either jointly or offset from one another independently from the operating state to a standby or out of operation can be set,

- the subsystems 8 selectively either out of operation can be set jointly or independently of each other from the standby mode,

- only a single subsystem 8 is connected to the group consisting of the required peripherals and other components of the personal computer as an overall system and put into operation, operated and out of operation can be set, whereas all of the remaining sub-systems 8 are not connected during this phase with the overall system, and thus no data transfer from one subsystem 8 can be done in another subsystem 8,

- where in the case A, that the personnel com- puter a central core system la is present,

are subsystems 8 so integrated into the personal computer or directly on the personal computer is connected, at the same time at most only a partial system 8 together with the central core system la and the necessary subsystems 7a, 7b, 7c put into operation, operated and out of operation can be set, during which the remaining subsystems 8 of this personal computer are during this period is not connected to the central core system la and can not be connected to the central core system la and either out of service or are set to be in a standby mode,

- where in the case B, that in the personal computer lb common and individual core systems, lc are present,

are B1-- the subsystems 8, which are associated with a common core system lb, integrated in such a way in the personal computer or directly on the personal computer is connected, at the same time a maximum of only one of these sub-systems 8 lb together with the common core system and the required subsystems 7a, 7b set 7c, operated and out of operation can be set, during which the remaining subsystems 8 of this Zuordungskategorie are not connected during this period with the common core system lb and also can not be connected to the common core system lb and either out of service are set, or be in a standby mode,

B2-- the subsystems 8, for which an indi- duel core system lc is present, in such a manner integrated with the personal computer or directly to personal computer are connected, at the same time a maximum of only one of these sub-systems 8 with that of the necessary peripheral devices, and other components, as well as the necessary subsystems 7c existing personal computer connected as a complete system and put into operation, operated and decommissioned can be set u> t to P 1 P "o LΠ o o LΠ LΠ oti

P φ φ μ p, rr

μ- CD • J as aa φ a μ Φ he

PJ N.sub.a he g

P D a fi St. D

N rr

Φ PJ p- b {rr rr Φ D

*there

P> a φ a p-

Φ a

Φ

ND

£ hj PJ a

<Pi

Φ φ lJ he h.sub.a

P a i H Φ a a p-

LQ CD

CD ^ J CD a rr

Φ ag

PJ CQ he

3 03

Φ

be a stationary standby mode subsystem 8 completely deleted, and / or such data are stored on the previously operated subsystem 8 prior to the complete erasure of data for the purpose of their conservation, and

On the other hand all the necessary for the re-start-up of the central core system la or the common core system lb, and for the subsequent start-up, the boot so-called, of the newly selected subsystem 8 primary initialization, and including the BIOS data and the configuration data, on the central core system la lb or on the common core system or the respective subsystem 8 remain unchanged and be connected together with the central core system la or the common core system lb of the specific hardware configuration of the newly selected subsystem 8, or

- the respective individual core system lc together with the respective subsystem 8 stem from Gesamtsy- of the personal computer and the required subsystems 7c is disconnected in such a way that all the data stored in the respective peripheral devices and other components and the necessary subsystems 7c of the overall system of the personal computer neither buffered nor otherwise supported and completely cleared within the period of time for start-up of another subsystem 8 or within the time for establishing a connection with a stationary standby subsystem 8 and / or prior to the complete deletion of such data for the purpose of their conservation, these data on the previously operated subsystem are stored. 8 Preferred embodiments of this invention are defined in the dependent claims.

In the following part of possible embodiments of the present invention are described.

In this case, normally not repeated embodiments as they are defined in the dependent claims.

In Figures 1, 2 and 3 are the usual peripherals together with a housing schematically ones shown, provides, namely, a screen, a keyboard, a computer mouse and a printer.

In Figures 1, 2 and 3, the BIOS 3a, the main and / or working memory 4a, the buffer 5a and the memory management 6a are shown as central elements. The respective embodiments 3c, 4c, 5c and 6c of these elements are shown at the individual subsystems 8 only suggested with dashed lines.

1 shows purely schematically a possible embodiment of an overall system in which a central core system la is present, which communicates with one of three subsystems. 8

2 shows purely schematically a possible embodiment of an overall system in which two common core systems lb, each of which are provided with one of two subsystems 8 in combination, and two individual core systems lc, each of which communicate with a subsystem 8 in combination, are available. Figure 3 shows purely schematically a possible embodiment of an overall system in which three individual core systems lc are present, which are each provided with a sub-system 8 in connection.

The inventive PC is equipped such that the user aware must determine a single subsystem 8 and then only this subsystem 8 can join and together with the group consisting of the necessary peripherals and other components personal com- puter as an overall system bring used. It is possible that the PC itself or a third party determined by an indirect access to the PC, for example, over a network, a subsystem 8 on the PC and this can bring used together with the said ele- ments.

In order to prevent an exchange of data between individual subsystems 8 of the present invention PC is preferably provided in such a manner that all data, which are located in all the volatile memory of the PC and / or in the involved peripheral devices 8 are completely erased prior to the activation of another subsystem, said deletion, depending on the used storage components, either by a previously defined period of Spannungslosig- ness of these memory components, or is caused by a so-called active quenching of volatile data storage, such as CMOS, which occupy an indifferent memory state at power failure.

In an inventive PC so-choosing a subsystem 8 and the connection of the selected subsystem 8 with the aforementioned elements and the possible connection to a network based on the hardware and allocate them within unique physical, latched positions are comfortable.

In a PC according to the invention, the switching elements are preferably designed such that they have unique physical shift positions. Latching switch positions are preferred. You can be rest form or in the form of an electrical or optical switch, for example an optocoupler. An optocoupler does not generate voltage spikes in contrast to elec- tric switches in the operation. This is particularly important for switching from bus connections.

In an inventive PC there is the possibility that the selected subsystem 8 respected tive thereby selected mode of operation for the user at any time at the switching element or actuating element or by partial variation of the shape of the PC, in particular by displacing or turning of a part of the PC, visible or is palpable. Under comparable design, it is also possible to display this information in addition to a screen. Another indication may also be convened on corresponding peripheral devices. This can be done for example in the form of a labeled light, in the form of several labeled lights or in the form of lights set, which is mounted on the keyboard on a computer mouse, the chassis of the PC or on the screen housing. In addition, the nature and / or the presentation of applications installed on the various sub systems 8 software can also be consciously differentiated, for example, by the use of different operating systems 10, such as Windows or Linux, and their user programs. Likewise, the con-> t to P 1 P "o Lπ o o LΠ LΠ can

CD d H "co 2 s;" PJ ≤ tu t-3 cn ≤ μ d = a ti CO D i d tsi Pi co 2 <CD D. ≤- Hl

Φ 0 P φ 0 = PJ 0 d Φ μ- Φ Φ <; 0 he Φ d P d J Φ Φ - o-- 0 Φ Φ Φ μ-

O μ, Ω a IQ ti a St. »i P μ- a CD he Φ 3 a Ω ti u P LQ ti ti u μ- LΩ

PJ he rr rr co a XH rr ti LQ he Ω Φ rr rr »i LQ a D d ^ μ μ- P d ti D. X CD CD Di φ tu rr he μ- a φ P Φ • Φ ti μ- i rr Ω a 0 μ- 0 Ω ^ d 3 d = Φ P X -> J φ CD Ω a Φ a PJ

Φ X φ φ LQ he μ- a ti he co φ he μ- 0 = P <3 tu> he d PJ ≤ • rr ii ti 0 <; tv CD Mi μ- rr Ω Φ a P- a Ω Φ μ- φ X a 3 Φ he μ- a φ μ- Φ he Φ φ P "i Φ he co μ, cn a ti he co Φ a X Φ a μ- o cn cn a rr Φ P- 3 3 3 2 LΩ Ω Φ Ω CD he rr P- rr 0 ≤ a

S. Φ PJ = rr t μ- Di d do 2t Φ PJ D. 0 a 'ao Ω' he μ- μ- rr tu Φ φ P-

Φ tu & rr Φ Φ φ μ- a 2 μ he P Di he PJ PJ a <φ a P- LQ X <d μ- ii μ- LΩ .omega..sub.i ii o P) Φ CD co rr φ μ- ii φ μ - μ. i Φ LΩ P rr φ 0 = 0

Di Φ ad = Φ φ rr a a N rr μ- 3 rr i φ μ- d Φ 2 Φ aaa

Φ a CD he LΩ Φ cn J μ- μ- CQ PJ PJ tu 0 J he Φ Φ ret LΩ φ J ti rr aa PJ Φ Φ μ- co X rr 0 0 a d Φ φ li Φ cn Φ Φ rr LQ Φ Φ P Φ CD cn Φ LΩ

•. rr t he a φ φ rr oa LQ ti Ω rr μ- μ Φ ti a ti σ μ- Φ a CQ a 0 a

XN Φ Φ P- Φ ad li X he ti a cn rr 0 3 Φ Φ a φ o μ- = - CD 3 a Φ μ- Φ μ- a CD N LQ μ- Φ PI J 0 a a a 3 Pi PJ X rr he P- a d-- J-- <; a rr φ d = Φ CQ Ω PJ a CD ia he o = ≤ Φ Ω, Ω a Di 3 φ Φ P "LΩ d 3 P- er er • he rr Hi Φ rr Φ Pi φ 3 a PJ μ- he

Φ? R Φ rr Pi ti Ü φ CQ Φ a LΩ μ- Φ CO CD rr 0 he li Φ μ- d D ii φ a μ CD J a Φ HP "J Hi PJ = a • Pi P rr rr li tsi rr> μ J Ü 0 a li PJ Hi a Φ Φ Ό ta Φ P CD μ- a CQ ad Φ P 3 ti ö Pi Ω ω μ- μ- a rr a Ω CD retd ≥ rr Pi φ => Di Pi CQ 3 Ω PJ Ω φ ti 3 er PJ PJ CD a φ μ- α 0 he D. φ φ φ φ φ φ μ- rr rr he μ- φ φ ti φ Di t he d LQ μ- cn cn φ rr 3 CD d Ü ii X μ. he φ CD CD rr φ 3 a = N PJ μ- ω ad CQ φ CQ Hl

Φ - ^ PJ = d tsi 0 Di ad D 0 rr rr tu Φ N φ Φ a LΩ \ -> u

CD Φ <3 LΩ a Ξ 3 er 3 Φ t cd Di CQ Φ a • a J Φ ≤ P <he LQ Φ P Φ D-

<: Μ- Φ rr CD LQ Φ 0 = Φ * as φ Ω Φ PJ = P φ H "rr Φ Φ CD co Hi Φ Φ P Cn φ Ω o t i l LQ IQ rr rr rr rr aa tu Φ PJ = HX IT IQ d = σ 3 CD 0

Pi he ≤ μ- φ Φ X P- "ti φ μ- ii P. N φ μ- rr? He he φ P Φ Hi

3 Φ Φ Ω 3 P- Φ ti rr he a μ- Φ μ- Pi Pi N P- a 3 li td LQ rr

0 = CO oa he PJ = 3 t Ω rr Φ Hl D. φ ii P- H Φ Φ d Φ φ LQ Hl = PJ rr φ μ- S

LΩ rr d D. Φ CD 0 = 0 it Hi Φ μ- he μ- Ω a CQ CQ Φ CD dd = μ, 3 CD P- PJ

PJ = ad CD LQ a Φ CD u CD he μ- CD PJ = μ rr aa CQ ≤ "Di φ ti

P- LQ a α φ μ a * a * Mi d φ N er 3 he Φ rr rr LQ Φ s P3 LQ Φ φ Φ 0 CD

Di Ω LQ PJ a P- μ- μ- X d Φ φ Ω CD N co Di a φ a ti 3 Ω P- Φ e he d Φ rr Ω PJ LΩ he CD φ σ u H cn * μ- - Φ Φ ≤ i er er P- LQ rr φ CΩ aa he d tu a CD he P- Ω P- ii a 0 h- 1 co = t a tu PJ Φ P- P- Φ ia a Ω rr co ti <PJ = hl a Ω Φ φ Φ he φ Ω aa μ rr N cn d. PJ Φ> -3 i s Φ ao T he Ω D 3> rr. PJ 3 Φ P- above PL, J Φ rr P- P- Φ d Φ μ P. O li he Φ μ- Φ μ- rr rr li li a Φ t. D- Φ μ- μ- d cn a a μ- P- he φ ti 3 li J Φ μ- Φ o P- iaa ≤ <LΩ Ü o rr 0 Φ a Hl Q φ PJ CD he d as Φ CD Φ rr φ a rr 0 Φ ti he rr D. Φ CD LΩ a CQ Φ a D. J rr Ω D. co he a he a li d

? PJ a Ω ti ≤> d * <Pi Φ a μ- he r Φ Φ 0 Di CD t-3 ≤ Φ CD a <; T he d Φ d Φ co Φ PJ Φ ti Pi = U 0 0 CD Pi Φ PJ Φ φ a Ω PJ D.

Φ Φ t-3 a P at rr ti da Φ aa J Ω o Φ HH P He P Hi Ü

P ii li μ- Di rr 3 Φ Hi Φ ≤ a Φ ad> - a li rr rr <μ- μ- PJ he a J φ Φ J 3; a φ Φ d a CD α • - CD Φ o φ μ μ-

Φ J ao μ- Φ ti a Φ Φ Φ μ- Pi a co - Φ φ ^ μ. a D- he Φ

Hi cn CD he μ- Φ rr rr Φ P- Φ CQ Hi ti P. J d ω Φ Φ rr ii 1 i D- 00 tia Φ μ- 0 P d = Φ Φ ti Φ d rr rr Di Di aa μ - aa φ rr 1 φ p j I he μ. Ω Ω φ ü P Φ ti φ φ 3 II he he 3 Φ a

economic security of appropriate subsets of data against unauthorized access or insight as well as a correspondingly simple and clear identification of such data for the user. As a result, by a corresponding risk-conscious use of this information for the variety of individual users is possible. Here is particularly given to a novel PC the ability to achieve these securities in particular by physical, visible and stable in itself differentiations, which for the user compared to the invisible and at times indifferent software solutions at all times ENTIRE orientation both in terms of the current state of the PC as well allowed regarding the Sensitivitat of the associated data.

With these measures, a new security standard is achieved for the orientation of a user.

According to a first possible embodiment, the PC is equipped with two hard disks 9, which are installed in the PC case. Besides these two hard disks 9 no further hard disks are installed in this PC or connected to this PC.

The hard disks 9 with the respective Betriebssy- Stemen 10 are for the two operating modes "open" and

is "safe" fix installed in the PC so that an individual commissioning of the respective subsystem 8 directly via a switching element, which is present in this embodiment as a rotary switch and actuating element formed as Betä- and attached to the front of the PC. The switching element is in the form of a multi-pole rotary switch with 4 inputs on each 3 outputs, namely switchable shorting executed. The three self-locking switch positions of the rotary switch are designated at the front with "safe", "off" and "open".

In "safe" are in addition to the connection to the corresponding subsystem 8 "open" also the connections to the internet, and especially the necessary to build relevant hardware components, such as modems, network cards, through the switching element interrupted physically, so that an access from the Internet side is "safe" absolutely ruled out the appropriate hard disk 9 for the operating mode.

In addition, the operating system 10 is in the operating mode "safe" installed so at the appropriate hard disk 9 that the network functions not selected and can not be accomplished by, for example, specific programs and drivers are not installed, which is a redundant safety against inadvertent Verbindungsaufnähme with the Internet results. The user can also by the said interruptions in the hardware because of the optionally resulting error messages, which are by the user to acknowl- animals are made additional attention to its access to the sensitive subsystem 8 or one of the sensitive subsystems. 8

Further, there is an essential element in the fact that a mode for On the other ren mode, the core system la and other components of the personal computer have to be switched on automatically excluded when switching from the, if necessary, indicated by the switches assigned to the "a", "from", " one "is given.

By forcibly turning off the core system la, and if necessary other components of the personal com- puter all respectively in the working buffers 4a, 5a existing user data is deleted. The necessary specific system control data, including the BIOS data is maintained unchanged.

For the operation of the personal computer is exclusively one of the two, namely the respective subsystem 8 "safe" or "open" associated hard disk 9, connected via the switching element in the corresponding position with the core la of the PC system.

In a first application, the PC is started and operated in the "safe". In general, the operation of the PC by a shutdown of the operating system 10 after use, preferably a regular shutdown Betriebsy- stems 10, ended. Accidental interruption of operation, for example, by a power failure, the operating system 10 is then an internal audit program ScanDisk to check back on proper operation and possibly instandzustel- len again.

the changeover from the operating mode "safe" are for a subsequent further application set to the "open" and a shutdown of the operating system 10, preferably a regular shutdown of the operating system 10 is required. By rotating the rotary switch from the "safe" position to the "open" about the intermediate position "off" while the core system la with a reset is booted.

Subsequently, the personal computer is started along with the newly selected subsystem. 8 The change in the hardware configuration of the PC is detected by the BIOS 3a during start-up, by the absence of the previous known to the BIOS hardware disk detected by the BIOS 3a and displayed in the form of an error message "Primary master hard disk fail" on the screen becomes. Then it is determined the newly present hardware configuration of the PC "Setup BIOS" on manual access to the, and the BIOS data corresponding to the newly encountered PC hardware configuration as described in detail manually changed with appropriate entries and then for commissioning follows the PC stored in the new configuration:

Depending on the manufacturer and version of the BIOS specific, individual entries from the keyboard and / or mouse to the corresponding PC are necessary for its change. The following information relates to a possible embodiment of a PC, which display is equipped with a

ROM PCI / ISA BIOS CMOS SETUP UTILITY AWARD SOFTWARE INC.

and 9th with 2 "IDE" hard disks After the appearance of the above error message to be made the following entries:

is that by pressing the "Delete" button

"BIOS Setup" on the PC called and the menu "IDE HDD AUTO Dedection" selected via the keyboard and started by subsequent pressing the "Enter" key.

In the following step "Auto Dedecting" for a maximum of four passes through the BIOS 3a manageable and correspondingly labeled Hard Disk Drives, HDD, from, and the search result of the found by the BIOS 3a in PC HDD 9, the in individual steps in the form detected new hard disks (not or no longer installed HDD 9, respectively, and in the form) browser displays on the screen in the following order to select 9:

- Select Primary Master H> Display 0

- Select Primary Slave LE> Display 0

- Select Secondary Master E> Display 0

- Select Secondary Slave LE> display of HD data.

These ads are selected as an option individually from the keyboard and confirmed by pressing "Y" (Yes) and executed by subsequent pressing the "Enter" key. Thus, the next query is initiated in the program sequence and displayed.

Finally, the menu item "Save and is

EXIT SETUP "is selected, this by entering" "confirmed (Yes) and with the command" Y Enter "executed and completed. Since during the" is not active BIOS Setup "the German keyboard driver, the system is based on an English keyboard, must be pressed in which Y on the key I of the German keyboard.

Then the operating system is wanted by the "BIOS" 3a on the now well-known and characterized addressable hard disk 9 10, the operating system 10 and recognized as such started up. By carried out the production of the corresponding contact on the rotary switch the modem is connected to the PC. The modem is detected by the operating system 10, and thereby the production of an Internet connection is then made possible.

Unlike in "safe" is in the operating mode "open" the necessary software for this purpose, such as specific programs and drivers installed on the appropriate hard disk. 9

If the start of the PC is in the same configuration as it has been operated previously excluded and on, no further action is usually necessary.

For the conversion of the operating mode "open" to the operating mode "safe" appears at startup in the new configuration "safe" of the PC analogy to the error message "Secondary Slave hard disk fail", and, accordingly, is the result of the step "Auto Dedecting" according to the newly encountered hardware configuration of the PC differently and gives the following search result: - Select Primary Master tH> display of HD data

- Select Primary Slave tH> Display 0

- Select Secondary Master tS> Display 0

- Select Secondary Slave. E> Display 0th

These ads are selected as an option individually from the keyboard and confirmed by pressing "Y" (Yes) and executed by subsequent pressing the "Enter" key. Thus, the next query is initiated in the program sequence and displayed.

Only in the "safe" acknowledge and Quittier.ung the error message of "Hardware Wizard" of the operating system is 10 concerning the lack of driver software for the network card in addition each time required, this acknowledgment either by pressing the "Esc" key or can be done with the mouse on the box of the error message by clicking the "Cancel". This necessary manipulation makes the user again on the start-up mode "safe" carefully.

Only when switching from one mode to another mode, the above-mentioned measures men concerning adjustment of the BIOS data corresponding to the selected respectively by the rotary switch to make hard disk. 9

According to a second possible embodiment, the PC includes four subsystems 8 and is equipped with a correspondingly multi-pole switching element. The first subsystem "safe" contains three HDD, two of HDD are permanently used for mirroring the programs and data, and of which the third HDD is permanently used to secure the incremental backups. For the other three subsystems "work", "internal" and "open" the HDD 9 is used. The backup of these three subsystems 8 made by the appropriate networks, for example using backup servers.

According to a third possible embodiment, the PC four subsystems 8 and is equipped with a correspondingly multi-pole switching element. The first subsystem "safe" contains three HDD, two of HDD are permanently used for mirroring the programs and data, and of which the third HDD is permanently used to secure the incremental backups. Here are the three HDD of the first partial system "safe" are in the form of a physical exchange unit to-summarized. This is made possible by the physical exchange unit can be stored in a vault during their non-use, additional protection for the subsystem "safe", and is protected against theft and fire. For the other three subsystems "work", "internal" and "open" the HDD 9 is used. The backup of these three subsystems 8 via the respective networks, for example using backup servers, which are specific for each subsystem. 8

According to a further possible execution form of a personal computer is indirectly operates the switching element. An indirect actuation of the switching element can for example take place by electrical means, wherein the selection of the desired mode to a remotely located from the switching element actuator such as rotary, sliding, tilting, or key switch, takes place. For both the direct and for the indirect actuation of the switch element, either the switching element or the corresponding actuator is preferably arranged as a rotary or key switch trained det and in a well visible to the operator and accessible position, for example on the front panel of the PC.

The key switch may be configured such that the corresponding key has to be used necessarily prior to the selection of the operating mode "safe" and during the time in which the operation mode is "safe" in operation, must be used and can not be removed.

In another embodiment, the key can be pulled out and removed only in the nearest position "off".

The other switch positions such as "internal" and / or "open", can be designed such that they can be selected optionally with the same or with a different or no key.

The key of which may be formed both as a purely mechanical element, as well as mechanical / electrical element, including any combination, for example in the form of a combination lock.

Similarly, an active or passive, elekti- shear and / or electronic key is applicable, for example in the form of "badges" or in the form of specific software with password access, in particular in the form of BlOS passwords, or even based on biometric methods in the form of personal characteristics such as fingerprints, eye characteristics, etc., recognized devices.

Inventive personal computer can optionally operated as a single-user applications and in combination in the form of networks are used. According to the specific requirements for data security, both the individual subsystems 8 and the corresponding, self-sufficient trained networks can be made available to a select group of users.

Inventive personal computers allow the decentralized use of data, in particular transmitter sitiven data. However, no data transfer through external networks must be done. The corresponding subsystem 8 remains either the respective user or is delivered to the authorized third party and is brought by these persons on a properly equipped personal computer locally used.

A PC according to the invention comprises at least two mutually independent sub-systems. 8 Thanks to this measure it is possible to use the PC in at least one or at correspondingly greater number of Teilsy- Stemen 8 also in several independent networks selectively to operate sequentially and optional.

If inventive PC's are connected to a network or multiple networks, these networks are designed such that only the equivalent contained in the individual PC's subsystems 8 set with each other, operated and out of operation can be set, that is, for example, in the modes "work" with "work", "intern" with "internal", "open" to "open".

An advantageous embodiment of such

Networks may be that the security against access by third parties to the individual subsystems 8 also guarantees about the special design of the network connections, for example, by the avoidance of potential security leaks in the network design have participated in the network design, especially to non-use of latent or potential open communication channels such as telephone, radio, directional beam, gateways, routers, etc.

If inventive PC's are connected to a network or multiple networks, these networks are preferably designed such that they are aware not compatible with each other, for example by using different types of data transmission media such as unshielded Twi- sted pair cable, UTP cable, coaxial cable, fiber optic cable, or by different not mutually compatible embodiments of the same category belong independently trained networks bertragungs- for example, by various geometric design of the UE and links, for example the plug connections.

It is also possible for the individual networks by use or attachment of special designations to distinguish from each other. The individual compounds can, if necessary, by additional measures, such as relocation, are protected in separate pipelines or by other structural measures. In addition, such wise according to their degree of confidentiality classified, deliberately small and thus manageable held autonomous networks compared to a single large internal network a higher security level on.

When at least one of the subsystems 8 is configured in an inventive PC that this subsystem or these subsystems 8 is in the form of a self-contained, physical exchange unit, there is a possibility to use the PC in an individualized or personalized form. Thanks to this physical change unit it is possible to make such individualized or personified th data in both a stationary and a mobile novel PC anywhere to use and process, for example in the form of "mobile offices". In this case, access to the individualized or personalized data locally on a novel PC and not via network connections, which are fraught with security risks, and from the perspective of the user often undefined user groups are accessible, for example via Intranet or Internet.

By using such a physical change units and / or by the use of Speichersubmodulen is possible to give a PC a new functional design with new integrated functionalities and / or a new architecture.

As subsystems 8 also removable data carriers may be used, for example in the form of state-ooo 90

U n HU α.

O

oo so O

90

1

© o 1 Φ R d 1 1 TJ 1 1 1 Φ d rö φ d • μ 0 Cn (E φ R SH Φ X Cn> Cn 1 Φ X od CQ Φ φ CD RXI d ^ ε JJ 1 -μ d rö EQ JJ CD -μ • μ 1 R - • μ Ti un 0 Φ ε φ d J JJ = 3 3 SH Φ ri Φ Φ 0 φ -μ -μ JJ JJ = 3 3 SH CQ φ R

-μ d X! Cn Φ Φ Φ rH Φ cn JJ rö SH XI JJ Ti ε = 0 TJ PJ rH Φ Φ φ XI

H CQ -μ -μ rö d D d SH JJ JJ 4π Φ x: Φ Cn d Ti d rö • <4H Φ JJ Cn CD U d Φ d 3 X! CD Φ φ CQ CQ υ 3 -μ a ^ -μ d -μ d 3 SH Φ TJ CD 3 -μ 3 - φ 3 α. Φ CQ SH CJ -μ 3 X! = 3 <N d PJ CO JJ JJ Ti -μ 0 fö P fö JJ <tsi PJ -μ d = Φ CQ Φ CQ rö d .epsilon. J SH SH ε φ d = 0 rö -μ d X d SH ε Φ r- t

-μ ε rö -μ SH JJ JJ φ Φ Φ Φ SH ü 0 ε d ε ß Φ SH JJ CD φ Φ H Φ 0 ε

PX! 2 CD Φ ri SH SH SH Cn u -μ -μ = φ 3 JJ fÖ Φ RH Φ ε • μ J SH 0 ü fÖ • μ> = rö Φ DJ 4H Ti SH 0 Φ JJ UH X) SH d CD rH Ti Φ Ti SH 0> d SH SH X!• μ CQ 3 3 r- K • μ • μ -μ d rö rö 0 tn 3 -i <HR φ Φ 3 CD 4H SH SH JJ rö s_ι fÖ N CD CD Φ CQ ε R XX) Φ 4H rö SH tsi rö CQ SH Φ xi a D JJ CQ Φ cn R: 3 d CD d SH X! -i 3 ε d Φ d '= d 3 Φ CD JJ υ Φ rö rö> Φ Φ d d 0 d 4H Φ Φ u JJ ri I 0 CD Φ JJ 4H rö R 0 d TJ Φ

-μ • μ • μ Ti N JJ rl Φ CQ CQ 3 JJ X CQ rö O rH x d ε H SH CD 3 JJ rH SH Ti d JJ JJ NN R φ SH SH CD -μ ü • μ UH φ Φ Φ XN Φ SH SH CD • μ ε Φ -μ .. fÖ -μ -μ JJ jj JJ Φ XI cn Φ 3 d PH d -μ X! -μ JJ JJ X Φ CQ Φ ε Ti JJ 2 ε r ε = rö rö a = 3 -μ JJ JJ N φ -μ PJ Φ φ SH rö 3 = 3 = SH fÖ

= O -μ Φ X! CD CQ Di ιμ d Φ d CO CQ .. Cn Cn 3 CQ PJ 1H ε Φ

* SH SH 2 d d CJ 3 3 CD φ ε μ JJ d φ d φ Φ N Q 3 ε -μ SH CD Φ X!

SH Φ Φ Φ d -μ φ rö fÖ o Φ 3 3 CD Ti Φ X! Φ ri Φ Cn JJ J rö o φ 5 Cn SH

Φ X! • SH Ti Φ ri d CQ CQ CJ Ti rit = 3 d cn φ JJ ri X! d Φ TJ 0 EQ U

X! 3 = Φ Φ d PJ Cn Rd 3 d Cn μ fÖ d -μ £ ->

SH JJ J rö PJ = fÖ = 0 SH J_) rH JJ dd φ 3 Φ φ SH rö UH ri CQ JJ R

Φ MH -μ d rö SH X Φ φ Roe: fÖ Φ rö Cn Cn d J X d cn Φ rl Φ d Φ fÖ SFÖ Ti CQ

CD Φ Φ TJ Ti R JJ JJ d SH X CD rH d CQ Φ Φ TJ CD d R JJ ri ri Φ Φ 3 a D -μ XX! CQ o 0 0 -μ: rö 3 φ -μ d cn dd JJ -μ 3 0 0 -μ -μ Φ rH R: rö φ TS JJ J - CD r- d Cn rö X) XI φ d φ Φ -μ Φ CD rH XI Xi -μ

X x: SH d -μ fö CJ CQ SH rö 0 d rö SH Ti 3 X! -μ φ 3 CD JJ SH rö 0 Ti Φ

U Φ CD Φ 3 Φ R PJ Φ yy R • μ a QX, Φ cn φ TJ 3 Φ CQ J -μ d ε R e -i ε d X) -μ t * H 0 JJ Ti Φ> φ φ cn rö ri dx 0 rö ε

Φ a -μ JJ U Φ X -μ rö dx: d • μ SH Φ ε d Φ Φ -μ d X d SH 5 -μ Φ X! Xt PJ X! JJ ^ R JJ JJ -μ υ Φ SH 3 JJ cn SH Φ -μ ε R JJ φ 0

Φ Ti CJ CJ υ CD Φ Φ X CD 4H -i JJ Φ 0 Φ J PJ φ Φ Φ X SH - Eu cn ". Φ JJ -μ -μ R 3 = 3 X! TI R SH Φ SH Ti CD Φ ^ X! CQ TJ cn Xt d Φ CQ

-μ Ti ε -μ -i -i tö Φ SH rj d 3 d 3 W Φ X5 d υ Φ -μ fÖ υ d 3 S Di Φ tsi d μ Φ X Cn! ε iμ, - 1 Φ Φ • μ Eij Cn O CQ Φ -μ -μ Φ d rH φ o Eij -μ d -μ Φ X = 0 3 c n ü ε o X d ^ JJ dd X Φ 3 0 X XI rö ! SH JJ i

-μ CQ Xi X ε = -μ 0 CD Φ Φ Φ d d d 0 3 CQ 0 ε CQ Φ d = 3 X) u φ R CJ rH; JJ Ti Φ TJ Φ -μ ri -μ d Φ O Φ CD d JJ WH rö R

JJ -μ • μ Φ Φ ε SH dd O JJ d CD JJ ri d Φ ε d d φ CQ JJ JR ε X! φ r -μ Φ SH CQ φ φ X TJ Φ ri Φ Φ d ^ -i -μ Φ Φ SH rö

CQ ε Φ Φ

CJ Φ PJ Cn TS = 0 X JJ WX) Φ CQ Φ cn rö JJ H rH rH Φ P JJ ri ω X) Φ CD Φ X d fÖ CO = 0 φ φ X SH J -μ Φ CQ WH UH tö φ Φ x: P d ■ φ JJ -μ CQ

-μ SH 2 -μ ε SH Φ d Φ -μ -μ ε d tu SH JJ CO Φ υ X JJ R -μ Φ -μ CD

XI Φ d Φ PM Φ -μ 0 3 r ^ 3 0 Φ cn CD 0 -μ ε CQ φ 3 Φ R

Φ Φ Φ Φ X! d> 3 CD; X d d JJ rH - Φ JJ> 3 CD 3 3 d Cn Cn -μ • X! d O d SH cn Φ 0 JJ JJ 3 N CQ ri JJ SH CD CQ J

-μ -μ SH Ti d u d Φ -μ Φ Φ cn a> dd Φ TJ -μ cn JJ φ EUE -μ Cn Φ 3 ri R d N d φ X! d -μ SFÖ> d RN Φ • μ o Φ N Φ Φ -μ d JJ T3 d JJ JJ R X) * RR Φ SH SH SH SH 3 ε Φ CJ Ti xt JJ CD -μ d Xi 3 SH SH. - μ 4H

Φ d -μ CQ Φ PJ • μ = 0 Φ Φ Φ JJ 0 φ φ X! rö d CJ = tö 3 φ υ JJ Φ 0 PJ SH o ε φ -μ 3 cn 00 Φ X ιμ 3 CQ Ti> T3 rH J 3 4H co JJ JJ N T5 co CQ Ti> CD ω O

ben comprising a switching element and the wiring as well as prepared modules and any required additional components in the form of at least one hard disk, and the other optionally required elements, such as integrated or adaptive interface management and network management.

Such a kit or a kit for upgrading existing personal computers to achieve the enhanced functionality of the personal computer according to the present invention may comprise at least in the form of at least an integral assembly of two autonomous storage devices 9,

wherein in this assembly, the switching element is preferably integrated, and said kit or the kit optionally comprises other necessary additional components,

for example corresponding cable assemblies and connectors for the preparation of the compounds of the integral assembly for "main board", and in accordance with cable assemblies and connectors for making connections to the possibly required interfaces, transfer cards, I / O cards and actuators.

In the present invention, the following reference numerals are used:

la central core system lb common core system lc individual core system

2 microprocessor

3a central BIOS

3b common BIOS

3c individual BIOS 4a central main and / or working memory

4b common main and / or working memory

4c individual main and / or working memory

5a 5b central cache shared cache

5c individual latch

6a central memory management

6b common memory management

6c individual memory management subsystem 7a central

7b common subsystem

7c individual subsystem

8 subsystem

9 storage medium (in the subsystem) 10 operating system (sub-system).

Claims

claims
First personal computer, including its portable variants, such as laptop computers, handhelds comprising
- the necessary peripherals such
Screen housing and means for data input, and other components,
- at least one core system (la, lb, lc), in English called Core system comprising
- at least one microprocessor (2), in English Central Processing Unit, called CPU, and optionally
- at least one BIOS (3a, 3b, 3c), Basic in- put Output System, and / or
- at least one main and / or working memory (4a, 4b, 4c), called in English Main Memory, and / or
- at least one intermediate memory (5a, 5b, 5c), in English called cache memory, and / or
- the associated memory management (6a,
6b, 6c), in English memory management unit, MMU, called, and
- at least one subsystem (7a, 7b, 7c), comprising at least a graphics controller, and / or
- at least one SCSI controllers, small computer system interface, and / or
- at least a RAID controller, Redundant
Array of Inexpensive Disks,
characterized in that the personal computer
- comprises at least two mutually independent sub-systems (8), each existing subsystem (8) is based on a separate, independent classification of the data contained therein due to their security enforcing Sensitivitat either
- for all subsystems (8) a central core system (la) is present, or
- for a first subset of sub-systems (8) have a common core system (lb) and for any other subsets of sub-systems (8) either each individual core system (lc) or at least one weite- res common core system (lb) is present, or
- for each subsystem (8) depending on an individual core system (lc) is present,
- comprises at least each subsystem (8) an individual physical and / or virtual Speichermedi- to (9), - each sub-system (8) at least an individual integrated operating system (10) includes, either
- for all existing subsystems (8) a central BIOS (3a) is present, or
- for a first subset of sub-systems (8) a common BIOS (3b) and for any other subsets of sub-systems (8) either an individual BIOS each (3c) or at least another common BIOS (3b) is provided, or
- for each subsystem (8) depending on an individual BIOS (3c), is present either
- for all existing subsystems (8), a central main and / or working memory (4a), a central buffer memory (5a) and a central memory management (6a) is present, or
- for a first subset of sub-systems (8) a common main and / or working memory
(4b), a common buffer memory (5b) and an overall my same memory management (6b) and for any other subsets of sub-systems (8) either an individual main per and / or memory (4c), an individual buffer (5c) and an individual memory management (6c) or at least one further joint main and / or working memory (4b), a common buffer memory (5b) and a common memory management (6b) is present, or
- for each subsystem (8) depending on an individual main and / or working memory (4c), an individual buffer (5c) and an individual memory management (6c) is present,
- the sub-systems (7a, 7b, 7c) either in a core system (la, lb, lc), or in a subsystem (8) are contained, or between a core system (la, lb, lc) and a subsystem (8) are arranged, wherein either
- for all existing subsystems (8) at least one central subsystem (7a) is provided, or
- for a first subset of subsystems
(8) at least one common subsystem (7b) and for any other subsets of sub-systems (8) upstream of at least either each individual subsystem (7c) or at least another common subsystem (7b) hands, or
- for each subsystem (8) each have at least an individual subsystem (7c) is present,
- the sub-systems (8) selectively either can be independently started up and ready for operation or put in a standby mode from each other or together,
- the sub-systems (8) selectively either can be set in operation and operated together or independently of one another,
- the sub-systems (8) optionally, either jointly or offset from one another independently from the operating state to a standby or out of operation can be set, - the sub-systems (8) optionally, either out of operation can be set jointly or independently of each other from the standby mode .
- only a single subsystem (8) out of operation can be set connected to the existing of the required peripherals and other components of the personal computer as an overall system and put into operation, operated and, whereas all of the remaining sub-systems (8) during this phase does not match the Ge - overall system are connected, and thus can take place no data transfer from a subsystem (8) to another subsystem (8),
- being present in the case A, that in the personal computer a central core system (la), the subsystems (8) in such a manner integrated with the personal computer or directly to personal computer are connected, at the same time at most only a partial system (8) together with the central core system (la) and the necessary subsystems (7a, 7c) is operated, operated and out of operation can be set, during which the remaining sub-systems (8) are connected to this personal computer during this time period not to the central core system (la) and not to the central core system (la) can be connected and either out of service or are set to be in a standby mode,
- where in the case B, that common and individual core systems (Ib, Ic) exist at the personal computer,
are B1--, integrated subsystems (8) which are associated with a common core system (lb) in such a way in the personal computer or directly on the personal computer is connected, at the same time a maximum of only one of these sub-systems (8) (together with the common core system lb ) and the required Subsy- Stemen (7b, 7c) is operated, operated and out of operation can be set, during which the remaining subsystems (8) of this Zuordungskategorie during this time period not to the common core system (lb) are connected and also not with the common core system (lb) can be connected and either out of service or are set to be in a standby mode,
B2-- the subsystems (8), for which an individual core system (LC) is provided in such a manner integrated with the personal computer or directly to personal computer are connected, at the same time a maximum of only one of these sub-systems (8) with that of the necessary peripheral devices and other components and the necessary subsystems (7c) existing personnel computer is connected as an overall system and put into operation, operated and out of operation can be set, whereas all of the remaining sub-systems (8) are not connected during this phase, the total system and not can be connected to the overall system,
- wherein an individual core system in case C, that in the personal computer, for each subsystem (8) (lc) is present, these subsystems (8) in such a manner integrated with the personal computer or directly to personal computer are connected, at the same time a maximum of only one these subsystems (8) existing with that of the necessary peripheral devices, and other components and the necessary subsystems (7c) personnel computer is connected as an overall system and put into operation, operated and out of operation can be set, a so-called "hot-swap" Meantime all remaining sub-systems (8) are not connected during this phase with the overall system and can not be connected to the overall system,
- when changing from one sub-system (8) to an other subsystem (8) either
- the central core system (Ia) or pattern the Joint core system (lb) as well as the required peripheral devices and other components and the necessary subsystems (7a, 7b, 7c) of the personal computer must be turned off as an overall system forcibly in such a way that
on the one hand all the central core system (la) or in the common core system (lb) as well as the necessary subsystems (7a, 7b, 7c) data stored are either buffered or otherwise supported, and within the period of time for start-up of another Teilsy- stems (8) or within the time span for connecting micrograph with a stationary standby mode subsystem (8) will be completely deleted, and / or prior to the complete erasure of data for the purpose of their conservation, this data on the previously-driven subsystem (8) are stored, and
On the other hand, all of the re-start-up of the central core system (la) or the common core system (lb) and for the subsequent start-up, the boot so-called, of the newly selected subsystem (8) the necessary primary initialization, including the BIOS data and the Konfigurati- 90
© ε 1 I 1 1 1 d 1 d o Φ 1 1 Xi 1 H xt .. o Ti. JJ SH CQ Φ ι CQ φ SH, -, 0 = d CD υ Φ Φ υ X
CQ -μ Φ Φ H ~ JJ Ti d CQ TJ φ 00 φ Φ J J SH d ri 3 m - CQ DUNM rH
-μ ε X T5 R - R φ ε JJ Ti - ε JJ SH 3 φ -μ rö JJ -μ 3 fÖ
3 Φ rö Φ d J ε Φ XX!^ -. d rö Φ TJ φ d Ti 1 d CQ Φ JJ Eu;
H rö dd φ TJ R -μ d fÖ 3 ri CQ Φ PX rö CO! rö EH Φ Φ -μ X XU ε CQ xi M μ
E-> Φ Φ o H Φ Φ Φ CJ CQ fÖ α. ε d u CD Ti Ti Ti TJ rö Φ <0
Φ ε ε -μ Φ U JJ -μ Φ Φ R d X! Φ iμ -μ Φ -μ d CO d Φ d d 3 ιμ CQ ε rö JJ 3 CQ ri ri rl Φ O 0 JJ 3 ε Ti CO .. Φ Φ 3 3 rö rl Φ -μ Φ J jJ fÖ φ CQ rö ε rl ri & JJ φ CQ rö Φ d Φ DJ rH Xi ε N = 3 X! Φ Φ Φ Ti
0 CD CD R SH JJ 0 CQ Φ CQ ε rö fÖ d. CQ JJ = rö -μ CQ SH 0 CD JJ MH Φ X! 3 a -μ
-μ -μ 3 3 Φ R> TJ 0 Φ P d CQ cn CD JJ Ti Xi Φ 0 d -μ Φ co CJ CD IS
.- ^ -i tsi Φ Cn JJ SH SH CQ tsi Ti -μ rH d> 1 CQ CD ε υ> 0 Ti rö -μ μ r s X! φ ri r-λ rö
- Φ. , 0 CD d -μ 3 CD -i Cn 3 JJ d υ Cn φ φ »φ rH φ φ ni TJ rö X co UH fÖ d. -μ μ 3 - φ φ Ti Ti ri rH d rl μ 3 = rö d -μ
- Φ μ
3 d cn R Xi - - * H Ti Φ Ό JJ d H d -μ 0 3 CO Φ Di tö JJ rH 0 PJ X '<
Φ 3 O u Φ Φ SH l 3 -μ φ> JJ. - CD d co d co> .. CQ ε n ε X CQ rH ε - Φ - - Φ d Xt egg ri d ^ rh rl CD - -μ φ rH
D Φ Φ Φ Φ Φ rH d TJ TJ JJ xi SH H rö CQ CQ ri Φ φ 3 φ d Φ J fÖ ε ε Φ Ti SH CD φ JJ φ SH -μ d d υ Φ Φ φ d φ Φ 0 Xi Φ JJ -μ Φ MH X! N CJ
CD Φ X! rö 3 3 CQ TJ -μ Φ Φ • μ -μ TJ> Φ J JJ X X d> d - JJ JJ rö 0 J -μ SH 3 N TJ, 3 3
Φ φ ε φ CQ d Ti EQ CQ u -μ -μ X rö Q - Φ
CQ CQ TJ -μ Φ Φ PJ rö SH d> ι rö φ fÖ CQ JP rd 3 d μ rH T) SH - ..> -i -μ n JJ JJ JJ 3 CQ Φ 0 d CD R JJ φ Ti CD Φ ..
Φ XI O fö 03 -μ -μ 3 dd CQ Φ EM CD N i> Φ RH D 3 xt d d CQ JJ -μ Φ Φ
Φ TJ X - Φ TJ 0 d 3 ι CD JJ Φ φ SH -μ d rl rö CJ 3 3 Φ SH Ti d X
X 0 d ^ - ^ RB CQ Φ CQ Φ d = 3 JJ M Φ φ φ φ rH rö JJ rö Φ SH
Φ CQ -μ rö R d SH P CQ JJ -μ d CQ Φ Ti H JJ JJ CD Φ d Φ d Φ R CQ .- .epsilon. "JJ H Φ ε R CD JJ Φ 3 SH CQ Φ d Ti 3 D r- 3 Φ TJ rö XI CQ JJ 3 rH Φ X! ri - X! Φ Φ Φ Φ Φ Φ JJ co fÖ CQ 0 CD d PJ Cn rö dd> Φ Cn X tsi in r- RH rö ü JJ CD CD Φ cn: Cn fÖ JJ d DJ 3 \ ^ X φ ET -μ ^ H 3 Φ -μ d Φ JJ fÖ X! ε CD -μ -μ JJ M d Φ 3 CD TJ TJ ü d 0 d JJ JJ r- Φ a φ
SH. Φ -μ 1 -i ri Φ Φ PJ Φ 3 JJ JJ JJ 0 d u Φ Φ Φ -μ CD JJ JJ JJ cn Φ Φ 3
JJ JJ H ε Φ CQ PJ -μ -μ SH CD xi ε -μ H -μ 2 3 3 3 N Λ X -μ d φ SH SH fÖ d Φ CQ ri Φ Φ ε -μ fö Φ υ Φ 0 3 rö IN φ rH -μ φ d EQ CQ φ φ
'JJ JJ Φ> 1 -μ N 3 3 0 SH -μ -μ u JJ JJ N> n JJ -μ rö CD ri Φ JJ JJ JJ TJ d tsi CD SH O Φ φ Φ Φ Φ SH CJ ri CD CD X ! D xt HR CO PJ Φ d Φ SH SH d Sπ iota -μ R Φ PJ H -n r-> TJ Φ rH d MH SH Ti u Φ 0 JJ fÖ X! TJ Φ φ JJ JJ Φ o Φ ε CQ J SH rH x CO; Φ rö o 3 Φ d CQ CQ φ JJ Ti ri Φ Φ xi X! RX! co J
Φ dd Φ CQ H R ε fÖ, - Ti PJ d CD Ti xo = 0 rö P rl rl -μ CJ CD 3 φ d = d
Ti S = rö X SH Φ fö Φ υ -μ d o JJ i 1 P φ ^ * -, Xt -μ X! Φ d rö X) -μ
Φ Φ SH JJ Ti Ti 0 r 0 SH CD Xi
X Φ ε X! co φ SH JJ co Φ -i rö X! d Φ CQ
Ui R Ti SH CQ - Φ 4H SH υ 3 ri Cn SH Φ Φ - - CD JJ JJ CJ Φ d ..
3> Φ Φ 1 JJ SH H Φ 0 ti rö ε Φ Xi. d Q d ε -μ Cn tö -μ J2 rö dd rH -μ 1 -μ Φ d Φ d X! -μ Cn CQ SH CN xi φ 3 = rö Φ CD 0 P Si
Φ 3 rö X! JJ
^ D ε Φ φ H -μ Φ 0 J ε rö D ε D ^ ts ε SH rH X ε Φ d CD JJ d Φ ε TJ -μ> -μ Φ = 0 JJ φ d fÖ. -. JJ R Φ CD Φ Φ φ Cn SH dd Φ d Φ Ti JJ .-. d rl -μ Φ Φ X -
Φ CQ co R ri Φ Φ JJ -μ TJ Ti Φ fÖ dd: £ fÖ N CQ co 0 JJ
JJ ε -μ X) Λt d Φ ε Φ ε TJ CD rH 4H PJ -μ -μ JJ Cn Φ ι • dd -> CQ TJ = 3 φ SH so fÖ -μ N Φ CQ ε -μ Φ CD 4H CQ Φ CQ Φ d d Ti CQ d X) d 3 0 o Φ ε Ti JJ fÖ ε CQ Φ -μ ε 3 JJ M ri ri Φ 3 Ti
CQ ε JJ φ φ 0 φ N ε 3 ε Φ CQ Φ CQ Φ a φ PJ P 3 3 -μ φ ri JJ XX -μ Φ CQ 4H JJ -μ cn JJ JJ
R JJ X Φ Φ Φ -ue Ti • μ oa JJ JJ 3 Φ 0 0 Φ φ φ a U JJ rö f HH Φ Φ Φ
0 Cn CQ CQ i R 0 N ~ CQ o -r> CQ CQ Cn N 0 ε> CQ rö 3 CN H CQ P i JJ rö Cn 53 SO
LAN connections inside computer, bus, separated respectively performed separately, and characterized in its operation together with the respective core system (la, lb, lc) and the overall system of the computer bezüg- lent data security a completely isolated "stand alone" personal computer corresponds to ,
3. Personal computer according to one of claims 1 to 2, characterized in that the interpretation of the core systems (la, lb, lc) is tuned with respect to architecture, performance of the processors and memory elements for customization to the specific needs of the various sub-systems (8).
4. Personal computer according to any one of claims 1 to 3, characterized in that when switching from a first subsystem (8) to any other subsystem (8)
- the first subsystem previously fully seated in operation (8) is either fully switched off or continues to remain in a first subsystem (8) contained tene standby unit in a separate standby mode in a reduced mode,
- the respective operating states of the individual subsystems (8) are displayed on the personal computer or on a connected screen, and that
- either before the complete shutdown of the personal computer in addition to the regular in service subsystem (8), the individual subsystems
(8), which are still in standby mode, to be shut down regularly, or - that the personal computer is only switched off in such a part, that a previously set number of sub-systems (8) either is displaced into a standby mode or still in standby mode is left.
5. A personal computer according to one of claims 1 to 4, characterized in that all or a subset of the subsystems (8), which are not connected to the central core system (la) or a common core system (lb) are connected, via a separate Subsystem management are managed in such a way that these subsystems (8)
autonomously started up when turning on the personal computer and put in an operative or in a far as possible prepared state and raised in such a way that these subsystems (8) are in their selection quickly available, and wherein, by a preset option, default, subsequent to the - commissioning of an optionally pretreated voted user program that the user program is preferably also prepared and thus also is ready for direct use, and that
- either before the complete shutdown of the personal computer in addition to the regular operation Henden subsystem (8) STE and the individual subsystems (8) which are still in standby mode, turn finally the user programs in question, are shut down regularly,
- or that the personal computer is only switched off in such a part, that a previously set number of sub-systems (8) is combined with the associated limitations the network connections by said Subsystem Management in either a standby mode or is still left in standby mode .
wherein the time which is required by the Subsystem Management shut down to the out of service to be set subsystems (8) with their operating systems (10) and user programs regularly, is shorter than the time taken by the command input for complete or partial shut-off the personal computer passes, and that this delay effect takes place either via a corresponding control element, for example a delay relay, or via the use of the corresponding signals of the operating system (10).
6. personal computer as claimed in claim
1 to 5, characterized in that at least one core system (la, lb, lc) mentioned together with further components, for example, the sockets for I / O cards, are combined in a module, in particular on a motherboard, in English motherboard.
7. A personal computer according to one of claims 1 to 6, characterized in that the sub-systems (8) are integrated in such a way in the personal computer or directly to the personal computer are connected, at the same time set a maximum of only a sub-system (8), operated and can be set out of operation, during which the remaining sub-systems (8) are turned off and remain off.
8. A personal computer according to one of claims 1 to 7, characterized in that either - at least one of the subsystems (8) in the personal computer is to be physically installed and integrated, or
- at least one of the subsystems (8) permanently or temporarily connected to the personal computer, for example via a plug connection or via a cable.
9. A personal computer according to any one of claims 1 to 8, characterized in that at least one of the subsystems (8) is designed such that this subsystem or these subsystems (8) of a in the form of a self-contained physical exchange unit, preferably in is designed and arranged in the personal computer individualized or personalized form that a simple interchangeability of these physical exchange unit is guaranteed.
10. A personal computer according to claim 9, characterized in that it is ensured the presence of multiple physical change units permanent differentiation of all or a subset of these physical change units, preferably in the form of mutual physical incompatibility, for example by various geometrical configurations.
11. A personal computer according to any one of claims 9 to 10, characterized in that for the introduction of a physical change unit in the personal computer or for the removal of a physical change unit of the personal computer, the use of a key is required, wherein these keys pre-L to t HH
O LΠ o LΠ O LΠ
CQ he Φ Ω Φ P N 1 er er ^ Ω ti 3 D. Pi PJ CO P> Di CD 3 CO ti
Ω Φ od P- to μ- Φ 0 he he d d d φ P a T3 d P SO VD Φ Φ Ω P> Ω φ P 3 μ, a P-P! φ Φ i LQ Φ a he J CQ • - 'Pi rr he he he LQ CQ
Φ X TS he Φ CO 3 PS LQ ti Ω co Φ μ- Ω P - 1 a Φ CQ
CD he Φ d M CD μ- d J CD he φ Ω O P he μ- P- P- P- co Φ CQ Ξ
- ti P- rr a a CD P- <d α ii cn Pi he CD φ A φ a CD φ rr - Φ
P Φ Φ rr CO Q φ 0 he Φ Φ LQ φ P a u P "rr CD P- P-
PJ CQ CD ti lh SP 1 Φ A 3 φ ti a Φ J Φ co A II H CQ CQ CQ J
X Ω Φ φ Φ OJ a CD 0 X TJ Φ CD μ co φ μ P ^ P Ω Φ d it ii μ P - Q • c Ω cn Φ φ rr rr d S ti rr a P- a- φ
CD Φ Φ a Ω P> φ Φ d Φ TJ P a 1 er P- Φ Φ Φ P Ω φ 1 N rr PJ CQ CQ ti d he D. P- LQ CQ Φ Ω μ- a J 3 3 P- rn PJ 3 J t he CD 0 P 1 μ- ^ Ω a Φ PJ • co Φ φ PJ μ- N • he co 0 Ω 0 d P. • φ CQ n t he? LQ μ. φ a 3 Ω Φ Φ rr 0 & ι CD he H-3 d
Ω Φ μ- CD d rj CD CQ he rr μ- O ti. d P- Φ 3 LQ Φ Ü j be Φ J φ 3 = a he d Φ d ii Φ Φ Φ it μ- 3 Φ Ω φ P- D "φ μ Φ P- Ω φ φ Φ CD CD XX φ Ω ii d μ- s: Φ ti ti he d ti φ '; CD he μ Φ r he Ω o X PJ CD 3 a CD he i rr 0): a CD a CD he J PJ P- rr 0 CD D P he μ he rr Φ Φ 0 O Ω he μ- LQ d Φ 0 3 CQ d Ti aa PJ "<QO he <! P J
O li N CD LQ LQ he a ti Φ he rr a 0 CQ CQ CQ Φ he Φ Φ Φ a co a,
D. 0 d φ PJ Φ 3 - PJ LQ Ü Φ Φ rr X rr PJ CD Ω P-
Φ a <X Φ Φ 0 0 li d Φ Φ P- CO Φ Φ Φ P- 1 μ- P- CD he u P- O P- Φ Φ P- CD d d μ- CQ 0 rr rr 3 a a Φ 0 Φ Ω
CQ a Φ a Ω ti • d CQ Φ Ω as a CO rr a ^ Φ a Ω he p. co he
3 Ω N Φ μ- P ao CQ he rr »i D. 0 Φ J P Ü P. - N 0 P Φ - Φ J he φ d CD Ω Ω a N ^ Φ 3 LQ P> r <CQ co Φ LQ ii CO
LQ LQ φ he Φ ai he co rr φ ret Ti Φ Φ rr P 0 μ- rr * - "P äd Φ 0 - ao CD o Φ P. P d μ- μ- μ- J d ≤ μ- Φ N ti a ~ Ω d> d TJ
Φ ^ Ξ Ω Pi Φ Ω rr φ X P a CD Φ rr rr PJ = a P-N he φ rr "rr PJ Φ rr he Φ CD a he Φ D PJ co Φ P CD he Φ φ d co Pi aa Φ 0 CQ P-
P TJ μ- da ti φ rr li ti at PJ d μ LQ PJ rr Φ u 3 CQ co φ co P co d er = Φ a P • - Φ he P- 1 Ω 3 Ω rr CQ CD he rr he μ- Ω X
Ω Φ Φ Φ rr 3 CQ CQ a PJ ι-3 Φ a he φ Φ s: he CD PJ - r a P <he he N CQ oi ^ PJ ti Ω <Φ D. μ- P) P Φ a Φ PJ a φ Φ
Φ 0 Φ PJ & CD Ω he rr 0 μ- PJ 3 Ω co P- μ- Q P <rr p. Ω PJ co CD P- D φ do it μ- Φ ii d he rr 3 co Φ P φ PJ he rr - co
- CD CQ a PJ LQ li N3 Φ <Φ d O φ φ CD a CQ P PI Ω
Φ CO PJ co φ Φ Φ d ti 0 rr CD j be μ Ω CQ φ φ co OJ he
PJ X 3 a CD μ- LQ H a he ii a C 3 Φ μ- Φ a Φ P- a X Φ
X he Φ o J a a LQ LQ PJ CO he CD P- Φ above a CD ≤ a 3 d t he CD Ω rr Ω N d Φ Φ X => Φ r d J CΩ Ω D 0 O φ φ φ CD & ^
P he μ- £ CD O d 3 0 0 Φ rr rr a ti it a 0 φ CD CO • da 3 PJ rr
'Co J φ ä ti 3 3 μ- Φ d • CD a Φ μ- C Q d Φ P <; rr μ- Φ
Φ Ω aa Pi Ti Ti Φ co P Φ Ω Φ J p. a φ Φ P LQ 0 ^ CQ
CD he P- Φ φ d W rr PJ φ φ α a 1 he H J Φ a Ω P- CQ φ Ω Φ a
Φ CD μ- μ- 3 rr rr li li CQ P- CD σ J ti φ Ω he rr li he Φ X
0 CD Ω LQ Φ a μ- μ- Φ φ P H PJ Ω rr μ- to Ü 0 μ- a he Φ Φ Φ α P- he - he TJ μ. he he CQ a Pi Φ μ a μ £ PJ a CQ;
Φ Φ P- Φ Ω P- Φ ta a - X 3 Y a • d li 3 CD 0 aa ii O CD o co ti μ- CQ Φ TJ he CO er 3 Φ microns co CQ O a
TJ rr CQ a TI Φ P Φ J φ <; P. μ- μ- d co <φ Φ LQ ü t μ- rr i - o LQ φ μ rr ii φ a 0 PJ rr rr <CD P μ- P- p; Φ Φ
PJ P- afdd = PJ-- μ- Φ P- P- P- N a a Φ he D-- H
CQ PJ Ω a d rr μ- μ 1. 1 X since Φ Ω μ- 1 0 LQ he Φ CD PJ 3 CD he
1 Φ Φ
90
© φ 1 μ ε Φ 1 φ Φ 1 JJ o -μ xt - xt Φ SH -μ -μ 1 1 i ^ 1 Φ Xt 1 - ^,
JJ ü Ti 0 CQ Φ Φ Φ o CJ CJ J CD -μ rl -μ CJ -μ Φ u = 3 rö Φ -μ Eu = 3 XI ​​-μ d CD n CD = 3 Φ Φ φ φ Φ Φ φ T5 = 3 rH 3 H ud SH ε φ CQ Φ d Ti 3 3 3 SH X! d ri -μ CQ CQ dd JJ
-μ PJ μ 3 PJ R -μ X) tsi DJ ti CJ Φ rö Ti -μ φ Φ CQ Di ε '- ^
H Xt Φ CQ CQ CQ Φ φ W d, φ SH • CQ -μ ri μ Φ TJ CD = 3 = 3 CQ: fÖ d X! U ε d xt CD Ti d JJ -μ σ -μ 0 JJ d Φ CD rö Cn ^ - d 3 -μ rH HR CQ Φ rH α. 0 <o 3 <3 CQ H SH> CQ d PJ SH φ cn CQ fÖ Ti X! cn
X -μ NRCX! SH - JJ -μ Φ O CD JJ rH xt d υ d rl d -
Φ SH SH -μ -μ Ti Φ Φ Φ yy yy d φ SH Φ CQ Φ SH Φ 3 rö
PJ Φ Φ O φ Φ R d Ti EQ -μ JJ Φ CD Φ JJ -μ ε -μ 0 3 Φ TJ TJ d Cn H
Cn TJ CO t> Φ φ Ti rö ε 1 Φ φ TJ CD μ d 3 DJ> JJ <d TJ Φ d - - •
-μ CQ Φ 3 JJ Cn Xt -μ d (Ö -μ Φ -μ CQ 0 3 3 -μ
P ε CQ -μ rö JJ CO Φ ε d X JJ! R TJ ε d X) co Ti -μ CD d Φ Ti φ ε JJ X! ε
D Φ Φ CQ 3 Ti -μ μ φ Φ tid Φ Φ Φ Φ Φ d d xt μ Φ
-μ d Ti CQ 3 R -μ Φ JJ> • d 0 d 3 EQ JJ rH φ -μ ε X) Ti xt υ -μ d Φ φ JJ
-μ -μ -μ t CQ CQ rH fÖ Φ • μ 3 d TJ Φ Φ CQ Xt -μ> CQ CQ φ Φ i Φ CQ U rö XI JJ ^ CD φ co d Φ Φ ^ -r> -μ -μ M Φ CQ> <
X! CQ CQ ε Φ -μ Xt Φ o X t 3 CQ CD -μ xt Φ μ Φ CQ CQ xi rö 3 -μ X! fÖ rH -μ d NX rö
Φ ε D Φ o JJ JJ JJ μ>, R rö Φ d
CJ -μ TJ PJ ü T5 N Φ SH CD R CJ TJ 0 0 X) -μ d = Φ 3 X μ CJ J Ti μ
TJ CQ rö Ti rö JJ JJ J Φ tö, tö d - 0 Φ Φ Φ Φ HH Q tö Φ
Φ d ~ Φ -μ R '= φ rö Xi Ti Jj Oi d ~ 0 X 3 DJ ε rh ^ d Φ X
T "> JJ ε Φ JJ CQ CJ EQ co - JJ JJ υ Φ CO TJ d Φ u cn JJ
SH SH φ X! SH Φ 3 Φ μ SH Φ CQ 3 - ri d Φ Φ Φ d ε
Xi Φ Φ Φ d d d N SH Φ Φ d Φ d rö φ d φ Φ CQ Φ 3 φ d JJ Φ Φ
CJ JJ xt Xt ~ JJ xi 4H Φ 3 Φ xt JJ i Cn dd CQ CQ CQ co JJ xi d
-μ ε
3 CJ CJ CJ ε 3 Φ 3 d tö J -μ 3 u ^ -μ φ CD JJ φ -μ 3 CJ rH -μ ri PJ PJ -μ -μ 3 -μ d << Φ P TJ PJ -μ -μ μ t CQ T) d rH φ Ti J • DJ -μ -μ φ
CQ. ε Φ Φ -μ ε Φ -μ d ri Φ ε φ Φ υ d 3: d fÖ 3 JJ ε Φ φ CQ in JJ O tsi PJ TJ Φ SH 0 N d φ ti ε 0 N -μ -μ JJ rö Xt 3 CQ CQ 3 o NH d φ CQ CJ d co Φ CJ d Φ rö -μ J SH J d> CQ CQ xt Φ JJ N ri -μ CJ d 0
-μ -μ d d ε - ^ TJ xi Ti = fÖ Φ d CQ SH 3 d Φ CD Φ d φ> r ri Φ CQ SH ri Φ co SH CQ X! -i Φ SH d rö 0 φ Φ Φ -μ d ri Φ 3 CD
X JJ fÖ X Φ Φ rö X - Φ 0 SH 3 CJ fö X Φ -μ ιμ> JJ -μ DJ 3 ιμ fÖ X -μ rl
CJ Φ d Φ JJ X! R Φ xi> = 3 N -μ d Φ d Φ CO *. TJ CQ CD 3 d Φ X! φ
CQ TJ 0 CD 4H u cn Φ O CJ 4-1 φ 0 Cn Cn O SH CQ μ -μ rö o cn Φ ι d ri CQ CQ rö -μ ε r Φ DJ CQ Φ d d Φ Φ φ o CQ - μ CQ
-μ Xi X Φ SH X! φ CO Φ CQ co μ -μ d xt Φ S Φ ri cn X) CQ μ X! -id
X Φ φ O PJ Φ υ JJ 3 • - * ε Φ Φ CJ Φ -μ ε Φ d * ri --- "μ CD Φ υ Φ rö
Φ
• PJ SH Φ CO • SH CQ
Cn ε -μ SH SH PJ μ Φ ε ri .. 0 Φ d X! μ
3 3 X 3, ε Ti fÖ Φ 3 Φ d rö U ε d> 3 3 JJ
JJ CQ. Ti rö CQ CQ. d JJ CQ φ SH TJ. 3 TJ CQ Φ ε μ JJ JJ 3 cn. Ti Φ dd 3 m rö ti Φ -μ V £> rö rH CQ JJ CD -μ r- rö Φ N 3 = 3 dd -μ o r- rö co fÖ d φ
Φ rH rö Ti Ti Ti -i -μ -μ co O rH φ ε μ d N O Ti 4H -μ rH μ μ i -μ J JJ ε d rö Ti Φ Φ Φ SH Xt, -. J Φ Φ JJ JJ φ rö
Φ - -μ X! - H d CQ PJ 0 d "Ti cn Φ φ d 1 ε JJ co M ^ P ri d Φ φ φ rH SH JJ rö m 3 -μ LD d - - DJ DJ φ X SH CQ φ rH
EQ 0 0 H XH Ti -μ Φ φ rH 0 DJ DJ Φ CQ JJ JJ xt Φ rH Φ ε
> - * O d Φ Φ Ti -. CQ d 3 3 rö -μ X! JJ -μ = 3 Ti Φ
CQ CQ rö Oi xt CQ TJ rö EH d JJ Φ CQ Φ Φ μ HM CJ d • μ Ti R CQ 0 Ti Ti oo Φ -μ - Φ -μ X! R Φ CQ -μ X) -μ Cn Cn rö TS -μ d Φ -μ
> Xt RRX! ε μ ε Φ -μ 3 X! CQ TJ 3 3 DJ μ φ xi SH JJ X t φ φ
-μ d B -μ -μ Φ 0 Φ Φ d -μ d φ rö rö Φ PJ tö U = 3 rö X! X o CQ 0 H H 3 φ φ d t> CD Ti 3 -i -μ ε EQ EQ CQ X co CO t P rH CJ ü O
serve to the information contained in the personal computer subsystems (8) and to the directly connected to the personal computer subsystems (8) and the other existing in the personal computer or on these directly connected further peripharen data read and data storage devices, via a switching element are guided at least , for example via
- a contained in the personal computer switching element, or
- a core system (la, lb, lc) included
Switching element, or
- a contained in at least one physical exchange unit switching element,
- a direct connectedness with the personal computer denes switching element,
- a switching element which is contained in an integral assembly of autonomously usable storage media (9),
including any combination of DA.
19. A personal computer according to claim 18, characterized in that the switching element with the associated switch positions and the necessary connections are combined in a so-called unit, and that the selected operating mode on this unit and / or visually displayed on a connected to the personal computer screen is, this unit ripheriegeräte either in the personal computer or in one of its PE, for example, printer, keyboard, screen, is mounted, or in the form of a so-called "stand alone" device is formed and connected directly with the personal computer or is wired.
20. Personal computer according to one of claims
1 to 19, characterized in that both the change from a first subsystem (8) to any other subsystem (8) and the associated full decommissioning of that core system (la, lb, lc), and if necessary other components takes place and the necessary subsystems (7a, 7b, 7c) of the personal computer via at least one switching element.
21. A personal computer according to one of claims 18 to 20, characterized in that the switching element has unique physical shift positions, preferably self-holding switching positions 1er example in locking form or in the form of an electrical or optical switch, for example an optocoupler, in particular per existing subsystem (8) at least one shift position is present.
22. A personal computer according to any one of claims 18 to 21, characterized in that the switching element is at least one directly-operable mechanical switching element, for example a rotary switch, a slide switch, a toggle switch, a rocker switch, a pedal, a pushbutton, including any combination from that.
23. A personal computer according to any one of claims 18 to 22, characterized in that the switching element as a directly actuable combination switch is trained det, in particular, such a combination switch, which is rotatable around a center or an axis or about several axes, tiltable or pivotable is, or is displaceable in a straight plane, or in an arbitrarily curved surface or multiple straight planes or arbitrarily curved surfaces, including any combination thereof.
24. A personal computer according to claim 23, characterized in that the combination switch has a integrated protection against unintended actuations, in particular for certain switch positions.
25. A personal computer according to any one of claims 23 to 24, characterized in that the combination switch on the one hand
- allows the direct selection of any sub-system (8), for example by turning a switch button, and on the other hand
- simultaneously also the forced out of operation of each core system (la, lb, lc) and causes, if necessary other components of the personal computer via at least one switching element, for example, by axial displacement of the switch knob along its axis of rotation.
26. A personal computer according to any one of claims 18 to 25, characterized in that the switch element comprises either a mechanical, an electrical, electronic, piezoelectric, optical, acoustic or magnetic element, including any combination thereof, examples play as a relay.
27. A personal computer according to any one of claims 18 to 26, characterized in that the switching element depending on its arrangement in the personal computer or in the physical exchange unit or in the integral assembly of autonomously usable storage media (9) is either directly manually operable or indirectly can be driven via a separately arranged from the switching device actuator, wherein the drive preferably to a non-visible by third parties or modifiable type, for example, via a specially designed, and optionally shielded autonomous cable connection takes place.
28. A personal computer according to any one of claims 18 to 27, characterized in that the drive of the switching element takes place via a remote control, preferably via an individualized or personalized remote control, which can be manipulated not influenced even by a third party, for example via a separate remote control or via a with the personnel nal computer directly connected computer mouse, preferably over such a computer mouse, which is a separate actuating element, for example in the form of a toggle switch, by means of which the change from one subsystem (8) to an other subsystem (8 ) can be performed.
29. A personal computer according to one of claims 18 to 28, characterized in that the total or partial, direct or indirect actuation of the switching element, the use of a key is neces- dig, this key preferably optical as a mechanical, electrical, electronic, piezoelectric, , acoustic or magnetic, active or passive element, including any combination thereof is formed.
30. A personal computer according to any one of claims 18 to 29, characterized in that the Schaltele- element directly or indirectly, entirely or partially, either
- by introducing or removing at least one physical exchange unit closed in itself, preferably in an individualized or personalized form, or
- by introducing or removing at least one storage medium (9) in the form of a self-contained physical memory unit, preferably in an individualized or sonicated per- form, for example in the form of a Speichersubmodules,
in the personal computer or the personal computer is operated.
31. A personal computer according to one of claims 18 to 30, characterized in that the switching element directly or indirectly, entirely or partly by moving or rotating the respective core system (la, lb, lc) relative to the personal computer, especially by the move, or by rotating the respective core system (la, lb, lc) over the existing subsystems in the personal computer (8) is actuated.
32. A personal computer according to any one of claims 18 to 31 characterized in that the switching element directly or indirectly, entirely or partially, either
- by shifting or rotating of at least one subsystem (8) relative to the personnel nal computer, or
- by shifting or rotating of at least one physical exchange unit relative to the personal computer, or
- closed by sliding or by turning of at least one in itself integral
Assembly of autonomously usable storage media (9) relative to the personal computer, or
- by moving or rotating the respective core system (la, lb, lc) from the personal computer
is operable, including any combination thereof.
33. A personal computer according to one of claims 18 to 32, characterized in that
- either the switching element and at least one subsystem (8) or the switching element and the respective core system (la, lb, lc) to-such in a module are summarized that this module relative to the housing of the personal computer in at least one straight plane, or arbitrarily curved surface slidably or at least a center or being rotatable about an axis tilted or pivoted, - that both the selection of the switch position and the start of the currently selected subsystem (8) and the physical access to a particular subsystem (8 ) associated weite- ren peripharen data read and data storage devices either directly or indirectly
through moving, turning, tilting or swiveling of the module relative to the housing of the personal computer or
by moving, rotating, tilting or
Pivoting the housing of the personal computer relative to its environment or a related interaction of the module or of the housing with its surroundings, king station for example in the form of a table or doctoral,
done, and
- that the chosen position of the module and its selected mode of the personal computer either
- on the position of the module relative to its surrounding casing or
- the situation of the surrounding housing with respect to its surroundings or
- is produced by an interaction of the module or of the housing with its surroundings can be seen and / or is visually displayed, for example on a connected to the personal computer screen.
34. A personal computer according to one of claims 1 to 33, characterized in that in addition to the partial systems (8) also
- all or a subset of the existing at the personal computer serial and / or parallel, analog and / or digital interfaces, respectively, the incoming and / or outgoing connections, and / or existing in the personal computer internal connections bus,
- and / or the feeding of this installed in the personal computer components, such as in- ternal modems Uebertragungskarten, I / O cards such as network interface cards, preferably in the form of a separate network card of different type per subsystem (8),
via a switching element are guided at least, in particular that the switching element with which the change from one subsystem (8) to an other subsystem (8), and in that the above-mentioned interfaces compounds Uebertragungskarten and I / O cards simultaneously with the respective selected subsystem (8) can be switched on or switched off mutatis AESS,
wherein all NICs are preferably combined centrally on a separate "Rearboard".
35. A personal computer according to any one of claims 1 to 34, characterized in that all or a subset of the existing at the personal computer and a particular sub-system (8) allocated to serial and / or parallel, analog and / or digital
Interfaces, respectively, the incoming and / or outgoing connections, are not mutually compatible formed, either
- by using different categorization s of data transfer media, such as Unshiel- ded twisted pair cable, the UTP cable, coaxial cable, fiber optic cable, or
- by several not mutually compatible embodiments of the overall belonging to the same category data transmission media, for example through its various geometrical configurations of the transmission and connection members, such as the plug connections.
36. A personal computer according to one of claims 1 to 35, characterized in that together with the existing in the subsystems (8) storage media (9) also
- at least one of the other present in the personal computer or connected to it further peripharen data read and data storage devices such as floppy disk drives, CD-R drives, CD-RW drives, memory card reader, streamers, which separate the additional storage of data on individual storage media (9) of different categories, such as floppy diskettes, CD-R, CD-RW, memory sticks, memory cards, magnetic tapes, in particular in the form of Streamerkassetten, the temporarily for this purpose
periph ren data read and data storage devices is configured such that, to avoid unintended data exchange of a first subsystem (8) on any further subsystem (8) there are formed at least two of said further peripharen data read and data storage devices together partially compatible only a selective allow data transfer by either
- works the drives in question only as Leselauf- or are formed only as storage drives, or
- only the reading functions or just the memory functions of the respective devices using the respective software can be controlled, or
- either that the reading function or the memory function of the respective drive, preferably the memory function, currency only by permanent actuation of an additional element is rend of the desired process allows the presence of a combined read and memory drive selectively, for example by pressing a separate key, which is mounted next to the appropriate data storage device,
including any combination of DA.
39. A personal computer according to one of claims 36 to 38 is possible, characterized in that the physical access to a particular subsystem (8) associated further data reading and peripharen Datenspei- only Storage Device in accordance with the respectively selected subsystem (8), whereas the other existing peripharen data read and data storage devices are completely inaccessible and remain inaccessible, particularly in the form of at least one to at least a center or an axis or about several axes rotatable, tiltable or pivotable, or in a straight plane, or in an arbitrarily curved surface or in more straight planes or arbitrarily curved surfaces slidable mechanical cover, including any combination thereof.
40. A personal computer according to claim 39, characterized in that the change in position of the mechanical cover to the direct or indirect actuation of a switching element is coupled such that either
- causes the rotating, tilting, pivoting and moving of the mechanical cover simultaneously the actuation of the switching element, or
- causes the actuation of the switching element, the corresponding end of rotating, tilting, pivoting and moving of the mechanical cover.
41. A personal computer according to any one of claims 1 to 40, characterized in that it comprises two independent sub-systems (8), in particular
- a first self-contained, autonomous subsystem
(8) which is completely and permanently disconnected from all external and the internal network data streams and is exclusively for the operation are provided with safety-relevant data, ie the so-called loading triebsart "safe", which in effect a completely isolated "stand alone" Personal Computer corresponds, and
- a second autonomous subsystem (8) which, either wired communication means such as Internet, fax, telephone, Intranet
Ethernet, Universal Standard Bus, USB, or wireless communication means, such as infrared, radio, including any combination thereof, respectively connected networks, ie the so-called operation "open", and
- that a switching element is present which switch positions "open" has in the order of "safe", "off", and the selected switch position, either can be seen on the switching element or the actuating element and / or is visually displayed, for example on a with screen the personal computer connected.
42. A personal computer according to any one of claims 1 to 40, characterized in that it comprises two independent sub-systems (8), in particular
- a first autonomous subsystem (8), which "stand alone" with a self-contained, autonomous internal network, such as an internal company network or a subset of such a network, of either analog equipped personal computers or suitably configured personal computers connected, respectively, cross-linked is so called mode "internal", the connections between the individual personal computers are designed so that in this mode only personnel
Computers can be selected internally, which are "internal" selected in the mode of operation, or accordingly, and
- a second autonomous subsystem (8) which, either wired communication means such as Internet, fax, telephone, Intranet
Ethernet, Universal Standard Bus, USB, or wireless communication means, such as infrared, radio, including any combination thereof, respectively connected networks, ie the so-called operation "open", and
- that a switching element is present which switch positions "internal", "off", "open" comprising in order, and the selected switch position is either on the switching element or its actuation element visible and / or is visually displayed, for example on a with screen the personal computer connected.
43. A personal computer according to any one of claims 1 to 40, characterized in that it comprises three of each other independent subsystems (8), in particular
- a first self-contained, autonomous subsystem (8), which is completely and permanently separated from all external and the internal network data streams and is exclusively for the operation are provided with safety-relevant data, ie the so-called mode "safe", which in fact a fully isolated "stand alone" staff meet computer
- a second autonomous subsystem (8) provided with a self-contained, autonomous internal network, such as an internal company network 90
© JJ Xt ~ ~ Φ o Φ -μ μ 0 υ -μ JJ = φ xt d
3 Φ 3 X 3 CQ Φ -μ .. φ Φ - CQ. d 3 dou rö
JJ CD 3 N = 3 μ fÖ SH ri JJ d X) -μ ^ -ir -μ μ JJ Φ φ 3 = d 3 and JJ PJ PJ Φ O ι Φ rH rö 0 JJ = Φ Φ Φ R RX) μ - μ μ
Φ d d ε CQ Φ φ CQ PJ Φ ^ SX 4H rö d 3 μ 3 JJ JJ Φ Φ Φ μ D.
H Φ o φ Cn xt JJ -μ φ d X! μ Φ Φ UH dd -μ Φ CQ d TJ U d CJ Φ cn CQ X! R u ^ -i d rH rö PJ ^ JJ 3 -μ cn Φ Φ> d OR α. o μ -μ d 3 J rH Φ "k 3 Φ Φ Φ PJ 0 JJ rö R = R ε X! <> 0
> Φ RH Ti 3 rö -μ Φ ε co ε E <JJ J Φ = -μ CSS 3 Φ μ CQ
TJ Ti 3 -i φ ε yy Q Φ = -μ - ^ -i ^ rH Φ μ μ φ
". 0 d 0 d 4J CQ TJ 0 ^ ri JJ ιμ = rH Φ TJ JJ φ Φ P
CQ o CQ CQ -μ μ *. XX ε ε Φ μ d ^ m ιμ Φ CQ CQ -μ μ 3 Ti
Φ d CQ! -HX) rö φ d μ Φ rö CD X! > Rö Φ = 0 ι JJ Cn. -μ £ <> d
X μ μ fÖ μ μ -μ Φ Φ J d d u -μ 4H Ti CQ Φ CQ 0 = d 3 ε ε -μ μ Φ Φ Φ φ ri d Ti CQ Φ Φ 0 -μ JJ P d HH μ 3 0 φ μ
Φ JJ PJ ..> TJ X d 0> κ d ri ri • μ X Φ rö fÖ CD Φ CD JJ ud φ -
3 3 JJ υ = 0 CQ Φ Φ JJ CQ Φ μ Xi CQ d ^ JJ -μ -μ Cn JJ
NP = CQ Φ CQ d XX) ri J EH fö CQ PJ μ μ = 3 = ri JJ -μ - Φ CQ CD
JJ ε Φ -μ -μ μ co Φ -μ d X Φ CQ JJ 0 - Φ rö: fÖ Φ rö co CQ
Φ od TJ Φ 3 d -μ Φ 3 ^ -μ -μ Φ Φ> R ri ιμ X! JJ N d xi fÖ tö s CJ o JJ JJ rö Φ μ EH X d rl μ EQ Φ Φ Φ Φ 0 rö CJ υ TS 4H r- N -μ 3 Ti JJ Φ Φ 3 X JJ JJ CD CQ CQ CO EQ Cn rö ε d r- rö JJ JJ Φ PJ Φ CQ μ cn ε d u d d Φ CQ R = d μ d - φ 3 φ Xi rö ε Φ φ Q JJ μ ε CQ Φ Φ yy 3 μ Φ d Φ rö JJ xi Ti d d 3 0 0 rö ε xt Φ 0 d Ti d ε r φ Φ Φ JJ FJJ μ φ - -
CJ 0 d 3 μ CJ CQ R 0 fÖ JJ t * t -μ dd Φ ri JJ Cn ri CQ ri Φ d -i co CQ Φ X rö) JJ -μ μ d d Φ 3 Φ ri ri ri rö X CD ri ε JJ xt "* - ^
0 μ JJ> ^ ri φ -i 0 Ti PI d d xt Φ JJ rö 0 = fÖ Φ Φ Φ 3 υ
CQ CQ Φ - rö -μ X t = Φ ^ JJ JJ μ φ CQ Xi iμ 3 Ti 3 Ti DJ -μ φ
CN Φ = μ dd rö R Ti 3 d φ CQ Φ X cn Φ CQ ud μ r ε Φ ε t "CQ> μ o JJ 3 μ R rö Φ CQ od> 0 CÖ Φ co Φ cn μ -μ o JJ N φ
Φ dd -μ Φ CQ Φ Φ Φ 3 d -μ rH 3 CQ Xi JJ xt Φ> -μ CJ d JJ d φ φ JJ JJ μ Q CD JJ CQ μ φ JJ Eu • * u rH φ -μ Φ Ti ε d CQ
-μ Jj JJ X d Φ d R - Φ Φ 3 X! d Φ co rö d Φ -μ 0 μ ri φ
Φ φ φ -μ rl PJ SH rö -μ TJ JJ JJ CQ rö. 0 -μ X! -μ t: Ti φ ε fÖ X CQ
'JJ φ PJ - Φ d JJ X ri μ JJ> Ti R υ φ JJ TJ Φ d Φ ri φ CQ CQ -μ d CQ Φ Φ TJ -μ d -μ 0 rö co -μ μ dd 0 d 0 Cn - μ
CD = 3 μ φ φ Φ μ JJ JJ CD μ -μ μ TJ φ 0 CQ Φ d Φ ^ \ -μ CQ φ d μ 3 SH μ d -μ Φ μ Ti JJ PJ d fÖ CQ ri d R 3 ε Ti Φ • μ xi H
Φ Φ TJ ri Cn fÖ JJ JJ rö -μ CQ φ μ d ri CQ φ μ Φ d ε Φ υ ε CD -μ ^ CQ Φ d d Q μ ε -μ dmo rö Ti CQ φ d ^ r- MH 3 μ φ ri CQ ι d X! N -μ -μ X! Φ -μ φ μ d -μ fÖ 3 -μ Φ 3 CD 3 -μ
-μ 3 d d Φ Φ Φ Φ -μ φ μ P Φ H JJ "Ti d φ - JJ J rö t • TJ -μ φ rö o J -μ -μ X! μ -μ JJ Φ JJ JJ tö Φ φ d - ca υ • fÖ CD
EH ^ d μ Φ Φ μ X Ti ". X Φ d CQ CQ Φ xi rö -μ φ CQ <* d Ti
CD3 JJ JJ JJ CQ Φ Φ Φ d CQ -μ • μ υ = -μ PJ X! CQ = rö
Φ O Ti X! Φ d CQ 3 φ ri 3 r -μ Xt CD d Φ 0 CJ xt -μ rH ^ Xi d rh d μ Φ PQ fö PJ CQ Φ JJ φ φ ε JJ JJ -μ Φ 3 = co u Φ -μ o Λ
-μ rö Φ Φ Ti Ti CD ε d JJ -μ 3 0 N 3 DJ CQ -μ ^ 3 EQ fö
Φ d xt> Φ 0 Φ CQ ε JJ JJ ^ N 0 Cn ^ ε CQ ri df CJ JJ d "CJ Φ i -μ ri Φ = 3 = fÖ JJ ri d oo CD 3 μ Φ Φ dd Ti Ti d CQ ε μ Φ Φ d CQ N tμ X! Φ φ μ φ μ μ μ d x t d r φ Φ CQ Φ -μ μ cn TJ Φ T) μ MH μ Ό -μ d X) μ S φ Φ PJ fÖ υ μ rö R tid Ti PJ -μ Φ R Xt d 0 0 PJ Φ φ o Φ -μ O TJ CQ CQ CQ JJ d d CJ CJ -μ 0 o X! > 3 3> Ti CD CQ JH Ti O
95 n
© Φ © φ 0 Φ ^ d Φ RH d X! X! JJ
JJ JJ
© EQ CQ d φ ri cn Ti X ^ rö Φ Φ Φ ü ü dw ε dd -μ μ i Φ d> - rö dd ri> ι μ CQ d -μ -μ CD cn ri Φ
U d Φ Φ φ Φ Φ d • μ d -μ d φ fÖ -μ Φ CQ Φ CQ fÖ d 0 d Q Ti ri Φ ε
JJ X! Φ xt JJ Cn ^ 3 μ d Φ d X 0 JJ JJ PQ CD 3 i- 1 X JJ Φ CQ μ 3 3 3 CQ Φ
CQ u μ μ -μ d JJ JJ Φ φ Φ X μ μ -μ CQ d 3 d μ Φ μ o J rö CQ TJ U> -μ JJ Φ d Ti X!^ JJ JJ ε Φ φ 0 μ μ μ fÖ JJ .. Φ rö μ Φ Φ JJ CQ d φ -.
CQ ri Φ xt rö d u ^ _ ^ d μ μ JJ DJ 3 Φ Φ Φ CQ ^ _ ^ bi Φ 3 3 PJ ri -μ -μ d JJ μ ri JJ CJ cn d: fÖ -μ -μ -μ oo CQ CQ Φ r CQ JJ X! Φ ti PJ oo d JJ fÖ Xt μ ri Φ Φ
-μ ε P JJ -μ φ ι - 3 -μ Φ φ d φ -μ d Φ d JJ ε = U rö X d Ti
Φ = rö rö CQ CQ cn DJ d μ μ μ JJ d -μ -μ -μ JJ Φ d -μ Φ 0 φ φ μ υ ^ d 0 H 0 -i CD CQ ε φ Φ 3 Φ CΩ Ti HX ε ε Φ d f u RJ> φ cn = 0 d JJ JJ CQ ri Φ Φ X cn cn ^ d fÖ JJ φ Φ 0 Φ 0 CQ CQ CQ Ti X X t
CQ Φ -μ d 0 d JJ μ d CQ CQ -μ d -i -μ Φ φ rH JJ d CQ ε d ri ri -μ Φ 3 Φ
Φ o ε ε φ> φ CQ fÖ -μ 3 4H Φ X! Φ φ Φ JJ EQ co 0 o μ Φ rö rö -μ R rö d -μ ε> = -μ o JJ rö φ Φ d Ti NX) 3 CQ, JJ -i xi -μ d JJ TJ μ Φ μ
OHX! Ti ε μ CQ 3 0 d D d -μ, μ CQ 3 X ιμ CJ 0 TJ Φ N TJ JJ JJ JJ JJ d φ Φ Φ φ ri fÖ Cn X 3 μ -μ CQ ε Φ ti ri ri CQ rö ü d JJ JJ -μ μ μ Φ
O i CQ -μ 0 d JJ -μ Cn OX! JJ Φ CQ 0 Ti d -μ d CQ 0 μ fÖ Φ φ Φ PQ a rö
JJ fÖ d μ -μ 3 CQ Φ dd i Ti μ Φ rö J φ Φ Φ d -μ CQ Φ JJ d X! PJ CQ 3
3 X! φ JJ ri Φ DJ irt Φ φ fÖ d Φ EQ d TJ d X! EH Φ Φ CD CQ μ 0 ε X! d rö μ JJ Φ fÖ ε d ε d Φ> Φ i -μ ü JJ CQ = Φ 3 0 Φ φ -μ JJ rö EQ t 0 CQ Φ RH rö xt Φ TJ ^ rö φ co -μ X! Φ Φ d> J -μ ri
". 3 P ^ Φ CQ U CJ -μ od JJ Ti d X! μ φ Φ CJ CQ φ d d ~ μ X =
CQ fö d JJ CQ CQ ε φ μ Φ μ ddd υ 0 PJ ε 3 -μ -μ -μ JJ Φ Φ ri = JJ = rö d
Φ Ti X Φ CQ ri o -μ 0 H φ μ Φ d Φ CQ -μ 3 0 N co CQ φ φ φ JJ> d rö φ 3 Ti
X μ TJ -μ JJ rö d -i DJ TJ JJ rö xi CD μ rö JJ JJ d 3 μ -μ μ R EQ Φ Φ d Φ μ J X X do μ φ CQ Φ 3 do dodd CQ Φ CQ Φ Φ yy o JJ CD 3 rö d 3 d M fÖ 0 JJ JJ υ φ 3 φ CQ DJ JJ JJ φ Φ Φ • μ CD ri = 3 -μ X JJ CQ μ ddn JJ 3 N = 3 t Φ CQ CQ 3 d Jj d ε CD -μ μ xt ε 3 JJ Φ d μ μ Φ R μ φ rö -μ r- 3 JJ MH Xt μ tö φ -μ d Φ 0 O X 3! X! CJ Φ TJ rö d -μ φ Φ PJ 3 Φ CQ = TJ rö -μ CD Φ φ Φ Φ cn Φ φ CQ u N = 3 CJ Ti ri dd PJ ε Cn cn = CQ PJ Φ dd
-μ s Xt Xt CD PJ CQ μ MH -μ φ CD rö 3 CD ri CQ -μ Φ -μ μ -μ JJ
TJ CQ Φ CJ CJ xi φ Φ d Φ ri Φ φ d φ d ri 3 μ t -μ -μ 3 μ JJ d TJ CQ Φ μ
Φ dd -μ CD -i = JJ u o CQ TJ rö -μ Φ Cn CD Φ JJ Φ d φ φ rö d μ Φ JJ rö
JJ = Φ rö -i μ Φ φ -μ -μ -μ od Ti CD CD CQ. TJ JJ cn Φ X! > 0 ^ fÖ d -μ d CQ JJ
CQ CQ JJ d 0 3 d φ CQ Φ 0 as φ d 0 -μ CD CD X d CQ ri φ -μ i μ μ μ CQ CQ> 0 3 3 d CQ 0 3 rö -μ φ μ ε μ ". φ 0 Φ X! Φ X! Φ Φ
Φ Φ φ rH ri N d CQ CQ μ μ to Ti ι- 1 d X! TJ 0 Cn X d ri TJ Ti φ N μ -μ -μ -μ ri JJ dr fÖ -μ CD Φ Φ Φ ri d JJ X! d Φ> d μ -μ rö dd -μ d CQ Φ μ JJ dod ri Φ Φ 3 d X JJ rö -μ μ u = 0 -μ d = rö Φ Φ d Φ 3 μ -μ CQ JJ JJ X
-μ> -μ X JJ MH TS -μ ε N μ 3 X! rö CQ X μ -μ ε X! 3 rö xt xt JJ φ rö 3 Φ Φ
Φ u rö fÖ d φ φ μ Φ PJ = μ μ ^ JJ CQ Φ Φ Xt N μ υ μ Φ TJ ri EQ
CQ TJ CQ P CD 3 fÖ do ε φ J φ Φ 3 Φ d d fö JJ φ μ Φ Φ CQ d
| ε φ
Φ d = CQ JJ -μ> N od CQ> TJ Φ fÖ Q • μ d Φ TJ Φ μ> μ φ • ^ o CO
Xt 3 3 d CQ Φ JJ CJ 0 -μ Ti Φ 3 £ 0 Ti DJ φ TJ J u Φ u fÖ Φ = JJ. Ri Φ φ d φ CQ JJ μ d d d JJ TJ ri d d JJ JJ X μ £ ri fÖ JJ -μ μ μ Φ -μ JJ ^ - ^ d X 3 JJ μ R d -μ rH d
Φ Φ Ti d fÖ d -μ μ rö N d Φ fÖ 3 -μ co Φ μ JJ d Φ R Φ CQ Φ d fÖ
3 dd rö CD Φ ε Φ dd TJ JJ JJ CQ = ε - d Φ d Φ JJ rö XI d -μ xt o μ 3> X) JJ 3 φ 0 d φ -μ 3 X! JJ X μ 3 Φ 3 R υ JJ 0 u .. © Φ φ Φ μ CQ CQ tsi d fÖ φ
, , D Di φ ri CQ μ ε Φ PJ Φ CQ tsi μ μ t CQ Φ
JJ JJ ri -μ Φ Φ yy μ μ μ JJ J ε -μ X o Φ Φ JJ JJ d Φ ε Cn -μ X! μ υ μ X co CQ φ -μ t Φ Φ Φ Φ CQ 0 0: 3 t JJ d Φ TJ 0 0 0 3 3 Φ 3 = PJ
© φ -μ rl JJ r υ JJ PJ> 3 CJ JJ 3 υ CQ • μ 53> 0 J CQ CQ N PJ rö o
90
© -. Φ φ CQ Φ © -μ = = i ri Xt JJ -μ d CQ JJ Xi
-μ - Φ φ MH WH t CQ ri 0 Φ
© ud μ Φ rö Φ d CJ -μ r JJ R Xt -μ .. -i 4H MH: fÖ Φ Φ CQ = 3 Φ R fÖ ts] - TJ Ti CQ Φ 0 = φ 3 un Φ rö 0 ri JJ : = Φ ~ 0 0 3 Ti 3 μ φ cn Φ X JJ JJ d ε rl μ 3
3 X m <*. φ d rö 3 - = = φ CQ Φ PJ -μ ε X CD φ Φ CQ CQ Ti t N
H -μ φ d X! μ Φ X CD μ -μ CQ do μ -μ ts? -μ d xt μ rH ri CQ U ^ d ri rH rö PJ ^ μ * CD Φ> d Φ d Φ Φ φ υ 3 -μ Φ φ CQ R α.^ _ ^ 3 φ Φ φ PJ 0 0 JJ d = Φ ε Ti -r- i 0 3 3 d 3 Φ φ JJ JJ R co ε EH JJ TJ φ = 3 3 CQ Φ -μ 0 Φ Φ Φ CD JJ N i <*. 3 ri R φ ε JJ Φ CQ = -μ -i 4H J Φ Ti -μ 3 JJ Cn xt a Ti PJ φ tö 3 μ Jj
0 - -μ n JJ ri fÖ JJ TJ TJ φ rö Φ 3 U rö CQ d n X! φ CQ ε XX ε φ μ * d. Φ CQ TJ d 0 JJ Ti £ TSI • μ JJ -μ υ φ Ti CD
Φ rö CQ Xt> rö Φ = Φ = d ^^ -μ μ μ ri dd CQ μ CO> -μ
JJ d 4H -μ R CJ CQ TJ CQ Φ ε 3 ε Ti
CQ φ Φ 0 -μ JJ X! ε = 3 d Φ 0 TJ Φ φ Φ -μ ε dd ι μ Φ Φ d φ ι Φ JJ> Φ JJ JJ JJ Ti CQ Φ Φ, d ri ri -μ X Φ ö rö Φ CD ". ri co 3 Φ -μ ε d X rö -μ rö ε μ rö XR 3
CO φ Φ JJ JJ xt CQ ri Φ CQ Φ -μ μ μ Φ t Ti Φ Φ TJ Φ -μ d ri TJ H rö CQ PJ μ μ = r o = J JJ d Φ CD rö fö JJ O μ Ti - μ o PJ Φ CQ
-μ d X φ CQ JJ 0 rö id r- CQ -μ rö JJ PJ μ CD φ i> μ CD CQ
Φ 3 ^ -rl -μ Φ φ> d d xt Φ fÖ -μ φ. xi Ti 3 Φ fÖ μ X ni ri φ Φ Xt rö ϊr <P JJ d ri μ EQ Φ u Φ DJ xt ε CJ fÖ CD Φ -μ X 3 rö JJ P μ JT) φ Φ 3 X JJ CD CO Xt 0 CJ X! 4H μ rö - X JJ φ rö JJ -μ = 3 rö
CQ CD R ε above sea Φ dd -μ - CO u 3 -μ d JJ ε φ μ μ d CQ Φ ^ R *.
Φ yy μ ε CD Φ Φ 3 Φ Φ -μ JJ rö xt Φ Φ d Φ a H d X μ CD JJ JJ ε xt Φ 0 d J d ε r d ε • X ~ ri o μ dd -μ 3 3 μ CD -i φ μ φ o rö JJ ^ -μ dd φ ri = -μ tö JJ φ CQ φ φ xt -μ N JJ Ti -μ d ri φ yy dd φ R 3 rö ri φ φ t X! CD TJ Jj J Φ JJ -μ d -> CD rö r JJ xt
0 Ti HR XI Φ d Φ MH JJ o rH -μ 3 -μ Φ Φ ε 3 d co MH rö d 3 o
JJ Φ ^ μ φ JJ CQ Q TJ 0 φ -μ Φ -μ PJ Φ JJ 3 Φ - = rö d Xt -μ PJ
3 d φ CD; Φ cn -i μ ri = Ti CQ 3 EQ ε NX! J JJ Xi φ J ET Φ t ^ xo φ CQ O> 0 fÖ φ -μ d φ μ CD O d ^ CJ φ μ d rö ε d H rH 3 Q
CQ μ Φ JJ Eu *. ä P CQ 0 N
Xt JJ φ -μ - "3 Φ ri dud -μ d TJ rö μ T) Φ Φ Φ ud
CJ 3 ri r JJ Φ Φ Φ d Φ φ Φ μ a JJ cn d φ Φ 3 Xi d Φ Φ Φ co tö dd JJ -μ d ri -ri rö X X Φ CD Φ ri d JJ 3
JJ JJ CQ rö 0 -μ t -n co μ Φ d φ PJ Φ φ ■■ rö 0 PQ XI u -μ μ N fÖ. μ X μ ri JJ> TJ d CJ -μ Φ φ CQ Ti d cn X! X -μ Φ -μ CQ rö R Φ φ Φ Φ T) 0 rö -μ co φ r JJ CD ε -μ dou Φ Φ φ Φ rH d JJ CD> O CD
-μ -μ μ Ti 0 Φ d 3 dd Φ Φ 3 CQ xt rH CD X! Xi co μ -μ Φ XI -μ CQ
> JJ DJ d rö CQ CQ Φ d -μ 3 t ri X μ υ Φ υ do b7 φ φ μ JJ Xi
-μ CQ Φ μ d ri co Φ Cn = r Φ μ φ μ 3 rö 3 -μ -. H μ -μ X Φ υ d ε -μ do rö CQ CQ ^ Ti ri o 3 Φ 3 Φ ri d rö μ Φ μ
-μ Φ μ d -μ rö - N ^ φ CD Ti> Ti -, - S ^ ~ Φ CD r JJ d X 3 φ P φ μ H JJ ^ Ti d μ = μ d JJ. rö d JJ co Φ CQ φ φ Φ Φ X. Ti
Φ Φ JJ JJ rö Ti o UH CQ 3 μ μ in d Φ CD -μ CQ TJ -μ μ Q CQ. O rö
TJ ^ X Φ d CQ xt d> m μ Cn 3 Φ ^ JJ -μ X t = 3 Ti d Φ R - d φ d Φ CD -μ -μ u 3 0 Φ -μ JJ μ ε u -i φ 3 d CQ Φ
3 ri -μ X! CQ .. JJ JJ J 3 <# fÖ Φ d CQ X -μ N φ CQ TJ <#
JJ JJ Φ Φ ε = -μ JJ JJ RH = <ö CD PJ CD JJ Φ μ υ φ = 0 = JJ JJ rö μ • d ^ JJ -μ 3 0 3 N d CQ - rö JJ -μ
Φ yy ε X) CQ CQ Φ Ti X) X! Φ μ ε Φ
£ CD X JJ ti μ -μ = Xt φ Φ 0 CD Φ d d JJ 0 Φ φ φ £ 3 CQ -H Φ Φ rH o X υ .phi EQ NJ -μ -μ CQ rö d fÖ 3 CD CD -μ - μ © CQ ε μ φ φ d CQ JJ 3 μ o Φ X) μ ri X! a X 3 Φ JJ RR t
Φ CQ Φ CD -μ μ T) Φ d d 0 4H Cn r- JJ -μ rl 5 NHXR td Φ TJ PJ Φ -μ d Xt -μ 3 3 Φ φ d fÖ CN Φ φ 0 Φ φ d rö - Φ • μ Xt CN
© CJ 0 0 CQ t> d υ = rö - JJ CQ fÖ d • * EQ H> d 3 3 Ti xo rH CQ u ^
O
90
© ©
© un
HU α.
mr ~
*
o © JJ 0
© 3
O
f ^ φ
X! > 0 μ d u μ
X JJ CQ Φ '= 3 Φ
Ti JJ μ μ d PJ
R CD φ Φ μ Φ φ PJ PJ fd t fÖ X! d CQ ε
JJ 3 Φ X = 3 dd -μ co JJ d e> X = 0 -i Φ μ TS X dd rö Ti d Φ d μ -μ
Xt Φ d Φ 3 3 Φ Φ d
JJ υ φ TJ Φ N J t d CQ xt JJ JJ TS μ μ -μ CJ Φ Φ Φ μ φ φ xi iz; JJ Φ ε φ rö Φ X!
PJ μ μ CJ rH 3 d = 3
Φ Eij PJ Φ Φ fÖ -μ
CQ CQ μ CD xt JJ JJ Φ CD μ PJ Φ CQ ε Φ υ -μ d CD Φ CQ JJ Xt rö CD φ φ φ ι 3 JJ ü TJ d -μ d CQ cn rö rö
-μ cn CQ Φ ri 3 td ~ φ d Φ Φ tsi ü JJ
= FÖ dd -μ μ Φ CQ Φ d cn φ PJ Φ d JJ
-μ μ μ Ti CQ N μ JJ xt
0 Φ -μ JJ -μ aod> N JJ Φ φ 3 -μ φ JJ -μ X) s Φ ε Φ
X Xi JJ 3 ε 0 ti
-μ υ d - • 4H ri ud
Φ Φ CQ rö d 3 d xt d EQ ri Φ Φ H rö ri ri d JJ φ rö t
-μ d rö μ ε 3 d Φ
EQ Ti Φ TJ o UH fÖ 0 CD CD ld d X d -μ CQ
-μ -μ φ 0> μ xt
X3 CQ ri X) O -μ Φ ud -μ φ ^ 3 Ti μ dd φ H rö d 3 φ 3 rö CQ -μ • Ti
JJ JJ φ μ - CD H rö co -i r-ι Φ d -μ Φ in Ti rö JJ JJ Φ N
Φ xt d 3 JJ -μ JJ • - μ φ Φ & μ Φ Φ ot CD TJ B fÖ N £ in
-μ 0 XX!
CQ X! CJ CQ CQ u Φ μ 3 u cn -μ -μ CQ
Φ rH Ti μ d Φ Φ Xt
X! 0 $, rö 3 ri -μ
2 -3 TJ d CD CD S rH
personnel computer contained autonomous network management, in English network management,
- are all or any subset of the autonomous internal networks connected to the personal computer and the other connected to it network management fed separately and independently, supported and operated individually, and that
- the autonomous internal networks and thereby indirectly connected to another in operation or in standby mode subsystems (8) permanently on their hardware integrity and its assignment to a specific sub-system (8) to be monitored, and that
- The current operating status of the autonomous internal networks and the current operating status of the candidate subsystems (8) either on a separate display on the personal computer or on a computer connected to the personal computer screen will be displayed.
52. A personal computer according to claim 51, DA by in that all the changes to the hardware configuration of the autonomous internal networks and associated indirectly via these networks in operation or in standby mode subsystems made after letztmali- gen startup of the personal computer ( 8) are monitored for their hardware integrity and its assignment to a specific subsystem (8), and that made changes detected and displayed in the form of a warning message on a computer connected to the personal computer screen, and that these changes before the commissioning of the respective subsystem (8) must be accepted, and specifically in accordance with the customized or personalized form of the subsystem (8) via a corresponding ID and enabled for use, wherein the identification and release preferably in one of Sensitivitat of the subsystem (8) proper, gesch tzten form takes place, for example in the form of a personality trait detection and using a personal password.
53. A personal computer according to one of claims 1 to 52, characterized in that it is equipped with such means that, an active and / or passive detection, sequential or permanent location relative to its absolute geographical location or its relative location changes beispiels- in relation to properties or vehicles or to the other analog-equipped personal computers, enabling, said means are preferably selected from the group consisting of
- communication devices, for example in the form of GSM
GSM,
- navigation devices, for example in the form of a Global Positioning System, GPS, and
geveranderungen physical sensors for measuring laser, for example in the form of sensors for barometric pressure measurement, in particular altimeter, -
- including davo any combination. 90
© μ 1 © -μ Φ μ ε rH φ -μ ro CD
-μ Φ Φ Ti 3 X 1 X Φ cn> Ti -μ Φ φ in r- -μ
© = 0 DJ CQ nd Φ 3 Φ CQ CQ JJ JJ -μ -μ d φ d 3 Φ CQ Φ Φ CQ JJ d fÖ jJ uo 3 CQ ε Φ CQ JJ JJ m 3 -μ JJ JJ 3 TJ o 3 CQ - μ CD3 -μ = 0 d φ TS d
> Μ CD Φ -μ dd μ R -μ -μ N TJ = 0 PJ o> μ cn Φ -μ μ 3 d Φ X! rö Φ
H Φ 3 d TJ Φ 0 Φ Φ d JJ T) d rö ^ Φ 3 3 X! Φ Φ ^ o JJ N ε U CD -μ α. ε XX Ti Xt = rö JJ JJ cn φ Ti N CD CD CD CD JJ CQ CQ Xt μ d μ Φ CQ Φ U JJ tö -μ t rö JJ -μ R μ μ ri H φ CD rö ri φ CD
3 Φ 0 TJ CQ Φ rH Ti CO Φ ε EC d X 3 Φ 0 Φ -μ xi -μ d CQ ri TJ fö
JJ Ti> CQ rö Φ d X! R EQ μ Φ CQ TJ J> Ti -μ φ φ 0 d -id rö
CQ CQ Φ Ti JJ J 3 d R Φ ri Φ ε R CQ CQ PJ xi CD ri Φ 4H rö
= 3 CD = ^ rö -i X! rö Ti Φ CQ 0 rH i Φ Φ 3 = cn ^ Φ CD ü μ d rö 3 d φ ε μ d μ ε ^ u fÖ 4H JJ = -μ -μ R xo 0 C CQ μ μ -μ R = 3 ' CQ φ 3 φ i JJ X
MH 3 Φ φ Φ JJ Xt d TJ 3 CD φ JJ MH rö Φ Φ φ 4H 3 d 3 d R d ri
3 ri JJ CD Φ u μ -μ μ -μ tö 3 d Φ R -μ 3 -i JJ P PJ 0: <E φ φ 0 φ φ φ
<Φ 3 d O DJ Φ CQ φ RR fÖ JJ JJ rö Ti 3 Φ CD P t P d -μ 3
-μ PJ - »xt CQ o = o Φ -μ -id μ ε -μ PJ" d JJ Φ rö φ φ μ N
Φ N ε dud JJ Φ X! d JJ -§ Φ Φ Φ; Ti Φ N ε d rft -μ Ü XX! ε Cn cn JJ
-μ μ 0 φ -μ -μ d -μ Φ μ -μ X -μ R -μ μ 0 Φ X Φ Φ Φ Φ
Ti PQ CJ ε Φ Φ φ ti d P rö 0 DJ Φ μ Φ Φ u JQ
-μ ε d Φ 0 Cn Cn cn JJ 5 μ tsi XX cn CD 3 CQ μ Φ μ φ> φ (x <d 0 d ri CQ CQ JJ μ rö -μ Φ Φ CQ N μ μ 0 ri Ti φ JJ CD d -μ TJ
= 3 3 rö ιμ dd -μ = 3 ε - d Φ CD JJ JJ rö: 3 3 rö f CQ φ Φ d d
MH t! d CQ Φ φ ε ι = rH o: • -μ X) d Φ ιμ t N d CQ ε φ Φ JJ Ti φ μ φ 3
0 CD X JJ rö -μ d £ ε 0 CD Φ -μ -μ CQ Φ CQ d Ti
N d Φ d CQ CD dd 4H M φ CQ CQ R ati dd Ti Φ CQ CQ 3 JJ -μ
JJ μ μ a CD CD CQ μ Φ d ri - μ Φ Ti JJ μ μ 3 -μ μ Φ d -μ φ J fÖ Φ Φ μ -μ -μ Φ φ Xi .. ri CQ Φ CΛ R .. rö Φ Φ CQ Φ microns Φ Ti .. -μ Φ 3 d
CQ JJ PJ xt X! d X o RR fÖ - 'JJ JJ -μ 3 μ CQ PJ CD P t JJ 3 CQ Φ
CΛ 3 3 3 = Φ u JJ υ CD φ Φ -μ Φ Φ 3 3 3 CD = CD Ti rö μ d ri ε r μ MH & rö μ 3 Φ Φ -μ X! JJ dd φ 3 CQ PJ JJ rö μ 4H CQ CQ Ti od Φ d Φ Φ
EQ ε Φ CQ 3 JJ JJ 3 Φ μ Φ Φ 3 3 CQ JJ EQ ε φ = CO rö> 3 rö JJ Φ -μ D o TS 3 J tsi CQ o N CD rö -μ d ri R PJ od 3 ε ni R DJ TJ rö μ CJ rit rö JJ = 3 φ Φ X Ti d φ Φ ε μ J rft Φ CQ JJ JJ ε Φ CQ d
Φ yy Ti rö μ d TJ CD CQ X) φ Φ -μ ε 0 Φ Φ Φ d JJ CD 3 R Φ -μ fö
Ti = ri rö d CQ φ d Φ CD Φ ε TS PJ Φ ri = Ti J rö ddd Φ 0 -μ Φ ε
0 rö JJ ^ Φ 3 CD 3 CD CD RR μ 0 CQ CD rö JJ Φ ^ xi -μ ε Φ PJ 3 XI dd -μ μ cn rö CQ d Φ 3 Φ Φ Φ -μ rö i-1 -μ d ri CQ u Φ Φ rH Φ ε O
0 -: fÖ m EQ 3 d 3 TJ CD Cn Xi -μ φ R rö JJ 0 ri ri -μ -μ Ti 3 0 CQ *. -i
-μ CQ fö d rö Ti ri fÖ o 3 P rö -μ d f CD P Φ ε Φ rH rH Ti X d
X μ d 0 Q μ Φ d Φ μ ~ -μ 0 ε 0 μ X R 0 Φ tsi μ JJ .. 0 Φ Φ
Φ 0 Φ CQ P -μ -μ -μ -μ JJ d Φ CQ CQ Φ R 0 2 φ X JJ JJ
, -μ JJ ε X! d 0 -i
X! CQ Φ rö P 3 μ Φ DJ d Φ μ. -μ Ti d rö X! CQ CQ d
• JJ rö Φ X t:; μ 0 Φ co JJ ^ φ rH Φ in Φ yy dd Xt Φ υ -μ Φ JJ in d XJH -μ υ Φ CQ X) RQ JJ rH PJ in d X Φ Φ υ rö X JJ -μ T) ε YY
D Φ CQ TJ ri d> α Φ P d d Φ Φ R μ tu φ -μ co Φ rH Ti Φ -μ
TJ 3 Φ Φ Φ CQ ε Φ φ ec JJ d 3 Φ CD T) JJ N μ ri ddd xi μ 3 JJ μ X - X Φ! ε CO • d Eu d ~ d -μ JJ rö EQ X!
Φ Φ υ Φ μ Φ CQ R rH φ U .. JJ N Φ CQ Xi tsi • μ φ (east XJ xt μ d = 3 TJ Φ TJ ^ -μ Φ Φ -μ CQ ri JJ JJ xi μ d PJ CJ JJ Φ μ CO d O o Φ φ φ μ 0 JJ -μ T3 rH Φ CQ ri EQ -μ rö Φ Φ = 0 3 μ tö Φ a μ φ © JJ JJ d J D CQ R cn J rH CD tsi> R CQ JJ JJ JJ MH 3 CQ CQ X! tsi φ JJ φ
CQ CQ μ JJ CQ 0 d μ Φ d JJ -μ d Xi 3 CQ μ X! TJ 3 Φ μ d CD> Ti
Φ Φ Φ
© d -μ rö -μ 3 (E JJ 3 = rö μ φ υ rö φ φ Φ rö fÖ tö xt
JJ JJ CQ co o φ -μ -μ - μ R
XX MH JJ rH X CQ CQ CD TS JJ co EQ xt 1 Ti EQ CJ> J φ JJ JJ 3
O
Personal computer comprising this kit or
Kit.
56. A kit or a kit for upgrading existing personal computers to obtain the enlarged functionality of the personal computer according to one of claims 1 to 53, characterized in that said kit or kit of at least two autonomous storage devices (9) in the form of at least one integral assembly comprises,
"Wherein in this assembly preferably the
Switching element is integrated, and said kit or the kit optionally comprises other necessary additional components,
for example corresponding cable assemblies and connectors for the preparation of the compounds of the integral assembly for "main board", and in accordance with cable assemblies and connectors for making connections to the possibly required interfaces, transfer cards, I / O cards and actuators, and
Personal computer comprising this kit or kit.
EP01271570A 2000-12-21 2001-12-21 Personal computer Withdrawn EP1348153A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CH252400 2000-12-21
CH25242000 2000-12-21
PCT/CH2001/000738 WO2002050646A2 (en) 2000-12-21 2001-12-21 Personal computer

Publications (1)

Publication Number Publication Date
EP1348153A2 true EP1348153A2 (en) 2003-10-01

Family

ID=4569848

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01271570A Withdrawn EP1348153A2 (en) 2000-12-21 2001-12-21 Personal computer

Country Status (5)

Country Link
US (1) US20040070920A1 (en)
EP (1) EP1348153A2 (en)
AU (1) AU2044702A (en)
WO (1) WO2002050646A2 (en)
ZA (1) ZA200305441B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111157B1 (en) * 2002-05-08 2006-09-19 3Pardata, Inc. Spurious input detection for firmware
KR100539778B1 (en) * 2002-12-31 2006-01-11 엘지전자 주식회사 Method for changing function control parameter in mobile terminal
US8260739B1 (en) 2005-12-29 2012-09-04 At&T Intellectual Property Ii, L.P. Method and apparatus for layering software agents in a distributed computing system
US9189195B2 (en) * 2006-10-16 2015-11-17 Sandel Avionics, Inc. Integrity monitoring
US20090080011A1 (en) * 2007-09-26 2009-03-26 Konica Minolta Systems Laboratory, Inc. Network port setup for printer driver for a networked printer
US20090089457A1 (en) * 2007-09-28 2009-04-02 Konica Minolta Systems Laboratory, Inc. Reconnecting a host computer with a networked printer having a dynamic network address
JP2013073234A (en) * 2011-09-28 2013-04-22 Nc Information Technology Co Ltd Image display system and method
US20130208630A1 (en) * 2012-02-15 2013-08-15 Ge Aviation Systems Llc Avionics full-duplex switched ethernet network
US20140309872A1 (en) * 2013-04-15 2014-10-16 Flextronics Ap, Llc Customization of vehicle user interfaces based on user intelligence
US20180012197A1 (en) 2016-07-07 2018-01-11 NextEv USA, Inc. Battery exchange licensing program based on state of charge of battery pack
US9928734B2 (en) 2016-08-02 2018-03-27 Nio Usa, Inc. Vehicle-to-pedestrian communication systems
US20180127001A1 (en) 2016-11-07 2018-05-10 NextEv USA, Inc. Feedback Performance Control and Tracking
US10249104B2 (en) 2016-12-06 2019-04-02 Nio Usa, Inc. Lease observation and event recording
US10074223B2 (en) 2017-01-13 2018-09-11 Nio Usa, Inc. Secured vehicle for user use only
US9984572B1 (en) 2017-01-16 2018-05-29 Nio Usa, Inc. Method and system for sharing parking space availability among autonomous vehicles
US10031521B1 (en) 2017-01-16 2018-07-24 Nio Usa, Inc. Method and system for using weather information in operation of autonomous vehicles
US10234302B2 (en) 2017-06-27 2019-03-19 Nio Usa, Inc. Adaptive route and motion planning based on learned external and internal vehicle environment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5978804A (en) * 1996-04-11 1999-11-02 Dietzman; Gregg R. Natural products information system
US6067618A (en) * 1998-03-26 2000-05-23 Innova Patent Trust Multiple operating system and disparate user mass storage resource separation for a computer system
US6061745A (en) * 1998-08-13 2000-05-09 Adaptec, Inc. BBS one BIOS image multicard support

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0250646A2 *

Also Published As

Publication number Publication date
ZA200305441B (en) 2004-05-19
US20040070920A1 (en) 2004-04-15
WO2002050646A3 (en) 2003-05-08
WO2002050646A2 (en) 2002-06-27
AU2044702A (en) 2002-07-01

Similar Documents

Publication Publication Date Title
US9465959B2 (en) Persistent agent supported by processor
EP0613073B1 (en) Licence management mechanism for a computer system
US4864494A (en) Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US5222134A (en) Secure system for activating personal computer software at remote locations
CA1246747A (en) Apparatus for controlling the use of computer software
JP3074641B2 (en) Security management method and apparatus in a personal computer
US5854891A (en) Smart card reader having multiple data enabling storage compartments
CA2026739C (en) Transaction system security method and apparatus
US8868933B2 (en) Persistent servicing agent
AU760752B2 (en) Method and system for providing cross-platform remote control and monitoring of facility access controller
JP5454715B2 (en) The virtual machine operating system, virtual machine operation method and program
US6968384B1 (en) License management system and method for commuter licensing
JP4387060B2 (en) rfid tagging device for network asset
US7536598B2 (en) Computer system capable of supporting a plurality of independent computing environments
US6745330B1 (en) Computer system having peripheral device look
US5072370A (en) System and method for monitoring electronic data processing equipment
US5552776A (en) Enhanced security system for computing devices
US5586250A (en) SCSI-coupled module for monitoring and controlling SCSI-coupled raid bank and bank environment
US20010025346A1 (en) Security management system and security managing method
CN1120431C (en) Personal computer system with security features
US20020188704A1 (en) Upgrade of licensed capacity on computer entity
US6268789B1 (en) Information security method and apparatus
US20060259960A1 (en) Server, method and program product for management of password policy information
US6263440B1 (en) Tracking and protection of display monitors by reporting their identity
US6202153B1 (en) Security switching device

Legal Events

Date Code Title Description
AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent to:

Countries concerned: ALLTLVMKROSI

17P Request for examination filed

Effective date: 20030623

17Q First examination report despatched

Effective date: 20040802

19U Interruption of proceedings before grant

Effective date: 20050809

19W Proceedings resumed before grant after interruption of proceedings

Effective date: 20100215

19W Proceedings resumed before grant after interruption of proceedings

Effective date: 20110301

18D Application deemed to be withdrawn

Effective date: 20110701