Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedded safety module and its safety protection method

A security module and security protection technology, which is applied in the field of information security and can solve problems such as inability to prevent attacks.

Inactive Publication Date: 2003-06-11
瑞达信息安全产业股份有限公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since this kind of attack does not depend on a specific operating system, any protection based on the operating system and its upper layer software cannot prevent this kind of attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded safety module and its safety protection method
  • Embedded safety module and its safety protection method
  • Embedded safety module and its safety protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Such as figure 1 As shown, the security module of the present invention is a hardware module, and may also be a chip containing security module components, or a device in other packaging forms containing security module components; the security module is embedded in a computer to implement security control on the computer, and may also be a The plug-in is outside the computer; the security module has a central processing unit (CPU) 1, which is a processor based on the X86 core, and can also be a processor of the ARM.MIPS.POWERPC core, or other special processors; there is a memory 2, it is as image 3 random access memory 2.1 and electrically erasable memory 2.2 or / and read-only memory; and figure 1 The shown input and output unit 3 is a user-specific information input device interface 3.3, which is connected to the computer for the interface 3.1, 3.2 for exchanging information between the module and the computer; the user-specific information input device as shown in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The security module comprises the CPU for managing the security, the memory, the input and the output units for transferring the external information as well as the security control unit for controlling the hardware at the bottom layer of the computer. The method for protecting the security is as follows. Based on the information of the user's authorities transferred to the security module by the input and the output module, the security control unit outputs the control signal to turn on or off control the hardware devices at the bottom layer of the computer. Thus, the hardward resources of the computer are managed and controlled by the security module, and are no longer complete open any more. The security protection is carried out from the hardware devices at the bottom layer of the computer. The use's securities are limited for users with different security status.

Description

technical field [0001] The invention relates to an embedded safety module and a safety protection method thereof, which belong to the technical field of information safety and are especially suitable for occasions with strict requirements on computer information safety. Background technique [0002] In the existing computer system architecture, access to any standard device is open, such as floppy disk drive, hard disk drive, PCI device, and USB device. The reading and writing methods and communication protocols of these devices are public, which allows any user to directly access these devices and read information directly from these devices. Because of this open architecture, it is possible for some malicious attackers to obtain information stored in the computer by directly reading and writing these hardware devices, or destroy the information. For example, an attacker can directly operate the hard disk drive through the underlying program and r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F12/16
Inventor 刘毅吕永康张焕国
Owner 瑞达信息安全产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products