CN2553439Y - 具有专有用户身份信息输入设备的安全计算机 - Google Patents
具有专有用户身份信息输入设备的安全计算机 Download PDFInfo
- Publication number
- CN2553439Y CN2553439Y CN 01252717 CN01252717U CN2553439Y CN 2553439 Y CN2553439 Y CN 2553439Y CN 01252717 CN01252717 CN 01252717 CN 01252717 U CN01252717 U CN 01252717U CN 2553439 Y CN2553439 Y CN 2553439Y
- Authority
- CN
- China
- Prior art keywords
- computer
- circuit unit
- fail
- performance element
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01252717 CN2553439Y (zh) | 2001-12-05 | 2001-12-05 | 具有专有用户身份信息输入设备的安全计算机 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01252717 CN2553439Y (zh) | 2001-12-05 | 2001-12-05 | 具有专有用户身份信息输入设备的安全计算机 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2553439Y true CN2553439Y (zh) | 2003-05-28 |
Family
ID=33662358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01252717 Expired - Lifetime CN2553439Y (zh) | 2001-12-05 | 2001-12-05 | 具有专有用户身份信息输入设备的安全计算机 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2553439Y (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100432890C (zh) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | 计算机开机身份认证***及其认证方法 |
-
2001
- 2001-12-05 CN CN 01252717 patent/CN2553439Y/zh not_active Expired - Lifetime
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100432890C (zh) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | 计算机开机身份认证***及其认证方法 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mijwil et al. | Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime | |
Locasto et al. | Flips: Hybrid adaptive intrusion prevention | |
Xu et al. | Data-provenance verification for secure hosts | |
CN111787001B (zh) | 网络安全信息的处理方法、装置、电子设备和存储介质 | |
CN108810035A (zh) | 一种可实时监控的网络安全设备 | |
CN1208728C (zh) | 具有信息安全管理单元的安全计算机 | |
CN2526907Y (zh) | 信息安全计算机 | |
Peisert et al. | Dynamic, flexible, and optimistic access control | |
CN2553439Y (zh) | 具有专有用户身份信息输入设备的安全计算机 | |
EP1378813A2 (en) | Security policy enforcement systems | |
Kaczmarek et al. | Modern approaches to file system integrity checking | |
CN115549950A (zh) | 一种基于虚拟化的工业控制设备的安全防护*** | |
Ling et al. | A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach. | |
Zhang et al. | Research on the Application of Network Security Technologies in the Network Security Operations and Maintenance Process | |
Wu et al. | Industrial control trusted computing platform for power monitoring system | |
RU200051U1 (ru) | Защищенная аппаратная платформа универсального назначения с модульной архитектурой | |
Abdullah et al. | File integrity monitor scheduling based on file security level classification | |
Kaur | A secure and smart framework for preventing ransomware attack | |
Luo | Research and Development of Deep Protection Model for Computer Network Information Security | |
McIntosh | RanDeter: using novel statistical and physical controls to deter ransomware attacks: a thesis presented in partial fulfillment of the requirements for the degree of Master of Information Sciences in Software Engineering at Massey University, Auckland, New Zealand | |
Kedia et al. | A Unique Approach for Detection and Removal of Key Loggers | |
Petrovych et al. | ANALYSIS OF CYBER SECURITY ASPECTS IN COMPUTER NETWORKS | |
Sun | Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data | |
Upadhyaya | Real-time intrusion detection with emphasis on insider attacks | |
Wang et al. | Introduction to Computer Architecture and Organization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: WUHAN RUIDA INFORMATION SAFETY INDUSTRY CO., LTD. Free format text: FORMER NAME OR ADDRESS: RUIDA ELECTRONICS CO., LTD., WUHAN |
|
CP03 | Change of name, title or address |
Address after: Hubei province Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 27 floor Patentee after: Ruida Electronics Co., Ltd., Wuhan Address before: Hubei province Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 28 floor Patentee before: Wuhan Ruida Electronic Co., Ltd. |
|
C56 | Change in the name or address of the patentee |
Owner name: JETWAY INFORMATION SECURITY INDUSTRY CO., LTD. Free format text: FORMER NAME: WUHAN JETWAY INFORMATION SECURITY INDUSTRY CO., LTD. |
|
CP01 | Change in the name or title of a patent holder |
Address after: 430070 Hubei Province, Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 27 floor Patentee after: JETWAY Information Security Industry Co., Ltd. Address before: 430070 Hubei Province, Wuhan city Wuchang District Wuluo Road No. 628 A Asia Trade Plaza, 27 floor Patentee before: Ruida Electronics Co., Ltd., Wuhan |
|
C17 | Cessation of patent right | ||
CX01 | Expiry of patent term |
Expiration termination date: 20111205 Granted publication date: 20030528 |