FIELD: computer engineering, possible use for trusted loading of a computer and for protection from unsanctioned access to information, which is stored in personal computers and in computerized informational and computing systems.
SUBSTANCE: device contains controller for exchanging information with external information carrier, controller for exchanging information with computer, processor for identification and authentication of users, blocks of energy-independent memory, module for blocking common control bus and exchanging computer data when an attempt of unsanctioned access to it is made, power management device, block of interfaces of external devices, module for blocking external devices, energy-independent flash memory, hardware indicator of random numbers, microcontroller of sensors of opening and extraction of computer components, random-access memory device, where introduced additionally to identification and authentication processor are module of constant user authentication, module for checking integrity and conditions of hardware components of protection device, module for controlling load on switches of hardware encoder, module for controlling network adapters, module for interaction with system for delimiting access and module for interaction with servers of informational and computing system.
EFFECT: expanded functional capabilities and increased efficiency of protection of information from unsanctioned access.
1 dwg
Title | Year | Author | Number |
---|---|---|---|
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
COMPUTER SYSTEM WITH REMOTE MANAGEMENT OF SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT | 2017 |
|
RU2690782C2 |
DEVICE OF HARDWARE AND SOFTWARE COMPLEX FOR GENERATING KEY INFORMATION AND RADIO DATA FOR RADIO STATION | 2016 |
|
RU2634202C1 |
METHOD AND DEVICE FOR TRUSTED COMPUTER BOOTING WITH CONTROL OF PERIPHERAL INTERFACES | 2020 |
|
RU2748575C1 |
DEVICE OF HARDWARE AND SOFTWARE COMPLEX FOR GENERATING KEY INFORMATION AND RADIO DATA FOR RADIO STATION | 2016 |
|
RU2636092C1 |
DEVICE FOR PREVENTING UNSANCTIONED ACCESS TO INFORMATION, STORED ON PERSONAL COMPUTER | 2003 |
|
RU2263950C2 |
SYSTEM, METHOD AND DEVICE FOR CONTINUOUS USER AUTHENTICATION AND PROTECTION OF AUTOMATED WORKSTATION RESOURCES FROM UNAUTHORIZED ACCESS | 2018 |
|
RU2691201C1 |
DEVICE PROTECTING AGAINST UNAUTHORISED ACCESS TO INFORMATION | 2007 |
|
RU2334272C1 |
Authors
Dates
2008-03-27—Published
2006-05-12—Filed