FIELD: information technology.
SUBSTANCE: method is proposed in which a computer is equipped with a built-in information protection hardware (IPH), installed as a daughter board in one of motherboard slots of the computer. On the motherboard for installing the IPH, a certain slot with an expanded set of contacts is allocated, through its excess contacts, at least one electrical circuit is transited, the opening of which is guaranteed to lead to a loss of the computer's operability, and at the IPH card, at least one physical switching element providing closure/opening of the said circuit or circuits when installing/removing the IPH board.
EFFECT: getting more resistant to hacking computers.
5 cl
Title | Year | Author | Number |
---|---|---|---|
TRUSTED COMPUTING SYSTEM WITH MULTILEVEL SECURITY SYSTEM | 2023 |
|
RU2816097C1 |
COMPUTER FOR WORK IN TRUSTED COMPUTING ENVIRONMENT | 2017 |
|
RU2666618C1 |
METHOD FOR SECURE EXTENSION OF FUNCTIONS OF INFORMATION SECURITY HARDWARE | 2014 |
|
RU2574347C2 |
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN PERSONAL COMPUTER | 2011 |
|
RU2475823C1 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
INTERACTIVE METHOD OF BIOMETRIC USER AUTHENTICATION | 2017 |
|
RU2670648C1 |
DEVICE FOR PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION THAT IS STORED IN PERSONAL COMPUTER | 1995 |
|
RU2067313C1 |
Authors
Dates
2017-08-15—Published
2016-06-16—Filed