FIELD: information security.
SUBSTANCE: trusted computing system with a multilevel security system comprises at least one central device (CD) and at least one peripheral device (PD), interacting with its CD through a peripheral interface (PI), in which at least one CD contains a resident security component (RSC) integrated into its composition and supporting, along with protection of the CD from unauthorized access, the physical connection or disconnection of the PI, wherein at least one PD comprises a resident security element (RSE) integrated into the PD, being physically unrecoverable from it, supporting security functions consisting in mutual identification or authentication with its CD and physical connection or disconnection of PI depending on the result of identification or authentication.
EFFECT: creation of trusted computing systems with multilevel protection system, providing a high level of security in relation to unauthorized actions, especially attacks of an intruder on the part of PD and PI.
3 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR SECURE EXTENSION OF FUNCTIONS OF INFORMATION SECURITY HARDWARE | 2014 |
|
RU2574347C2 |
METHOD AND DEVICE FOR TRUSTED COMPUTER BOOTING WITH CONTROL OF PERIPHERAL INTERFACES | 2020 |
|
RU2748575C1 |
COMPUTER FOR WORK IN TRUSTED COMPUTING ENVIRONMENT | 2017 |
|
RU2666618C1 |
TRUSTED BOOT TOOL WITH BUILT-IN BINARY TRANSLATOR OF OPERATING SYSTEM AND WIRELESS CONTROL CHANNEL | 2023 |
|
RU2820971C1 |
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN PERSONAL COMPUTER | 2011 |
|
RU2475823C1 |
SYSTEM, METHOD AND DEVICE FOR CONTINUOUS USER AUTHENTICATION AND PROTECTION OF AUTOMATED WORKSTATION RESOURCES FROM UNAUTHORIZED ACCESS | 2018 |
|
RU2691201C1 |
METHOD OF PROTECTING A COMPUTER SYSTEM FROM THE LOAD OF A NON-STANDARD OPERATING SYSTEM | 2022 |
|
RU2791431C1 |
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE | 2016 |
|
RU2635269C1 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
Authors
Dates
2024-03-26—Published
2023-06-23—Filed