信息网络安全 ›› 2014, Vol. 14 ›› Issue (9): 171-175.doi: 10.3969/j.issn.1671-1122.2014.09.039

• Orginal Article • Previous Articles     Next Articles

A Secure Computer Terminal Coping with Various Threats

ZHANG Xue-jun, LI Yu-wen   

  1. China Security Operations Computer Ltd., Beijing 100011,China
  • Received:2014-08-06 Online:2014-09-01

Abstract: As an important part of the information system, computer faces security threats from external and internal. The current way of protection, mainly against viruses, Trojans and other security threats and attacks from the network and external, has little effect on negligence and deliberate leaks from behavior of internal staff. Furthermore, the protection function is based on the computer to be protected, its own reliability is limited. This article proposes secure computer architecture with independent protection system, theoretical analysis and practice show that this architecture can effectively respond to external and internal security threats, protect the security of the computer itself and internal data information.

Key words: computer, protection system, dual host, trusted computing