CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - soft input
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Sub Category
assembly language
SCSI-ASPI
ELanguage
Disk Tools
Speech/Voice recognition/combine
Editor
Anti-virus
MultiLanguage
MPI
source in ebook
Delphi VCL
OS Develop
MiddleWare
MacOS develop
LabView
e-language
python
Search - soft input - List
[
assembly language
]
从BIOS控制计算机安全
DL : 0
纵观市场上的安全产品,从网络防火墙到各种网络加密、个人数字签证以及早期硬盘锁,均未能对个人计算机本身进行实质性的保护。这些安全机制大都基于这样一种原理:利用一个软件,输入一个特定的密码,经过验证后即可获得合法身份,从而实现各种操作,如购物、收发公文、浏览甚至修改机密数据。众所周知,这种基于纯密码的机制是很脆弱的,所以,许多关键行业和部门都采用了软、硬结合的方式,如设立各种Smart卡认证机制。在银行工作的职工,每人都有一张代表自己电子身份的IC卡,每天上班,必须先刷卡才能进入银行的业务系统。这种机制的安全性大大提高了,但对于个人或普通企业用计算机,这种机制成本太高。本文从BIOS工作原理出发,提出一种安全性高、全新的计算机安全保护机制。 -Taking a panoramic view on the market safe products, from network firewall to various networks encryption, visa and personal digital locks early drives have failed to personal computer itself substantive protection. Most of these security mechanisms based on a principle : the use of a software, input a specific password, once validated receive legal status, thereby realizing a variety of actions, such as shopping, send correspondence, View or even confidential data. As we all know, such a pure password mechanism is very fragile, so many key industries and departments have adopted a soft, a combination of hardware, such as the establishment of the Smart Card authentication mechanism. The bank workers, everybody will have a representative of their electronic identity IC card to work everyday
Date
: 2008-10-13
Size
: 2.49kb
User
:
zy
[
assembly language
]
从BIOS控制计算机安全
DL : 0
纵观市场上的安全产品,从网络防火墙到各种网络加密、个人数字签证以及早期硬盘锁,均未能对个人计算机本身进行实质性的保护。这些安全机制大都基于这样一种原理:利用一个软件,输入一个特定的密码,经过验证后即可获得合法身份,从而实现各种操作,如购物、收发公文、浏览甚至修改机密数据。众所周知,这种基于纯密码的机制是很脆弱的,所以,许多关键行业和部门都采用了软、硬结合的方式,如设立各种Smart卡认证机制。在银行工作的职工,每人都有一张代表自己电子身份的IC卡,每天上班,必须先刷卡才能进入银行的业务系统。这种机制的安全性大大提高了,但对于个人或普通企业用计算机,这种机制成本太高。本文从BIOS工作原理出发,提出一种安全性高、全新的计算机安全保护机制。 -Taking a panoramic view on the market safe products, from network firewall to various networks encryption, visa and personal digital locks early drives have failed to personal computer itself substantive protection. Most of these security mechanisms based on a principle : the use of a software, input a specific password, once validated receive legal status, thereby realizing a variety of actions, such as shopping, send correspondence, View or even confidential data. As we all know, such a pure password mechanism is very fragile, so many key industries and departments have adopted a soft, a combination of hardware, such as the establishment of the Smart Card authentication mechanism. The bank workers, everybody will have a representative of their electronic identity IC card to work everyday
Date
: 2025-12-20
Size
: 2kb
User
:
zy
[
assembly language
]
wendu
DL : 0
关于SHT15的时钟输入的编程,以上函数可以实现SCK和DATA总线的各种输入与输出状态。在SHT15的通信中还需要延时函数,设计时采用函数void DelaylIn8(U32 tt)实现软延时。这样就能完成对SHT15通信协议的模拟。-SHT15 the clock input on programming, the above function can be achieved in a variety of SCK and DATA bus input and output. In SHT15 also need to delay the communication function, designed with function void DelaylIn8 (U32 tt) to achieve the soft delay. This communication protocol can be completed SHT15 simulation.
Date
: 2025-12-20
Size
: 42kb
User
:
开心果
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.