Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - soft input
Search - soft input - List
纵观市场上的安全产品,从网络防火墙到各种网络加密、个人数字签证以及早期硬盘锁,均未能对个人计算机本身进行实质性的保护。这些安全机制大都基于这样一种原理:利用一个软件,输入一个特定的密码,经过验证后即可获得合法身份,从而实现各种操作,如购物、收发公文、浏览甚至修改机密数据。众所周知,这种基于纯密码的机制是很脆弱的,所以,许多关键行业和部门都采用了软、硬结合的方式,如设立各种Smart卡认证机制。在银行工作的职工,每人都有一张代表自己电子身份的IC卡,每天上班,必须先刷卡才能进入银行的业务系统。这种机制的安全性大大提高了,但对于个人或普通企业用计算机,这种机制成本太高。本文从BIOS工作原理出发,提出一种安全性高、全新的计算机安全保护机制。 -Taking a panoramic view on the market safe products, from network firewall to various networks encryption, visa and personal digital locks early drives have failed to personal computer itself substantive protection. Most of these security mechanisms based on a principle : the use of a software, input a specific password, once validated receive legal status, thereby realizing a variety of actions, such as shopping, send correspondence, View or even confidential data. As we all know, such a pure password mechanism is very fragile, so many key industries and departments have adopted a soft, a combination of hardware, such as the establishment of the Smart Card authentication mechanism. The bank workers, everybody will have a representative of their electronic identity IC card to work everyday
Date : 2008-10-13 Size : 2.49kb User : zy

纵观市场上的安全产品,从网络防火墙到各种网络加密、个人数字签证以及早期硬盘锁,均未能对个人计算机本身进行实质性的保护。这些安全机制大都基于这样一种原理:利用一个软件,输入一个特定的密码,经过验证后即可获得合法身份,从而实现各种操作,如购物、收发公文、浏览甚至修改机密数据。众所周知,这种基于纯密码的机制是很脆弱的,所以,许多关键行业和部门都采用了软、硬结合的方式,如设立各种Smart卡认证机制。在银行工作的职工,每人都有一张代表自己电子身份的IC卡,每天上班,必须先刷卡才能进入银行的业务系统。这种机制的安全性大大提高了,但对于个人或普通企业用计算机,这种机制成本太高。本文从BIOS工作原理出发,提出一种安全性高、全新的计算机安全保护机制。 -Taking a panoramic view on the market safe products, from network firewall to various networks encryption, visa and personal digital locks early drives have failed to personal computer itself substantive protection. Most of these security mechanisms based on a principle : the use of a software, input a specific password, once validated receive legal status, thereby realizing a variety of actions, such as shopping, send correspondence, View or even confidential data. As we all know, such a pure password mechanism is very fragile, so many key industries and departments have adopted a soft, a combination of hardware, such as the establishment of the Smart Card authentication mechanism. The bank workers, everybody will have a representative of their electronic identity IC card to work everyday
Date : 2025-12-20 Size : 2kb User : zy

关于SHT15的时钟输入的编程,以上函数可以实现SCK和DATA总线的各种输入与输出状态。在SHT15的通信中还需要延时函数,设计时采用函数void DelaylIn8(U32 tt)实现软延时。这样就能完成对SHT15通信协议的模拟。-SHT15 the clock input on programming, the above function can be achieved in a variety of SCK and DATA bus input and output. In SHT15 also need to delay the communication function, designed with function void DelaylIn8 (U32 tt) to achieve the soft delay. This communication protocol can be completed SHT15 simulation.
Date : 2025-12-20 Size : 42kb User : 开心果
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.