HK1251673A1 - 防黑客計算機設計 - Google Patents
防黑客計算機設計Info
- Publication number
- HK1251673A1 HK1251673A1 HK18110868.8A HK18110868A HK1251673A1 HK 1251673 A1 HK1251673 A1 HK 1251673A1 HK 18110868 A HK18110868 A HK 18110868A HK 1251673 A1 HK1251673 A1 HK 1251673A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- hacking
- computer design
- resistant computer
- resistant
- design
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1433—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a module or a part of a module
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
- G06F3/0659—Command handling arrangements, e.g. command buffers, queues, command scheduling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/031—Protect user input by software means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/032—Protect output to user by software means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/841,469 US9578054B1 (en) | 2015-08-31 | 2015-08-31 | Hacking-resistant computer design |
PCT/US2016/049523 WO2017040542A1 (en) | 2015-08-31 | 2016-08-30 | Hacking-resistant computer design |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1251673A1 true HK1251673A1 (zh) | 2019-02-01 |
Family
ID=58017755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK18110868.8A HK1251673A1 (zh) | 2015-08-31 | 2018-08-23 | 防黑客計算機設計 |
Country Status (7)
Country | Link |
---|---|
US (8) | US9578054B1 (zh) |
EP (1) | EP3345095B1 (zh) |
JP (1) | JP6695885B2 (zh) |
CN (1) | CN107924365B (zh) |
HK (1) | HK1251673A1 (zh) |
SG (1) | SG11201705227RA (zh) |
WO (1) | WO2017040542A1 (zh) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429735B2 (en) * | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
US10241706B2 (en) * | 2016-05-20 | 2019-03-26 | Renesas Electronics Corporation | Semiconductor device and its memory access control method |
KR101997254B1 (ko) * | 2017-05-10 | 2019-07-08 | 김덕우 | 고립된 사용자컴퓨팅부를 갖는 컴퓨터 |
US10061923B1 (en) * | 2017-06-26 | 2018-08-28 | Pritam Nath | Safe and secure internet or network connected computing machine providing means for processing, manipulating, receiving, transmitting and storing information free from hackers, hijackers, virus, malware etc. |
US10991255B2 (en) * | 2018-04-05 | 2021-04-27 | Ge Aviation Systems Llc | Providing an open interface to a flight management system |
FR3087548A1 (fr) * | 2018-08-24 | 2020-04-24 | Societe D'innovation Du Mûrier | Dispositif de securite pour un moyen de stockage de donnees numeriques |
US11444919B2 (en) * | 2019-05-20 | 2022-09-13 | Woodward, Inc. | Mission critical security zone |
WO2021232233A1 (en) * | 2020-05-19 | 2021-11-25 | Yangtze Memory Technologies Co., Ltd. | Control method and controller of program suspending and resuming for memory |
JP2024518005A (ja) * | 2021-03-24 | 2024-04-24 | キム、ドクウ | 孤立したユーザコンピューティング部を有する制御システムおよびその制御方法 |
CN113505362B (zh) * | 2021-07-16 | 2023-09-22 | 长鑫存储技术有限公司 | 系统权限管控方法、数据中心、管控装置和存储介质 |
Family Cites Families (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2156554B (en) * | 1984-03-10 | 1987-07-29 | Rediffusion Simulation Ltd | Processing system with shared data |
US5210854A (en) * | 1989-06-14 | 1993-05-11 | Digital Equipment Corporation | System for updating program stored in eeprom by storing new version into new location and updating second transfer vector to contain starting address of new version |
JP3417065B2 (ja) * | 1994-07-04 | 2003-06-16 | 富士通株式会社 | ウイルス対応型外部記憶装置、データ処理装置およびデータ処理方法 |
US6651171B1 (en) * | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
US6643751B2 (en) * | 2000-03-20 | 2003-11-04 | Texas Instruments Incorporated | System and method for limited access to system memory |
US6507904B1 (en) * | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
US6725317B1 (en) * | 2000-04-29 | 2004-04-20 | Hewlett-Packard Development Company, L.P. | System and method for managing a computer system having a plurality of partitions |
US6986052B1 (en) | 2000-06-30 | 2006-01-10 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
US20020083362A1 (en) * | 2000-12-22 | 2002-06-27 | Objectsoft Corp. | System and method for providing unattended personality acquisition, self-recovery and remote maintenance to internet-based end-user devices |
US7313705B2 (en) * | 2002-01-22 | 2007-12-25 | Texas Instrument Incorporated | Implementation of a secure computing environment by using a secure bootloader, shadow memory, and protected memory |
US6763441B2 (en) * | 2002-01-23 | 2004-07-13 | International Business Machines Corporation | System and method for using ancillary processors and storage to speed time critical data capture |
GB0226874D0 (en) * | 2002-11-18 | 2002-12-24 | Advanced Risc Mach Ltd | Switching between secure and non-secure processing modes |
GB2396034B (en) * | 2002-11-18 | 2006-03-08 | Advanced Risc Mach Ltd | Technique for accessing memory in a data processing apparatus |
JP2004234053A (ja) * | 2003-01-28 | 2004-08-19 | Internatl Business Mach Corp <Ibm> | コンピュータシステム、コンピュータ装置、記憶装置のデータ保護方法、およびプログラム |
US7509644B2 (en) | 2003-03-04 | 2009-03-24 | Secure 64 Software Corp. | Operating system capable of supporting a customized execution environment |
US20070067366A1 (en) * | 2003-10-08 | 2007-03-22 | Landis John A | Scalable partition memory mapping system |
US7072211B2 (en) * | 2004-05-19 | 2006-07-04 | L-3 Integrated Systems Company | Systems and methods for write protection of non-volatile memory devices |
US7818574B2 (en) * | 2004-09-10 | 2010-10-19 | International Business Machines Corporation | System and method for providing dynamically authorized access to functionality present on an integrated circuit chip |
US8619971B2 (en) * | 2005-04-01 | 2013-12-31 | Microsoft Corporation | Local secure service partitions for operating system security |
CN101228531A (zh) | 2005-07-22 | 2008-07-23 | 松下电器产业株式会社 | 执行装置 |
US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
US7845005B2 (en) * | 2006-02-07 | 2010-11-30 | International Business Machines Corporation | Method for preventing malicious software installation on an internet-connected computer |
CN100464314C (zh) * | 2006-03-23 | 2009-02-25 | 联想(北京)有限公司 | 一种数据透明保护的安全写系统和方法 |
JP2007304954A (ja) | 2006-05-12 | 2007-11-22 | Sharp Corp | メモリ保護機能を有するコンピュータシステム |
US7984301B2 (en) | 2006-08-17 | 2011-07-19 | Inside Contactless S.A. | Bi-processor architecture for secure systems |
US20160248588A1 (en) * | 2006-09-07 | 2016-08-25 | Altera Corporation | Security ram block with multiple partitions |
US8571598B2 (en) | 2006-12-18 | 2013-10-29 | Intel Corporation | Method and apparatus for location-based wireless connection and pairing |
WO2008077628A2 (en) * | 2006-12-22 | 2008-07-03 | Virtuallogix Sa | System for enabling multiple execution environments to share a device |
WO2008138653A1 (en) | 2007-05-09 | 2008-11-20 | International Business Machines Corporation | A method and data processing system to prevent manipulation of computer systems |
US8397043B2 (en) | 2007-12-17 | 2013-03-12 | Freescale Semiconductor, Inc. | Memory mapping system, request controller, multi-processing arrangement, central interrupt request controller, apparatus, method for controlling memory access and computer program product |
US7743375B2 (en) * | 2008-06-27 | 2010-06-22 | International Business Machines Corporation | Information handling system including dynamically merged physical partitions |
US7657941B1 (en) | 2008-12-26 | 2010-02-02 | Kaspersky Lab, Zao | Hardware-based anti-virus system |
US8205037B2 (en) * | 2009-04-08 | 2012-06-19 | Google Inc. | Data storage device capable of recognizing and controlling multiple types of memory chips operating at different voltages |
US9152200B2 (en) * | 2009-06-23 | 2015-10-06 | Hewlett-Packard Development Company, L.P. | Resource and power management using nested heterogeneous hypervisors |
US20110154023A1 (en) * | 2009-12-21 | 2011-06-23 | Smith Ned M | Protected device management |
US20110225645A1 (en) * | 2010-01-26 | 2011-09-15 | Ellis Frampton E | Basic architecture for secure internet computers |
US8429735B2 (en) * | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
WO2011094616A1 (en) * | 2010-01-29 | 2011-08-04 | Ellis Frampton E | The basic architecture for secure internet computers |
JP2011215879A (ja) | 2010-03-31 | 2011-10-27 | Sharp Corp | 操作用通信装置、非操作用通信装置、操作用通信装置の制御方法、非操作用通信装置の制御方法、通信システム、操作用通信プログラム、非操作用通信プログラム及び記録媒体 |
US20110314075A1 (en) * | 2010-06-18 | 2011-12-22 | Nokia Corporation | Method and apparatus for managing distributed computations within a computation space |
US8082585B1 (en) | 2010-09-13 | 2011-12-20 | Raymond R. Givonetti | Protecting computers from malware using a hardware solution that is not alterable by any software |
US8561066B2 (en) * | 2010-12-08 | 2013-10-15 | International Business Machines Corporation | Simplified DMA mappings for self-virtualizing input/output device virtual functions |
TWI432987B (zh) * | 2011-03-15 | 2014-04-01 | Phison Electronics Corp | 記憶體儲存裝置、其記憶體控制器與病毒掃描方法 |
KR20120119092A (ko) * | 2011-04-20 | 2012-10-30 | 삼성전자주식회사 | 반도체 메모리 시스템 및 이의 구동 방법 |
WO2013063484A1 (en) | 2011-10-28 | 2013-05-02 | The Regents Of The University Of California | Multiple-core computer processor |
KR101365083B1 (ko) * | 2012-03-06 | 2014-02-21 | 모젼스랩(주) | 모션 인식을 통한 인터페이스 장치 및 이의 제어방법 |
US9043559B2 (en) | 2012-10-23 | 2015-05-26 | Oracle International Corporation | Block memory engine with memory corruption detection |
GB2513850B (en) * | 2013-05-03 | 2017-06-14 | Rosberg System As | Access control system |
AU2014291635B2 (en) * | 2013-07-18 | 2019-11-07 | Benjamin Gittins | Computing architecture with peripherals |
US9692789B2 (en) * | 2013-12-13 | 2017-06-27 | Oracle International Corporation | Techniques for cloud security monitoring and threat intelligence |
US11228427B2 (en) | 2014-02-11 | 2022-01-18 | Ericsson Ab | System and method for securing content keys delivered in manifest files |
US9686077B2 (en) * | 2014-03-06 | 2017-06-20 | Microsoft Technology Licensing, Llc | Secure hardware for cross-device trusted applications |
US20160044136A1 (en) * | 2014-05-27 | 2016-02-11 | Nimbus 9, Inc. | Virtual gateway |
US9479331B2 (en) | 2014-08-20 | 2016-10-25 | Apple Inc. | Managing security in a system on a chip (SOC) that powers down a secure processor |
US20160070656A1 (en) * | 2014-09-05 | 2016-03-10 | Qualcomm Incorporated | Write protection management systems |
US9444849B2 (en) * | 2014-10-06 | 2016-09-13 | The Boeing Company | Enforcing policy compliance on a device |
US9749323B2 (en) * | 2015-03-27 | 2017-08-29 | Intel Corporation | Technologies for secure server access using a trusted license agent |
US10063375B2 (en) | 2015-04-20 | 2018-08-28 | Microsoft Technology Licensing, Llc | Isolation of trusted input/output devices |
-
2015
- 2015-08-31 US US14/841,469 patent/US9578054B1/en not_active Expired - Fee Related
-
2016
- 2016-08-30 SG SG11201705227RA patent/SG11201705227RA/en unknown
- 2016-08-30 JP JP2017538238A patent/JP6695885B2/ja not_active Expired - Fee Related
- 2016-08-30 EP EP16842830.8A patent/EP3345095B1/en active Active
- 2016-08-30 WO PCT/US2016/049523 patent/WO2017040542A1/en active Application Filing
- 2016-08-30 CN CN201680043460.XA patent/CN107924365B/zh not_active Expired - Fee Related
-
2017
- 2017-01-05 US US15/399,654 patent/US10002245B2/en active Active
- 2017-02-20 US US15/437,056 patent/US10089248B2/en active Active
-
2018
- 2018-05-07 US US15/973,392 patent/US10311226B2/en active Active
- 2018-08-23 HK HK18110868.8A patent/HK1251673A1/zh unknown
- 2018-10-01 US US16/148,944 patent/US10606768B2/en active Active
-
2019
- 2019-05-15 US US16/413,446 patent/US11030301B2/en active Active
-
2020
- 2020-03-27 US US16/833,355 patent/US11061832B2/en active Active
-
2021
- 2021-06-14 US US17/346,864 patent/US20220043905A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US10002245B2 (en) | 2018-06-19 |
SG11201705227RA (en) | 2017-07-28 |
EP3345095A4 (en) | 2019-04-24 |
CN107924365B (zh) | 2022-01-04 |
EP3345095A1 (en) | 2018-07-11 |
JP2018526691A (ja) | 2018-09-13 |
US20170169222A1 (en) | 2017-06-15 |
US20170235944A1 (en) | 2017-08-17 |
US10606768B2 (en) | 2020-03-31 |
US20200301853A1 (en) | 2020-09-24 |
US11030301B2 (en) | 2021-06-08 |
JP6695885B2 (ja) | 2020-05-20 |
US10089248B2 (en) | 2018-10-02 |
US11061832B2 (en) | 2021-07-13 |
EP3345095B1 (en) | 2021-07-07 |
US20220043905A1 (en) | 2022-02-10 |
US20180330076A1 (en) | 2018-11-15 |
US10311226B2 (en) | 2019-06-04 |
US20200134170A1 (en) | 2020-04-30 |
US20190278718A1 (en) | 2019-09-12 |
US20170063877A1 (en) | 2017-03-02 |
WO2017040542A1 (en) | 2017-03-09 |
CN107924365A (zh) | 2018-04-17 |
US9578054B1 (en) | 2017-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1251673A1 (zh) | 防黑客計算機設計 | |
HK1215780A2 (zh) | 防塵計算機 | |
GB2551150B (en) | Trackballs | |
GB201514187D0 (en) | Metadata | |
GB2541867B (en) | Polytunnel arrangement | |
GB2545956B (en) | Vibro-polishing arrangement | |
GB2545219B (en) | Computer cradle | |
GB2535547B (en) | Data processor | |
GB201517135D0 (en) | Interface design | |
GB201502316D0 (en) | Bitcon technology | |
GB201502073D0 (en) | HDEG technology | |
GB2544388B (en) | Polytunnel Arrangement | |
GB2540412B (en) | Polytunnel arrangement | |
GB201810841D0 (en) | Interface design | |
GB201519665D0 (en) | Interface | |
GB201516379D0 (en) | Computer Operating Sysytems | |
GB201520133D0 (en) | Computer device | |
GB201520037D0 (en) | Computer device | |
GB201519469D0 (en) | Computer device | |
GB201516530D0 (en) | Computer device | |
GB201514035D0 (en) | Computer device | |
GB201511758D0 (en) | Computer device | |
GB201515482D0 (en) | All technology | |
GB201521680D0 (en) | Independent touch marked | |
GB201514803D0 (en) | Easy see mouse |