Shengda Shiji Co.,Ltd

ADD: 1st Floor,NO.51,Fu Cheng Ao,Ping Hu Town,Shengzhen City,GuangDong Province,China.

Tel: +86-755-84690819

Phone: +86-18123903355

E-mail: service@jammerwill.com

Home > News > Content

Computer Information Leakage Security Technology

Shengda Shiji Co.,Ltd | Updated: Apr 20, 2016

Computer security information leakage protection technology, known as TEMPEST technology, is to take the transient electromagnetic radiation standard English Transient Electromagnetic Pulse Emanation Standard abbreviation; TEMPEST originated in a top-secret National Security Agency program, which is emitted by the control electronics leaks code. The program includes: electronic leak detection device information (electromagnetic, acoustic) signal; suppressing information leakage. The main content of TEMPEST technology research include: technical standards and normative research; services, management consulting and research methods; test methods and test equipment research; protection and manufacturing technology research.

The main measures TEMPEST techniques used include: filtering, shielding, interference, grounding, isolation and other measures, and these measures can also be used in combination. TEMPEST technology has gone through three generations: the first generation, from 1950 to 1982, inclusive, represented by formula TEMPEST computer; the second generation, from 1982 to 1997, in order to separate red and black TEMPEST computer as representatives; third generation, starting in 1997, it is based on the SOFT-TEMPEST technology as the representative.