CN109002371A - Active network backup device - Google Patents
Active network backup device Download PDFInfo
- Publication number
- CN109002371A CN109002371A CN201710423668.0A CN201710423668A CN109002371A CN 109002371 A CN109002371 A CN 109002371A CN 201710423668 A CN201710423668 A CN 201710423668A CN 109002371 A CN109002371 A CN 109002371A
- Authority
- CN
- China
- Prior art keywords
- hardware part
- host computer
- data
- active network
- backup device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The present invention provides a kind of active network backup device, the active network backup device includes an at least host computer and hardware part, host computer and other network equipments can not login hardware part, be set, data access etc., can make the defence of hardware part and blocking virus, the attack for kidnapping software and hacker whereby.Entity security switch control that the present invention has Port opening and closing, it must go open entity safety switch that could use independent input and output Port with artificial operation, to confirm that administrative staff are the behaviors operated as the occasion requires, prevent robot program it is astonished enter, most importantly hardware part can not execute destructive instruction virus and can not execute or operate in hardware part, it the accident such as can avoid occurring accidentally to delete because setting mistake, or it is kidnaped software or Malware disguises oneself as setting program, it is executed after careless user's downloading and destroys archives.
Description
Technical field
The present invention relates to a kind of active network backup devices, specifically, being related to a kind of technology of network safety filed.
Background technique
It is scientific and technological now flourish under, the transmission of information is all that intercommunication is carried out by way of wireless network, is saved whereby
It has saved the time and has shortened interpersonal distance, however for the safety of data, generally data can all be encrypted
Cloud is either placed, so that data must be that user such as can just open, download at the operation, but be full of in the internet
Raw meat, have a strong smell, color, it is illegal that the people (referred to as hacker) that more has a pile illegal can attack number of site, kidnap data etc.
The facts, serious person also will do it the paralysis of network, throw virus etc., this looks forward to the people that need to have secrecy privacy, company
Industry etc. is very had a headache, however related dealer further research and develop the behavior of hacker and is proposed so-called safety and fills on the market
Set, firewall etc., although in a short time can be as scheduled by virus, attack etc. into blocking, be even isolated, what hacker bragged
Be exactly that superb means, it is permanent under will break through the limitation of safety device, firewall, lead to once and again three thing again
Constantly occur.
Also there are many special incorporated businesses on the market now, is mainly to provide incorporated business, user carries out the standby of data
Deposit, avoid internal the problems such as causing all Missing datas, corrupted by the invasion of hacker, otherwise be exactly user operationally
Carelessness so that the problems such as Missing data, corrupted can not rescue back, this incorporated business seeks to solve above-mentioned ask
Topic, but this security firm, in the backup for carrying out data, used means still will be by the online setting of internet
It just can achieve the presence or absence of data transmission, this is nothing more than being the pipeline that can be invaded for hacker, therefore safety is public
The backup means of department but still have the defects that substantially.
Summary of the invention
In place of solving above-mentioned the deficiencies in the prior art, the present inventor puts into many time study correlations and knows
Know, and be compared every superiority and inferiority, carry out the research and exploitation of Related product, and after many experiments and test, overcome
Drawbacks described above provides a kind of active network backup device.
The active network backup device includes three kinds of technical solutions, and according to the first aspect of the invention, the present invention provides
A kind of active network backup device, the active network backup device include: an at least host computer (such as SERVER, PC,
NB, NAS or other network storage equipments etc., hereinafter referred to as host computer) and a hardware part;The host computer includes a power
Limit unit;Between the hardware part and at least a host computer by directly it is online or with wired, wireless LAN connection in a manner of
It interlinks, accesses the data of at least host computer duplication, at least one electricity in the hardware part equipped with an access space
The open data grabber duplication read permission and hardware part is made actively to carry out single direction of the permission unit of brain server, and need also
The open write-in permission of the permission unit does the number that single direction is written data, restores its backup to hardware part when former Backup Data
According to telegram in reply brain server, had in the hardware part remittance whole unit the data in access space are arranged, layout, compression,
Encryption etc. and the interior control unit control hardware part that has are to host computer progress reading data, data write-in and hardware
The running of part;Wherein, host computer and other network equipments can not login hardware part, be set, data access, whereby may be used
To allow hardware part to defend and blocking virus, the attack for kidnapping software and hacker.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part can only
Above-mentioned directly online or with relevant action that is wired, being backed up and restored in Wireless LAN, connected because it does not have
The function of internet can invade to avoid by the Malware of internet.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part is into one
A setup unit and independent wired or wireless Port are had in step, the setup unit can set hardware part to host computer
Data backup and reduction program setting, the setup unit must be defeated by the independent wired or wireless input of hardware part
Port connection external equipment (such as running gear, keyboard, mouse or display) just can be carried out the operation and setting of hardware part out,
The connection of external equipment and hardware part is online independently of hardware part and host computer, is mutually isolated each other, because that can not lead to
Setting and operation that host computer carries out hardware part are crossed, therefore it is online by host computer to can avoid virus, kidnapping software and hacker
Invade hardware part.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part is into one
A detecting alarm unit is had in step, the detecting alarm unit mainly detects the data replicated in access space, Yi Jisuo
Whether the data in the host computer to be replicated are abnormal, and the detecting alarm unit further controls a warning component of hardware part
Generate warning message prompting;The warning component is loudspeaker, buzzer, flashing lamp or acousto-optic component, can also be pacified in host computer
An application program with alarm function is filled, by online with host computer, notice host computer acousto-optic, news in brief, mail
Etc. modes propose alert news, notify user.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part is into one
Step is equipped with a switching switch, and the switching switch can forcibly close the online running between hardware part and host computer, can be used for
System propose virus or hacker attacks warn when automatic or manual cutting hardware part and host computer it is online.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part can be set
It sets either separately positioned in an at least host computer.
According to the second aspect of the invention, the present invention provides a kind of active network backup device, the active networks
Backup device is switched including an entity security, and the active network backup device includes: an at least host computer and a hardware part;Institute
Stating host computer includes a permission unit;With directly online or wired, wireless between the hardware part and at least a host computer
LAN connection mode interlinks, and an access space is equipped in the hardware part, access at least host computer duplication
Data, the data that the open reading permission of the permission unit of an at least host computer makes hardware part actively carry out single direction are grabbed
The open write-in permission of the permission unit does single direction write-in number to hardware part when taking duplication, and needing to restore Backup Data
According to, reduction backup data telegram in reply brain server;In addition, the hardware part is switched including an entity security, the entity security is opened
Opening and closing for at least one wired or wireless independent input output Port for controlling hardware part is closed, the independent input is defeated
Port is used to connect external input device to carry out the program setting of the backup-and-restore of setting hardware part out.The entity peace
Full switch by least by a manual switch or tapered end or identification of fingerprint or iris identification constituted;Wherein, when administrative staff need
Before hardware part is carried out or changed to the setting of host computer, it is necessary to be gone to open the entity security switch with artificial operation
Independent input and output Port could be used, to carry out the setting of hardware part, administrative staff operate as the occasion requires so as to confirmation
Behavior, with prevent robot program it is astonished enter.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part includes
One identity identification unit recognizes if not identification of fingerprint or iris after entity security switch is opened as the occasion requires by personnel, then should
Administrative staff must input the identity validations program such as password, speech recognition again, just can login and operate hardware part, to ensure as the occasion requires
Operation is administrative staff.
As the further explanation to active network backup device of the present invention, it is preferable that the entity security is opened
Close include an automatic time switch, if receiving correct setting message during effective timing, will reclocking, postpone
Online function is automatically closed, with prevent the administrative staff operated as the occasion requires forget close the independent input and output Port of hardware part with
The keyboard that must be used when setting hardware part, mouse, screen, mobile phone, portable equipment etc. external input output equipment it
Between connection.
As the further explanation to active network backup device of the present invention, it is preferable that the self-clocking is opened
Pass can first propose that online warning will be closed after reaching closedown condition, as long as user operates an entity security switch again
Or the correct setting message of input can postpone automatic closing function again.
According to the third aspect of the invention we, the present invention provides a kind of active network backup devices, including exclude to destroy shelves
The function of case instruction, the active network backup device includes: an at least host computer and a hardware part;The host computer packet
Include a permission unit;With direct online or wired, wireless LAN connection between the hardware part and at least a host computer
Mode interlinks, equipped with the access space access data that at least a host computer is replicated in the hardware part, it is described extremely
The open data grabber duplication read permission and hardware part is made to carry out single direction of the permission unit of a few host computer, and need
The open write-in permission of the permission unit does the number of single direction write-in data, reduction backup to hardware part when restoring Backup Data
According to telegram in reply brain server;Wherein, in order to back up the safety of file, the hardware part can not execute destructive instruction, such as delete, repair
Change, file opening (execute archives) etc. can destroy or change the instructions of archives, only not disruptive instruction is such as established, is removed
It moves, duplication, backup, reduction etc., when hardware part unfortunately backs up the data being finally infected, because the virus can not be
It is executed in hardware part or running also can avoid sending out because setting mistake so the data of completion are had backed up before can not destroying
It is raw accidentally to delete equal unexpected, or it is kidnaped software or Malware disguises oneself as setting program, is executed and broken after being downloaded by careless user
Bad archives.
As the further explanation to active network backup device of the present invention, it is preferable that the hardware part includes
External backup media dedicated concatenation port, the concatenation port is moved old expired in access space to connect storage media
Backup Data to save space, when instruction is moved in execution, if being not inserted into external media, will be unable to complete move instruction
And stop.
Active network backup device provided by the invention stores hardware space by independent, and does not have any internet and join
The design of machine, enable Secure Manager accurately Backup Data without being destroyed, it is often more important that through various softwares it is hard
It the considerations of means and human nature factor of part, protects layer by layer, strengthens the safety of archives.And will be executed automatically after the completion of setting,
It is not necessary to manpower intervention, the human factors such as lazy, forgetting is avoided to influence file security, is a kind of invention that practicability is splendid.This hair
Backing up for the offer data of bright offer has absolute safety, and can be convenient, is rapidly performed by classification, compression, encryption etc.,
In addition to the data that protection standby will deposit, entire backup and reduction process is that the work of access data is actively done by hardware part CPU,
Will not occupy the resource in script computer or network storage equipment and space, improve the prior art on carrying out data backup because
Its host computer or network storage equipment etc. can be connected to internet so that be easy by hacker, virus invasion and corrupted,
The problems such as kidnapping, occurs.The present invention is a kind of quite with the invention of practicability and progressive, and industrial circle is quite worth to be promoted,
And make society know.
Detailed description of the invention
Fig. 1 is block schematic diagram of the invention.
The reference numerals are as follows:
Host computer 1, permission unit 11, hardware part 2, access space 21, the whole unit 22 of remittance, control unit 23, setting are single
Member 24, Port 25, detecting alarm unit 26, identity identification unit 27, concatenation port 28, warning component 3, switching switch 4, entity
Safety switch 5, automatic time switch 52.
Specific embodiment
In order to enable auditor to further appreciate that structure of the invention, feature and other purposes, now in conjunction with appended preferable
Embodiment is accompanied by attached drawing, and detailed description are as follows, this attached drawing embodiment described is only used to illustrate the technical scheme of the present invention, and
The non-limiting present invention.
It please refers to shown in Fig. 1, present invention tool is a kind of active net there are three types of embodiment, first the first embodiment
Network backup device, the active network backup device include: an at least host computer 1 and a hardware part 2, and host computer 1 includes one
Permission unit 11;With directly online or with wired, wireless LAN connection side between hardware part 2 and at least a host computer 1
Formula interlinks, and hardware part 2 is internal or external to access the data that at least a host computer 1 is replicated equipped with an access space 21,
The data grabber that the open reading permission of the permission unit 11 of an at least host computer 1 makes hardware part 2 actively carry out single direction is multiple
System, and the open write-in permission of permission unit 11 to hardware part 2 does single direction write-in data, also when needing to restore Backup Data
The data telegram in reply brain server 1 of its former backup, have in hardware part 2 remittance whole unit 22 data in access space 21 are carried out it is whole
The progress of host computer 1 reading data, data are written in reason, layout and an interior control unit 23 control hardware part 2 that has, with
And the running of hardware part 2;Wherein, host computer 1 and other network equipments can not login hardware part 2, set, data are deposited
It takes, hardware part 2 can be allowed to have at least a independent Backup Data of safety with certain defence whereby, and simultaneously blocking virus, kidnapping are soft
(the aforementioned technical characteristics for the main embodiment of the present invention, correspond to the interior of the claim of this application 1 for the attack of part and hacker
Hold, is able to know the purpose of the present invention and embodiment in detail, and technical characteristic described in remaining dependent claims is for right
It is required that the detailed description or additional technical feature of 1 content, rather than the confining spectrum to limit claim 1, it should be appreciated that the application right
It is required that 1 does not necessarily include technical characteristic described in remaining dependent claims).
What general incorporated business either had that the archives of high secret are most afraid of is exactly Malware, kidnaps software, disease
Invasion, infection, the attack of poison and hacker, especially in the state of having Internet connection, the above problems such as virus, Malware
It is most readily by the online of internet and flees everywhere, cause various data, archives, software inside host computer etc. by
Poison, kidnapping etc. so that the archives of arduous production, data all throw to the winds, although have on the market so-called firewall and gas defence,
The assistance of antitheft software, but possessed ability and effect are really limited, and according to progress scientific and technological now and person who is ambitious or tenacious of purpose
Under the malice of scholar, then all still leaky presence of high-strength firewall, security software, having only to back up at any time and persistently can just subtract
Few loss, therefore the present invention is linked under setting by the non-the Internet mode between hardware part 2 and host computer 1, allows hardware part 2
Individually become independent component, and the relationship between hardware part 2 and host computer 1 only has permission unit 11 to have to open and hardware
The permission transmitted between part 2, and can only limit the crawl of 2 single direction of hardware part, the data in backup host computer 1 and store
In access space 21, then by the whole unit 22 of remittance in hardware part 2 by the data in be copied into access space 21 into
Row collating sort, this mode completely without the use by internet, be greatly decreased virus, kidnapping software, hacker via because
Special net and attack, invade;In addition, the standby of hardware part 2 can be passed through when incorporated business is because of the loss of data in host computer 1
The data for giving script for change are deposited, but when the data in hardware part 2 will revert back host computer 1, are only capable of through host computer 1 to hardware
Part 2 opens permission, and the data for being located at (not being destroyed) not infected in access space 21 originally is allowed to revert back host computer one by one
1, thus user can continue operation from the course of script, not will cause the loss of archives and must remake cost
More spirit and physical strength.
According to aforementioned first embodiment of the invention, be necessary between hardware part 2 and host computer 1 directly it is online or
It is related to reduction to the data backup of host computer 1 dynamic using hardware part 2 is carried out under wired, Wireless LAN framework
Make, because hardware part 2 itself does not have the function of connecting internet, and cannot be controlled and be deposited by host computer 1 etc. equipment
Access evidence can thus prevent hardware part 2 and be invaded by Malware, virus, kidnapping software etc., be avoided standby
The data that part is completed are destroyed.In addition, please referring to shown in Fig. 1, the present invention is further interior in the design of hardware part 2 to have one
Wired, the wireless Port 25 of setup unit 24 and an independent work, wherein setup unit 24 can be directed to hardware part 2
To the program setting of the data backup reduction of host computer 1, hardware part 2 for example can be set to computer by setup unit 24
The setting that the significant data of host 1 is backed up, such as: data selection, backup cycle, backup address, go back setting for original date
Fixed (reduction how long Qian data) etc., above-mentioned is all only the type enumerated explanation and be not limited to set, furthermore setup unit
24 must can just allow user single by setting by the independent Port 25 of hardware part 2 with wired or wireless connection
First 24 pairs of hardware parts 2 are operated and are set, and Port 25 can connect external equipment and provide user's operation, aforementioned meaning
External equipment such as running gear, keyboard, mouse or display etc., and external equipment passes through Port 25 to hardware part 2
Connection can't interfere different from the connection relationship between hardware part 2 and host computer 1, therefore two kinds online are mutually isolated
State can invade hardware part 2 by host computer 1 to avoid virus, kidnapping software, hacker whereby, please refer to shown in Fig. 1.
It please refers to shown in Fig. 1, in order to allow user hardware part 2 can be judged for the standby of host computer 1 in first time
Part, the data of reduction whether be normal, therefore hardware part 2 further in have a detecting alarm unit 26, detecting warning is single
Member 26 mainly detects the data replicated in access space 21, and whether the data in the host computer 1 to be replicated are abnormal,
Detect a warning component 3 generation warning message prompting that alarm unit 26 further controls hardware part 2;Warning component 3 be loudspeaker,
Buzzer, flashing lamp or acousto-optic component, when hardware part 2 backs up host computer 1, if it find that data to back up
When having abnormal data variation, detecting alarm unit 26 is because be at any time under the running checked, so that detecting problem
When just will start a warning component 3 generate alarm abnormal message prompting, or notice host computer or user portable equipment
Upper proposition alert news, the user that can thus provide hardware part 2 quickly learn 1 generation problem of host computer, exception;Separately
Outside, the set-up mode of hardware part 2 of the present invention can oneself be independent work and be separate design or hardware with host computer 1
Part 2 be built into an at least host computer 1 or the network storage equipments 1 such as NAS inside.
Finally, the present invention is further provided with a switching switch 4 in the design of hardware part 2, mainly it is to provide user and exists
It can stop operating immediately when finding the problem, hardware part 2 thus can be forcibly closed by the setting of switching switch 4
Online running between host computer 1, can be used for system propose virus or hacker attacks warn when automatic or manual cutting or
Stop the connection between hardware part 2 and host computer 1, ensures hardware part 2, the safety inside host computer 1 whereby, and
The integrity degree of data, please refers to shown in Fig. 1.
According to the first embodiment of aforementioned present invention, second of embodiment and the difference of the first are only that hardware
Part 2 is equipped with an entity security switch 5, and entity switching switch 4 controls a wired or wireless independent input output of hardware part 2
The open and close of Port 25, independent input and output Port 25 are used to set the program of the backup-and-restore of hardware part 2
Setting.Entity security switch 5 is please referred to be at least made of a manual switch or the identification of tapered end or identification of fingerprint or iris
Shown in Fig. 1, before administrative staff need to carry out or change body hardware part 2 to the setting of host computer 1, it is necessary to artificial behaviour
Go open entity safety switch 5 that could use independent input and output Port 25, to carry out the backup or reduction of hardware part 2
Setting, so as to confirmation administrative staff be the behavior operated as the occasion requires, with prevent robot program it is astonished enter, please refer to shown in Fig. 1.
Above-mentioned explanation is connected, in order to ensure being the running of user's unlatching hardware part 2, therefore hardware part 2 further includes
There is an identity identification unit 27, after entity security switch 5 is opened as the occasion requires by personnel, is distinguished if not identification of fingerprint or iris
Knowing, then the administrative staff must input the identity validations program such as password, speech recognition again, hardware part 2 just can be logined and operate, with
That ensure to operate as the occasion requires is administrative staff (user), is please referred to shown in Fig. 1;In order to thoroughly reach pre- anti-virus, kidnapping
The invasion of software, it is necessary to the time that certain limitation user uses, therefore entity security switch 5 includes an automatic time switch
52, if receiving correct setting message during effective timing, will reclocking, postponement online function is automatically closed,
It is on the contrary to prevent the administrative staff operated as the occasion requires from forgetting to close hardware part 2 and set the Port 25 between input equipment to connect
If within effective time not yet correct setting message when, be momentarily turned off hardware part 2 and setting input equipment between it is independent
Input and output Port 25 is online, and intentional virus, software is avoided to invade hardware part 2 by the input equipment that this is linked, from
Dynamic time switch 52 (time to) after reaching closedown condition can first propose that online warning will be closed, as long as user grasps again
Automatic closing function can be postponed again by making an entity security switch 5 or the correct setting message of input, as shown in Figure 1.
Finally, third embodiment of the invention is different from first two embodiment, focus on to back up file
Safety, hardware part 2 can not execute destructive instruction, such as delete, modification, file opening (execution archives) can be destroyed or be changed
The instruction of archives, only not disruptive instruction, such as establish, move, replicate, back up, restore, when hardware part is unfortunately standby
When the data that part is finally infected, because the virus can not be executed or be operated in hardware part, it can not be destroyed
Before have backed up the data of completion, also can avoid occurring accidentally to delete because setting mistake it is equal surprisingly, or the software or maliciously soft that is kidnaped
Part disguises oneself as setting program, is executed after careless user's downloading and destroys archives;In addition, hardware part 2 includes external backup matchmaker
Body dedicated concatenation port 28, old expired Backup Data in access space is moved at concatenation port 28 to connect storage media
To save space, when instruction is moved in execution, if being not inserted into external media, it will be unable to complete to move instruction and stop, asking
With reference to shown in Fig. 1.
In conclusion active network backup device of the invention, in the practicality and cost-effectiveness, strictly comply fully with
Needed for developing in industry, and provided architecture invention also has unprecedented innovative structure, and compared with prior art
The present invention also substantially increases using effect, while having novelty and creativeness.
It is to be understood that foregoing invention content and specific embodiment are intended to prove technical solution provided by the present invention
Practical application should not be construed as limiting the scope of the present invention.Those skilled in the art are in spirit and principles of the present invention
It is interior, when can various modifications may be made, equivalent replacement or improvement.Protection scope of the present invention is subject to the appended claims.
Claims (12)
1. a kind of active network backup device, which is characterized in that the active network backup device includes:
An at least host computer (1), host computer (1) include a permission unit (11);
One hardware part (2), by directly online or with wired, wireless local area between hardware part (2) and an at least host computer (1)
Network on-line mode interlinks, and internal or external a be equipped with access space (21) of hardware part (2) access an at least host computer
(1) data replicated, the permission unit (11) of an at least host computer (1), which is set as the open permission that reads, makes hardware part (2) actively
Permission unit (11) open write-in permission is to hard when carrying out the data grabber duplication of single direction, and needing to restore Backup Data
Body part (2) does the data telegram in reply brain server (1) of single direction write-in data, reduction backup, has the whole list of a remittance in hardware part (2)
First (22) arrange the data in access space (21), layout, compression, encryption etc. and interior has a control unit
(23) control hardware part (2) carries out reading data, data write-in and the running of hardware part (2) to host computer (1);
Wherein, host computer (1) and other network equipments can not login hardware part (2), be set, data access, whereby
Hardware part (2) can be allowed to defend the attack of simultaneously blocking virus, kidnapping software and hacker.
2. active network backup device as described in claim 1, which is characterized in that hardware part (2) can only be above-mentioned direct
Machine or relevant action that is wired, being backed up and restored in Wireless LAN can be kept away without the function of connecting internet
Exempt to be invaded by the Malware of internet.
3. active network backup device as described in claim 1, which is characterized in that have one in hardware part (2) is further and set
Order member (24) and independent wired or wireless Port (25), setup unit (24) can set hardware part (2) to host computer
(1) data backup and reducing program, setup unit (24) must be defeated by the independent wired or wireless input of hardware part (2)
Port (25) connection external equipment (such as running gear, keyboard, mouse or display) just can be carried out the operation of hardware part (2) out
With setting, the connection of external equipment and hardware part (2) is online independently of hardware part (2) and host computer (1), each other mutually
Be isolated, because can not by host computer (1) carry out hardware part (2) setting and operation, therefore can avoid virus, kidnapping software with
Hacker passes through host computer (1) online invasion hardware part (2).
4. active network backup device as described in claim 1, which is characterized in that have one in hardware part (2) is further and detect
It surveys alarm unit (26), the data replicated in access space (21), or the electricity to be replicated mainly are detected in detecting alarm unit (26)
Whether the data in brain server (1) are abnormal, and detecting alarm unit (26) further controls warning component (3) report of hardware part (2)
It is alert;Warning component (3) is loudspeaker, buzzer, flashing lamp or acousto-optic component, can also install a tool warning function in host computer (1)
The application program of energy, by online with host computer (1), notice host computer (1) is mentioned with modes such as acousto-optic, news in brief, mails
Alert news out notifies user.
5. active network backup device as described in claim 1, which is characterized in that hardware part (2) is further provided with a switching
It switchs (4), switching switch (4) can forcibly close the online running between hardware part (2) and host computer (1), can be used for system
It proposes automatic or manual cutting when virus or hacker attacks warn or stops the online of hardware part (2) and host computer (1).
6. active network backup device as described in claim 1, which is characterized in that hardware part (2) can be set to an at least computer
It is in host (1) or separately positioned.
7. a kind of active network backup device, the active network backup device includes entity security switch (5), and feature exists
In the active network backup device includes:
An at least host computer (1), host computer (1) include a permission unit (11);
One hardware part (2), with directly online or with wired, WLAN between hardware part (2) and an at least host computer (1)
Network on-line mode interlinks, and hardware part (2) is internal or external to be equipped with an access space (21), accesses an at least host computer
(1) data replicated, the permission unit (11) of an at least host computer (1) is open read permission make hardware part (2) actively into
The data grabber of row single direction replicates, and when needing to restore Backup Data permission unit (11) open write-in permission to hardware
Part (2) does the data telegram in reply brain server (1) of single direction write-in data, reduction backup;Hardware part (2) includes that an entity security is opened
It closes (5), at least one wired or wireless independent input that entity security switchs (5) control hardware part (2) exports Port (25)
Open and close, independent input and output Port (25) be used for connect external input device with carry out setting hardware part (2) it is standby
The program setting of part and reduction, entity security switch (5) are at least distinguished by a manual switch or tapered end or identification of fingerprint or iris
Knowledge is constituted;
Wherein, before administrative staff need to carry out or change hardware part (2) to the setting of host computer (1), it is necessary to artificially
Operation go open entity safety switch (5) that independent input and output Port (25) could be used, to carry out hardware part (2)
Setting, so as to confirmation administrative staff be the behavior operated as the occasion requires, with prevent robot program it is astonished enter.
8. active network backup device as claimed in claim 7, which is characterized in that hardware part (2) includes an identity identification list
First (27) recognize, then administrator after entity security switch (5) is opened as the occasion requires by personnel if not identification of fingerprint or iris
Member must input the identity validations program such as password, speech recognition again, hardware part (2) just can be logined and operate, to ensure to grasp as the occasion requires
That make is administrative staff.
9. active network backup device as claimed in claim 7, which is characterized in that it includes one automatic that entity security, which switchs (5),
Time switch (52), if receiving correct setting message during effective timing, will reclocking, postponement is automatically closed
Online function prevents the administrative staff operated as the occasion requires from forgetting to close hardware part (2) independent input and output Port (25) and set
Determine the keyboard that must be used when hardware part (2), mouse, screen, mobile phone, portable equipment etc. external input output equipment it
Between connection.
10. active network backup device as claimed in claim 9, which is characterized in that automatic time switch (52) is reaching pass
It after closing condition can first propose that online warning will be closed, as long as user operates an entity security switch (5) again or inputs
Correct setting message can postpone automatic closing function again.
11. a kind of active network backup device, the active network backup device includes the function of excluding to destroy archives instruction,
It is characterized in that, the active network backup device includes:
An at least host computer (1), host computer (1) include a permission unit (11);
One hardware part (2), with direct online or wired, Wireless LAN between hardware part (2) and an at least host computer (1)
On-line mode interlinks, and hardware part (2) is internal or external to be equipped with an access space (21) access at least host computer (1) again
The data of system, the open permission that reads of the permission unit (11) of an at least host computer (1) make hardware part (2) to carry out single direction
Data grabber duplication, and when needing to restore Backup Data the open write-in permission of permission unit (11) done to hardware part (2) it is single
Direction write-in data, the data telegram in reply brain server (1) for restoring its backup;
Wherein, in order to back up the safety of file, hardware part (2) can not execute destructive instruction, such as delete, modification, file opening
The instruction of archives can be destroyed or be changed to (execute archives) etc., only not disruptive instruction such as establish, move, replicating, backing up,
Reduction etc., when hardware part (2) back up the data being finally infected, because the virus can not be held in hardware part (2)
Row or running also be can avoid occurring accidentally to delete because setting mistake etc. and anticipated so the data of completion are had backed up before can not destroying
Outside, it or is kidnaped software or Malware disguises oneself as setting program, is destroyed archives after being executed after careless user's downloading.
12. active network backup device as claimed in claim 11, which is characterized in that hardware part (2) includes external backup matchmaker
Dedicated concatenation port (28) of body, concatenation port (28) is moved old expired in access space (21) to connect storage media
Backup Data is to save space, when instruction is moved in execution, if being not inserted into external media, will move instruction because being unable to complete
And stop.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710423668.0A CN109002371A (en) | 2017-06-07 | 2017-06-07 | Active network backup device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710423668.0A CN109002371A (en) | 2017-06-07 | 2017-06-07 | Active network backup device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109002371A true CN109002371A (en) | 2018-12-14 |
Family
ID=64573886
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710423668.0A Pending CN109002371A (en) | 2017-06-07 | 2017-06-07 | Active network backup device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109002371A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030018657A1 (en) * | 2001-07-18 | 2003-01-23 | Imation Corp. | Backup of data on a network |
US20080104145A1 (en) * | 2006-06-23 | 2008-05-01 | Derrell Lipman | Method and appartus for backup of networked computers |
CN102929522A (en) * | 2011-08-05 | 2013-02-13 | 诺基亚公司 | Controlling responsiveness to user inputs |
US20150098348A1 (en) * | 2013-10-09 | 2015-04-09 | Kabushiki Kaisha Toshiba | Wireless communicaton device, wireless communication system, wireless communication method, and wireless apparatus |
CN106569909A (en) * | 2016-09-26 | 2017-04-19 | 山东浪潮商用系统有限公司 | Backup device, system and method, and computer readable medium |
-
2017
- 2017-06-07 CN CN201710423668.0A patent/CN109002371A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030018657A1 (en) * | 2001-07-18 | 2003-01-23 | Imation Corp. | Backup of data on a network |
US20080104145A1 (en) * | 2006-06-23 | 2008-05-01 | Derrell Lipman | Method and appartus for backup of networked computers |
CN102929522A (en) * | 2011-08-05 | 2013-02-13 | 诺基亚公司 | Controlling responsiveness to user inputs |
US20150098348A1 (en) * | 2013-10-09 | 2015-04-09 | Kabushiki Kaisha Toshiba | Wireless communicaton device, wireless communication system, wireless communication method, and wireless apparatus |
CN106569909A (en) * | 2016-09-26 | 2017-04-19 | 山东浪潮商用系统有限公司 | Backup device, system and method, and computer readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Moore | Detecting ransomware with honeypot techniques | |
Ahmed et al. | Scada systems: Challenges for forensic investigators | |
US20180375826A1 (en) | Active network backup device | |
Formby et al. | Out of control: Ransomware for industrial control systems | |
Song et al. | Security enhancement against insiders in cyber-manufacturing systems | |
Tu et al. | Data loss prevention management and control: Inside activity incident monitoring, identification, and tracking in healthcare enterprise environments | |
CN109002371A (en) | Active network backup device | |
Kelty | The morris worm | |
Vatsyayan et al. | A detailed investigation of popular attacks on cyber physical systems | |
AlKilani et al. | Data exfiltration techniques and data loss prevention system | |
CN207051883U (en) | Active network backup device | |
Connell et al. | Cerebro: a platform for collaborative incident response and investigation | |
Zeybek et al. | A study on security awareness in mobile devices | |
TWI665579B (en) | Active network backup | |
Cappelli et al. | The Key to Successful Monitoring for Detection of Insider Attacks | |
Syambas et al. | Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics. | |
TWM553005U (en) | Active network backup device | |
Tuptuk et al. | Crime in the age of the Internet of Things | |
Alharbi | Developing cost-effective cybersecurity management system for academic institutions in saudi arabia | |
Tapsoba | Ransomware: Offensive warfare using cryptography as a weapon | |
Stimmel | Emerging security and data privacy challenges for utilities: case studies and solutions | |
Kausar et al. | Analysis of the cyber security challenges and solutions | |
Bingham | Russia's Continued Cyber Operations Targeting its Adversaries' Energy Sectors | |
Stevens et al. | Contingency Planning for Data Breaches | |
Wang et al. | Challenges and solutions for network security in the information age |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181214 |