CN103530556A - Control system effectively preventing computer from being attacked by hacker and viruses and data stealing - Google Patents

Control system effectively preventing computer from being attacked by hacker and viruses and data stealing Download PDF

Info

Publication number
CN103530556A
CN103530556A CN201310352126.0A CN201310352126A CN103530556A CN 103530556 A CN103530556 A CN 103530556A CN 201310352126 A CN201310352126 A CN 201310352126A CN 103530556 A CN103530556 A CN 103530556A
Authority
CN
China
Prior art keywords
computer
hacker
computing machine
data
control system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310352126.0A
Other languages
Chinese (zh)
Inventor
陈玉康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANTONG TENGQI E-COMMERCE Co Ltd
Original Assignee
NANTONG TENGQI E-COMMERCE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANTONG TENGQI E-COMMERCE Co Ltd filed Critical NANTONG TENGQI E-COMMERCE Co Ltd
Priority to CN201310352126.0A priority Critical patent/CN103530556A/en
Publication of CN103530556A publication Critical patent/CN103530556A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Abstract

The invention belongs to the reform of computer hardware technologies and particularly relates to a control system effectively preventing a computer from being attached by a hacker and viruses and data stealing. The purpose is to overcome the defects in the prior art. Under the condition of computer networking, the working mode of the user computer can not be changed and information of the user computer can not be stolen whatever technical measures and means the hacker adopts, and therefore absolute security of the information of the user computer is guaranteed.

Description

Effectively prevent computing machine by hacker and virus attack and steal the control system of data
Technical field:
The present invention belongs to computer hardware technology transformation.Relate in particular to and a kind ofly effectively prevent computing machine by hacker and virus attack and steal the control system of data.
Background technology:
Computer virus is mainly propagated by data file, attack to as if computing machine behaviour
Make system, object is to make its paralysis.The black appearance of computing machine is invaded computing machine and is mainly contained two effects: steal user's private data secret; Destroy operating system of user, make its paralysis.Existing anti-hacker and virus attack technology are all by firewall software and the antivirus software of anti-hacker and cell entry are installed in computing machine; prevent hacker and virus attack; thereby reach the object of protected data; but virus firewall and antivirus software could not immediate updatings sometimes; and be also in a helpless situation hopeless to the new viral code of some hacker master-hands; even some virus can make whole operating system paralysis, and some data file is owing to could not immediate backup being estimated by this loss of information dropout.Along with the continuous expansion of computer network scale, the contradiction of computer information safe problem.On computer network security protection question, the technology and the way that on present society, adopt are a lot.The one, adopt isolation card technology, by system software controls isolation card, select two different hard disks; The 2nd, computing machine adopts two kinds of different operating systems, controls respectively two hard disks; The 3rd, a hard disk partition is become to two different workspaces, by two kinds of different operating systems, control; The 4th, adopt duplex computer, a networking, one does not network; The 5th, connected with network cable while adopting online, way while not surfing the Net, netting twine being disconnected etc.No matter which type of technology of above-mentioned employing and way, have a same deadly defect, is exactly no matter to be storage security information
Hard disk, still store the hard disk of unclassified information, all power up at the same time work, this steals from network user profile just to " network hacker " condition is provided.Technically, as long as computernetworking, hard disk is powering up work, and " network hacker " just can change the working method of subscriber computer from network, and the technical measures of just not taking are stolen user profile, except non-hand disk does not power up work.So the safety precautions that above-mentioned computing machine is taked and way, all can not guarantee being perfectly safe of subscriber computer information.
Summary of the invention
The object of the invention is to overcome the shortcoming of above-mentioned prior art, providing a kind of can have
Effect prevents the anti-hacker of computing machine and the virus attack of computer virus and steals data set.The in the situation that of computernetworking, no matter " network hacker " adopts which type of technical measures and means, all cannot change the working method of subscriber computer, cannot steal the information of subscriber computer, guarantees being perfectly safe of subscriber computer information.
For achieving the above object, the technical solution used in the present invention is: the control of computer operation pattern
Switch processed, computer network lines break-make self-actuated controller and hard disc of computer power control line group three parts.Comprise by data line and power lead and the joining backup harddisk of computing machine, backup harddisk is that CD-ROM drive data line is connected with time IDE mouth, and one end and the power lead of four blade single-throw switch are connected, and the other end and the backup harddisk of four blade single-throw switch are connected.Its structural feature is: mode of operation gauge tap is arranged on subscriber computer panel, make and break contact is connected with hard disk power control line group, power control line group is connected with self-actuated controller with two hard disks of allocation of computer, and self-actuated controller is connected with computer network with computing machine network interface card.
Beneficial effect of the present invention: the present invention is divided into two kinds of mode of operations subscriber computer, a kind of is " safe mode ", another kind is " grid connect mode ".The working mode change of subscriber computer, by the own manual operation of user, " network hacker " cannot change the mode of operation of subscriber computer on the net.Subscriber computer is under " safe mode ", and secret hard disk (hard disk 1) powers up work; Unclassified hard disk (hard disk 2) and self-actuated controller do not power up, and now hard disk is not worked, and netting twine disconnects, and subscriber computer and network depart from.Subscriber computer is under " grid connect mode ", and secret hard disk (hard disk 1) does not power up, and hard disk 1 is not worked; Unclassified hard disk (hard disk 2) and self-actuated controller power up, now hard disk 2 work, and netting twine is connected, and subscriber computer is connected to the network.
1, the present invention has adopted " some automatic multi-controllings " technology, has realized mechanical action with many
The combination of the automatic interlock of point.User is by pulling hand switch, when selecting computer operation pattern, automatically completed that hard disk powers up, hard disk power-off, computer and network connects and the multi-mode operation such as computer and network disconnection, guaranteeing under the condition of safe and reliable operation, reduce to greatest extent manual operation, realized the safety protection function of computing machine.
2, the present invention has adopted 1 double-throw double-break switch, has solved 2 hard disks and 1 simultaneously
The power supply automatic power problem of individual self-actuated controller.System has been selected the annexation of simplifying most in design, has realized optimized circuit combination, has completed the automatic interaction between each component of computer.
3, the present invention adopts secret hard disk and the netting twine technology that opposes each other, in secret hard disk work
Time, netting twine automatic cutout, when secret hard disk does not power up, netting twine is connected automatically.
So which type of technological means no matter " network hacker " take, on network, all can not implement to attack to the hard disk with classified information, can definitely guarantee the safety of secret hard disk information.In a word, assembly of the present invention is few, simple in structure, design science, and reliable in function, is easy to popularize.
Accompanying drawing explanation:
Fig. 1 is structural representation of the present invention.
Embodiment
The present invention includes K switch (mode of operation gauge tap), attaching plug (public affairs) A, electricity
Source plug (mother) B, attaching plug (mother) C, attaching plug (mother) D, netting twine are controlled automatically
Device processed, netting twine 1, netting twine 2.Attaching plug A buttock line 1 (+12V) connects with K switch 5 joints
Connect, buttock line 4 (+5V) is connected with K switch 2 joints, buttock line 2 () and attaching plug B
Buttock line 2 connects, buttock line 3 () be connected with attaching plug B buttock line 3.Attaching plug B tail
Line l is connected with K switch 6 joints, and buttock line 4 is connected with K switch 3 joints; Buttock line 2 is connected with attaching plug C buttock line 2, and buttock line 3 is connected with attaching plug C buttock line 3.Attaching plug C buttock line 1 is connected with K switch 4 joints, and buttock line 4 is connected with K switch 1 joint; Buttock line 1 is connected with attaching plug D buttock line 1 (inwall), and buttock line 3 connects with attaching plug C buttock line 2 (outer wall)
Connect.Netting twine 1 one end is connected with self-actuated controller RBUPLINK mouth.Netting twine 2 one end are connected with self-actuated controller BASE-T mouth 1.The present invention is reached attack protection and is stolen object by hardware means.Adopt after the technical program, during online, by four blade single-throw switch, disconnect the power lead of backup harddisk.At this moment, computing machine can be surfed the Net as common computer.Because backup harddisk connects power lead, do not work, so hacker had both made to enter in computing machine, cannot destroy or steal private data yet; In the time will processing important clothesline, disconnect network, connect backup harddisk, restart computing machine, can process clothesline carefreely.In ferocious age of sticking up of computer virus nowadays, this scheme can also back up and protected data file.General computer virus is all the operating system of invading computing machine, and the data of operating system on a hard disk, is easily damaged and paralyses.And backup harddisk and computer operating system hard disk are separately independently, can effectively prevent that like this computer virus from destroying user's private data.
Comprise by data line and power lead and the joining backup harddisk of computing machine, backup harddisk is that CD-ROM drive data line is connected with time IDE mouth, and one end and the power lead of four blade single-throw switch are connected, and the other end and the backup harddisk of four blade single-throw switch are connected.Its structural feature is: mode of operation gauge tap is arranged on subscriber computer panel, make and break contact is connected with hard disk power control line group, power control line group is connected with self-actuated controller with two hard disks of allocation of computer, and self-actuated controller is connected with computer network with computing machine network interface card.

Claims (3)

1. effectively prevent computing machine by hacker and virus attack and steal the control system of data, it is characterized in that computer operation mode control switch, computer network lines break-make self-actuated controller and hard disc of computer power control line group three divide greatly.
2. according to claim 1ly a kind ofly effectively prevent computing machine by hacker and virus attack and steal the control system of data, it is characterized in that: by data line and power lead and the joining backup harddisk of computing machine, backup harddisk is that CD-ROM drive data line is connected with time IDE mouth, one end and the power lead of four blade single-throw switch are connected, and the other end and the backup harddisk of four blade single-throw switch are connected.
3. according to claim 1ly a kind ofly effectively prevent computing machine by hacker and virus attack and steal the control system of data, it is characterized in that: mode of operation gauge tap is arranged on subscriber computer panel, make and break contact is connected with hard disk power control line group, power control line group is connected with self-actuated controller with two hard disks of allocation of computer, and self-actuated controller is connected with computer network with computing machine network interface card.
CN201310352126.0A 2013-08-14 2013-08-14 Control system effectively preventing computer from being attacked by hacker and viruses and data stealing Pending CN103530556A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310352126.0A CN103530556A (en) 2013-08-14 2013-08-14 Control system effectively preventing computer from being attacked by hacker and viruses and data stealing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310352126.0A CN103530556A (en) 2013-08-14 2013-08-14 Control system effectively preventing computer from being attacked by hacker and viruses and data stealing

Publications (1)

Publication Number Publication Date
CN103530556A true CN103530556A (en) 2014-01-22

Family

ID=49932560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310352126.0A Pending CN103530556A (en) 2013-08-14 2013-08-14 Control system effectively preventing computer from being attacked by hacker and viruses and data stealing

Country Status (1)

Country Link
CN (1) CN103530556A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10331884B2 (en) 2016-10-10 2019-06-25 Stephen Rosa Method and system for countering ransomware
CN110034967A (en) * 2018-01-12 2019-07-19 克洛纳测量技术有限公司 System with electric equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2556721Y (en) * 2002-04-27 2003-06-18 谢寿生 Device for anti-hacker and anti-virus and stealing data for computer
CN2879281Y (en) * 2006-03-30 2007-03-14 谢寿生 Computer hacker, virus attack and data theft proof device based on physical isolation
CN101436241A (en) * 2007-11-16 2009-05-20 沈阳天佳先进技术工程有限公司 Computer network security control system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2556721Y (en) * 2002-04-27 2003-06-18 谢寿生 Device for anti-hacker and anti-virus and stealing data for computer
CN2879281Y (en) * 2006-03-30 2007-03-14 谢寿生 Computer hacker, virus attack and data theft proof device based on physical isolation
CN101436241A (en) * 2007-11-16 2009-05-20 沈阳天佳先进技术工程有限公司 Computer network security control system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10331884B2 (en) 2016-10-10 2019-06-25 Stephen Rosa Method and system for countering ransomware
CN110034967A (en) * 2018-01-12 2019-07-19 克洛纳测量技术有限公司 System with electric equipment

Similar Documents

Publication Publication Date Title
US10360161B2 (en) Cable lock with confidential data protection
CN105556494A (en) Establishing physical presence with a trusted platform module by physically connecting or disconnecting a hot-pluggable device
CN103546478A (en) Internal and external network secure access method and system
CN103530556A (en) Control system effectively preventing computer from being attacked by hacker and viruses and data stealing
CN104615937A (en) Information processing method and mobile terminal
CN101436241A (en) Computer network security control system
WO2022109664A1 (en) Ransomware mitigation system and method for mitigating a ransomware attack
CN110703869A (en) Method and system for controlling plug-pull of NVMe hard disk and related components
CN103235746B (en) Server all-in-one automatic recovery method
CN205721797U (en) A kind of novel computer information safe device
CN205121568U (en) Computer network safety governor
CN102682231A (en) Computer network guard system
CN108304738B (en) Method for managing USB debugging mode, mobile terminal and storage device
CN205103823U (en) Intelligent computer network security gateway
CN102543233B (en) A kind of nuclear plant digital operating standard is relieved the method and system steadily switched
CN103532977A (en) Secure access equipment for intranet and extranet
CN203299824U (en) Computer safety device capable of achieving network physical isolation
CN103942503B (en) Safe state switching system and switching method
CN203799380U (en) Computer network safety controller
CN203084736U (en) Computer network safety control system
CN102708068A (en) Implementation method of software tool for flash drive privacy protection
CN202929633U (en) Computer data information safety device
CN205139924U (en) Computer network security controller
CN104951454A (en) File full life cycle tracking and controlling method
CN2879281Y (en) Computer hacker, virus attack and data theft proof device based on physical isolation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140122