CN103530556A - Control system effectively preventing computer from being attacked by hacker and viruses and data stealing - Google Patents
Control system effectively preventing computer from being attacked by hacker and viruses and data stealing Download PDFInfo
- Publication number
- CN103530556A CN103530556A CN201310352126.0A CN201310352126A CN103530556A CN 103530556 A CN103530556 A CN 103530556A CN 201310352126 A CN201310352126 A CN 201310352126A CN 103530556 A CN103530556 A CN 103530556A
- Authority
- CN
- China
- Prior art keywords
- computer
- hacker
- computing machine
- data
- control system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
Abstract
The invention belongs to the reform of computer hardware technologies and particularly relates to a control system effectively preventing a computer from being attached by a hacker and viruses and data stealing. The purpose is to overcome the defects in the prior art. Under the condition of computer networking, the working mode of the user computer can not be changed and information of the user computer can not be stolen whatever technical measures and means the hacker adopts, and therefore absolute security of the information of the user computer is guaranteed.
Description
Technical field:
The present invention belongs to computer hardware technology transformation.Relate in particular to and a kind ofly effectively prevent computing machine by hacker and virus attack and steal the control system of data.
Background technology:
Computer virus is mainly propagated by data file, attack to as if computing machine behaviour
Make system, object is to make its paralysis.The black appearance of computing machine is invaded computing machine and is mainly contained two effects: steal user's private data secret; Destroy operating system of user, make its paralysis.Existing anti-hacker and virus attack technology are all by firewall software and the antivirus software of anti-hacker and cell entry are installed in computing machine; prevent hacker and virus attack; thereby reach the object of protected data; but virus firewall and antivirus software could not immediate updatings sometimes; and be also in a helpless situation hopeless to the new viral code of some hacker master-hands; even some virus can make whole operating system paralysis, and some data file is owing to could not immediate backup being estimated by this loss of information dropout.Along with the continuous expansion of computer network scale, the contradiction of computer information safe problem.On computer network security protection question, the technology and the way that on present society, adopt are a lot.The one, adopt isolation card technology, by system software controls isolation card, select two different hard disks; The 2nd, computing machine adopts two kinds of different operating systems, controls respectively two hard disks; The 3rd, a hard disk partition is become to two different workspaces, by two kinds of different operating systems, control; The 4th, adopt duplex computer, a networking, one does not network; The 5th, connected with network cable while adopting online, way while not surfing the Net, netting twine being disconnected etc.No matter which type of technology of above-mentioned employing and way, have a same deadly defect, is exactly no matter to be storage security information
Hard disk, still store the hard disk of unclassified information, all power up at the same time work, this steals from network user profile just to " network hacker " condition is provided.Technically, as long as computernetworking, hard disk is powering up work, and " network hacker " just can change the working method of subscriber computer from network, and the technical measures of just not taking are stolen user profile, except non-hand disk does not power up work.So the safety precautions that above-mentioned computing machine is taked and way, all can not guarantee being perfectly safe of subscriber computer information.
Summary of the invention
The object of the invention is to overcome the shortcoming of above-mentioned prior art, providing a kind of can have
Effect prevents the anti-hacker of computing machine and the virus attack of computer virus and steals data set.The in the situation that of computernetworking, no matter " network hacker " adopts which type of technical measures and means, all cannot change the working method of subscriber computer, cannot steal the information of subscriber computer, guarantees being perfectly safe of subscriber computer information.
For achieving the above object, the technical solution used in the present invention is: the control of computer operation pattern
Switch processed, computer network lines break-make self-actuated controller and hard disc of computer power control line group three parts.Comprise by data line and power lead and the joining backup harddisk of computing machine, backup harddisk is that CD-ROM drive data line is connected with time IDE mouth, and one end and the power lead of four blade single-throw switch are connected, and the other end and the backup harddisk of four blade single-throw switch are connected.Its structural feature is: mode of operation gauge tap is arranged on subscriber computer panel, make and break contact is connected with hard disk power control line group, power control line group is connected with self-actuated controller with two hard disks of allocation of computer, and self-actuated controller is connected with computer network with computing machine network interface card.
Beneficial effect of the present invention: the present invention is divided into two kinds of mode of operations subscriber computer, a kind of is " safe mode ", another kind is " grid connect mode ".The working mode change of subscriber computer, by the own manual operation of user, " network hacker " cannot change the mode of operation of subscriber computer on the net.Subscriber computer is under " safe mode ", and secret hard disk (hard disk 1) powers up work; Unclassified hard disk (hard disk 2) and self-actuated controller do not power up, and now hard disk is not worked, and netting twine disconnects, and subscriber computer and network depart from.Subscriber computer is under " grid connect mode ", and secret hard disk (hard disk 1) does not power up, and hard disk 1 is not worked; Unclassified hard disk (hard disk 2) and self-actuated controller power up, now hard disk 2 work, and netting twine is connected, and subscriber computer is connected to the network.
1, the present invention has adopted " some automatic multi-controllings " technology, has realized mechanical action with many
The combination of the automatic interlock of point.User is by pulling hand switch, when selecting computer operation pattern, automatically completed that hard disk powers up, hard disk power-off, computer and network connects and the multi-mode operation such as computer and network disconnection, guaranteeing under the condition of safe and reliable operation, reduce to greatest extent manual operation, realized the safety protection function of computing machine.
2, the present invention has adopted 1 double-throw double-break switch, has solved 2 hard disks and 1 simultaneously
The power supply automatic power problem of individual self-actuated controller.System has been selected the annexation of simplifying most in design, has realized optimized circuit combination, has completed the automatic interaction between each component of computer.
3, the present invention adopts secret hard disk and the netting twine technology that opposes each other, in secret hard disk work
Time, netting twine automatic cutout, when secret hard disk does not power up, netting twine is connected automatically.
So which type of technological means no matter " network hacker " take, on network, all can not implement to attack to the hard disk with classified information, can definitely guarantee the safety of secret hard disk information.In a word, assembly of the present invention is few, simple in structure, design science, and reliable in function, is easy to popularize.
Accompanying drawing explanation:
Fig. 1 is structural representation of the present invention.
Embodiment
The present invention includes K switch (mode of operation gauge tap), attaching plug (public affairs) A, electricity
Source plug (mother) B, attaching plug (mother) C, attaching plug (mother) D, netting twine are controlled automatically
Device processed, netting twine 1, netting twine 2.Attaching plug A buttock line 1 (+12V) connects with K switch 5 joints
Connect, buttock line 4 (+5V) is connected with K switch 2 joints, buttock line 2 () and attaching plug B
Buttock line 2 connects, buttock line 3 () be connected with attaching plug B buttock line 3.Attaching plug B tail
Line l is connected with K switch 6 joints, and buttock line 4 is connected with K switch 3 joints; Buttock line 2 is connected with attaching plug C buttock line 2, and buttock line 3 is connected with attaching plug C buttock line 3.Attaching plug C buttock line 1 is connected with K switch 4 joints, and buttock line 4 is connected with K switch 1 joint; Buttock line 1 is connected with attaching plug D buttock line 1 (inwall), and buttock line 3 connects with attaching plug C buttock line 2 (outer wall)
Connect.Netting twine 1 one end is connected with self-actuated controller RBUPLINK mouth.Netting twine 2 one end are connected with self-actuated controller BASE-T mouth 1.The present invention is reached attack protection and is stolen object by hardware means.Adopt after the technical program, during online, by four blade single-throw switch, disconnect the power lead of backup harddisk.At this moment, computing machine can be surfed the Net as common computer.Because backup harddisk connects power lead, do not work, so hacker had both made to enter in computing machine, cannot destroy or steal private data yet; In the time will processing important clothesline, disconnect network, connect backup harddisk, restart computing machine, can process clothesline carefreely.In ferocious age of sticking up of computer virus nowadays, this scheme can also back up and protected data file.General computer virus is all the operating system of invading computing machine, and the data of operating system on a hard disk, is easily damaged and paralyses.And backup harddisk and computer operating system hard disk are separately independently, can effectively prevent that like this computer virus from destroying user's private data.
Comprise by data line and power lead and the joining backup harddisk of computing machine, backup harddisk is that CD-ROM drive data line is connected with time IDE mouth, and one end and the power lead of four blade single-throw switch are connected, and the other end and the backup harddisk of four blade single-throw switch are connected.Its structural feature is: mode of operation gauge tap is arranged on subscriber computer panel, make and break contact is connected with hard disk power control line group, power control line group is connected with self-actuated controller with two hard disks of allocation of computer, and self-actuated controller is connected with computer network with computing machine network interface card.
Claims (3)
1. effectively prevent computing machine by hacker and virus attack and steal the control system of data, it is characterized in that computer operation mode control switch, computer network lines break-make self-actuated controller and hard disc of computer power control line group three divide greatly.
2. according to claim 1ly a kind ofly effectively prevent computing machine by hacker and virus attack and steal the control system of data, it is characterized in that: by data line and power lead and the joining backup harddisk of computing machine, backup harddisk is that CD-ROM drive data line is connected with time IDE mouth, one end and the power lead of four blade single-throw switch are connected, and the other end and the backup harddisk of four blade single-throw switch are connected.
3. according to claim 1ly a kind ofly effectively prevent computing machine by hacker and virus attack and steal the control system of data, it is characterized in that: mode of operation gauge tap is arranged on subscriber computer panel, make and break contact is connected with hard disk power control line group, power control line group is connected with self-actuated controller with two hard disks of allocation of computer, and self-actuated controller is connected with computer network with computing machine network interface card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310352126.0A CN103530556A (en) | 2013-08-14 | 2013-08-14 | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310352126.0A CN103530556A (en) | 2013-08-14 | 2013-08-14 | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103530556A true CN103530556A (en) | 2014-01-22 |
Family
ID=49932560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310352126.0A Pending CN103530556A (en) | 2013-08-14 | 2013-08-14 | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103530556A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10331884B2 (en) | 2016-10-10 | 2019-06-25 | Stephen Rosa | Method and system for countering ransomware |
CN110034967A (en) * | 2018-01-12 | 2019-07-19 | 克洛纳测量技术有限公司 | System with electric equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2556721Y (en) * | 2002-04-27 | 2003-06-18 | 谢寿生 | Device for anti-hacker and anti-virus and stealing data for computer |
CN2879281Y (en) * | 2006-03-30 | 2007-03-14 | 谢寿生 | Computer hacker, virus attack and data theft proof device based on physical isolation |
CN101436241A (en) * | 2007-11-16 | 2009-05-20 | 沈阳天佳先进技术工程有限公司 | Computer network security control system |
-
2013
- 2013-08-14 CN CN201310352126.0A patent/CN103530556A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2556721Y (en) * | 2002-04-27 | 2003-06-18 | 谢寿生 | Device for anti-hacker and anti-virus and stealing data for computer |
CN2879281Y (en) * | 2006-03-30 | 2007-03-14 | 谢寿生 | Computer hacker, virus attack and data theft proof device based on physical isolation |
CN101436241A (en) * | 2007-11-16 | 2009-05-20 | 沈阳天佳先进技术工程有限公司 | Computer network security control system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10331884B2 (en) | 2016-10-10 | 2019-06-25 | Stephen Rosa | Method and system for countering ransomware |
CN110034967A (en) * | 2018-01-12 | 2019-07-19 | 克洛纳测量技术有限公司 | System with electric equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10360161B2 (en) | Cable lock with confidential data protection | |
CN105556494A (en) | Establishing physical presence with a trusted platform module by physically connecting or disconnecting a hot-pluggable device | |
CN103546478A (en) | Internal and external network secure access method and system | |
CN103530556A (en) | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing | |
CN104615937A (en) | Information processing method and mobile terminal | |
CN101436241A (en) | Computer network security control system | |
WO2022109664A1 (en) | Ransomware mitigation system and method for mitigating a ransomware attack | |
CN110703869A (en) | Method and system for controlling plug-pull of NVMe hard disk and related components | |
CN103235746B (en) | Server all-in-one automatic recovery method | |
CN205721797U (en) | A kind of novel computer information safe device | |
CN205121568U (en) | Computer network safety governor | |
CN102682231A (en) | Computer network guard system | |
CN108304738B (en) | Method for managing USB debugging mode, mobile terminal and storage device | |
CN205103823U (en) | Intelligent computer network security gateway | |
CN102543233B (en) | A kind of nuclear plant digital operating standard is relieved the method and system steadily switched | |
CN103532977A (en) | Secure access equipment for intranet and extranet | |
CN203299824U (en) | Computer safety device capable of achieving network physical isolation | |
CN103942503B (en) | Safe state switching system and switching method | |
CN203799380U (en) | Computer network safety controller | |
CN203084736U (en) | Computer network safety control system | |
CN102708068A (en) | Implementation method of software tool for flash drive privacy protection | |
CN202929633U (en) | Computer data information safety device | |
CN205139924U (en) | Computer network security controller | |
CN104951454A (en) | File full life cycle tracking and controlling method | |
CN2879281Y (en) | Computer hacker, virus attack and data theft proof device based on physical isolation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140122 |