CN103530577A - Computer anti-invading system - Google Patents
Computer anti-invading system Download PDFInfo
- Publication number
- CN103530577A CN103530577A CN201310477909.1A CN201310477909A CN103530577A CN 103530577 A CN103530577 A CN 103530577A CN 201310477909 A CN201310477909 A CN 201310477909A CN 103530577 A CN103530577 A CN 103530577A
- Authority
- CN
- China
- Prior art keywords
- power supply
- hard disk
- port
- switch
- change
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Sources (AREA)
Abstract
The invention discloses a computer anti-invading system which comprises a power supply and two hard disks connected with a main board through data wires. The computer anti-invading system is characterized in that the two hard disks are connected with the power supply through a selector switch which is a more-than-three-pole double-throw switch, wherein three pole input end moving contacts are respectively connected with a power supply 12V positive electrode, a power supply 5V positive electrode, a power supply 3.3V positive electrode which provide power for the hard disks, and a 12V port, a 5V port and a 3.3V port of one hard disk are connected with a 12V output end static contact, a 5V output end static contact and a 3.3V static output end static contact on the same side of three poles respectively. A 12V port, a 5V port and a 3.3V port of the other hard disk are connected with a 12V output end static contact, a 5V output end static contact and a 3.3V static output end static contact on the other side of the three poles. A GND common end of the power supply is respectively connected with GND common ends of the two hard disks. An electromagnet is fixedly connected to the selector switch. The two hard disks can be used in a switching mode, so that a computer works in different network environments, and safety and reliability are achieved.
Description
Technical field
The present invention relates to a kind of computer safeguard, particularly relate to a kind of computing machine anti-intrusion system.
Background technology
In the development along with social and scientific and technological progress, computing machine has spread to every field in productive life, has been the instrument that people are indispensable, for productive life has been brought greatly facility.Active computer except in local operation use procedure also with network data exchange frequently, at information society computer virus, spread unchecked overall background under, make our computing machine among risk, information in computing machine exists the danger of leakage constantly, in order to ensure information safety, cause some units to forbid that computing machine is connected with internet, but information society people be unable to do without again network, have to separately establish some computing machines that are connected with internet for people to use, this has increased use cost undoubtedly, in the less enterprise of some scales and family, be that it cannot be born, some capsule information and other information all leave in same hard disk, at computing machine, be subject to virus attack, particularly when some hacker's malicious intrusions, although there is strick precaution software protection, but still be difficult to ensure its security, risk is still very high, how this risk is stopped, still awaiting technological innovation provides better technical scheme to make up, while also having hard disk of a computing machine will fill two cover operating system, also exist inconvenience to need equally to solve.
Summary of the invention
In order to address the above problem, the invention provides a kind of computing machine anti-intrusion system.
The technical solution used in the present invention is: a kind of computing machine anti-intrusion system, comprise power supply, two hard disks that are connected by data line with mainboard, it is characterized in that two hard disks are connected with power supply by a change-over switch, change-over switch is the above double throw switch of three cuttves, wherein three cutter input end moving contacts are connected with power supply 12V, 5V, 3.3V positive pole for hard disk power supply respectively, and the 12V of a hard disk, 5V, 3.3V port are connected with 12V, 5V, the 3.3V output terminal stationary contact of this three cuttves homonymy respectively.The 12V of another piece hard disk, 5V, 3.3V port are connected with 12V, 5V, the 3.3V output terminal stationary contact of this three cuttves opposite side respectively, and the GND common port of power supply is connected with two hard disk GND common ports respectively; In change-over switch, be fixedly connected with an electromagnet, the GND common port of solenoid actuated coil one termination power, the other end is connected with a moving contact in described three cutter input ends, electromagnet core is axially-movable formula armature shaft, armature shaft one end is latch, between the other end and coil rack, be provided with latch to the Compress Spring shrinking in coil rack, moving contact driving handle is provided with two pilot holes, driving handle one of them pilot hole when a stable state aligns with latch, and driving handle another pilot hole when another stable state aligns with latch.
Further, described change-over switch is four blade double throw switch, remains a cutter input end moving contact and is connected with power supply GND common port, and these cutter two output terminal stationary contacts are connected with two hard disk GND common ports respectively.
Further, described change-over switch is 11 double-pole double throw switches, remains eight cutter input end moving contacts and connects respectively eight access netting twines, and the output terminal stationary contact of one group of homonymy of this eight cutter is connected with network interface card by netting twine.
Further, described two hard disc data lines are connected with a switch, then are connected to mainboard by switch, and switch is synchronizeed with change-over switch.
The present invention is by arranging two hard disks, and only make a wherein connection working power by change-over switch, two operating systems that hard disk is all equipped with, one hard disk and internet UNICOM, another hard disk and internet disconnect, and important information can be placed in the hard disk disconnecting with internet and guarantee that the hard disk of its security ,Yu internet UNICOM can be used for communication amusement, compare with two computing machines, saved greatly cost; Two hard disks can pack different operating system into simultaneously, are respectively charged into incompatible software, and software choice for use is more flexible; Change-over switch can be carried out status lock by relay latch and put in addition, during shutdown, relay latch is regained and is not locked and put, moving moving contact driving handle selects to start shooting after hard disk, computer power supply is change-over switch power supply, relay drive coil obtains plug and eject to insert a pilot hole aliging with it and lock and put change-over switch, moving contact driving handle is removed motionless, after computer shutdown, computer power supply power-off latch is regained, and in the time of can preventing computer operation like this, change-over switch misoperation causes computing machine cisco unity malfunction and hardware damage.
Accompanying drawing explanation
Fig. 1 is embodiment of the present invention circuit diagram.
Fig. 2 is embodiment of the present invention change-over switch side-looking perspective structure figure.
Fig. 3 is embodiment of the present invention change-over switch sectional structure chart.
Fig. 4 is that cut-away view is opened in embodiment of the present invention switching.
Number in the figure title: 1 moving contact; 2,3 stationary contacts; 4 driving handles; 5 armature shafts; 6 latches; 7 Compress Springs; 8,9 pilot holes; K change-over switch; YA electromagnet.
Embodiment
The embodiment of the present invention as shown in Figures 1 to 4, this computing machine anti-intrusion system comprises power supply, two hard disks that are connected by data line with mainboard, two hard disks switch K switch by one and are connected with power supply, change-over switch K is triac device, three cutter input end moving contacts 1 are connected with power supply 12V, 5V, 3.3V positive pole for hard disk power supply respectively, and the 12V of a hard disk, 5V, 3.3V port are connected with 12V, 5V, the 3.3V output terminal stationary contact 2 of this three cuttves homonymy respectively.The 12V of another piece hard disk, 5V, 3.3V port are connected with 12V, 5V, the 3.3V output terminal stationary contact 3 of this three cuttves opposite side respectively, the GND common port of power supply is connected with two hard disk GND common ports respectively, moves moving contact driving handle 4 and can make a wherein hard disk be connected to power supply.In the present embodiment change-over switch, be fixedly connected with an electromagnet, solenoid actuated coil working voltage can be 12V, 5V or 3.3V, the GND common port of one termination power, the other end is connected with an isobaric moving contact in described three cutter input ends, electromagnet core is axially-movable formula armature shaft, armature shaft one end is latch 6, between the other end and coil rack, be provided with latch to the Compress Spring 7 shrinking in coil rack, moving contact driving handle 4 is provided with two pilot holes 8, 9, driving handle 4 one of them pilot hole 8 when a stable state aligns with latch 6, driving handle 4 another pilot hole 9 when another stable state aligns with latch 6.
The present embodiment change-over switch can be carried out status lock by relay latch and be put, during shutdown, relay latch is regained and is not locked and put, moving moving contact driving handle selects to start shooting after hard disk, computer power supply is change-over switch power supply, relay drive coil obtains plug and eject to insert a pilot hole aliging with it and lock and put change-over switch, moving contact driving handle is removed motionless, after computer shutdown, computer power supply power-off latch is regained, and in the time of can preventing computer operation like this, change-over switch misoperation causes computing machine cisco unity malfunction and hardware damage.During the present embodiment computer operation, change-over switch only makes a wherein connection working power, two operating systems that hard disk is all equipped with, one hard disk and internet UNICOM, another hard disk and internet disconnect, important information can be placed in the hard disk disconnecting with internet and guarantee its security, can be used for communication amusement with the hard disk of internet UNICOM, compare with two computing machines, saved greatly cost; Two hard disks can pack different operating system into simultaneously, are respectively charged into incompatible software, and software choice for use is more flexible.
During the invention process, change-over switch also can be four blade double throw switch, remains a cutter input end moving contact and is connected with power supply GND common port, and these cutter two output terminal stationary contacts are connected with two hard disk GND common ports respectively, can make dump more thoroughly prevent from disturbing; Change-over switch also can be 11 double-pole double throw switches, remains eight cutter input end moving contacts and connects respectively eight access netting twines, and the output terminal stationary contact of one group of homonymy of this eight cutter is connected with network interface card by netting twine, can realize mechanical suspension, realizes with network and isolating more reliably; Two hard disc data lines can connect a switch, then are connected to mainboard by switch, and switch is synchronizeed with change-over switch, and the data line machinery that can realize the hard disk of not working disconnects; Change-over switch also can adopt the other forms of switches such as knob, is locked and is put equally by relay.
Claims (4)
1. a computing machine anti-intrusion system, comprise power supply, two hard disks that are connected by data line with mainboard, it is characterized in that two hard disks are connected with power supply by a change-over switch, change-over switch is the above double throw switch of three cuttves, wherein three cutter input end moving contacts are connected with power supply 12V, 5V, 3.3V positive pole for hard disk power supply respectively, and the 12V of a hard disk, 5V, 3.3V port are connected with 12V, 5V, the 3.3V output terminal stationary contact of this three cuttves homonymy respectively; The 12V of another piece hard disk, 5V, 3.3V port are connected with 12V, 5V, the 3.3V output terminal stationary contact of this three cuttves opposite side respectively, and the GND common port of power supply is connected with two hard disk GND common ports respectively; In change-over switch, be fixedly connected with an electromagnet, the GND common port of solenoid actuated coil one termination power, the other end is connected with a moving contact in described three cutter input ends, electromagnet core is axially-movable formula armature shaft, armature shaft one end is latch, between the other end and coil rack, be provided with latch to the Compress Spring shrinking in coil rack, moving contact driving handle is provided with two pilot holes, driving handle one of them pilot hole when a stable state aligns with latch, and driving handle another pilot hole when another stable state aligns with latch.
2. computing machine anti-intrusion system according to claim 1, it is characterized in that described change-over switch is four blade double throw switch, remain a cutter input end moving contact and be connected with power supply GND common port, these cutter two output terminal stationary contacts are connected with two hard disk GND common ports respectively.
3. computing machine anti-intrusion system according to claim 1, it is characterized in that described change-over switch is 11 double-pole double throw switches, remain eight cutter input end moving contacts and connect respectively eight access netting twines, the output terminal stationary contact of one group of homonymy of this eight cutter is connected with network interface card by netting twine.
4. according to the arbitrary described computing machine anti-intrusion system of claims 1 to 3, it is characterized in that described two hard disc data lines are connected with a switch, then be connected to mainboard by switch, switch is synchronizeed with change-over switch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310477909.1A CN103530577B (en) | 2013-10-14 | 2013-10-14 | A kind of computer anti-intrusion system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310477909.1A CN103530577B (en) | 2013-10-14 | 2013-10-14 | A kind of computer anti-intrusion system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103530577A true CN103530577A (en) | 2014-01-22 |
CN103530577B CN103530577B (en) | 2016-10-26 |
Family
ID=49932579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310477909.1A Active CN103530577B (en) | 2013-10-14 | 2013-10-14 | A kind of computer anti-intrusion system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103530577B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611189A (en) * | 2012-03-13 | 2012-07-25 | 华为技术有限公司 | Double-power-supply switching device and controlling method thereof |
CN102890619A (en) * | 2011-07-18 | 2013-01-23 | 吴慧敏 | Novel desk computer hard disk selector |
CN203596019U (en) * | 2013-10-14 | 2014-05-14 | 无锡艾科瑞思产品设计与研究有限公司 | Computer anti-invasion system |
-
2013
- 2013-10-14 CN CN201310477909.1A patent/CN103530577B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102890619A (en) * | 2011-07-18 | 2013-01-23 | 吴慧敏 | Novel desk computer hard disk selector |
CN102611189A (en) * | 2012-03-13 | 2012-07-25 | 华为技术有限公司 | Double-power-supply switching device and controlling method thereof |
CN203596019U (en) * | 2013-10-14 | 2014-05-14 | 无锡艾科瑞思产品设计与研究有限公司 | Computer anti-invasion system |
Also Published As
Publication number | Publication date |
---|---|
CN103530577B (en) | 2016-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103391367A (en) | Data anti-theft method in case of mobile phone loss | |
US20100070638A1 (en) | System and a method for secured data communication in computer networks by phantom connectivity | |
CN105844146B (en) | Method and device for protecting driver and electronic equipment | |
CN203596019U (en) | Computer anti-invasion system | |
EP4135140A1 (en) | Driving electric motor control system and method for ensuring safety thereof | |
US7409563B2 (en) | Method and apparatus for preventing un-authorized attachment of computer peripherals | |
CN107908957A (en) | A kind of safe operation management method and system of intelligent terminal | |
US20070214331A1 (en) | Selectable mass storage system | |
CN103530577A (en) | Computer anti-invading system | |
CN214851260U (en) | Intelligent network card out-of-band connection system | |
CN104615937A (en) | Information processing method and mobile terminal | |
CN110046108A (en) | USB peripheral control device, system and its control method | |
CN102662873B (en) | Device for realizing insulation blocking of storage carrier data | |
CN107851171B (en) | Terminating machine with security function | |
US20160170931A1 (en) | Console server with usb console port | |
CN204376944U (en) | Computer network security shielding system | |
CN110389789A (en) | A kind of application control method, equipment and computer readable storage medium | |
CN205003682U (en) | Computer network security isolation system | |
CN205621003U (en) | Computer security controller | |
CN205123779U (en) | Support card to carry USB storage device's network security isolating device | |
CN103001969A (en) | Network security isolating device | |
CN205594636U (en) | Computer network security controller | |
CN209120085U (en) | Anchor driving machine system | |
CN201072548Y (en) | Multi-hard disk anti-disclosure safety recovery device for computer | |
CN202257582U (en) | Single-interface electronically-isolated dual solid state hard disk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200429 Address after: 430000 NO.666, Wuhuan Avenue, airport economic and Technological Development Zone, Wuhan, Hubei Province (10) Patentee after: Wuhan Shanghan Technology Co., Ltd Address before: Building 214070 West Liyuan Development Zone in Jiangsu province Wuxi City No. 599 Building 1 Room 305 Patentee before: WUXI XRESEARCH PRODUCT DESIGN AND RESEARCH Co.,Ltd. |