CN104751036B - A kind of computer information safe system - Google Patents

A kind of computer information safe system Download PDF

Info

Publication number
CN104751036B
CN104751036B CN201510170407.3A CN201510170407A CN104751036B CN 104751036 B CN104751036 B CN 104751036B CN 201510170407 A CN201510170407 A CN 201510170407A CN 104751036 B CN104751036 B CN 104751036B
Authority
CN
China
Prior art keywords
information
computer
module
network
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510170407.3A
Other languages
Chinese (zh)
Other versions
CN104751036A (en
Inventor
刘丽华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi University of Technology
Original Assignee
Shaanxi University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi University of Technology filed Critical Shaanxi University of Technology
Priority to CN201510170407.3A priority Critical patent/CN104751036B/en
Publication of CN104751036A publication Critical patent/CN104751036A/en
Application granted granted Critical
Publication of CN104751036B publication Critical patent/CN104751036B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of computer information safe systems,Wherein,Computer motherboard is connected with computer peripheral,Whether the information that subscriber authentication controller is used to verify user has legal identity,Network security module for identification and judge network whether safety,Whether port security control module opens to the outside world for control computer system external interface,Information tracking module is for accessing,Record accesses the information with download with tracking computer system,Anti-tampering module is electromagnetically shielded for preventing electromagnetic exposure from classified information being caused to be revealed,The present invention is by being arranged subscriber authentication controller,Network information security module,Port security control module,Information tracking module,It is electromagnetically shielded anti-tampering module and data backup module,From multiple angles,Many aspects are monitored and protect to the information of computer information safe system,Improve the security performance of use and the transmission of computer information safe.

Description

A kind of computer information safe system
Technical field
The present invention relates to a kind of computer system, specially a kind of computer information safe system belongs to computer and letter Cease technical field.
Background technology
Computer and computer network have become important information carrier and the transmission of enterprise, government and various other tissues Working efficiency is greatly improved in channel, and the storage and processing of magnanimity information is made to be achieved.Computer and computer network are given The work and life of people brings huge convenience, but also occurs the information security issue being widely noticed therewith.Number letter Why breath safety than traditional data file security is more exposed to concern, is on the one hand since digital information itself is with being easy to The characteristic of duplication, using this characteristic, information is susceptible to be difficult to control and what is traced steals prestige knee, is on the other hand, due to Remote information access facility possessed by computer network makes information be easy the threat for being destroyed, changing and being stolen.It is very bright It is aobvious, it can ensure that the safety of enterprise, government or other organization internal digital informations has been related to calculating to greatest extent Can machine and computer network really become the key factor for the large-scale application for having essential meaning.
A kind of computer information safe system provided by the invention, by the way that subscriber authentication controller, network is arranged Information security module, port security control module, information tracking module, the anti-tampering module of electromagnetic shielding and data backup module, The information of computer information safe system is monitored and is protected from multiple angles, many aspects, substantially increases computer The security performance of use and the transmission of information security, improves the security performance of the departments such as government, enterprise classified information.
Invention content
A kind of computer information safe system provided by the invention, which is characterized in that it includes computer motherboard, computer Peripheral equipment, subscriber authentication controller, network information security module, port security control module, information tracking module, electricity The anti-tampering module of magnetic screen and data backup module, wherein the computer motherboard is connected with the computer peripheral, Whether the information that the subscriber authentication controller is used to verify user there is legal identity, the network security module to be used for It identifies and judges whether network is safe, and whether the port security control module is external for control computer system external interface Open, described information tracking module is used to access, records the information for accessing and downloading with tracking computer system, the electromagnetism Anti-tampering module is shielded for preventing electromagnetic exposure from classified information being caused to be revealed, the data backup module is for storing and backing up Vital document.
Further, preferably, the subscriber authentication controller includes fingerprint or pattern sample devices, computer System safe opening unit, from lock unit and alarm unit, the fingerprint or pattern sample devices are photoelectricity sampling equipment, when When the information that the photoelectricity sampling equipment is acquired is legal, the computer system security opening unit drives trusted computer automatically Security system is ceased to automatically turn on, it is described to be locked automatically from lock unit when the acquired information of photoelectricity sampling setting is illegal The fixed computer information safe system, and the alarm unit is driven to send out the buzzing prompting sound of alarm;The network information peace Full module includes netkey generator, netkey controller, netkey decipher and Network Isolation switch, the net Network key generator is generated using the unique Product sequence number of AT05SC card microcontrollers as seed, and according to certain rule 128 user encryption keys, whether generation of the netkey controller for authentication secret be legal, and judges inputted close Whether key is correct, and the netkey decipher is used to decrypt verification information input by user and carry out pair with encryption key Than the Network Isolation switch includes data information filter, network state detection circuit and network connection block device, the number According to the Method for Filtering Abnormal Information that signal filter detects the network state detection circuit, and the network connection is driven to block Network is carried out blocking isolation by device;The port security control module includes that port controller, port encryption equipment and data pass Defeated encrypted master, wherein the port controller is used to control the keying of the computer information safe system interface, described Setting, the data transmission encryption is encrypted by the interface to the computer information safe system in port encrypted master Controller carries out application cryptoguard to the data transmitted needed for the interface, and carries out the equipment that data interaction is connect with interface After having the password successful matching applied with the port encrypted master, the transmission and transmission of data-interface could be realized.
Further, preferably, described information tracking module includes resource control unit and data follow-up auditing unit, In, the resource control unit carries out real-time online scanning, monitoring and record to computer-internal static resource, when in computer When portion's static resource illegally changes, the information of monitoring is uploaded onto the server and generates evidence text by the resource control unit in real time Part is shown in the display of computer system;The data tracking auditable unit is recorded, is audited, analyzing with tracking entirely in real time Data, configuration Parameters variation, information flow direction, keyboard and the screen of computer information safe system, record from computer port The All Files copy information of output and input, and automatically generate log recording and store.
Further, preferably, the computer peripheral includes printer, PCI slot or mouse, hard disk.
Further, preferably, the invention also includes boot-strap circuit unit, the boot-strap circuit unit is described for controlling The keying of computer motherboard.
A kind of computer information safe system provided by the invention, by the way that subscriber authentication controller, network is arranged Information security module, port security control module, information tracking module, the anti-tampering module of electromagnetic shielding and data backup module, The information of computer information safe system is monitored and is protected from multiple angles, many aspects, substantially increases computer The security performance of use and the transmission of information security, improves the security performance of the departments such as government, enterprise classified information.
Description of the drawings
Fig. 1 is a kind of structure diagram of computer information safe system;
Specific implementation mode
The present invention will be further described below in conjunction with the accompanying drawings.
As is shown in fig. 1, a kind of computer information safe system provided by the invention comprising computer motherboard, calculating Peripheral devices, subscriber authentication controller, network information security module, port security control module, information tracking module, It is electromagnetically shielded anti-tampering module and data backup module, wherein computer motherboard is connected with the computer peripheral, uses Whether the information that authentication controller in family is used to verify user there is legal identity, network security module for identification and to judge Whether network is safe, and whether port security control module opens to the outside world for control computer system external interface, information trace Module is used to access, records the information for accessing and downloading with tracking computer system, to avoid concerning security matters caused by electromagnetic exposure Information leakage, the present invention take scrambling processing, electromagnetic shielding measure, are provided with and are electromagnetically shielded anti-tampering module, which is used for Prevent electromagnetic exposure from classified information being caused to be revealed, the data backup module is for storing and backing up vital document.
Wherein, subscriber authentication controller includes that fingerprint or pattern sample devices, computer system security open list Member, from lock unit and alarm unit, fingerprint or pattern sample devices are photoelectricity sampling equipment, when photoelectricity sampling equipment is acquired Information it is legal when, computer system security opening unit drive automatically computer information safe system automatically turn on, when described When the acquired information of photoelectricity sampling setting is illegal, the computer information safe system is locked automatically from lock unit, and drive The alarm unit sends out the buzzing prompting sound of alarm;The network information security module includes netkey generator, network Cipher controlled device, netkey decipher and Network Isolation switch, the netkey generator use AT05SC card micro-controls The unique Product sequence number of device processed generates 128 user encryption keys, the intelligent chip as seed, and according to certain rule It is that 8 smart card microcontrollers of Atmel companies production are included it can be used to store the key executed needed for cryptographic algorithm 40kb read-only memory, 2kb Electrically Erasable Programmable Read-Only Memory have globally unique 64 product IDs, initialization When, 64 it is product ID as seed using this, 128 user encryptions and decruption key can be generated, with very high peace Full security performance.Whether generation of the netkey controller for authentication secret be legal, and judges whether inputted key is correct, Netkey decipher by verification information input by user for decrypting and being compared with encryption key, Network Isolation switch packet Data information filter, network state detection circuit and network connection block device are included, data information filter will be described network-like The Method for Filtering Abnormal Information that state detection circuit detects, and drive network connection block device that network is carried out blocking isolation;Pacify port Full control module includes port controller, port encryption equipment and data transmission encrypted master, wherein port controller is used for The keying of the computer information safe system interface is controlled, port encrypted master passes through to the computer information safe system Setting is encrypted in the interface of system, and data transmission encrypted master carries out the data transmitted needed for the interface to apply password guarantor Shield, and carry out the password successful matching that the equipment that data interaction is connect only applies with the port encrypted master with interface Afterwards, the transmission and transmission of data-interface could be realized.
Information tracking module includes resource control unit and data follow-up auditing unit, wherein resource control unit is to meter Calculation machine internal stationary resource carries out real-time online scanning, monitoring and record, when computer-internal static resource illegally changes, money It includes the display in computer system that the information of monitoring is uploaded onto the server and generates the instrument of evidence by source control unit in real time In;Data tracking auditable unit is recorded, is audited, analyzes and tracking the data of entire computer information safe system, configure in real time Parameters variation, information flow direction, keyboard and screen record the All Files copy information for exporting and inputting from computer port, And it automatically generates log recording and stores.Computer peripheral includes printer, PCI slot or mouse, hard disk.
In addition, the invention also includes boot-strap circuit unit, boot-strap circuit unit is used for the keying of control computer mainboard.
A kind of computer information safe system provided by the invention, by the way that subscriber authentication controller, network is arranged Information security module, port security control module, information tracking module, the anti-tampering module of electromagnetic shielding and data backup module, The information of computer information safe system is monitored and is protected from multiple angles, many aspects, substantially increases computer The security performance of use and the transmission of information security, improves the security performance of the departments such as government, enterprise classified information.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, in relation to the common of technical field Technical staff can also make a variety of changes and modification without departing from the spirit and scope of the present invention, therefore all Equivalent technical solution also belongs to scope of the invention, and scope of patent protection of the invention should be defined by the claims.

Claims (1)

1. a kind of computer information safe system, which is characterized in that it includes computer motherboard, computer peripheral, user Authentication controller, network information security module, port security control module, information tracking module, electromagnetic shielding are anti-tampering Module and data backup module, wherein the computer motherboard is connected with the computer peripheral, the user identity Whether the information that access control device is used to verify user there is legal identity, the network information security module for identification and to sentence Whether circuit network is safe, and whether the port security control module opens to the outside world for control computer system external interface, institute Information tracking module is stated for accessing, recording the information for accessing and downloading with tracking computer system, the electromagnetic shielding is anti- Interference module is for preventing electromagnetic exposure from classified information being caused to be revealed, and the data backup module is for storing and backing up important text Part;
The subscriber authentication controller include fingerprint or pattern sample devices, computer system security opening unit, from Lock unit and alarm unit, the fingerprint or pattern sample devices are photoelectricity sampling equipment, when the photoelectricity sampling equipment institute When the information of acquisition is legal, the computer system security opening unit drives computer information safe system to open automatically automatically It opens, it is described to lock computerized information peace automatically from lock unit when the information that the photoelectricity sampling equipment is acquired is illegal Total system, and the alarm unit is driven to send out the buzzing prompting sound of alarm;The network information security module includes that network is close Key generator, netkey controller, netkey decipher and Network Isolation switch, the netkey generator use The unique Product sequence number of ATO5SC card microcontrollers is as seed, and it is close according to certain rule to generate 128 user encryptions Key, the netkey controller verify the generation of key, and judge whether the key generated is legal, and the network is close Verification information input by user is decrypted and is compared with encryption key by key decipher, and the Network Isolation switch includes data Signal filter, network state detection circuit and network connection block device, the data information filter is by the network state The Method for Filtering Abnormal Information that detection circuit detects, and drive the network connection block device that network is carried out blocking isolation;It is described Port security control module includes port controller, port encryption equipment and data transmission encrypted master, wherein the port Controller controls the keying of the computer information safe system interface, and the port encryption equipment passes through to the computerized information Setting is encrypted in the interface of security system, and the data transmission encrypted master applies the data transmitted needed for the interface Encrypted code is protected, and is carried out the password that the equipment that data interaction is connect only applies with the port encryption equipment with interface and be paired into After work(, the transmission and transmission of data-interface could be realized;
Described information tracking module includes resource control unit and data follow-up auditing unit, wherein the resource control unit Real-time online scanning, monitoring and record are carried out to computer-internal static resource, when computer-internal static resource illegally changes When, it includes in computer system that the information of monitoring is uploaded onto the server and generates the instrument of evidence by the resource control unit in real time Display in;The data tracking auditable unit is recorded, is audited, analyzing and tracking entire computer information safe system in real time Data, configuration Parameters variation, information flow direction, keyboard and screen, record all texts for exporting and inputting from computer port Part copy information, and automatically generate log recording and store;
The computer peripheral includes printer, PCI slot or mouse, hard disk;
Further include boot-strap circuit unit, the boot-strap circuit unit is used to control the keying of the computer motherboard.
CN201510170407.3A 2015-04-10 2015-04-10 A kind of computer information safe system Expired - Fee Related CN104751036B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510170407.3A CN104751036B (en) 2015-04-10 2015-04-10 A kind of computer information safe system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510170407.3A CN104751036B (en) 2015-04-10 2015-04-10 A kind of computer information safe system

Publications (2)

Publication Number Publication Date
CN104751036A CN104751036A (en) 2015-07-01
CN104751036B true CN104751036B (en) 2018-08-24

Family

ID=53590709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510170407.3A Expired - Fee Related CN104751036B (en) 2015-04-10 2015-04-10 A kind of computer information safe system

Country Status (1)

Country Link
CN (1) CN104751036B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994097A (en) * 2015-07-03 2015-10-21 孙艳君 Computer network information security control device
CN106055978A (en) * 2016-05-03 2016-10-26 武珍珍 Novel computer information safety protection lock
CN106131072A (en) * 2016-08-28 2016-11-16 姜俊 A kind of computer information safe system
CN106446706B (en) * 2016-08-30 2019-03-19 许昌学院 A kind of computer data enciphering system
US10311220B2 (en) * 2016-09-02 2019-06-04 Qualcomm Incorporated Accessing a user equipment using a biometric sensor concurrently with an authentication pattern
CN106502866A (en) * 2016-11-04 2017-03-15 河南理工大学 A kind of computer safety system and method
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107403079A (en) * 2017-07-27 2017-11-28 山东理工大学 A kind of computer information safe system
CN107609409A (en) * 2017-09-07 2018-01-19 苏州凯瑟兰特信息科技有限公司 A kind of big data analysis system using computer verification code technology
CN108090357A (en) * 2017-12-14 2018-05-29 湖南财政经济学院 A kind of computer information safe control method and device
CN108664777A (en) * 2018-03-16 2018-10-16 济宁医学院 A kind of secure information storage method
CN108521431A (en) * 2018-04-25 2018-09-11 信阳师范学院 A kind of information security of computer network system
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system
CN108734034A (en) * 2018-05-17 2018-11-02 合肥利元杰信息科技有限公司 A kind of data-storage system of computer
CN108710793A (en) * 2018-05-25 2018-10-26 马鞍山市润启新材料科技有限公司 A kind of computer network means of defence and system
CN109756499B (en) * 2019-01-07 2020-02-21 武汉东湖大数据交易中心股份有限公司 Big data security access control system
CN109818958A (en) * 2019-01-28 2019-05-28 西安航空学院 A kind of computer network intelligent monitor system
CN109905378A (en) * 2019-02-01 2019-06-18 湖北大学 A kind of network information security monitoring method, system and computer storage medium
CN110381127A (en) * 2019-07-04 2019-10-25 陈羽 A kind of method for remote controlling computer and system
CN110471359B (en) * 2019-09-22 2023-02-14 南京时仓信息科技有限公司 Information security control module and control method suitable for embedded host
CN112131546B (en) * 2020-09-10 2022-09-27 重庆电子工程职业学院 Information security management and control device
CN115277084B (en) * 2022-06-23 2023-09-01 浙江科技学院 Electronic information unidirectional transmission system and method for signal shielding

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1423203A (en) * 2001-12-05 2003-06-11 武汉瑞达电子有限公司 Safety computer with information safety management unit
CN1632709A (en) * 2004-12-15 2005-06-29 中国长城计算机深圳股份有限公司 A computer system for guaranteeing information security
CN104243402A (en) * 2013-06-08 2014-12-24 中国人民解放军91655部队 Novel desktop audit system and method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005038139A (en) * 2003-07-18 2005-02-10 Global Friendship Inc Electronic information management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1423203A (en) * 2001-12-05 2003-06-11 武汉瑞达电子有限公司 Safety computer with information safety management unit
CN1632709A (en) * 2004-12-15 2005-06-29 中国长城计算机深圳股份有限公司 A computer system for guaranteeing information security
CN104243402A (en) * 2013-06-08 2014-12-24 中国人民解放军91655部队 Novel desktop audit system and method thereof

Also Published As

Publication number Publication date
CN104751036A (en) 2015-07-01

Similar Documents

Publication Publication Date Title
CN104751036B (en) A kind of computer information safe system
CN107563213B (en) Safety secrecy control device for preventing data extraction of storage equipment
CA2935780C (en) Systems and methods with cryptography and tamper resistance software security
CN105740725B (en) A kind of document protection method and system
CN108616531B (en) Radio frequency signal secure communication method and system
US20080016127A1 (en) Utilizing software for backing up and recovering data
Mavrovouniotis et al. Hardware security modules
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
CN102236607B (en) Data security protection method and data security protection device
CN1776563A (en) File encrypting device based on USB interface
US20130322619A1 (en) Information processing apparatus, ic chip, and information processing method
Hurley-Smith et al. Certifiably biased: An in-depth analysis of a common criteria EAL4+ certified TRNG
CN107506660A (en) A kind of daily record sensitive information processing method and system applied to financial self-service equipment
CN117592108A (en) Interface data desensitization processing method and device
CN103368926A (en) Method for preventing file tampering and device for preventing file manipulation
CN100543762C (en) Computer-aided design data encryption protecting method based on hardware environment
Ukidve et al. Analysis of payment card industry data security standard [PCI DSS] compliance by confluence of COBIT 5 framework
CN103577771A (en) Virtual desktop data leakage-preventive protection technology on basis of disk encryption
CN116842545A (en) File encryption-based data anti-luxury method and system
CN106952659B (en) CD multistage imprinting encryption method based on XTS encryption mode
CN108376212A (en) Execute code security guard method, device and electronic device
CN107423627A (en) The time slot scrambling and electronic equipment of a kind of electronic equipment
US20210111870A1 (en) Authorizing and validating removable storage for use with critical infrastrcture computing systems
CN106650492A (en) Multi-device file protection method and device based on security catalog
TWI444849B (en) System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180824

Termination date: 20190410

CF01 Termination of patent right due to non-payment of annual fee