CN105468991A - Computer - Google Patents

Computer Download PDF

Info

Publication number
CN105468991A
CN105468991A CN201410451982.6A CN201410451982A CN105468991A CN 105468991 A CN105468991 A CN 105468991A CN 201410451982 A CN201410451982 A CN 201410451982A CN 105468991 A CN105468991 A CN 105468991A
Authority
CN
China
Prior art keywords
enable pin
write
hand switch
read
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410451982.6A
Other languages
Chinese (zh)
Inventor
林于翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tongsheng Green Technology Co Ltd
Original Assignee
Shenzhen Tongsheng Green Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tongsheng Green Technology Co Ltd filed Critical Shenzhen Tongsheng Green Technology Co Ltd
Priority to CN201410451982.6A priority Critical patent/CN105468991A/en
Priority to PCT/CN2014/086390 priority patent/WO2016033818A1/en
Publication of CN105468991A publication Critical patent/CN105468991A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a computer. The computer comprises: a processor provided with: a first read enable end, used for transmitting a read enable signal under the control of the processor; a first write enable end, used for transmitting a write enable signal under the control of the processor a memory provided with: a second read enable end, connected to the first read enable end, and used for receiving the read enable signal; a second write enable end connected to the first write enable end, and used for receiving the write enable signal; a first manual switch arranged between the first read enable end and the second read enable end, the first manual switch enabling the first read enable end to be connected to or disconnected from the second read enable end via manual control; and a second manual switch arranged between the first write enable end and the second write enable end, the second manual switch enabling the first write enable end to be connected to or disconnected from the second write enable end via manual control. The computer effectively prevents memory data from being illegally modified, and ensures the security of data storage.

Description

A kind of computing machine
Technical field
The present invention relates to computer realm, particularly relate to a kind of computing machine.
Background technology
The write-protect of traditional circuit memory device adopts the I/O mouth of system processor or the dedicated port of controller to carry out write-protect usually.Like this once computer infected trojan horse, be easy to infect storer, the information of storer is illegally modified, computer software may be caused what is more not run, and systemic breakdown, causes serious consequence.
Summary of the invention
The technical matters that the present invention solves provides a kind of computing machine, can effectively prevent memory data to be illegally modified, and ensures the security that data store.
For solving the problems of the technologies described above, the invention provides a kind of computing machine, comprising: processor, being provided with: first reads Enable Pin, reads enable signal for sending under processor control; First writes Enable Pin, for sending write enable signal under processor control; Storer, is provided with: second reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin, writes Enable Pin be connected, for receiving write enable signal with first; First hand switch, is arranged on first and reads Enable Pin and second and read between Enable Pin, and the first hand switch makes first to read Enable Pin and second through manual control to read to be connected between Enable Pin or to disconnect; Second hand switch, is arranged on first and writes Enable Pin and second and write between Enable Pin, and the second hand switch makes first to write Enable Pin and second through manual control to write and to be connected between Enable Pin or to disconnect.
Wherein, processor also comprises multiple first data transmission end, and storer also comprises multiple second data transmission terminals be connected with first data transmission end respectively.
Wherein, first hand switch makes first to read Enable Pin and second through manual control and reads to be connected between Enable Pin, and processor is read Enable Pin by first and is sent and read enable signal, making second to read Enable Pin receives when reading enable signal, processor by multiple first data transmission end and multiple second data transmission terminal from memory read data.
Wherein, second hand switch makes first to write Enable Pin and second through manual control and writes between Enable Pin and be connected, and processor is write Enable Pin by first and is sent write enable signal, make second to write Enable Pin when receiving write enable signal, processor writes data by multiple first data transmission end and multiple second data transmission terminal to storer.
Wherein, be set to can by internet user access for storer.
Wherein, the first hand switch and the second hand switch are pullswitch, at least one in knife switch and pushbutton switch.
By such scheme, the invention has the beneficial effects as follows: being provided with first by processor and reading Enable Pin, reading enable signal for sending under processor control; First writes Enable Pin for sending write enable signal under processor control; Storer is provided with second and reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin and first writes Enable Pin and is connected, for receiving write enable signal; First manual switch-linear hybrid is read Enable Pin and second first and is read between Enable Pin, and the first hand switch makes first to read Enable Pin and second through manual control to read to be connected between Enable Pin or to disconnect; Second manual switch-linear hybrid is write Enable Pin and second first and is write between Enable Pin, second hand switch makes first to write Enable Pin and second through manual control to write and to be connected between Enable Pin or to disconnect, can effectively prevent memory data to be illegally modified, ensure the security that data store.
Accompanying drawing explanation
Fig. 1 is the structural representation of the computing machine of first embodiment of the invention;
Fig. 2 is the structural representation of the computing machine of second embodiment of the invention;
Fig. 3 is the structural representation of the computing machine of invention the 3rd embodiment;
Fig. 4 is the schematic flow sheet of the network inbreak detection method of the computing machine of first embodiment of the invention.
Embodiment
Refer to Fig. 1, Fig. 1 is the structural representation of the computing machine of first embodiment of the invention.As shown in Figure 1, computing machine 10 comprises: storer 11, first hand switch 12, second hand switch 13 and processor 14.Wherein, processor 14 is provided with: first reads Enable Pin 141 and first writes Enable Pin 142.First reads Enable Pin 141 reads enable signal for sending under processor 14 control, and first writes Enable Pin 142 sends write enable signal under controlling at processor 14.Storer 11 is provided with: second reads Enable Pin 111 and second writes Enable Pin 112.Second reads Enable Pin 111 and first reads Enable Pin 141 and is connected, and reads enable signal for receiving, and second writes Enable Pin 112 and first writes Enable Pin 142 and be connected, for receiving write enable signal.First hand switch 12 is arranged on first and reads Enable Pin 141 and second and read between Enable Pin 111, and the first hand switch 12 makes first to read Enable Pin 141 and second through manual control to read to be connected between Enable Pin 111 or to disconnect.Second hand switch 13 is arranged on first and writes Enable Pin 142 and second and write between Enable Pin 112, and the second hand switch 13 makes first to write Enable Pin 142 and second through manual control to write and to be connected between Enable Pin 112 or to disconnect.Processor 14 also comprises multiple first data transmission end 143, and storer 11 also comprises multiple second data transmission terminals 113 be connected with first data transmission end 143 respectively.
In embodiments of the present invention, computing machine 10 can also comprise a second memory (not shown) identical with storer 11, and second memory is the backup of memory of storer 11, for backing up the data of storer.Second memory read Enable Pin and processor 14 read with writing between Enable Pin of processor 14, hand switch is set respectively to be connected between Enable Pin and in the Enable Pin of writing of second memory.And the digital data transmission end of second memory is also directly connected with the data transmission terminal of processor, to carry out the transmission of data.When storer 11 can normally use, storer 11 is set to can by internet user access, and second memory be set to can not by internet user access.When storer 11 damages or can not normally use, computing machine 10 directly can automatically switch to second memory to carry out the normal read-write of data.
In embodiments of the present invention, first hand switch 12 makes first to read Enable Pin 141 and second through manual control and reads to be connected between Enable Pin 111, and processor 14 is read Enable Pin 141 by first and is sent and read enable signal, making second to read Enable Pin 111 receives when reading enable signal, and processor 14 reads data by multiple first data transmission end 143 and multiple second data transmission terminal 113 from storer 11.Second hand switch 13 makes first to write Enable Pin 142 and second through manual control and writes between Enable Pin 112 and be connected, and processor 14 is write Enable Pin 142 by first and is sent write enable signal, make second to write Enable Pin 112 when receiving write enable signal, processor 14 writes data by multiple first data transmission end 143 and multiple second data transmission terminal 113 to storer 11.Wherein, the first hand switch 12 and the second hand switch 13 are at least one of pullswitch, knife switch or pushbutton switch.In embodiments of the present invention, manually operate the read-write operation of the first hand switch 12 and the second hand switch 13 and then difference control processor 14 pairs of storeies 11, the data in storer 11 effectively can be prevented to be illegally modified, to ensure the security that data store.
Fig. 2 is the structural representation of the computing machine of second embodiment of the invention.As shown in Figure 2, computing machine 20 comprises: storer 21, first hand switch 22, second hand switch 23, processor 24 and switching manipulation mandate module 25.Processor 24 is provided with: first reads Enable Pin 241 and first writes Enable Pin 242.First reads Enable Pin 241 reads enable signal for sending under processor 24 control, and first writes Enable Pin 242 sends write enable signal under controlling at processor 24.Storer 21 is provided with: second reads Enable Pin 211 and second writes Enable Pin 212.Second reads Enable Pin 211 and first reads Enable Pin 241 and is connected, and reads enable signal for receiving.Second writes Enable Pin 212 and first writes Enable Pin 412 and is connected, for receiving write enable signal.First hand switch 22 is arranged on first and reads Enable Pin 241 and second and read between Enable Pin 211, and the first hand switch 22 makes first to read Enable Pin 241 and second through manual control to read to be connected between Enable Pin 211 or to disconnect.Second hand switch 23 is arranged on first and writes Enable Pin 242 and second and write between Enable Pin 212, and the second hand switch 23 makes first to write Enable Pin 242 and second through manual control to write and to be connected between Enable Pin 212 or to disconnect.Switching manipulation mandate module 25 is for carrying out authentication at least one user of the first hand switch 22 and the second hand switch 23, when authentication is passed through, the open operating right that first hand switch 22 is disconnected with the second hand switch 23 or is connected of switching manipulation mandate module 25.
In embodiments of the present invention, computing machine 20 can also comprise a second memory (not shown) identical with storer 21, and second memory is the backup of memory of storer 21, for backing up the data of storer.Second memory read Enable Pin and processor 24 read with writing between Enable Pin of processor 24, hand switch is set respectively to be connected between Enable Pin and in the Enable Pin of writing of second memory.And the digital data transmission end of second memory is also directly connected with the data transmission terminal of processor, to carry out the transmission of data.When storer 21 can normally use, storer 21 is set to can by internet user access, and second memory be set to can not by internet user access.When storer 21 damages or can not normally use, computing machine 20 directly can automatically switch to second memory to carry out the normal read-write of data, now need equally switching manipulation mandate module 25 to be separately positioned on second memory read Enable Pin and processor 24 read carry out authentication between Enable Pin and at least one user writing the hand switch write between Enable Pin of Enable Pin and processor 24 of second memory, and when authentication is passed through, the open operating right that this two hand switch is disconnected or connected of switching manipulation mandate module 25.
In embodiments of the present invention, processor 24 also comprises multiple first data transmission end 243, and storer 24 also comprises multiple second data transmission terminals 213 be connected with first data transmission end 243 respectively.First hand switch 22 makes first to read Enable Pin 241 and second through manual control and reads to be connected between Enable Pin 211, and processor 24 is read Enable Pin 241 by first and is sent and read enable signal, making second to read Enable Pin 211 receives when reading enable signal, and processor 24 reads data by multiple first data transmission end 243 and multiple second data transmission terminal 313 from storer 24.Second hand switch 23 makes first to write Enable Pin 242 and second through manual control and writes between Enable Pin 212 and be connected, and processor 24 is write Enable Pin 242 by first and is sent write enable signal, make second to write Enable Pin 212 when receiving write enable signal, processor 24 writes data by multiple first data transmission end 243 and multiple second data transmission terminal 213 to storer 21.Wherein, the first hand switch 22 and the second hand switch 23 are pullswitch, at least one in knife switch and pushbutton switch.So carry out authentication by switching manipulation mandate module 25 at least one user to the first hand switch 22 and the second hand switch 23, and when authentication is passed through, the open operating right that first hand switch 22 is disconnected with the second hand switch 23 or is connected of switching manipulation mandate module 25, the data of storer 21 can be prevented further to be illegally modified, to ensure the security that data store further.
Switching manipulation mandate module 25 comprises: electronic password lock 251 and casing 252.Electronic password lock 251 is for locking casing 252, and the first hand switch 22 and the second hand switch 23 are arranged in casing 252, and electronic password lock 251 gathers the identity information that at least one user provides, and carries out authentication.When determining collected identity information and being consistent with the identity information prestored, authentication is passed through, electronic password lock 251 pairs of casings 252 unlock, when determining collected identity information and being inconsistent with the identity information prestored, authentication is not passed through, and electronic password lock 251 pairs of casings 252 keep locking.Identity information comprises at least one in user profile or password.Namely identity information can only include user profile or password, also can comprise user profile and the password corresponding to user profile.Wherein user profile can be obtained by brush smart card.User profile can be the numbering of smart card, the job number of user or other identity informations relevant to individual subscriber.Password is at least one in password, fingerprint, retina, iris.Identity information comprise user profile and to the password that user profile is corresponding time, first electronic password lock 251 gathers user profile that user provides and carries out certification, and carries out certification at user information authentication by the rear collection password corresponding with this user profile.If when the cipher authentication of electronic password lock 251 pairs of user profile and correspondence all passes through, electronic password lock 251 pairs of casings 252 unlock.
In embodiments of the present invention, electronic password lock 251 can gather the identity information that a user provides, and carry out authentication, electronic password lock 251 complete authentication and authentication by time, namely the checking of the identity information provided for first user is provided.If the identity information that the checking that storer 21 operates just needs unique user to provide can complete checking, if then smart card is lost and to be found by others and/or password is known by others, just be easy to cause others arbitrarily can operate the first hand switch 22 and the second hand switch 23, make processor 24 pairs of storeies 21 carry out read operation or write operation, this just makes security performance not high; And only need verify that the user profile of unique user and/or password also easily make this client carrying out verifying carry out random operation.Given this, switching manipulation mandate module 25 can also be verified the identity information that two or more users provide.Particularly, three times are at least verified for the identity information provided for different users, electronic password lock 251 gathers identity information that the second user provides and verifies, and when the identity information checking that the second user provides is correct, the identity information that acquisition one the 3rd user provides also is verified.So at least need the identity information provided two different users to verify and verify to operate the first hand switch 22 and the second hand switch 23 correctly.When the identity information wherein provided three different users is verified, can limit the order of the identity information that these three users provide, namely first regulation must verify the identity information which user provides, and then verify the identity information which user provides, finally verify the identity information which user provides; The order of the identity information checking that also can not provide these three users limits, namely only need the identity information to these three users provide to carry out verifying, and the identity information that these three users provide need not be managed with which type of order verify.Certainly in other embodiments of the invention, also can verify the identity information that more user provides, this is not restricted.Wherein, the user operated the first hand switch 22 and the second hand switch 23 can be one of them in these three users, and also can be other users outside these three users, this is not restricted.So verify at the identity information provided two or more users and just casing 252 unlocked by rear electronic password lock 251, obvious security performance can be improved, simultaneously, due to the identity information needing two or more users to provide, wherein the operation of any one user to the first hand switch 22 and the second hand switch 23 all at least needs the supervision accepting at least another one user, that is wherein any one user can not arbitrarily operate the first hand switch 22 and the second hand switch 23, the security that data are stored improves further.
Switching manipulation mandate module 25 and the first hand switch 22 and the second hand switch 23 are all the independent components independent of processor 24, are not subject to processing the impact of device 24, also just do not affect by the external world such as internet worm, wooden horse etc.
In embodiments of the present invention, by switching manipulation mandate module 25, at least one user to the first hand switch 22 and the second hand switch 23 carries out authentication, and when authentication is passed through, the open operating right that first hand switch 22 is disconnected with the second hand switch 23 or is connected of switching manipulation mandate module 25, the data of storer 21 can be prevented further to be illegally modified, to improve the security that data store further.
Fig. 3 is the structural representation of the computing machine of third embodiment of the invention.As shown in Figure 3, computing machine 30 comprises: storer 31, first hand switch 32, second hand switch 33, processor 34, switching manipulation mandate module 35 and mirroring memory 36.Processor 34 is provided with: first reads Enable Pin 341 and first writes Enable Pin 342.First reads Enable Pin 341 reads enable signal for sending under processor 34 control, and first writes Enable Pin 342 sends write enable signal under controlling at processor 34.Storer 31 is provided with: second reads Enable Pin 311 and second writes Enable Pin 312.Second reads Enable Pin 311 and first reads Enable Pin 341 and is connected, and reads enable signal for receiving, and second writes Enable Pin 312 and first writes Enable Pin 342 and be connected, for receiving write enable signal.First hand switch 32 is arranged on first and reads Enable Pin 341 and second and read between Enable Pin 311, and the first hand switch 32 is read to be connected between Enable Pin 311 or to disconnect through making manual control first read Enable Pin 341 and second.Second hand switch 33 is arranged on first and writes Enable Pin 342 and second and write between Enable Pin 312, and the second hand switch 32 makes first to write Enable Pin 342 and second through manual control to write and to be connected between Enable Pin 312 or to disconnect.Mirroring memory 36 is the mirror image of storer 31, and mirroring memory 36 comprises: third reading Enable Pin 361 and the 3rd writes Enable Pin 362.Third reading Enable Pin 361 and first is read Enable Pin 341 and is directly connected, and reads enable signal for receiving, and the 3rd writes Enable Pin 362 and first writes Enable Pin 342 and be directly connected, for receiving write enable signal.Switching manipulation mandate module 35 is for carrying out authentication at least one user of the first hand switch 32 and the second hand switch 33, when authentication is passed through, the open operating right that first hand switch 32 is disconnected with the second hand switch 33 or is connected of switching manipulation mandate module 35.
In embodiments of the present invention, storer 31 is set to can by internet user access, and mirroring memory 36 is set to cannot by internet user access.Processor 34 also comprises multiple first data transmission end 343, storer 32 also comprises multiple second data transmission terminals 313 be connected with first data transmission end 343 respectively, and mirroring memory 36 also comprises multiple 3rd data transmission terminals 363 be connected with first data transmission end 343 respectively.
In embodiments of the present invention, first hand switch 32 makes first to read Enable Pin 341 and second through manual control and reads to be connected between Enable Pin 311, processor 34 is read Enable Pin 341 by first and is sent and read enable signal, making second to read Enable Pin 311 and third reading Enable Pin 361 receives when reading enable signal, processor 34 reads data by multiple first data transmission end 343 and multiple second data transmission terminal 313 from storer 31, and reads data by multiple first data transmission end 343 and multiple 3rd data transmission terminal 363 from mirroring memory 36.First hand switch 32 makes first to read Enable Pin 341 and second through manual control and reads the separated of Enable Pin 311, processor 34 is read Enable Pin 341 by first and is sent and read enable signal, when making only have third reading Enable Pin 361 to receive and read enable signal, processor 34 reads data by multiple first data transmission end 341 and multiple 3rd data transmission terminal 361 from mirroring memory 36.
Second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes between Enable Pin 312 and be connected, processor 34 is write Enable Pin 342 by first and is sent write enable signal, make second to write Enable Pin 312 and the 3rd and write Enable Pin 362 when receiving write enable signal, processor 34 writes data by multiple first data transmission end 343 and multiple second data transmission terminal 313 to storer 31, and writes data by multiple first data transmission end 343 and multiple 3rd data transmission terminal 363 to mirroring memory 36.Second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes the separated of Enable Pin 312, processor 34 is write Enable Pin 342 by first and is sent write enable signal, make only to have the 3rd to write Enable Pin 362 when receiving write enable signal, processor 34 writes data by multiple first data transmission end 343 and multiple 3rd data transmission terminal 363 to mirroring memory 36.So when computing machine 30 is connected with internet, second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes the separated of Enable Pin 312, when computing machine 30 is subject to network intrusions, the data stored in mirroring memory 36 are changed according to the write enable signal sent of processor 34, and the data stored in storer 31 are unactually changed.Computing machine 30 also comprises comparison module (not shown), comparison module compares the data in storer 31 and mirroring memory 36, if the two is inconsistent, then judge that computing machine 30 is subject to network intrusions, so can prevent storer 31 from suffering illegal network intrusions.
In embodiments of the present invention, computing machine 30 can also comprise a second memory (not shown) identical with storer 31, and second memory is the backup of memory of storer 31, for backing up the data of storer.Second memory read Enable Pin and processor 34 read with writing between Enable Pin of processor 34, hand switch is set respectively to be connected between Enable Pin and in the Enable Pin of writing of second memory.And the digital data transmission end of second memory is also directly connected with the data transmission terminal of processor, to carry out the transmission of data.When storer 31 can normally use, storer 31 is set to can by internet user access, and second memory be set to can not by internet user access.When storer 31 damages or can not normally use, computing machine 30 directly can automatically switch to second memory to carry out the normal read-write of data, and mirroring memory also 36 automatically switches to mirror image to moulding storer.Now need equally switching manipulation mandate module 35 to be separately positioned on second memory read Enable Pin and processor 34 read carry out authentication between Enable Pin and at least one user writing the hand switch write between Enable Pin of Enable Pin and processor 34 of second memory, and when authentication is passed through, the open operating right that this two hand switch is disconnected or connected of switching manipulation mandate module 35.
And when computing machine 30 is connected with internet, hand switch through manual control make second memory write Enable Pin 342 and processor 34 write the separated of Enable Pin 312.When computing machine 30 is subject to network intrusions, the data stored in mirroring memory 36 are changed according to the write enable signal sent of processor 34, and the data stored in second memory are unactual changes.Comparison module compares the data in second memory and mirroring memory 36, if the two is inconsistent, then judges that computing machine 30 is subject to network intrusions.So also can prevent second memory from suffering illegal network intrusions.
In embodiments of the present invention, a part of data that also can limit wherein of the data in storer 31 need just can carry out read-write operation by the manual control of the first hand switch 32 and the second hand switch 33.Particularly, only have certification by switching manipulation mandate module 35 and certification by afterwards, just write operation or read operation can be carried out by this partial data in operation first hand switch 32 or the second hand switch 33 pairs of storeies 31, so illegal network intrusions can be prevented.
Fig. 4 is the schematic flow sheet of the network inbreak detection method of the computing machine of first embodiment of the invention.As shown in Figure 4, the network inbreak detection method of computing machine 30 comprises:
Step S10: arranging that storer 31 is set to can by internet user access, and mirroring memory 36 is set to cannot by internet user access.
Wherein, the concrete structure of computing machine 30 as shown in Figure 3.Mirroring memory 36 is the mirror image of storer 31.
Step S11: the second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes the separated of Enable Pin 312; Data in storer 31 and mirroring memory 36 are compared, if the two is inconsistent, then judges that computing machine 30 is subject to network intrusions, if the two is consistent, then judge that computing machine 30 is not subject to network intrusions.
In sum, the present invention is provided with first by processor and reads Enable Pin, reads enable signal for sending under processor control; First writes Enable Pin for sending write enable signal under processor control; Storer is provided with second and reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin and first writes Enable Pin and is connected, for receiving write enable signal; First manual switch-linear hybrid is read Enable Pin and second first and is read between Enable Pin, and the first hand switch is read Enable Pin and second through manual control first and read to be connected between Enable Pin or to disconnect; Second manual switch-linear hybrid is write Enable Pin and second first and is write between Enable Pin, second hand switch is write Enable Pin and second through manual control first and is write and to be connected between Enable Pin or to disconnect, can effectively prevent memory data to be illegally modified, ensure the security that data store.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (6)

1. a computing machine, is characterized in that, comprising:
Processor, is provided with:
First reads Enable Pin, reads enable signal for sending under described processor control;
First writes Enable Pin, under controlling at described processor, send write enable signal;
Storer, is provided with:
Second reads Enable Pin, reads Enable Pin and is connected, described in receiving, read enable signal with described first;
Second writes Enable Pin, writes Enable Pin be connected, for receiving described write enable signal with described first;
First hand switch, is arranged on described first and reads Enable Pin and described second and read between Enable Pin, and described first hand switch makes described first to read Enable Pin and described second through manual control to read to be connected between Enable Pin or to disconnect;
Second hand switch, is arranged on described first and writes Enable Pin and described second and write between Enable Pin, and described second hand switch makes described first to write Enable Pin and described second through manual control to write and to be connected between Enable Pin or to disconnect.
2. computing machine according to claim 1, is characterized in that, described processor also comprises multiple first data transmission end, and described storer also comprises multiple second data transmission terminals be connected with described first data transmission end respectively.
3. computing machine according to claim 2, it is characterized in that, described first hand switch makes described first to read Enable Pin through manual control and reads to be connected between Enable Pin with described second, and described processor by described first read Enable Pin send described in read enable signal, make described second read Enable Pin receive described in when reading enable signal, described processor by described multiple first data transmission end and described multiple second data transmission terminal from described memory read data.
4. computing machine according to claim 2, it is characterized in that, described second hand switch makes described first to write Enable Pin and described second through manual control and writes between Enable Pin and be connected, and described processor is write Enable Pin by described first and is sent described write enable signal, make described second to write Enable Pin when receiving described write enable signal, described processor by described multiple first data transmission end and described multiple second data transmission terminal to described storer write data.
5. computing machine according to claim 1, is characterized in that, described storer is set to can by internet user access.
6. computing machine according to claim 1, is characterized in that, described first hand switch and described second hand switch are pullswitch, at least one in knife switch and pushbutton switch.
CN201410451982.6A 2014-09-05 2014-09-05 Computer Pending CN105468991A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410451982.6A CN105468991A (en) 2014-09-05 2014-09-05 Computer
PCT/CN2014/086390 WO2016033818A1 (en) 2014-09-05 2014-09-12 Computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410451982.6A CN105468991A (en) 2014-09-05 2014-09-05 Computer

Publications (1)

Publication Number Publication Date
CN105468991A true CN105468991A (en) 2016-04-06

Family

ID=55439058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410451982.6A Pending CN105468991A (en) 2014-09-05 2014-09-05 Computer

Country Status (2)

Country Link
CN (1) CN105468991A (en)
WO (1) WO2016033818A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060104364A1 (en) * 2004-11-17 2006-05-18 Lg Electronics Inc. Video decoding system of mobile broadcasting receiver
CN201047944Y (en) * 2007-05-11 2008-04-16 广东天海威数码技术有限公司 Personal computer capable of performing access control to memory space
CN101217366A (en) * 2007-01-04 2008-07-09 李代甫 A digital signature device with write protection
CN102385673A (en) * 2011-07-19 2012-03-21 古丽 Human body lock
CN204189172U (en) * 2014-09-05 2015-03-04 深圳市同盛绿色科技有限公司 A kind of computing machine

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1129867C (en) * 2000-03-17 2003-12-03 杭州中正生物认证技术有限公司 Finger print hard disc

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060104364A1 (en) * 2004-11-17 2006-05-18 Lg Electronics Inc. Video decoding system of mobile broadcasting receiver
CN101217366A (en) * 2007-01-04 2008-07-09 李代甫 A digital signature device with write protection
CN201047944Y (en) * 2007-05-11 2008-04-16 广东天海威数码技术有限公司 Personal computer capable of performing access control to memory space
CN102385673A (en) * 2011-07-19 2012-03-21 古丽 Human body lock
CN204189172U (en) * 2014-09-05 2015-03-04 深圳市同盛绿色科技有限公司 A kind of computing machine

Also Published As

Publication number Publication date
WO2016033818A1 (en) 2016-03-10

Similar Documents

Publication Publication Date Title
CN105554035B (en) A kind of electronic lock system and its control method
EP2715598B1 (en) Method and apparatus for authenticating a non-volatile memory device
US9521132B2 (en) Secure data storage
CN104318647A (en) Access control system based on intelligent terminal and control method of access control system
CN204189172U (en) A kind of computing machine
US20160246957A1 (en) Method and Apparatus for Controlling Debug Port of Terminal Device
CN101980235A (en) Safe computing platform
CN106131072A (en) A kind of computer information safe system
CN106161442A (en) A kind of system control user login method
CN106295290B (en) Method, device and system for generating authentication information based on fingerprint information
CN107133512B (en) POS terminal control method and device
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN205788363U (en) A kind of multiple authentication Gate-ban Monitoring System of Home House
CN113641979A (en) Authentication method, authentication system and computer readable storage medium
CN104680055A (en) Control method for performing management on U disk after access into industrial control system network
CN101645124B (en) Method for unlocking PIN code and intelligent secret key device
CN205451071U (en) Machine case data destructors that uncaps
CN103984901A (en) Trusted computer system and application method thereof
CN104937602B (en) Privacy protection method and electronic equipment
CN105468996A (en) Computer
CN105678149A (en) Unlocking method and terminal
CN105871840A (en) Certificate management method and system
Kovalchuk et al. A practical proposal for ensuring the provenance of hardware devices and their safe operation
CN105468991A (en) Computer
CN205354034U (en) Secure computer mainboard based on close algorithm of state is encrypted

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20191115