CN108595949A - A kind of computer anti-virus attack device - Google Patents
A kind of computer anti-virus attack device Download PDFInfo
- Publication number
- CN108595949A CN108595949A CN201810226921.8A CN201810226921A CN108595949A CN 108595949 A CN108595949 A CN 108595949A CN 201810226921 A CN201810226921 A CN 201810226921A CN 108595949 A CN108595949 A CN 108595949A
- Authority
- CN
- China
- Prior art keywords
- virus
- hard disk
- computer
- computer anti
- disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Abstract
The present invention relates to a kind of computer anti-viruses to attack device comprising one piece of antivirus card and key floppy disk adaptable therewith.Include decoder and tri-state switch again in antivirus card, its course of work is to access the instruction of virus infraction hard disk into row decoding to computer by logic circuit, its effect of described key floppy disc is guiding user security operation, the present invention solves in safety zone the normal right for not limiting operating system illegally not by poisoning intrusion and in principle compared with prior art, also antivirus card is small, is lacked using component and operation is simple.
Description
Technical field
The present invention relates to a kind of computer anti-viruses to attack device.
Background technology
Prevention for computer virus, based on " controlling ", mainly various disinfection softwares, its significance lies in that it be for
It is remedied by one kind of the object of virus infraction.Its fatal defects is passive.Based on " anti-", mainly some immunological softwares
With some antitoxin cards.Its significance lies in that they increase the difficulty of poisoning intrusion to some extent, have a disadvantage in that, they are main
The control of system host CPU is still relied on, virus can break through its defence line by host CPU completely.Although also it has been suggested that " independently of
The prevention method of system host CPU ", but probably also have a distance from practical product or even a kind of practicable technical solution.
Have a disadvantage in that " unauthorized access (poisoning intrusion) " and the division of " Lawful access (non-viral operation) " still adopt
Artificial limitation standard takes poisoning intrusion the method for " intercepting ", this necessarily causes system normal legal right illegally to be limited
System makes certain application software operations be hindered.This is because for the resource of operating system administration, system all Internet access at any time.
This be first, and principle of the above method in gas defence mechanism it is insufficient.And the generation of " right to access table " is also not easy reality
It is existing.Second, as stated above " the additional protection mechanism hardware in original system hardware environment ", being technically not easy to realize, especially
It is to lack the type of technical data (such as those:Original-pack AST, COMPAQ computer), it is technically more difficult to realize.
Invention content
The technical problem to be solved in the present invention is, for problem of the prior art, provides a kind of computer anti-virus and attacks
Hit device.
The technical solution adopted by the present invention to solve the technical problems is:According to new anti-virus mechanism, a kind of meter is proposed
Calculation machine anti-virus attacks the practicable technical solution of device.
The measure that the present invention takes is:
1. in gas defence mechanism, to take poisoning intrusion the method for " dredging " to replace the method for original " intercepting ".It is waved non-
Open up safety zone on (mainly hard disk) on hair property medium, make virus that can not invade, at the same guide system avoid this safety zone or
By System guides to not local, to make the normal legal power of system illegally not limited.
2. above-mentioned safety zone is inserted in the hard card in expansion slot and utterly protects.Hard card is technically easily achieved, i.e.,
Make for very opaque original-pack AST, COMPAQ type of technology, experiments have shown that practical.
3. the Lawful access of above-mentioned safety zone starts machine by clean (virus-free) key floppy disk, and according to screen prompt
It is aided with artificial hard switching setting to be had secure access to.
Description of the drawings
A kind of embodiment principle of specification of lower combination and implementation method:
Fig. 1 is block diagram of the computer anti-virus attack device of the present invention on computer bus.
Fig. 2 is the schematic diagram of the computer anti-virus attack device of the present invention.
Specific implementation mode
The present invention includes antivirus card and key floppy disk adaptable therewith, includes decoder and tri-state in antivirus card
Switch, the course of work are to be protected into row decoding to reach to the instruction of computer access virus infraction hard disk by logic circuit
The purpose in hard disk secure area is protected, described key floppy disc, it is a clean boot disk, in the related operation hard disk peace of disc recording
The whole district makes the safety zone become the application program in the implicit region of operating system not accessed and guides user security operation
Application program.
By the INT13 of DOS systems obtain a certain specific model be how access hard disk.In embodiment, Wo Menzhi
Road is by the ports I/O 1F5 when system host CPU writes hard disk 010000-01FFFF magnetic tracks for COMPAQ, AST type
01 (hard disk magnetic track is 2 high) is write, 30 (write order codes) are write come what is completed to 1F7.
U1, U6, U8 and U2 form a port I/O (address 1F5) of main system, and U1, U6, U8 and U4 form system
Another port I/O (address 1F7), two ports and U7, U9, U10, U11, U12, U3, U5 collective effect, make host CPU repair
When changing and (write or format) hard disk 010000-11FFFF magnetic tracks, high-level control signal, this signal control are exported by U12 third feet
Triple gate U13 processed is disconnected, and the cable (the control cable of connection main system and hard disk) to be connected on U13 disconnects, and makes
Main system and hard disk can not communicate, and achieve the purpose that protect hard disk.Other operations of host CPU to hard disk, then this card guarantee are led
CPU is without hindrance to hard disk communication.
When hard disk goes into operation, we can with the FDISK of DOS by safety zone to be opened up (such as:Hard disk 010000-
11FFFG magnetic tracks) it is set as a Logical Disk (such as D disks).Then the subregion chain of this Logical Disk is given up (such as being changed to full 0).This
Sample, this Logical Disk just become an implicit disk of operating system, and under normal circumstances, system will not access this safety zone.
When needing Lawful access safety zone, start machine with a clean key floppy disk, user need to only operate according to prompt
.(toggle switch U18, hard card is made to be switched on or off) is automatically performed by the software on key floppy disc under the human intervention of user
The recovery of implicit logical disk partition chain, (safety zone not be set as generally workspace, only confirming virus-free software for modification access
Just can directly be run on implicit disk) operation.
The present invention solves in principle compared with prior art in safety zone not by poisoning intrusion and not illegal limitation behaviour
Make the normal right of system, scheme facts have proved practical.Also be exactly that antivirus card is small, using component it is few and behaviour
Make simple and practicable.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, the change or replacement that can be readily occurred in,
It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims
Subject to.
Claims (4)
1. a kind of computer anti-virus attacks device, which is characterized in that adaptable key including antivirus card and therewith
Floppy disk.
2. computer anti-virus according to claim 1 attacks device, which is characterized in that antivirus card includes decoder
And tri-state switch.
3. computer anti-virus according to claim 1 attacks device, which is characterized in that the course of work is by logic circuit
The instruction of virus infraction hard disk is accessed into row decoding, to achieve the purpose that protect hard disk secure area to computer.
4. computer anti-virus as described in claim 1 attacks device, which is characterized in that it is a clean boot disk,
In the related operation hard disk secure area of disc recording, the safety zone is made to become the application journey in the implicit region of operating system not accessed
Sequence and the application program of guiding user security operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810226921.8A CN108595949A (en) | 2018-03-13 | 2018-03-13 | A kind of computer anti-virus attack device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810226921.8A CN108595949A (en) | 2018-03-13 | 2018-03-13 | A kind of computer anti-virus attack device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108595949A true CN108595949A (en) | 2018-09-28 |
Family
ID=63626681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810226921.8A Pending CN108595949A (en) | 2018-03-13 | 2018-03-13 | A kind of computer anti-virus attack device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108595949A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1124377A (en) * | 1995-12-21 | 1996-06-12 | 沈阳工业高等专科学校工矿备件公司 | Hard disk information protective technology and equipment for micro computer |
CN1127386A (en) * | 1994-12-20 | 1996-07-24 | 肖勇 | Virus proof tech. for computer |
-
2018
- 2018-03-13 CN CN201810226921.8A patent/CN108595949A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1127386A (en) * | 1994-12-20 | 1996-07-24 | 肖勇 | Virus proof tech. for computer |
CN1124377A (en) * | 1995-12-21 | 1996-06-12 | 沈阳工业高等专科学校工矿备件公司 | Hard disk information protective technology and equipment for micro computer |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3779745B1 (en) | Code pointer authentication for hardware flow control | |
CN102592083B (en) | Storage protecting controller and method for improving safety of SOC (system on chip) | |
US8966624B2 (en) | System and method for securing an input/output path of an application against malware with a below-operating system security agent | |
TWI514187B (en) | Systems and methods for providing anti-malware protection on storage devices | |
CN107563213B (en) | Safety secrecy control device for preventing data extraction of storage equipment | |
CN110659458A (en) | Central processor design method supporting software code data secret credible execution | |
US20070101424A1 (en) | Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements | |
US20130305388A1 (en) | Link status based content protection buffers | |
KR101469894B1 (en) | Method and apparatus for providing secure execution environment based on domain separation | |
KR20190021673A (en) | Apparatus and method for preventing ransomware | |
Muñoz et al. | A survey on the (in) security of trusted execution environments | |
Branco et al. | Blinded random corruption attacks | |
CN102194074A (en) | Computer protection method based on process right | |
Song | Analysis of risks for virtualization technology | |
JP2015052951A (en) | Security strengthening device | |
CN108595949A (en) | A kind of computer anti-virus attack device | |
Tsifountidis | Virtualization security: Virtual machine monitoring and introspection | |
CN1322424C (en) | Virus proof tech. for computer | |
KR100651611B1 (en) | Safe control method when detecting the access to storage media | |
Zheng et al. | TZ-KPM: Kernel protection mechanism on embedded devices on hardware-assisted isolated environment | |
Khurshid et al. | ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack | |
Khan et al. | A Comparative Analysis of Software Protection Schemes. | |
CN106952659B (en) | CD multistage imprinting encryption method based on XTS encryption mode | |
Suciu et al. | Droidsentry: Efficient code integrity and control flow verification on trustzone devices | |
Hauet | ‘ISA99/IEC 62443: A solution to cyber-security issues? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180928 |