CN1202479C - Safety protective computer - Google Patents
Safety protective computer Download PDFInfo
- Publication number
- CN1202479C CN1202479C CN 02153576 CN02153576A CN1202479C CN 1202479 C CN1202479 C CN 1202479C CN 02153576 CN02153576 CN 02153576 CN 02153576 A CN02153576 A CN 02153576A CN 1202479 C CN1202479 C CN 1202479C
- Authority
- CN
- China
- Prior art keywords
- port
- security protection
- network
- computing machine
- programmable logic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to a safe protection computer which comprises an inner net isolation switching card, an outer net isolation switching card, and an information leakage resistance part, wherein the information leakage resistance part is provided with a programmable logic device and a wideband power amplifying stage. The card type jammer also comprises an alarm part, the programmable logic device of a system is provided with three connection ports, one of the ports is connected with the filtering power source end, another of the ports is connected with the wideband power amplifying stage, the last of the ports is connected with the alarm part, a port connected with a display card is arranged between the programmable logic device of the system and the alarm part, and the output terminal of the wideband power amplifying stage is connected with an antenna T. The present invention is also provided with a part by which the fingerprint identity can be identified, and the computer can effectively prevent the information leakage from being returned, can achieve a purpose of one computer with double net, and adopts the fingerprint identification technology so that the security of the computer can be ensured.
Description
Technical field
The present invention relates to a kind of computing machine, more particularly, the present invention relates to a kind of computing machine of protecting information security, relate to a kind of complex art of multinomial security protection.In International Patent Classification (IPC), should be divided into the G06 class.
Background technology
As everyone knows, will produce the electromagnetic leakage emission as long as computing machine and auxiliary device are started working, described electromagnetic leakage emission can produce radiation and conduction emission by spatial field and conductor.And the emission of above-mentioned electromagnetic leakage will inevitably be carried away the handled information of equipment, and can recover handled information by receiving equipment in certain distance.If being classified information, handled information certainly will causing and divulge a secret! In order to prevent the electromagnetic leakage emission, common means are to take electromagnetic shielding measure, promptly are that whole computer system is placed in the screened room.Above-mentioned measure is effective, but weak point is also arranged: invest too greatly, use inconveniently, working environment is not good enough in the big cage of screened room.In addition, common computer generally adopts numeral to carry out that identity is differentiated or encrypt, and certain advantage is also arranged, but some shortcomings are also arranged: forget easily, easy crack causes information stolen or lose.
Summary of the invention
Goal of the invention of the present invention is: at the deficiency of prior art, under the prerequisite that a machine pair nets, assurance inside and outside network physical are isolated, further provide a kind of and can prevent that leakage of information is received reduction and causes the security protection computing machine of divulging a secret, have discriminating of enhancing identity and encryption.
Goal of the invention of the present invention is achieved through the following technical solutions: described security protection computing machine comprises interior network interface, outer network interface, CPU, I/O interface, described security protection computing machine has one first hard disk and one second hard disk, an ATX power supply, a UPS, described security protection computing machine also comprises a network switching, and described network switching is with Intranet start key N and outer net start key W; Control first hard disk by Intranet start key N with network switching and be connected, interconnect with CPU, RAM, I/O interface respectively, network interface in being connected with network switching by the two hard disk isolation cards that connect data bus by data bus with data bus; At another constantly, controlling second hard disk by outer net start key W with network switching is connected with data bus, interconnect with CPU, RAM, I/O interface respectively by data bus, be connected outer network interface with network switching by the two hard disk isolation cards that connect data bus; It is characterized in that: described security protection computing machine has a Tempest part.
Described Tempest partly has a programmable logic device (PLD), a wideband power amplifier level is arranged, also contain the warning part, described programmable logic device (PLD) has three connectivity ports, one of them port connects the filter power supply end, another port connects wideband power amplifier level, and the 3rd port connects the warning part; In described programmable logic device (PLD) with between reporting to the police partly a port that connects video card is arranged; Output termination antenna T in described wideband power amplifier level.
A fingerprint identity validation part is arranged.
Described fingerprint identity validation partly comprises fingerprint sensor.
Described network switching comprises control circuit 1, two groups of on-off circuits 2 and 8, two network/ network segment ports 3 and 7, PORT COM 5, two network interface card ports 4 and 9 and one group selection switches 6; Wherein, news port 5 is connected in the input of control circuit 1, and the two-way output of control circuit 1 connects the control end of two groups of on-off circuits 2 and 8 respectively; On-off circuit 2 and 8 be serially connected in respectively network/ network segment port 3 and 7 with corresponding network interface card port 4 and 9 between; Selector switch 6 is connected between two network interface card ports 4 and 9.
Be connected to coupling capacitance between described programmable logic device (PLD) and wideband power amplifier level, described coupling capacitance is a capacitor C parallel with one another
2And C
3
Described programmable logic device (PLD) is connected to interference unit, and described interference unit is first crystal oscillator, second crystal oscillator and the 3rd crystal oscillator.
Described warning part comprises acoustic alarm and light two parts of reporting to the police.
Described acoustic alarm partly has a warning circuit, and described warning circuit has a port to connect to programmable logic device (PLD), and passes through resistance R
2Connect to video card, described warning circuit also is connected to transistor T
1With alarm lamp BJD1; Described light is reported to the police and is partly comprised the transistor T of cascade
2And T
3, light emitting diode D and alarm lamp BJD2; At described transistor T
3Collector on be connected to alarm lamp BJD2, at described transistor T
2Base stage on the negative pole of sending and receiving optical diode D, the positive pole of described light emitting diode D passes through capacitor C
5And inductance L
3Connect to wideband power amplifier level.
Described wideband power amplifier level is by the inductance L of series connection
3And capacitor C
4Connect to antenna T.
On a port of described wideband power amplifier level, be connected to power adjustments potentiometer W
1
Described fingerprint sensor is installed on the finger print mouse.
Described fingerprint sensor also can be installed on the keyboard.
Because the present invention has adopted technique scheme, the present invention has realized the purpose that the two nets of a machine, inside and outside network physical are isolated, and can guarantee that Intranet is secret.Owing to adopted the UPS technology, in outage and do not have under the situation of civil power computing machine and still can work for a long time, and data can not lost.The present invention does not use any shielding measure and can prevent the leakage of classified information effectively.Because saved screened room, not only saved investment significantly, and used more conveniently, improved working environment.Owing to used the fingerprint identity validation technology, strengthened the security of differentiating and encrypting.
Description of drawings
The present invention is further described below in conjunction with accompanying drawing, wherein:
Accompanying drawing 1 is the theory diagram of Tempest part of the present invention.
Accompanying drawing 3 is Tempest of the present invention parts and the block diagram that is connected of host display.
Accompanying drawing 4 is inside and outside net conversion work schematic diagrams of the present invention.
Accompanying drawing 5 is block diagrams of network switching of the present invention.
Accompanying drawing 6 is process flow diagrams of fingerprint verification method of the present invention.
Accompanying drawing 7 is circuit theory diagrams of Tempest part of the present invention.
Embodiment
The theory diagram of Tempest part of the present invention shown in Figure 1, this accompanying drawing is one of gordian technique of the present invention, it mainly comprises controller, pixel clock generator, multichannel variable sequence generator, broadband output circuit and broad-band antenna T.The work middle controller is to the f of computing machine input
VAnd f
HDetect (f
V, f
HFrame, line synchronizing signal for the computer display card that interference unit connected), the display mode of judgement computer operation.Pass through S
0-S
7Control bus control pixel clock generator produces the pixel clock relevant with this display mode.The undesired signal of output of multichannel variable sequence generator and leakage information structurally associated.The D that controller produces at random
0-D
1Control signal makes multichannel variable sequence random variation, strengthens self confidentiality of undesired signal.The broadband output circuit strengthens the undesired signal of 10KHz-1000MHZ and exports by the broad-band antenna radiation.
Accompanying drawing 3 is Tempest of the present invention parts and the block diagram that is connected of host display.Can be clear that from this accompanying drawing Tempest equipment links to each other with display by the main frame video card.The signal that sends during computer operation, by the processing of interference unit, the frame structure of the automatic tracing display information of undesired signal can effectively resist to steal and receive back digital correlation reception technique.By above-mentioned technology, can prevent the stolen receipts of information effectively after, restore original signal, reach the effect of security protection.
Accompanying drawing 4 is inside and outside net conversion work schematic diagrams of the present invention.Comprise interior network interface, outer network interface, CPU, RAM, I/O interface and data bus, principal feature is: also contain one first hard disk and one second hard disk, an ATX power supply, a UPS, also comprise a network switching in addition, described network switching is with Intranet start key N and outer net start key W; Control first hard disk by Intranet start key N with network switching and be connected, interconnect with CPU, RAM, I/O interface respectively, network interface in being connected with network switching by the two hard disk isolation cards that connect data bus by data bus with data bus; At another constantly, controlling second hard disk by outer net start key W with network switching is connected with data bus, interconnect with CPU, RAM, I/O interface respectively by data bus, be connected outer network interface with network switching by the two hard disk isolation cards that connect data bus.
When being used for two network interface card microcomputer environment, selector switch 6 is located at scram position, when control circuit 1 cut-off switch circuit 2 was connected on-off circuits 8, only network interface card port and 9 can be set interior network interface card with network/network segment port 7 connections and is connected with Intranet; When control circuit 1 cut-off switch circuit 8 was connected on-off circuit 2, only the network interface card port can be set outer network interface card and be connected with outer net with network/network segment port 3 connections with 4.
Accompanying drawing 6 is process flow diagrams of fingerprint verification method of the present invention.As previously mentioned, described fingerprint identity validation partly comprises fingerprint sensor and fingerprint verification method.Fingerprint sensor can be installed on the finger print mouse, also can be installed on the keyboard.Fingerprint sensor is used to gather finger print information, and fingerprint identification method is finished the catching, handle, encrypt of image, pseudo-finger mark detection, registration, fingerprint template management, checking, identification by the operation in computing machine and communicated by letter.Fingerprint recognition carries out the identity discriminating and encrypts guaranteeing its security and reliability by the fingerprint live body.The fingerprint living body authentication is the uniqueness that makes full use of fingerprint, can protect important data information by the present invention, and can login the user, file processing etc. carried out encrypting fingerprint and authentication.
Experiment showed, by technique scheme of the present invention, can prevent the leakage of classified information effectively; Because saved screened room, not only saved investment significantly, and used more conveniently, improved working environment.Can guarantee inside and outside, the reliable physical isolation of net realization.Make full use of the uniqueness authentication techniques relevant of fingerprint, guarantee the security of computing machine reliably with it.
Claims (7)
1. security protection computing machine, described security protection computing machine comprises interior network interface, outer network interface, CPU, I/O interface, described security protection computing machine has one first hard disk and one second hard disk, an ATX power supply, a UPS, described security protection computing machine also comprises a network switching, and described network switching is with Intranet start key N and outer net start key W; Control first hard disk by Intranet start key N with network switching and be connected, interconnect with CPU, RAM, I/O interface respectively, network interface in being connected with network switching by the two hard disk isolation cards that connect data bus by data bus with data bus; At another constantly, controlling second hard disk by outer net start key W with network switching is connected with data bus, interconnect with CPU, RAM, I/O interface respectively by data bus, be connected outer network interface with network switching by the two hard disk isolation cards that connect data bus; It is characterized in that: described security protection computing machine has a Tempest part;
Described Tempest partly has a programmable logic device (PLD), a wideband power amplifier level is arranged, also contain the warning part, described programmable logic device (PLD) has three connectivity ports, one of them port connects the filter power supply end, another port connects wideband power amplifier level, and the 3rd port connects the warning part; In described programmable logic device (PLD) with between reporting to the police partly a port that connects video card is arranged; Output termination antenna T in described wideband power amplifier level;
A fingerprint identity validation part is arranged, and described fingerprint identity validation partly comprises fingerprint sensor.
2. security protection computing machine according to claim 1 is characterized in that: described network switching comprises control circuit (1), two groups of on-off circuits (2) and (8), two network/network segment ports (3) and (7), a PORT COM (5), two network interface card ports (4) and (9) and a group selection switch (6); Wherein, news port (5) is connected in the input of control circuit (1), and the two-way output of control circuit (1) connects the control end of two groups of on-off circuits (2) and (8) respectively; On-off circuit (2) and (8) are serially connected in respectively between network/network segment port (3) and (7) and the corresponding network interface card port (4) and (9); Selector switch (6) is connected between two network interface card ports (4) and (9);
Be connected to coupling capacitance between described programmable logic device (PLD) and wideband power amplifier level, described coupling capacitance is a capacitor C parallel with one another
2And C
3
Described programmable logic device (PLD) is connected to interference unit, and described interference unit is first crystal oscillator, second crystal oscillator and the 3rd crystal oscillator;
Described warning part comprises acoustic alarm and light two parts of reporting to the police.
3. according to claim 1,2 described security protection computing machines, it is characterized in that: described acoustic alarm partly has a warning circuit, and described warning circuit has a port to connect to programmable logic device (PLD), and passes through resistance R
2Connect to video card, described warning circuit also is connected to transistor T
1With alarm lamp BJD1; Described light is reported to the police and is partly comprised the transistor T of cascade
2And T
3, light emitting diode D and alarm lamp BJD2; At described transistor T
3Collector on be connected to alarm lamp BJD2, at described transistor T
2Base stage on the negative pole of sending and receiving optical diode D, the positive pole of described light emitting diode D passes through capacitor C
5And inductance L
3Connect to wideband power amplifier level.
4. security protection computing machine according to claim 1 is characterized in that: described wideband power amplifier level is by the inductance L of series connection
3And capacitor C
4Connect to antenna T.
5. security protection computing machine according to claim 1 is characterized in that: be connected to power adjustments potentiometer W on a port of described wideband power amplifier level
1
6. security protection computing machine according to claim 1 is characterized in that: described fingerprint sensor is installed on the finger print mouse.
7. security protection computing machine according to claim 1 is characterized in that: described fingerprint sensor is installed on the keyboard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 02153576 CN1202479C (en) | 2002-11-28 | 2002-11-28 | Safety protective computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 02153576 CN1202479C (en) | 2002-11-28 | 2002-11-28 | Safety protective computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1419198A CN1419198A (en) | 2003-05-21 |
CN1202479C true CN1202479C (en) | 2005-05-18 |
Family
ID=4752313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 02153576 Expired - Fee Related CN1202479C (en) | 2002-11-28 | 2002-11-28 | Safety protective computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1202479C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640595B (en) * | 2008-07-28 | 2015-03-25 | 联想(北京)有限公司 | Method, device and system for controlling switching of isolation card |
CN101989117A (en) * | 2009-07-30 | 2011-03-23 | 鸿富锦精密工业(深圳)有限公司 | Power supply circuit for computer graphic processing unit chip |
-
2002
- 2002-11-28 CN CN 02153576 patent/CN1202479C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1419198A (en) | 2003-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104751036A (en) | Computer information security system | |
CN106131072A (en) | A kind of computer information safe system | |
CN105095719A (en) | Fingerprint unlocking method and system and electronic device provided with system | |
CN203366348U (en) | Face recognition system and entrance guard system | |
CN105320865A (en) | Authentication method, collection device, authentication device and system, equipment cabinet and unlocking method | |
CN108319887A (en) | A kind of identity authentication method and system | |
CN1202479C (en) | Safety protective computer | |
CN204463132U (en) | A kind of anti-theft device for computer data information | |
CN105897401B (en) | General differential power consumption analysis method and system based on bit | |
CN109271772A (en) | A kind of multi-action computer network guard system | |
US20160125239A1 (en) | Systems And Methods For Secure Iris Imaging | |
CN103258372B (en) | Laser imaging code keypad | |
CN112287346A (en) | IRP analysis-based encrypted Lesso software real-time monitoring system and method | |
CN102779242A (en) | Computer system | |
CN107194229A (en) | A kind of computer user's personal identification method | |
CN102592065A (en) | Computer system | |
CN108683639A (en) | A kind of computer network abnormality detection and automatic repair system, method and mobile terminal | |
CN109664000A (en) | A kind of solder system | |
CN103366455A (en) | Safety monitoring device for card reader of ATM (Automatic Teller Machine) and monitoring method thereof | |
CN1281190A (en) | Network security computer with single motherboard | |
CN106296192A (en) | The safe transmission method of password, system and close shield | |
CN112182556A (en) | Pressure dimension test system for intelligent unlocking | |
CN112887288B (en) | Internet-based E-commerce platform intrusion detection front-end computer scanning system | |
DE202004008380U1 (en) | Secure card reader has additional electronic components for encrypting data to be transferred to an external unit and for detecting data access attempts | |
CN113486394B (en) | Privacy protection and tamper-proof method and system based on face block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
DD01 | Delivery of document by public notice |
Addressee: Li Dadong Document name: payment instructions |
|
DD01 | Delivery of document by public notice | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20050518 Termination date: 20211128 |
|
CF01 | Termination of patent right due to non-payment of annual fee |