CN1202479C - Safety protective computer - Google Patents

Safety protective computer Download PDF

Info

Publication number
CN1202479C
CN1202479C CN 02153576 CN02153576A CN1202479C CN 1202479 C CN1202479 C CN 1202479C CN 02153576 CN02153576 CN 02153576 CN 02153576 A CN02153576 A CN 02153576A CN 1202479 C CN1202479 C CN 1202479C
Authority
CN
China
Prior art keywords
port
security protection
network
computing machine
programmable logic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 02153576
Other languages
Chinese (zh)
Other versions
CN1419198A (en
Inventor
李大东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 02153576 priority Critical patent/CN1202479C/en
Publication of CN1419198A publication Critical patent/CN1419198A/en
Application granted granted Critical
Publication of CN1202479C publication Critical patent/CN1202479C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention relates to a safe protection computer which comprises an inner net isolation switching card, an outer net isolation switching card, and an information leakage resistance part, wherein the information leakage resistance part is provided with a programmable logic device and a wideband power amplifying stage. The card type jammer also comprises an alarm part, the programmable logic device of a system is provided with three connection ports, one of the ports is connected with the filtering power source end, another of the ports is connected with the wideband power amplifying stage, the last of the ports is connected with the alarm part, a port connected with a display card is arranged between the programmable logic device of the system and the alarm part, and the output terminal of the wideband power amplifying stage is connected with an antenna T. The present invention is also provided with a part by which the fingerprint identity can be identified, and the computer can effectively prevent the information leakage from being returned, can achieve a purpose of one computer with double net, and adopts the fingerprint identification technology so that the security of the computer can be ensured.

Description

The security protection computing machine
Technical field
The present invention relates to a kind of computing machine, more particularly, the present invention relates to a kind of computing machine of protecting information security, relate to a kind of complex art of multinomial security protection.In International Patent Classification (IPC), should be divided into the G06 class.
Background technology
As everyone knows, will produce the electromagnetic leakage emission as long as computing machine and auxiliary device are started working, described electromagnetic leakage emission can produce radiation and conduction emission by spatial field and conductor.And the emission of above-mentioned electromagnetic leakage will inevitably be carried away the handled information of equipment, and can recover handled information by receiving equipment in certain distance.If being classified information, handled information certainly will causing and divulge a secret! In order to prevent the electromagnetic leakage emission, common means are to take electromagnetic shielding measure, promptly are that whole computer system is placed in the screened room.Above-mentioned measure is effective, but weak point is also arranged: invest too greatly, use inconveniently, working environment is not good enough in the big cage of screened room.In addition, common computer generally adopts numeral to carry out that identity is differentiated or encrypt, and certain advantage is also arranged, but some shortcomings are also arranged: forget easily, easy crack causes information stolen or lose.
Summary of the invention
Goal of the invention of the present invention is: at the deficiency of prior art, under the prerequisite that a machine pair nets, assurance inside and outside network physical are isolated, further provide a kind of and can prevent that leakage of information is received reduction and causes the security protection computing machine of divulging a secret, have discriminating of enhancing identity and encryption.
Goal of the invention of the present invention is achieved through the following technical solutions: described security protection computing machine comprises interior network interface, outer network interface, CPU, I/O interface, described security protection computing machine has one first hard disk and one second hard disk, an ATX power supply, a UPS, described security protection computing machine also comprises a network switching, and described network switching is with Intranet start key N and outer net start key W; Control first hard disk by Intranet start key N with network switching and be connected, interconnect with CPU, RAM, I/O interface respectively, network interface in being connected with network switching by the two hard disk isolation cards that connect data bus by data bus with data bus; At another constantly, controlling second hard disk by outer net start key W with network switching is connected with data bus, interconnect with CPU, RAM, I/O interface respectively by data bus, be connected outer network interface with network switching by the two hard disk isolation cards that connect data bus; It is characterized in that: described security protection computing machine has a Tempest part.
Described Tempest partly has a programmable logic device (PLD), a wideband power amplifier level is arranged, also contain the warning part, described programmable logic device (PLD) has three connectivity ports, one of them port connects the filter power supply end, another port connects wideband power amplifier level, and the 3rd port connects the warning part; In described programmable logic device (PLD) with between reporting to the police partly a port that connects video card is arranged; Output termination antenna T in described wideband power amplifier level.
A fingerprint identity validation part is arranged.
Described fingerprint identity validation partly comprises fingerprint sensor.
Described network switching comprises control circuit 1, two groups of on-off circuits 2 and 8, two network/ network segment ports 3 and 7, PORT COM 5, two network interface card ports 4 and 9 and one group selection switches 6; Wherein, news port 5 is connected in the input of control circuit 1, and the two-way output of control circuit 1 connects the control end of two groups of on-off circuits 2 and 8 respectively; On-off circuit 2 and 8 be serially connected in respectively network/ network segment port 3 and 7 with corresponding network interface card port 4 and 9 between; Selector switch 6 is connected between two network interface card ports 4 and 9.
Be connected to coupling capacitance between described programmable logic device (PLD) and wideband power amplifier level, described coupling capacitance is a capacitor C parallel with one another 2And C 3
Described programmable logic device (PLD) is connected to interference unit, and described interference unit is first crystal oscillator, second crystal oscillator and the 3rd crystal oscillator.
Described warning part comprises acoustic alarm and light two parts of reporting to the police.
Described acoustic alarm partly has a warning circuit, and described warning circuit has a port to connect to programmable logic device (PLD), and passes through resistance R 2Connect to video card, described warning circuit also is connected to transistor T 1With alarm lamp BJD1; Described light is reported to the police and is partly comprised the transistor T of cascade 2And T 3, light emitting diode D and alarm lamp BJD2; At described transistor T 3Collector on be connected to alarm lamp BJD2, at described transistor T 2Base stage on the negative pole of sending and receiving optical diode D, the positive pole of described light emitting diode D passes through capacitor C 5And inductance L 3Connect to wideband power amplifier level.
Described wideband power amplifier level is by the inductance L of series connection 3And capacitor C 4Connect to antenna T.
On a port of described wideband power amplifier level, be connected to power adjustments potentiometer W 1
Described fingerprint sensor is installed on the finger print mouse.
Described fingerprint sensor also can be installed on the keyboard.
Because the present invention has adopted technique scheme, the present invention has realized the purpose that the two nets of a machine, inside and outside network physical are isolated, and can guarantee that Intranet is secret.Owing to adopted the UPS technology, in outage and do not have under the situation of civil power computing machine and still can work for a long time, and data can not lost.The present invention does not use any shielding measure and can prevent the leakage of classified information effectively.Because saved screened room, not only saved investment significantly, and used more conveniently, improved working environment.Owing to used the fingerprint identity validation technology, strengthened the security of differentiating and encrypting.
Description of drawings
The present invention is further described below in conjunction with accompanying drawing, wherein:
Accompanying drawing 1 is the theory diagram of Tempest part of the present invention.
Accompanying drawing 2 is schematic block circuit diagram of Tempest part of the present invention.
Accompanying drawing 3 is Tempest of the present invention parts and the block diagram that is connected of host display.
Accompanying drawing 4 is inside and outside net conversion work schematic diagrams of the present invention.
Accompanying drawing 5 is block diagrams of network switching of the present invention.
Accompanying drawing 6 is process flow diagrams of fingerprint verification method of the present invention.
Accompanying drawing 7 is circuit theory diagrams of Tempest part of the present invention.
Embodiment
The theory diagram of Tempest part of the present invention shown in Figure 1, this accompanying drawing is one of gordian technique of the present invention, it mainly comprises controller, pixel clock generator, multichannel variable sequence generator, broadband output circuit and broad-band antenna T.The work middle controller is to the f of computing machine input VAnd f HDetect (f V, f HFrame, line synchronizing signal for the computer display card that interference unit connected), the display mode of judgement computer operation.Pass through S 0-S 7Control bus control pixel clock generator produces the pixel clock relevant with this display mode.The undesired signal of output of multichannel variable sequence generator and leakage information structurally associated.The D that controller produces at random 0-D 1Control signal makes multichannel variable sequence random variation, strengthens self confidentiality of undesired signal.The broadband output circuit strengthens the undesired signal of 10KHz-1000MHZ and exports by the broad-band antenna radiation.
Accompanying drawing 2 is schematic block circuit diagram of Tempest part of the present invention.Therefrom have three major parts as can be seen, described three major parts comprise: a programmable logic device (PLD), a wideband power amplifier level, a warning part.Principal feature is: described programmable logic device (PLD) has three connectivity ports, and one of them port connects the filter power supply end, and another port connects wideband power amplifier level, and the 3rd port connects the warning part.In described programmable logic device (PLD) with between reporting to the police partly a port that connects video card is arranged.At the output termination antenna T of described wideband power amplifier level, described antenna T is a broad-band antenna, wherein also contains and covers undesired signal.
Accompanying drawing 7 is circuit theory diagrams of Tempest part of the present invention.Therefrom can further see architectural feature of the present invention.Wherein between described programmable logic device (PLD) and wideband power amplifier level, be connected to coupling capacitance.Described coupling capacitance is a capacitor C parallel with one another 2And C 3Described programmable logic device (PLD) is connected to interference unit.Described interference unit is first crystal oscillator, second crystal oscillator and the 3rd crystal oscillator.Described warning part comprises acoustic alarm and light two parts of reporting to the police.Described acoustic alarm partly has a warning circuit, and described warning circuit has a port to connect to programmable logic device (PLD), and passes through resistance R 2Connect to video card, described warning circuit also is connected to transistor T 1With alarm lamp BJD1.Described light is reported to the police and is partly comprised the transistor T of cascade 2And T 3, light emitting diode D and alarm lamp BJD2.At described transistor T 3Collector on be connected to alarm lamp BJD2, at described transistor T 2Base stage on the negative pole of sending and receiving optical diode D, the positive pole of described light emitting diode D passes through capacitor C 5And inductance L 3Connect to wideband power amplifier level.Described wideband power amplifier level is by the inductance L of series connection 3And capacitor C 4Connect to antenna T.On a port of described wideband power amplifier level, be connected to power adjustments potentiometer W 1, to regulate the size of power.
Accompanying drawing 3 is Tempest of the present invention parts and the block diagram that is connected of host display.Can be clear that from this accompanying drawing Tempest equipment links to each other with display by the main frame video card.The signal that sends during computer operation, by the processing of interference unit, the frame structure of the automatic tracing display information of undesired signal can effectively resist to steal and receive back digital correlation reception technique.By above-mentioned technology, can prevent the stolen receipts of information effectively after, restore original signal, reach the effect of security protection.
Accompanying drawing 4 is inside and outside net conversion work schematic diagrams of the present invention.Comprise interior network interface, outer network interface, CPU, RAM, I/O interface and data bus, principal feature is: also contain one first hard disk and one second hard disk, an ATX power supply, a UPS, also comprise a network switching in addition, described network switching is with Intranet start key N and outer net start key W; Control first hard disk by Intranet start key N with network switching and be connected, interconnect with CPU, RAM, I/O interface respectively, network interface in being connected with network switching by the two hard disk isolation cards that connect data bus by data bus with data bus; At another constantly, controlling second hard disk by outer net start key W with network switching is connected with data bus, interconnect with CPU, RAM, I/O interface respectively by data bus, be connected outer network interface with network switching by the two hard disk isolation cards that connect data bus.
Accompanying drawing 5 is block diagrams of network switching of the present invention.The block diagram of described network switching comprises control circuit 1, two groups of on-off circuits 2 and 8, two network/ network segment ports 3 and 7, PORT COM 5, two network interface card ports 4 and 9 and one group selection switches 6.Wherein, news port 5 is connected in the input of control circuit 1, and the two-way output of control circuit 1 connects the control end of two groups of on-off circuits 2 and 8 respectively; On-off circuit 2 and 8 be serially connected in respectively network/ network segment port 3 and 7 with corresponding network interface card port 4 and 9 between; Selector switch 6 is connected between two network interface card ports 4 and 9.
When being used for two network interface card microcomputer environment, selector switch 6 is located at scram position, when control circuit 1 cut-off switch circuit 2 was connected on-off circuits 8, only network interface card port and 9 can be set interior network interface card with network/network segment port 7 connections and is connected with Intranet; When control circuit 1 cut-off switch circuit 8 was connected on-off circuit 2, only the network interface card port can be set outer network interface card and be connected with outer net with network/network segment port 3 connections with 4.
Accompanying drawing 6 is process flow diagrams of fingerprint verification method of the present invention.As previously mentioned, described fingerprint identity validation partly comprises fingerprint sensor and fingerprint verification method.Fingerprint sensor can be installed on the finger print mouse, also can be installed on the keyboard.Fingerprint sensor is used to gather finger print information, and fingerprint identification method is finished the catching, handle, encrypt of image, pseudo-finger mark detection, registration, fingerprint template management, checking, identification by the operation in computing machine and communicated by letter.Fingerprint recognition carries out the identity discriminating and encrypts guaranteeing its security and reliability by the fingerprint live body.The fingerprint living body authentication is the uniqueness that makes full use of fingerprint, can protect important data information by the present invention, and can login the user, file processing etc. carried out encrypting fingerprint and authentication.
Experiment showed, by technique scheme of the present invention, can prevent the leakage of classified information effectively; Because saved screened room, not only saved investment significantly, and used more conveniently, improved working environment.Can guarantee inside and outside, the reliable physical isolation of net realization.Make full use of the uniqueness authentication techniques relevant of fingerprint, guarantee the security of computing machine reliably with it.

Claims (7)

1. security protection computing machine, described security protection computing machine comprises interior network interface, outer network interface, CPU, I/O interface, described security protection computing machine has one first hard disk and one second hard disk, an ATX power supply, a UPS, described security protection computing machine also comprises a network switching, and described network switching is with Intranet start key N and outer net start key W; Control first hard disk by Intranet start key N with network switching and be connected, interconnect with CPU, RAM, I/O interface respectively, network interface in being connected with network switching by the two hard disk isolation cards that connect data bus by data bus with data bus; At another constantly, controlling second hard disk by outer net start key W with network switching is connected with data bus, interconnect with CPU, RAM, I/O interface respectively by data bus, be connected outer network interface with network switching by the two hard disk isolation cards that connect data bus; It is characterized in that: described security protection computing machine has a Tempest part;
Described Tempest partly has a programmable logic device (PLD), a wideband power amplifier level is arranged, also contain the warning part, described programmable logic device (PLD) has three connectivity ports, one of them port connects the filter power supply end, another port connects wideband power amplifier level, and the 3rd port connects the warning part; In described programmable logic device (PLD) with between reporting to the police partly a port that connects video card is arranged; Output termination antenna T in described wideband power amplifier level;
A fingerprint identity validation part is arranged, and described fingerprint identity validation partly comprises fingerprint sensor.
2. security protection computing machine according to claim 1 is characterized in that: described network switching comprises control circuit (1), two groups of on-off circuits (2) and (8), two network/network segment ports (3) and (7), a PORT COM (5), two network interface card ports (4) and (9) and a group selection switch (6); Wherein, news port (5) is connected in the input of control circuit (1), and the two-way output of control circuit (1) connects the control end of two groups of on-off circuits (2) and (8) respectively; On-off circuit (2) and (8) are serially connected in respectively between network/network segment port (3) and (7) and the corresponding network interface card port (4) and (9); Selector switch (6) is connected between two network interface card ports (4) and (9);
Be connected to coupling capacitance between described programmable logic device (PLD) and wideband power amplifier level, described coupling capacitance is a capacitor C parallel with one another 2And C 3
Described programmable logic device (PLD) is connected to interference unit, and described interference unit is first crystal oscillator, second crystal oscillator and the 3rd crystal oscillator;
Described warning part comprises acoustic alarm and light two parts of reporting to the police.
3. according to claim 1,2 described security protection computing machines, it is characterized in that: described acoustic alarm partly has a warning circuit, and described warning circuit has a port to connect to programmable logic device (PLD), and passes through resistance R 2Connect to video card, described warning circuit also is connected to transistor T 1With alarm lamp BJD1; Described light is reported to the police and is partly comprised the transistor T of cascade 2And T 3, light emitting diode D and alarm lamp BJD2; At described transistor T 3Collector on be connected to alarm lamp BJD2, at described transistor T 2Base stage on the negative pole of sending and receiving optical diode D, the positive pole of described light emitting diode D passes through capacitor C 5And inductance L 3Connect to wideband power amplifier level.
4. security protection computing machine according to claim 1 is characterized in that: described wideband power amplifier level is by the inductance L of series connection 3And capacitor C 4Connect to antenna T.
5. security protection computing machine according to claim 1 is characterized in that: be connected to power adjustments potentiometer W on a port of described wideband power amplifier level 1
6. security protection computing machine according to claim 1 is characterized in that: described fingerprint sensor is installed on the finger print mouse.
7. security protection computing machine according to claim 1 is characterized in that: described fingerprint sensor is installed on the keyboard.
CN 02153576 2002-11-28 2002-11-28 Safety protective computer Expired - Fee Related CN1202479C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02153576 CN1202479C (en) 2002-11-28 2002-11-28 Safety protective computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02153576 CN1202479C (en) 2002-11-28 2002-11-28 Safety protective computer

Publications (2)

Publication Number Publication Date
CN1419198A CN1419198A (en) 2003-05-21
CN1202479C true CN1202479C (en) 2005-05-18

Family

ID=4752313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02153576 Expired - Fee Related CN1202479C (en) 2002-11-28 2002-11-28 Safety protective computer

Country Status (1)

Country Link
CN (1) CN1202479C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640595B (en) * 2008-07-28 2015-03-25 联想(北京)有限公司 Method, device and system for controlling switching of isolation card
CN101989117A (en) * 2009-07-30 2011-03-23 鸿富锦精密工业(深圳)有限公司 Power supply circuit for computer graphic processing unit chip

Also Published As

Publication number Publication date
CN1419198A (en) 2003-05-21

Similar Documents

Publication Publication Date Title
CN104751036A (en) Computer information security system
CN106131072A (en) A kind of computer information safe system
CN105095719A (en) Fingerprint unlocking method and system and electronic device provided with system
CN203366348U (en) Face recognition system and entrance guard system
CN105320865A (en) Authentication method, collection device, authentication device and system, equipment cabinet and unlocking method
CN108319887A (en) A kind of identity authentication method and system
CN1202479C (en) Safety protective computer
CN204463132U (en) A kind of anti-theft device for computer data information
CN105897401B (en) General differential power consumption analysis method and system based on bit
CN109271772A (en) A kind of multi-action computer network guard system
US20160125239A1 (en) Systems And Methods For Secure Iris Imaging
CN103258372B (en) Laser imaging code keypad
CN112287346A (en) IRP analysis-based encrypted Lesso software real-time monitoring system and method
CN102779242A (en) Computer system
CN107194229A (en) A kind of computer user's personal identification method
CN102592065A (en) Computer system
CN108683639A (en) A kind of computer network abnormality detection and automatic repair system, method and mobile terminal
CN109664000A (en) A kind of solder system
CN103366455A (en) Safety monitoring device for card reader of ATM (Automatic Teller Machine) and monitoring method thereof
CN1281190A (en) Network security computer with single motherboard
CN106296192A (en) The safe transmission method of password, system and close shield
CN112182556A (en) Pressure dimension test system for intelligent unlocking
CN112887288B (en) Internet-based E-commerce platform intrusion detection front-end computer scanning system
DE202004008380U1 (en) Secure card reader has additional electronic components for encrypting data to be transferred to an external unit and for detecting data access attempts
CN113486394B (en) Privacy protection and tamper-proof method and system based on face block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
DD01 Delivery of document by public notice

Addressee: Li Dadong

Document name: payment instructions

DD01 Delivery of document by public notice
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050518

Termination date: 20211128

CF01 Termination of patent right due to non-payment of annual fee