CN201047944Y - Personal computer capable of performing access control to memory space - Google Patents

Personal computer capable of performing access control to memory space Download PDF

Info

Publication number
CN201047944Y
CN201047944Y CNU2007200513417U CN200720051341U CN201047944Y CN 201047944 Y CN201047944 Y CN 201047944Y CN U2007200513417 U CNU2007200513417 U CN U2007200513417U CN 200720051341 U CN200720051341 U CN 200720051341U CN 201047944 Y CN201047944 Y CN 201047944Y
Authority
CN
China
Prior art keywords
change
over switch
identifying code
personal computer
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNU2007200513417U
Other languages
Chinese (zh)
Inventor
李根森
柯宗庆
柯宗贵
郑少荣
陈文浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bluedon Information Safety Technology Co., Ltd.
Original Assignee
TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG filed Critical TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG
Priority to CNU2007200513417U priority Critical patent/CN201047944Y/en
Application granted granted Critical
Publication of CN201047944Y publication Critical patent/CN201047944Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

In the premise that use of non-secured data in the memory of a personal computer is not affected, and to solve the technical problem that the verification code for accessing authority verification of secured data is subject to declassification so as to provide a safe memory space for the secured data, the utility model provides a personal computer which can perform access control of memory spaces. The personal computer comprises a central processor, which is connected with input devices, output devices and a plurality of sections of memory media composed of one or more memories. The utility model is characterized in that the computer also comprises a device with a verification code, which is separate from the personal computer body in normal time; the device with the verification code can be plugged into an appointed interface of the personal computer body; the computer is also provided with a normally-off change-over switch which is series connected between a section of memory media and the central processor; the control end of the change-over switch is connected with the central processor. When the device with the verification code is plugged into the appointed interface, the change-over switch turns on only when the verification code is tested and verified.

Description

Can to storage space conduct interviews control PC
Technical field
The utility model relate to can to storage space conduct interviews control PC.
Background technology
The data storage of PC (personal computer) is in the storage medium of storer.A PC, its central processing unit can connect a plurality of storeies.Generally speaking, storage space on the storer allows to be visited by Any user, if but the data storage that needs to maintain secrecy is arranged in the storer of PC, then each is attempted to visit the request of private data, all should carry out strict authority audit, to can't being refused, to guarantee that private data is not revealed by the request of access of authentication.Secrecy provision commonly used at present is that when the user sent request of access, system ejected the identifying code input frame, the input equipment that the user carries by PC (for example keyboard) input validation sign indicating number, this identifying code is checked by system, has only identifying code to coincide, and just allows private data accessed.The defective of this secrecy provision is that its identifying code is used the method for exhaustion easily and attempts one by one and cracked, have multiple special decryption software now on the internet at this secrecy provision, during running software, automatically attempt identifying code according to the order of setting, coincide the visit that just is opened of the space of storage security data until identifying code.As seen, this secrecy provision performs practically no function in face of decryption software, and identifying code just is cracked easily.
The utility model content
The purpose of this utility model is under the prerequisite of the normal use of unclassified data in not influencing the PC storer, solution is used for the technical matters of the identifying code easy crack of private data access authority verification, thereby the storage space of one section safety is provided for private data.
Be head it off, the utility model provide can to storage space conduct interviews control PC, comprise central processing unit, central processing unit connects input equipment, output device and the multistage storage medium of forming by one or more storeies, it is characterized in that, the equipment that also comprises the band identifying code that separates with this machine of PC at ordinary times, the equipment of band identifying code can insert the designated port of this machine of PC, the change-over switch that also is provided with normal off is serially connected between one section storage medium and the central processing unit, the control termination central processing unit of change-over switch, when the equipment of described band identifying code inserts the designated port of this machine of PC, it is just closed to have only identifying code to be verified by, change-over switch.
The change-over switch that the utility model is provided with normal off is serially connected between one section storage medium and the central processing unit, and making at ordinary times can not be accessed corresponding to the storage space of this section storage medium.The input equipment input validation sign indicating number that secrecy provision in the background technology allows the user directly to carry by computing machine; And the utility model is stored in identifying code to be verified in the equipment that can insert this machine of PC designated port, the user can only allow PC read identifying code in the equipment of described band identifying code by the mode that the equipment of this band identifying code is inserted this machine of PC, have only identifying code be verified by, the change-over switch that is serially connected between this section storage medium and the central processing unit is just closed, thereby be communicated with the circuit between this section storage medium and the central processing unit, this moment, the user just can visit the storage space corresponding to this section storage medium.This just makes that the people of the equipment of not holding this band identifying code can't the input validation sign indicating number, also just can't visit the private data that is stored in this section storage space, has solved the technical matters of identifying code easy crack.Because the utility model has only the control that the visit of a part of storage medium is subjected to change-over switch, the user who does not hold the equipment of described band identifying code still can normally visit other storage space, and unclassified data are operated.
Description of drawings
Accompanying drawing is the utility model schematic diagram.
Embodiment
Can to storage space conduct interviews control PC, comprise central processing unit, central processing unit connects keyboard, display and a plurality of storer, the equipment that also comprises the band identifying code that separates with this machine of PC at ordinary times, the equipment of band identifying code can insert the designated port (is example with the USB port) of this machine of PC, the change-over switch that also is provided with normal off is serially connected between one of them storer and the central processing unit, the control termination central processing unit of change-over switch.
When the equipment of described band identifying code inserts the USB port of this machine of PC, CPU (central processing unit) reads identifying code from the equipment of described band identifying code and verifies, after checking is passed through, the closed change-over switch of central processing unit, make the storage medium of this storer and the circuit communication between the central processing unit, the user just can pass through keyboard typing private data, or checks private data by display.
After the change-over switch closure, if the designated port of the equipment of described band identifying code and this machine of PC disconnects, change-over switch just disconnects again, in order to avoid late comer's unauthorized access private data.

Claims (3)

  1. Can to storage space conduct interviews control PC, comprise central processing unit, central processing unit connects input equipment, output device and the multistage storage medium of forming by one or more storeies, it is characterized in that, the equipment that also comprises the band identifying code that separates with this machine of PC at ordinary times, the equipment of band identifying code can insert the designated port of this machine of PC, the change-over switch that also is provided with normal off is serially connected between one section storage medium and the central processing unit, the control termination central processing unit of change-over switch, when the equipment of described band identifying code inserts the designated port of this machine of PC, it is just closed to have only identifying code to be verified by, change-over switch.
  2. According to claim 1 can be to the conduct interviews PC of control of storage space, after the change-over switch closure, if the designated port of the equipment of described band identifying code and this machine of PC disconnects, change-over switch is disconnection again just.
  3. According to claim 1 can to storage space conduct interviews control PC, described designated port is a USB port.
CNU2007200513417U 2007-05-11 2007-05-11 Personal computer capable of performing access control to memory space Expired - Lifetime CN201047944Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU2007200513417U CN201047944Y (en) 2007-05-11 2007-05-11 Personal computer capable of performing access control to memory space

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU2007200513417U CN201047944Y (en) 2007-05-11 2007-05-11 Personal computer capable of performing access control to memory space

Publications (1)

Publication Number Publication Date
CN201047944Y true CN201047944Y (en) 2008-04-16

Family

ID=39300534

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU2007200513417U Expired - Lifetime CN201047944Y (en) 2007-05-11 2007-05-11 Personal computer capable of performing access control to memory space

Country Status (1)

Country Link
CN (1) CN201047944Y (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980138A (en) * 2010-11-04 2011-02-23 深圳市天方信安电子科技有限公司 Computer capable of switching different data storages by using physical switch
CN102004527A (en) * 2010-11-04 2011-04-06 深圳市天方信安电子科技有限公司 Method for switching different data storages by using physical switch
CN103246455A (en) * 2012-02-01 2013-08-14 深圳市天方信安电子科技有限公司 Screen double-unlocking system
WO2016033818A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer
CN105468996A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Computer
CN105468968A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Computer and network intrusion detection method therefor
CN109144910A (en) * 2018-10-09 2019-01-04 郑州云海信息技术有限公司 A kind of method and device that the inside serial ports with storage equipment is communicated

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980138A (en) * 2010-11-04 2011-02-23 深圳市天方信安电子科技有限公司 Computer capable of switching different data storages by using physical switch
CN102004527A (en) * 2010-11-04 2011-04-06 深圳市天方信安电子科技有限公司 Method for switching different data storages by using physical switch
CN102004527B (en) * 2010-11-04 2012-10-24 深圳市天方信安电子科技有限公司 Method for switching different data storages by using physical switch
CN101980138B (en) * 2010-11-04 2012-10-24 深圳市天方信安电子科技有限公司 Computer capable of switching different data storages by using physical switch
CN103246455A (en) * 2012-02-01 2013-08-14 深圳市天方信安电子科技有限公司 Screen double-unlocking system
WO2016033818A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer
CN105468996A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Computer
CN105468968A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Computer and network intrusion detection method therefor
CN105468991A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Computer
CN109144910A (en) * 2018-10-09 2019-01-04 郑州云海信息技术有限公司 A kind of method and device that the inside serial ports with storage equipment is communicated

Similar Documents

Publication Publication Date Title
CN201047944Y (en) Personal computer capable of performing access control to memory space
CN103353931B (en) Security-enhanced computer system and method
CN102521165B (en) Safe USB disk and its recognition methods and device
CA2799932C (en) Computer motherboard having peripheral security functions
CN206348799U (en) Encrypt storage device and safe storage system
CN101211651B (en) USB status restriction equipment and method of use thereof
CN104969180A (en) User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system
CN109344598A (en) The binding of equipment room and authority control method, device, equipment and storage medium
CN102567235A (en) Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk
CN101673330A (en) BIOS-based computer security protection method and system
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN105005721B (en) Computer mandate opening control system and method based on computer booting key
US12045379B1 (en) Methods and apparatus for authenticating an encryption key stored in removable memory devices, to access a compute device
CN201820230U (en) Computer and trusted-computing trusted root equipment for same
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN107688756B (en) Hard disk control method, equipment and readable storage medium storing program for executing
CN109886662A (en) Block chain wallet application method and system, terminal and computer readable storage medium
CN111914228A (en) Online opening method and device of security shield, terminal equipment, server and medium
CN103473512B (en) A kind of mobile memory medium management method and device
CN105069361A (en) Safety access method and system for privacy space
CN101420299A (en) Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
CN105516500A (en) Method and system for selecting equipment mode
US9262619B2 (en) Computer system and method for protecting data from external threats
CN106372494A (en) Anti-violation external connection apparatus
CN101051293A (en) Access control method for personal computer storage space

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: LANDUN INFORMATION SAFTY TECHNOLOGY CO., LTD.

Free format text: FORMER NAME: GUANGDONG TIANHAIWEI DIGITAL TECHNOLOGY CO., LTD.

CP03 Change of name, title or address

Address after: Guangdong province Guangzhou city road five No. 248 Jinshan tower, two floor, zip code: 510630

Patentee after: Bluedon Information Safety Technology Co., Ltd.

Address before: Guangdong province Guangzhou city road five No. 248 Jinshan tower, two floor, zip code: 510630

Patentee before: Tianwei Digital Codes Tech Co., Ltd., Guangdong

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20080416