CN201111056Y - Computer information security control apparatus - Google Patents

Computer information security control apparatus Download PDF

Info

Publication number
CN201111056Y
CN201111056Y CNU200720015313XU CN200720015313U CN201111056Y CN 201111056 Y CN201111056 Y CN 201111056Y CN U200720015313X U CNU200720015313X U CN U200720015313XU CN 200720015313 U CN200720015313 U CN 200720015313U CN 201111056 Y CN201111056 Y CN 201111056Y
Authority
CN
China
Prior art keywords
computer
relay
power supply
pilot relay
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNU200720015313XU
Other languages
Chinese (zh)
Inventor
吴晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNU200720015313XU priority Critical patent/CN201111056Y/en
Application granted granted Critical
Publication of CN201111056Y publication Critical patent/CN201111056Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model belongs to the computer information security control field, in particular to a computer information security control device. The device comprises a relay drive part, a computer network control relay, a computer power supply control relay, a computer power supply, a microprocessor and an interface conversion part. One path of the output port of the microprocessor is connected with the user computer through the interface conversion part and the other path of the output port is connected with the input port of the relay drive part. One path of the output port of the relay drive part is connected with the input port of the computer network control relay and the other path of the output port is connected with the input port of the computer power supply control relay. The computer power supply control relay is used for controlling the encryption of the computer security hard disk and the computer network control relay is used for controlling the on and off states of the computer network. The computer information security control device of the utility model can effectively guarantee the absolute security of the information in the user computer.

Description

The computer information safe control device
Technical field
The utility model belongs to computer information safe control field, relates in particular to a kind of computer information safe control device.
Background technology
Along with the fast development of computer technology and network, make computing machine become people's indispensable instrument in work, studying and living.Equally, development of computer network has also been brought the potential safety hazard of subscriber computer information, and the network information is stolen, information attack, virus disseminating etc. all exist all the time and take place.In order to solve the subscriber computer information security issue, people have taked many measures and method, comprise adopting the two hard disk work of hard disk isolation card control, two two hard disk work of different operating system control, manually controlling two hard disks technical measures and means such as work respectively.These methods all exist technical defective to some extent, and what have can not guarantee " network hacker " in the attack of network-side to user's hard disk information, and the needs that have are shut down computer and could be changed hard disk work.
The utility model content
The utility model is intended to overcome the deficiencies in the prior art part and provides a kind of simple in structure, " network hacker " can't change the duty of subscriber computer in network-side, can effectively guarantee the computer information safe control device that subscriber computer information is perfectly safe.
For achieving the above object, the utility model is achieved in that
The computer information safe control device, it comprises: relay drive part, computer network pilot relay, computer power supply pilot relay, computer power supply, microprocessor, interface conversion part;
Described output end of microprocessor mouth one tunnel joins through interface conversion part and subscriber computer, and the input port of its another road and relay drive part joins;
The output port one tunnel of described relay drive part joins with the input port of computer network pilot relay, and the input port of its another road and computer power supply pilot relay joins; Described computer power supply pilot relay is used for the encryption of the secret hard disk of control computer; Described computer network pilot relay is used for the break-make of control computer network.
As a kind of preferred version, computer network pilot relay described in the utility model comprises two relays; Described computer power supply pilot relay comprises two relays.
As another kind of preferred version, interface conversion part described in the utility model can adopt pci interface converter or RS-232 interface converter.
The utility model compared with prior art has following characteristics:
1, can guarantee being perfectly safe of subscriber computer information
(1) the utility model is divided into three kinds of mode of operations to subscriber computer, and first kind is " safe mode ", and second kind is " grid connect mode ", and the third is " a unloading pattern ".The mode of operation of subscriber computer is come control transformation by user oneself by software application, and " network hacker " can't change the mode of operation of subscriber computer on the net.The utility model can be under the state of subscriber computer networking; effectively the middle information of protection subscriber computer " hard disc of computer that has information safety protection " is perfectly safe; " network hacker " be technical measures and means whatsoever, all can't steal and attack the information in the subscriber computer " hard disc of computer that has information safety protection ".
(2) user can register portable hard drive, flash disk by software program, and portable hard drive that is not registered and flash disk can not use on subscriber computer.Thereby, protected being perfectly safe of subscriber computer information at the user side of subscriber computer.
2, control combination realizes optimization
The intelligent hard disc control card that the utility model adopts; solved the automatic power problem of the hard disc of computer that has information safety protection; solve the interface problem with computer PCI, RS-232 and network interface card RJ-45, also solved the application program cross complaint problem of intelligent hard disc control card and subscriber computer simultaneously.The utility model has been selected optimum way on control structure, selected the annexation of simplifying most on combination of circuits, has finished the Based Intelligent Control between the each component of computer.
3, simple in structure, be easy to popularize
The intelligent hard disc control card of the utility model design, its components and parts are the parts of easily purchasing on the market, and are therefore with low cost, are easy to produce, and are easy to popularize.
Description of drawings
The utility model is described in further detail below in conjunction with the drawings and specific embodiments.Protection domain of the present utility model will not only be confined to the protection of following content.
Fig. 1 is the utility model integrated circuit theory diagram;
Fig. 2 is a kind of embodiment schematic block circuit diagram of the utility model;
Fig. 3 is the another kind of embodiment schematic block circuit diagram of the utility model;
Fig. 4 is a kind of embodiment physical circuit of the utility model schematic diagram.
Embodiment
As shown in Figure 1, the computer information safe control device comprises: relay drive part, computer network pilot relay, computer power supply pilot relay, computer power supply, microprocessor, interface conversion part; Described output end of microprocessor mouth one tunnel joins through interface conversion part and subscriber computer, and the input port of electrical equipment drive part is succeeded on another road of its output port; The output port one tunnel of described relay drive part joins with the input port of computer network pilot relay, and another road of its output port connects the input port of computer power supply pilot relay; Described computer power supply pilot relay is used for the encryption of the secret hard disk of control computer; Described computer network pilot relay is used for the break-make of control computer network.Shown in Fig. 2,3, computer network pilot relay described in the utility model comprises two relays, i.e. relay 1 and relay 2; Computer power supply pilot relay described in the utility model comprises two relays, i.e. relay 3 and relay 4.As shown in Figure 3, interface conversion part described in the utility model can adopt the pci interface converter.As shown in Figure 2, interface conversion part described in the utility model is for also adopting the RS-232 interface converter.
The utility model is when actual design, and apparatus structure comprises the computer-internal power supply, has the hard disc of computer of information safety protection, network interface card, common computer hard disk, computer network hub; The computer-internal power supply links to each other with the hard disc of computer that has information safety protection through intelligent hard disc control card power interface; network interface card links to each other with the computer network hub through intelligent hard disc control card RS-232 interface, and the common computer hard disk is connected with network interface card in computer-internal.
The plug of computer-internal power supply links to each other with intelligent hard disc control card interface; the plug that has the hard disc of computer of information safety protection links to each other with intelligent hard disc control card interface; the plug of computing machine RS-232 interface links to each other with intelligent hard disc control card interface; the plug of computer network hub is connected with intelligent hard disc control card interface, and the plug of network interface card links to each other with intelligent hard disc control card interface.
The utility model in use; open the subscriber computer power supply; subscriber computer is under original state; automatically enter " safe mode "; this moment, subscriber computer and computer network disconnected; the hard disc of computer that has information safety protection powers up, and the information of common computer hard disk writes and is employed the software cancellation.
In the time will being replaced by " grid connect mode "; the user controls by operating application program; at this moment; the power supply that has the hard disc of computer of information safety protection is disconnected; (program adopts common hard disk hot-plug technology not to be damaged with the protection hard disk); the information of common computer hard disk writes and is employed software and opens, and subscriber computer is connected with computer network.Because subscriber computer is under the state of networking; the power supply that has the hard disc of computer of information safety protection is disconnected; do not work so have the hard disc of computer of information safety protection, it is hereby ensured subscriber computer the networking state under do not stolen security information by " network hacker ".
In the time will being replaced by " unloading pattern "; the user controls by operating application program; this moment, subscriber computer and computer network disconnected; the hard disc of computer that has information safety protection powers up; the information of common computer hard disk writes and is employed software and opens, and has between the hard disc of computer of information safety protection and the common computer hard disk to carry out the information unloading.Because under " unloading pattern ", subscriber computer and computer network disconnect, under the state of networking, do not stolen security information by " network hacker " so can guarantee subscriber computer equally.
As shown in Figure 4, the relay drive part adopts DS2003CM (16), and microprocessor adopts AT89C2051.Interface conversion part adopts MAX232.
Control procedure of the present utility model:
1, init state: relay 1,2 disconnects, and Registered Jack-45 is not communicated with, and subscriber computer and computer network disconnect; Relay 3,4 adhesives, the computer power supply socket is communicated with, and computer power supply powers up to the secret hard disk of subscriber computer, secret hard disk work.
2, microprocessor sends instruction, relay 1,2 adhesives, and Registered Jack-45 is communicated with, and subscriber computer is communicated with computer network, and relay 3,4 disconnects, and the computer power supply socket is not communicated with, the secret hard disk outage of subscriber computer, secret hard disk is not worked.
3, instruction is sent in little processing, and relay 1,2 disconnects, and Registered Jack-45 is not communicated with, and subscriber computer and computer network disconnect; Relay 3,4 adhesives, the computer power supply socket is communicated with, and computer power supply powers up to the secret hard disk of subscriber computer, secret hard disk work.
4, relay 1,2 and relay 3,4 oppose each other, and when relay 1,2 adhesives, relay 3,4 must disconnect.When relay 1,2 disconnects, relay 3,4 inevitable adhesives.Mainly be to guarantee that secret hard disk of subscriber computer and computer network oppose each other.That is to say that when the secret hard disk of subscriber computer was worked, subscriber computer is inevitable to be disconnected with network; When the secret hard disk of subscriber computer is not worked, the inevitable and network-in-dialing of subscriber computer.

Claims (3)

1, the computer information safe control device is characterized in that, comprising: relay drive part, computer network pilot relay, computer power supply pilot relay, computer power supply, microprocessor, interface conversion part;
Described output end of microprocessor mouth one tunnel joins through interface conversion part and subscriber computer, and the input port of its another road and relay drive part joins;
The output port one tunnel of described relay drive part joins with the input port of computer network pilot relay, and the input port of its another road and computer power supply pilot relay joins; Described computer power supply pilot relay is used for the encryption of the secret hard disk of control computer; Described computer network pilot relay is used for the break-make of control computer network.
2, computer information safe control device according to claim 1 is characterized in that: described computer network pilot relay comprises two relays; Described computer power supply pilot relay comprises two relays.
3, computer information safe control device according to claim 1 and 2 is characterized in that: described interface conversion part is pci interface converter or RS-232 interface converter.
CNU200720015313XU 2007-10-16 2007-10-16 Computer information security control apparatus Expired - Fee Related CN201111056Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU200720015313XU CN201111056Y (en) 2007-10-16 2007-10-16 Computer information security control apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU200720015313XU CN201111056Y (en) 2007-10-16 2007-10-16 Computer information security control apparatus

Publications (1)

Publication Number Publication Date
CN201111056Y true CN201111056Y (en) 2008-09-03

Family

ID=39895594

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU200720015313XU Expired - Fee Related CN201111056Y (en) 2007-10-16 2007-10-16 Computer information security control apparatus

Country Status (1)

Country Link
CN (1) CN201111056Y (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102549508A (en) * 2009-04-20 2012-07-04 皮尔茨公司 Safety controller for controlling an automated system and method for generating a user program for a safety controller

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102549508A (en) * 2009-04-20 2012-07-04 皮尔茨公司 Safety controller for controlling an automated system and method for generating a user program for a safety controller
CN102549508B (en) * 2009-04-20 2015-12-02 皮尔茨公司 For the safety control of auto-control equipment and the method for creating application program for safety control

Similar Documents

Publication Publication Date Title
CN205103825U (en) Computer information safety control
CN102393729B (en) Test platform system and test method for auxiliary current transformer control unit
CN101414336A (en) Computer information safety control system
CN205036953U (en) Intelligence tap based on thing networking
CN204463132U (en) A kind of anti-theft device for computer data information
CN201111056Y (en) Computer information security control apparatus
CN205121568U (en) Computer network safety governor
CN203871840U (en) Programmable, safe, energy-saving leakage protector
CN205103823U (en) Intelligent computer network security gateway
CN202372991U (en) Data security management device for computer
CN202837944U (en) Wireless control system used in sanitation system
CN202615403U (en) Computer network information safety control device
CN202473168U (en) Computer network security controller
CN202331466U (en) Anti-theft device for computer data information
CN204536992U (en) A kind of highdensity ARM server
CN103049715A (en) Computer capable of controlling enabling of peripherals
CN203143844U (en) Elevator landing calling controller
CN207690076U (en) It soars the control device of computer function interface
CN202583796U (en) Hot-pluggable multichannel analogue output module
CN105786740B (en) A kind of USBKey
CN202929633U (en) Computer data information safety device
CN206301188U (en) A kind of circuit that the key switch machine of industrial equipment one is realized without UPS
CN105282173B (en) A kind of handset identities verifying tele-control system based on bluetooth
CN204066090U (en) Contact audio authentication device
CN206117712U (en) Intelligent computer network security gateway

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080903

Termination date: 20101016