Integrated secure computer
Technical field
The utility model relates to a kind of computing machine, relates in particular to a kind of integrated secure computer.
Background technology
1, computer system is divulged a secret and is on the rise
It is fast that computing machine reaches information processing rate greatly with its information storage, plugged the wing of rapid development for governability, scientific and technological research and development, army building and enterprise development, particularly portable computer has been created impayable convenient condition for people carry out the office of information processing and strange land in addition in office, and we are difficult to one of the imagination does not now have the government department of computing machine or Modern Corporation how to turn round.But, along with rapid development of Internet, computer network is divulged a secret and also is on the rise, and the concerning security matters portable computer is often lost problem, has become a difficult problem that makes the concentrated public services of Party and government offices, army, Defence business, scientific research institution and citizen's essential information data have a headache very much.Show that according to interrelated data in security work at present, computer network and portable computer are lost the leakage of a state or party secret that causes, accounted for more than 70% of sum of divulging a secret, and be rising tendency year by year.Computer information system has become the main channel of revealing state secret, serious threat national security and interests, threaten the patented technology of enterprise and citizen's personal secrets, press for new technology and prevent that effectively computer network from divulging a secret, guarantee the safety of computerized information.
2, the pattern of the current Chinese government and enterprise's relating computer use
Relevant regulations according to national security system, for the generation of divulging a secret that prevents that computing machine from using, what mechanism of the current Chinese government taked prevents that the main mode that computer network is divulged a secret from being to adopt two computing machines to share a display by converter to carry out physical isolation, two computing machines insert Intranet and outer net respectively, and use principle as shown in Figure 1.Prevent the intrusion of outer net hacker though this kind mode can play effectively, reduce the generation of user's leakage of a state or party secret unintentionally in use the concerning security matters computer.But it is many that this use pattern exists between the Device Host connecting line, uses operation inconvenience, only is applicable to desktop computer, the problem that can't use as mobile office.Secondly, the network interface card connecter type of two computing machine uses is identical, and inside and outside net wrong or the artificial problem of wrong netting twine intentionally unintentionally also take place easily, and security performance is more weak comparatively speaking.Also have, prior art generally uses software passwords that the user of secure computer is distinguished that in case the password that is stolen, computing machine itself can not distinguish that security is relatively poor automatically to appropriator.And, in case secure computer is stolen, also can't know its position, can not handle private data wherein.
Summary of the invention
Exist between the Device Host connecting line many at prior art, use operation inconvenience, the inside and outside netting twine of easy wrong, can't distinguish the user automatically, the defective of the processing power difference after stolen, the utility model provides a kind of can distinguish the user automatically, can carry out data transfer safely, can locate automatically and tool hard disk self-destruction ability, do not understand the integrated secure computer of inside and outside netting twine wrong.
For achieving the above object, the utility model adopts following technical scheme:
Integrated secure computer, comprise power supply, display, mouse, keyboard, interior network interface, outer network interface, also comprise concerning security matters main frame, non-concerning security matters main frame, converter, network interface is connected with the concerning security matters main frame in described, outer network interface is connected with non-concerning security matters main frame, and described display, mouse, keyboard, concerning security matters main frame, non-concerning security matters main frame all are connected with converter.Share display, keyboard, mouse, CD-ROM drive, power supply between concerning security matters main frame and the non-concerning security matters main frame, guaranteeing under concerning security matters main frame and the physically-isolated prerequisite of non-concerning security matters main frame, improve usage ratio of equipment as far as possible, the peripheral hardware connecting line of simplified apparatus, guarantee integrated, the miniaturization of secure computer, manipulate simple and easy to do.
As preferably, described integrated secure computer also comprises fingerprint contrast, portrait acquisition system in good time, and described fingerprint contrast, the portrait acquisition system is connected with concerning security matters main frame, non-concerning security matters main frame respectively by converter in good time.Fingerprint contrast, in good time portrait acquisition system are by gathering user's fingerprint, compare with the legal user's who prestores fingerprint, can prevent that non-legal user from starting computer, compare by in good time collection portrait and the legal portrait that prestores, can prevent that non-legal user from taking advantage of legal user and leaving gap use secure computer.Described fingerprint contrast, in good time portrait acquisition system can be built in the converter.
As preferably, described integrated secure computer also comprises built-in fingerprint contrast, portrait acquisition system in good time, and described fingerprint contrast, the portrait acquisition system is built in respectively in concerning security matters main frame, the non-concerning security matters main frame in good time.With fingerprint contrast, in good time the portrait acquisition system make that two covers are integrated in respectively in concerning security matters main frame, the non-concerning security matters main frame can simplified structure, improve processing speed.
As preferably, described integrated secure computer also comprises copy preventing system, described copy preventing system is built in the concerning security matters main frame, is used to prevent directly duplicating and vehicular all duplicate copy of non-use CD of hard disc data between concerning security matters main frame, the non-concerning security matters main frame.Can avoid intranet and extranet to be used alternatingly in the process effectively, non-concerning security matters host hard drive or USB flash disk have poisoning intrusion to the concerning security matters main frame, and the situation that causes the concerning security matters main frame to be divulged a secret takes place, and has stronger self-protection function.
As preferably, described integrated secure computer also comprises CD-ROM drive, and the FPDP of described CD-ROM drive links to each other with converter, is connected with non-concerning security matters host hard drive with the concerning security matters host hard drive respectively by converter again.Automatic recording function by CD-ROM drive, unloading function, the informational function of erasing automatically automatically, realize data between concerning security matters main frame, the non-concerning security matters main frame automatically, safety and quick copy.Have at integrated secure computer under the situation of copy preventing system, all of concerning security matters main frame are duplicated all and must be carried out as intermediate medium by CD burning.In use, when have in the outer net data that needs need with reference to the time, can be earlier by non-concerning security matters main frame with used data imprinting to miniature huge capacity compact discs, switch on the concerning security matters main frame by converter then, automatically, safely and fast with the data copy of imprinting in CD in the concerning security matters main frame, automatically the information of erasing afterwards realizes that when preventing information-leakage CD is repeatedly used.
As preferably, described in network interface vary in size with outer network interface, interior network interface adopts non-standard netting twine interface, outer network interface employing straight through cable interface.Thereby can avoid leakage of a state or party secret generation because of the access mistake initiation of netting twine.
As preferably, the built-in satnav chip of described concerning security matters main frame is used for determining the position of integrated secure computer, the destruction instruction of accepting Surveillance center and the signal after Surveillance center sends concerning security matters host hard drive auto-destruct.In case occur having things stolen, maintain secrecy office and Security Officer can in time lock the position of stolen integrated secure computer, find stolen secure computer as early as possible, to the positive guaranteeing role that plays that prevents to divulge a secret.
As preferably, described concerning security matters main frame built-in hard disk self-desttruction equipment is used for divulge a secret the hard disk self-destruction under the precarious position of integrated secure computer.When external force occurring and illegally tear the situation of machine open, secure computer will send command-destruct, start the hard disk self-destroying function of concerning security matters main frame automatically.When secure computer is stolen can't give for change the time, the user also can notify Surveillance center to send self damaging order, destroys the hard disc data in the concerning security matters main frame, prevents to divulge a secret.In case hard disk self-destruction success, secure computer will send self-destruction to Surveillance center via satellite and become function signal.
Integrated secure computer of the present utility model not only can satisfy the request for utilization of current secret unit to secure computer effectively; but also has stronger self-protection function; the security performance that it is unique; as safety protection functions such as in good time image contrast, satnav, secret hard disk self-destruction, access function restrictions; can distinguish the user automatically, can carry out data transfer safely, have the ability of the stolen problem of divulging a secret that causes of stronger processing, for the user of computing machine provides strong security performance.The use of integrated secure computer, especially in governability, scientific and technological research and development, army building and enterprise development, not only can reduce the generation that computer network and portable computer are lost the leakage of a state or party secret that causes effectively, retrieve the stolen immeasurable economic loss of bringing of confidential data.Simultaneously can also improve the user is work efficiency, reduces use cost.
Description of drawings
Fig. 1 is the structural representation of traditional relating computer.
Fig. 2 is the structural representation of embodiment 1.
Fig. 3 is the structural representation of embodiment 1 converter.
Fig. 4 is the structural representation of embodiment 2.
Embodiment
The utility model is described further with embodiment below in conjunction with Fig. 2-4.
Embodiment 1
Integrated secure computer, as shown in Figure 2, comprise power supply 1, display 2, mouse 3, keyboard 4, interior network interface 5, outer network interface 6, also comprise concerning security matters main frame 7, non-concerning security matters main frame 8, converter 9, CD-ROM drive 10, network interface 5 is connected with concerning security matters main frame 7 in described, outer network interface 6 is connected with non-concerning security matters main frame 8, and described display 2, mouse 3, keyboard 4, concerning security matters main frame 7, non-concerning security matters main frame 8 all are connected with converter 9.Power supply 1 is connected with concerning security matters main frame 7, non-concerning security matters main frame 8, converter 9.Described CD-ROM drive 10 is connected with CD-ROM driver interface on the converter 9, is connected with the hard disk of concerning security matters main frame 7, non-concerning security matters main frame 8 respectively by converter 9 then.Network interface 5 varies in size with outer network interface 6 in described, and interior network interface 5 adopts non-standard netting twine interface, outer network interface 6 to adopt the straight through cable interface.Described concerning security matters main frame 7, non-concerning security matters main frame 8 include independently mainboard, independent CPUs, independently internal memory, independently hard disk, independently sound card, independently video card, network interface card independently.
Integrated secure computer also comprises fingerprint contrast, in good time portrait acquisition system 11, is built in copy preventing system 16, satnav chip 14, the hard disk self-desttruction equipment 15 of concerning security matters main frame 7.
Converter 9; as shown in Figure 3, has concerning security matters host data interface (ZJs); non-concerning security matters host data interface (ZJf); concerning security matters host hard drive data-interface (ZYs); non-concerning security matters host hard drive data-interface (ZYf); CD-ROM driver interface; keyboard interface; mouse interface; display interface device; safety system input data-interface (the security interface is gone into); safety system output data interface (the security interface goes out); power interface; concerning security matters and non-concerning security matters main frame shift key (Jsf); concerning security matters main frame start key (Ks); non-concerning security matters main frame start key (Kf); data command expansion input interface; data command expansion output interface.Wherein, concerning security matters host data interface (ZJs) is connected with concerning security matters main frame 7 mainboards, non-concerning security matters host data interface (ZJf) is connected with non-concerning security matters main frame 8 mainboards, concerning security matters host hard drive data-interface (ZYs) is connected with concerning security matters main frame 7 hard disks, non-concerning security matters host hard drive data-interface (ZYf) is connected with non-concerning security matters main frame 8 hard disks, and CD-ROM driver interface, keyboard interface, mouse interface, display interface device, power interface are connected with CD-ROM drive 10, keyboard 4, mouse 3, display 2, power supply 1 respectively.Safety system input data-interface is with the fingerprint contrast, portrait acquisition system 11 is connected in good time, and safety system output data interface is connected with the CPU of concerning security matters main frame 7 with non-concerning security matters main frame 8.Function expansion after data command expansion input interface, data command expansion output interface are used for.
When integrated secure computer need be started shooting, power supply 1 normally starts, computing machine enters self check, the input startup password, enter and open fingerprint contrast, the finger print comparison function of portrait acquisition system 11 in good time behind the open state, if the fingerprint contrast is normal, then send the normal boot-strap instruction, concerning security matters main frame 7 and non-concerning security matters main frame 8 are opened simultaneously automatically.After computing machine is opened, the portrait of fingerprint contrast, in good time portrait acquisition system 11 is gathered comparing function in good time and is entered corresponding state, if the in good time portrait comparing function of hard closing, comprise the mode such as block camera, in the environment of dark, use that adopts, secret main frame will cut out automatically.In normal use, if user and computing machine acquired original people's vivid inconsistent or detection less than acquired original people's image of activity, the concerning security matters main frame in the computing machine will cut out automatically, the user can only use the partial function in the non-concerning security matters main frame.The user then directly presses concerning security matters main frame (Ks) start key on the converter 9 if need restart after the shutdown of concerning security matters main frame, and converter (Jsf) switch is switched the S end to secret main frame, by can normally starting secret main frame behind the fingerprint comparison.After the shutdown of non-concerning security matters main frame, want to restart, directly press non-concerning security matters main frame (Kf) start key on the converter 9, then concerning security matters and non-concerning security matters main frame shift key (Jsf) switch are switched to f and hold on the non-concerning security matters main frame 8, get final product normal boot-strap by fingerprint comparison.When shutting down computer, need to use concerning security matters to switch to corresponding main frame respectively and close with non-concerning security matters main frame shift key (Jsf).
Hard disk in the relating computer in two main frames has copy function mutually, and all of concerning security matters main frame 7 are duplicated all and must be duplicated as intermediate medium by the CD burning of CD-ROM drive 10.If directly take other means to duplicate by force, copy preventing system 16 starts, the illegality equipment that concerning security matters main frame 7 will the straightforward format access, and send the alerting signal of illegal operation.In use, when have in the outer net data that needs need with reference to the time, can through non-concerning security matters main frame 8 by CD-ROM drive 10 imprintings to CD, switch on the concerning security matters main frame 7 by converter then, can be in concerning security matters main frame 7 with the data copy of imprinting in CD.When the operator that can't detect or detect when secure computer is not the acquired original user that stores in the secure computer vivid, computer safety system close automatically that in the secure computer all are duplicated, concerning security matters main frame 7 also will cut out in copy, imprinting, printing and the Email sending function, if user's this moment uses on the non-concerning security matters main frame in secure computer and duplicates, copy, imprinting, printing and Email sending function, secure computer will send the alerting signal of various modes such as sound, wireless.
When external force is illegally torn machine open, secure computer will send command-destruct, start the hard disk self-desttruction equipment 15 of concerning security matters main frame 7 automatically, and the hard disc data of broken ring concerning security matters main frame 7 is in case stopping leak is close.
When the stolen situation of integrated secure computer occurring, positioning chip 14 is accurately determined the particular location of integrated secure computer via satellite, if this position can be fetched rapidly, then fetch as early as possible, the possibility of divulging a secret with minimizing, if this particular location is abroad, or other positions that are difficult to fetch, then by the hard disk self-desttruction equipment 15 of handset starting concerning security matters main frame 7, the hard disc data of broken ring concerning security matters main frame 7 is in case stopping leak is close.
Embodiment 2
Identical with embodiment 1 other parts, difference is:
Integrated secure computer as shown in Figure 4, comprises built-in fingerprint contrast, in good time portrait acquisition system 12,13, and described fingerprint contrast, in good time portrait acquisition system 12,13 are built in respectively in concerning security matters main frame 7, the non-concerning security matters main frame 8.
Being preferred embodiment of the present utility model only in sum, is not to be used for limiting practical range of the present utility model, and all equivalences of doing according to the content of the application's claim change and modify, and all should be technology category of the present utility model.