CN201946004U - Integrated confidential computer - Google Patents

Integrated confidential computer Download PDF

Info

Publication number
CN201946004U
CN201946004U CN2011200549862U CN201120054986U CN201946004U CN 201946004 U CN201946004 U CN 201946004U CN 2011200549862 U CN2011200549862 U CN 2011200549862U CN 201120054986 U CN201120054986 U CN 201120054986U CN 201946004 U CN201946004 U CN 201946004U
Authority
CN
China
Prior art keywords
main frame
concerning security
security matters
matters main
confidential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2011200549862U
Other languages
Chinese (zh)
Inventor
李闽榕
李予温
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGSHENG GUOJI TECHNOLOGY CO., LTD.
Original Assignee
李予温
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 李予温 filed Critical 李予温
Priority to CN2011200549862U priority Critical patent/CN201946004U/en
Application granted granted Critical
Publication of CN201946004U publication Critical patent/CN201946004U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a computer, in particular to an integrated confidential computer, which comprises a power supply, a displayer, a mouse, a keyboard, an inner network port, an outer network port, and further comprises a confidential host, a non-confidential host and a converter. The inner network port is connected with the confidential host, and the outer network port is connected with the non-confidential host. The displayer, the mouse, the keyboard, the confidential host and the non-confidential host are all connected with the converter. The integrated confidential computer also comprises a fingerprint comparing system, timely portrait collecting system, a copy protection system, satellite positioning chips, a self destruction device for hard disks, wherein the copy protection system, the satellite positioning chips, the self destruction device for hard disks are arranged inside the confidential host. The integrated confidential computer is integrated in structure and convenient to use, has functions such as timely images comparing, satellite positioning, self-destruction of confidential hard disks, access limiting, and is capable of automatically identifying users, transferring data in a safe way, dealing with divulgence problems caused by thefts and providing a strong confidentiality performance for the users.

Description

Integrated secure computer
Technical field
The utility model relates to a kind of computing machine, relates in particular to a kind of integrated secure computer.
Background technology
1, computer system is divulged a secret and is on the rise
It is fast that computing machine reaches information processing rate greatly with its information storage, plugged the wing of rapid development for governability, scientific and technological research and development, army building and enterprise development, particularly portable computer has been created impayable convenient condition for people carry out the office of information processing and strange land in addition in office, and we are difficult to one of the imagination does not now have the government department of computing machine or Modern Corporation how to turn round.But, along with rapid development of Internet, computer network is divulged a secret and also is on the rise, and the concerning security matters portable computer is often lost problem, has become a difficult problem that makes the concentrated public services of Party and government offices, army, Defence business, scientific research institution and citizen's essential information data have a headache very much.Show that according to interrelated data in security work at present, computer network and portable computer are lost the leakage of a state or party secret that causes, accounted for more than 70% of sum of divulging a secret, and be rising tendency year by year.Computer information system has become the main channel of revealing state secret, serious threat national security and interests, threaten the patented technology of enterprise and citizen's personal secrets, press for new technology and prevent that effectively computer network from divulging a secret, guarantee the safety of computerized information.
2, the pattern of the current Chinese government and enterprise's relating computer use
Relevant regulations according to national security system, for the generation of divulging a secret that prevents that computing machine from using, what mechanism of the current Chinese government taked prevents that the main mode that computer network is divulged a secret from being to adopt two computing machines to share a display by converter to carry out physical isolation, two computing machines insert Intranet and outer net respectively, and use principle as shown in Figure 1.Prevent the intrusion of outer net hacker though this kind mode can play effectively, reduce the generation of user's leakage of a state or party secret unintentionally in use the concerning security matters computer.But it is many that this use pattern exists between the Device Host connecting line, uses operation inconvenience, only is applicable to desktop computer, the problem that can't use as mobile office.Secondly, the network interface card connecter type of two computing machine uses is identical, and inside and outside net wrong or the artificial problem of wrong netting twine intentionally unintentionally also take place easily, and security performance is more weak comparatively speaking.Also have, prior art generally uses software passwords that the user of secure computer is distinguished that in case the password that is stolen, computing machine itself can not distinguish that security is relatively poor automatically to appropriator.And, in case secure computer is stolen, also can't know its position, can not handle private data wherein.
Summary of the invention
Exist between the Device Host connecting line many at prior art, use operation inconvenience, the inside and outside netting twine of easy wrong, can't distinguish the user automatically, the defective of the processing power difference after stolen, the utility model provides a kind of can distinguish the user automatically, can carry out data transfer safely, can locate automatically and tool hard disk self-destruction ability, do not understand the integrated secure computer of inside and outside netting twine wrong.
For achieving the above object, the utility model adopts following technical scheme:
Integrated secure computer, comprise power supply, display, mouse, keyboard, interior network interface, outer network interface, also comprise concerning security matters main frame, non-concerning security matters main frame, converter, network interface is connected with the concerning security matters main frame in described, outer network interface is connected with non-concerning security matters main frame, and described display, mouse, keyboard, concerning security matters main frame, non-concerning security matters main frame all are connected with converter.Share display, keyboard, mouse, CD-ROM drive, power supply between concerning security matters main frame and the non-concerning security matters main frame, guaranteeing under concerning security matters main frame and the physically-isolated prerequisite of non-concerning security matters main frame, improve usage ratio of equipment as far as possible, the peripheral hardware connecting line of simplified apparatus, guarantee integrated, the miniaturization of secure computer, manipulate simple and easy to do.
As preferably, described integrated secure computer also comprises fingerprint contrast, portrait acquisition system in good time, and described fingerprint contrast, the portrait acquisition system is connected with concerning security matters main frame, non-concerning security matters main frame respectively by converter in good time.Fingerprint contrast, in good time portrait acquisition system are by gathering user's fingerprint, compare with the legal user's who prestores fingerprint, can prevent that non-legal user from starting computer, compare by in good time collection portrait and the legal portrait that prestores, can prevent that non-legal user from taking advantage of legal user and leaving gap use secure computer.Described fingerprint contrast, in good time portrait acquisition system can be built in the converter.
As preferably, described integrated secure computer also comprises built-in fingerprint contrast, portrait acquisition system in good time, and described fingerprint contrast, the portrait acquisition system is built in respectively in concerning security matters main frame, the non-concerning security matters main frame in good time.With fingerprint contrast, in good time the portrait acquisition system make that two covers are integrated in respectively in concerning security matters main frame, the non-concerning security matters main frame can simplified structure, improve processing speed.
As preferably, described integrated secure computer also comprises copy preventing system, described copy preventing system is built in the concerning security matters main frame, is used to prevent directly duplicating and vehicular all duplicate copy of non-use CD of hard disc data between concerning security matters main frame, the non-concerning security matters main frame.Can avoid intranet and extranet to be used alternatingly in the process effectively, non-concerning security matters host hard drive or USB flash disk have poisoning intrusion to the concerning security matters main frame, and the situation that causes the concerning security matters main frame to be divulged a secret takes place, and has stronger self-protection function.
As preferably, described integrated secure computer also comprises CD-ROM drive, and the FPDP of described CD-ROM drive links to each other with converter, is connected with non-concerning security matters host hard drive with the concerning security matters host hard drive respectively by converter again.Automatic recording function by CD-ROM drive, unloading function, the informational function of erasing automatically automatically, realize data between concerning security matters main frame, the non-concerning security matters main frame automatically, safety and quick copy.Have at integrated secure computer under the situation of copy preventing system, all of concerning security matters main frame are duplicated all and must be carried out as intermediate medium by CD burning.In use, when have in the outer net data that needs need with reference to the time, can be earlier by non-concerning security matters main frame with used data imprinting to miniature huge capacity compact discs, switch on the concerning security matters main frame by converter then, automatically, safely and fast with the data copy of imprinting in CD in the concerning security matters main frame, automatically the information of erasing afterwards realizes that when preventing information-leakage CD is repeatedly used.
As preferably, described in network interface vary in size with outer network interface, interior network interface adopts non-standard netting twine interface, outer network interface employing straight through cable interface.Thereby can avoid leakage of a state or party secret generation because of the access mistake initiation of netting twine.
As preferably, the built-in satnav chip of described concerning security matters main frame is used for determining the position of integrated secure computer, the destruction instruction of accepting Surveillance center and the signal after Surveillance center sends concerning security matters host hard drive auto-destruct.In case occur having things stolen, maintain secrecy office and Security Officer can in time lock the position of stolen integrated secure computer, find stolen secure computer as early as possible, to the positive guaranteeing role that plays that prevents to divulge a secret.
As preferably, described concerning security matters main frame built-in hard disk self-desttruction equipment is used for divulge a secret the hard disk self-destruction under the precarious position of integrated secure computer.When external force occurring and illegally tear the situation of machine open, secure computer will send command-destruct, start the hard disk self-destroying function of concerning security matters main frame automatically.When secure computer is stolen can't give for change the time, the user also can notify Surveillance center to send self damaging order, destroys the hard disc data in the concerning security matters main frame, prevents to divulge a secret.In case hard disk self-destruction success, secure computer will send self-destruction to Surveillance center via satellite and become function signal.
Integrated secure computer of the present utility model not only can satisfy the request for utilization of current secret unit to secure computer effectively; but also has stronger self-protection function; the security performance that it is unique; as safety protection functions such as in good time image contrast, satnav, secret hard disk self-destruction, access function restrictions; can distinguish the user automatically, can carry out data transfer safely, have the ability of the stolen problem of divulging a secret that causes of stronger processing, for the user of computing machine provides strong security performance.The use of integrated secure computer, especially in governability, scientific and technological research and development, army building and enterprise development, not only can reduce the generation that computer network and portable computer are lost the leakage of a state or party secret that causes effectively, retrieve the stolen immeasurable economic loss of bringing of confidential data.Simultaneously can also improve the user is work efficiency, reduces use cost.
Description of drawings
Fig. 1 is the structural representation of traditional relating computer.
Fig. 2 is the structural representation of embodiment 1.
Fig. 3 is the structural representation of embodiment 1 converter.
Fig. 4 is the structural representation of embodiment 2.
Embodiment
The utility model is described further with embodiment below in conjunction with Fig. 2-4.
Embodiment 1
Integrated secure computer, as shown in Figure 2, comprise power supply 1, display 2, mouse 3, keyboard 4, interior network interface 5, outer network interface 6, also comprise concerning security matters main frame 7, non-concerning security matters main frame 8, converter 9, CD-ROM drive 10, network interface 5 is connected with concerning security matters main frame 7 in described, outer network interface 6 is connected with non-concerning security matters main frame 8, and described display 2, mouse 3, keyboard 4, concerning security matters main frame 7, non-concerning security matters main frame 8 all are connected with converter 9.Power supply 1 is connected with concerning security matters main frame 7, non-concerning security matters main frame 8, converter 9.Described CD-ROM drive 10 is connected with CD-ROM driver interface on the converter 9, is connected with the hard disk of concerning security matters main frame 7, non-concerning security matters main frame 8 respectively by converter 9 then.Network interface 5 varies in size with outer network interface 6 in described, and interior network interface 5 adopts non-standard netting twine interface, outer network interface 6 to adopt the straight through cable interface.Described concerning security matters main frame 7, non-concerning security matters main frame 8 include independently mainboard, independent CPUs, independently internal memory, independently hard disk, independently sound card, independently video card, network interface card independently.
Integrated secure computer also comprises fingerprint contrast, in good time portrait acquisition system 11, is built in copy preventing system 16, satnav chip 14, the hard disk self-desttruction equipment 15 of concerning security matters main frame 7.
Converter 9; as shown in Figure 3, has concerning security matters host data interface (ZJs); non-concerning security matters host data interface (ZJf); concerning security matters host hard drive data-interface (ZYs); non-concerning security matters host hard drive data-interface (ZYf); CD-ROM driver interface; keyboard interface; mouse interface; display interface device; safety system input data-interface (the security interface is gone into); safety system output data interface (the security interface goes out); power interface; concerning security matters and non-concerning security matters main frame shift key (Jsf); concerning security matters main frame start key (Ks); non-concerning security matters main frame start key (Kf); data command expansion input interface; data command expansion output interface.Wherein, concerning security matters host data interface (ZJs) is connected with concerning security matters main frame 7 mainboards, non-concerning security matters host data interface (ZJf) is connected with non-concerning security matters main frame 8 mainboards, concerning security matters host hard drive data-interface (ZYs) is connected with concerning security matters main frame 7 hard disks, non-concerning security matters host hard drive data-interface (ZYf) is connected with non-concerning security matters main frame 8 hard disks, and CD-ROM driver interface, keyboard interface, mouse interface, display interface device, power interface are connected with CD-ROM drive 10, keyboard 4, mouse 3, display 2, power supply 1 respectively.Safety system input data-interface is with the fingerprint contrast, portrait acquisition system 11 is connected in good time, and safety system output data interface is connected with the CPU of concerning security matters main frame 7 with non-concerning security matters main frame 8.Function expansion after data command expansion input interface, data command expansion output interface are used for.
When integrated secure computer need be started shooting, power supply 1 normally starts, computing machine enters self check, the input startup password, enter and open fingerprint contrast, the finger print comparison function of portrait acquisition system 11 in good time behind the open state, if the fingerprint contrast is normal, then send the normal boot-strap instruction, concerning security matters main frame 7 and non-concerning security matters main frame 8 are opened simultaneously automatically.After computing machine is opened, the portrait of fingerprint contrast, in good time portrait acquisition system 11 is gathered comparing function in good time and is entered corresponding state, if the in good time portrait comparing function of hard closing, comprise the mode such as block camera, in the environment of dark, use that adopts, secret main frame will cut out automatically.In normal use, if user and computing machine acquired original people's vivid inconsistent or detection less than acquired original people's image of activity, the concerning security matters main frame in the computing machine will cut out automatically, the user can only use the partial function in the non-concerning security matters main frame.The user then directly presses concerning security matters main frame (Ks) start key on the converter 9 if need restart after the shutdown of concerning security matters main frame, and converter (Jsf) switch is switched the S end to secret main frame, by can normally starting secret main frame behind the fingerprint comparison.After the shutdown of non-concerning security matters main frame, want to restart, directly press non-concerning security matters main frame (Kf) start key on the converter 9, then concerning security matters and non-concerning security matters main frame shift key (Jsf) switch are switched to f and hold on the non-concerning security matters main frame 8, get final product normal boot-strap by fingerprint comparison.When shutting down computer, need to use concerning security matters to switch to corresponding main frame respectively and close with non-concerning security matters main frame shift key (Jsf).
Hard disk in the relating computer in two main frames has copy function mutually, and all of concerning security matters main frame 7 are duplicated all and must be duplicated as intermediate medium by the CD burning of CD-ROM drive 10.If directly take other means to duplicate by force, copy preventing system 16 starts, the illegality equipment that concerning security matters main frame 7 will the straightforward format access, and send the alerting signal of illegal operation.In use, when have in the outer net data that needs need with reference to the time, can through non-concerning security matters main frame 8 by CD-ROM drive 10 imprintings to CD, switch on the concerning security matters main frame 7 by converter then, can be in concerning security matters main frame 7 with the data copy of imprinting in CD.When the operator that can't detect or detect when secure computer is not the acquired original user that stores in the secure computer vivid, computer safety system close automatically that in the secure computer all are duplicated, concerning security matters main frame 7 also will cut out in copy, imprinting, printing and the Email sending function, if user's this moment uses on the non-concerning security matters main frame in secure computer and duplicates, copy, imprinting, printing and Email sending function, secure computer will send the alerting signal of various modes such as sound, wireless.
When external force is illegally torn machine open, secure computer will send command-destruct, start the hard disk self-desttruction equipment 15 of concerning security matters main frame 7 automatically, and the hard disc data of broken ring concerning security matters main frame 7 is in case stopping leak is close.
When the stolen situation of integrated secure computer occurring, positioning chip 14 is accurately determined the particular location of integrated secure computer via satellite, if this position can be fetched rapidly, then fetch as early as possible, the possibility of divulging a secret with minimizing, if this particular location is abroad, or other positions that are difficult to fetch, then by the hard disk self-desttruction equipment 15 of handset starting concerning security matters main frame 7, the hard disc data of broken ring concerning security matters main frame 7 is in case stopping leak is close.
Embodiment 2
Identical with embodiment 1 other parts, difference is:
Integrated secure computer as shown in Figure 4, comprises built-in fingerprint contrast, in good time portrait acquisition system 12,13, and described fingerprint contrast, in good time portrait acquisition system 12,13 are built in respectively in concerning security matters main frame 7, the non-concerning security matters main frame 8.
Being preferred embodiment of the present utility model only in sum, is not to be used for limiting practical range of the present utility model, and all equivalences of doing according to the content of the application's claim change and modify, and all should be technology category of the present utility model.

Claims (8)

1. integrated secure computer, comprise power supply (1), display (2), mouse (3), keyboard (4), interior network interface (5), outer network interface (6), it is characterized in that: also comprise concerning security matters main frame (7), non-concerning security matters main frame (8), converter (9), network interface (5) is connected with concerning security matters main frame (7) in described, outer network interface (6) is connected with non-concerning security matters main frame (8), and described display (2), mouse (3), keyboard (4), concerning security matters main frame (7), non-concerning security matters main frame (8) all are connected with converter (9).
2. integrated secure computer according to claim 1, it is characterized in that: also comprise fingerprint contrast, in good time portrait acquisition system (11), described fingerprint contrast, in good time portrait acquisition system (11) are connected with concerning security matters main frame (7), non-concerning security matters main frame (8) respectively by converter (9).
3. integrated secure computer according to claim 1, it is characterized in that: also comprise built-in fingerprint contrast, in good time portrait acquisition system (12,13), described built-in fingerprint contrast, in good time portrait acquisition system (12,13) are built in respectively in concerning security matters main frame (7), the non-concerning security matters main frame (8).
4. according to claim 1 or 2 or 3 described integrated secure computers, it is characterized in that: also comprise copy preventing system (16), described copy preventing system (16) is built in concerning security matters main frame (7), is used to prevent duplicating of data between concerning security matters main frame (7), the non-concerning security matters main frame (8).
5. integrated secure computer according to claim 4, it is characterized in that: also comprise CD-ROM drive (10), described CD-ROM drive (10) is connected with converter (9), is connected with the hard disk of concerning security matters main frame (7), non-concerning security matters main frame (8) respectively by converter (9) then.
6. integrated secure computer according to claim 1 is characterized in that: network interface (5) varies in size with outer network interface (6) in described, and interior network interface (5) adopts non-standard netting twine interface, outer network interface (6) to adopt the straight through cable interface.
7. integrated secure computer according to claim 1 is characterized in that: the built-in satnav chip of described concerning security matters main frame (7) (14) is used for determining the position of integrated secure computer.
8. integrated secure computer according to claim 7 is characterized in that: described concerning security matters main frame (7) built-in hard disk self-desttruction equipment (15) is used for divulge a secret the hard disk self-destruction under the precarious position of integrated secure computer.
CN2011200549862U 2011-03-04 2011-03-04 Integrated confidential computer Expired - Lifetime CN201946004U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011200549862U CN201946004U (en) 2011-03-04 2011-03-04 Integrated confidential computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011200549862U CN201946004U (en) 2011-03-04 2011-03-04 Integrated confidential computer

Publications (1)

Publication Number Publication Date
CN201946004U true CN201946004U (en) 2011-08-24

Family

ID=44473341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011200549862U Expired - Lifetime CN201946004U (en) 2011-03-04 2011-03-04 Integrated confidential computer

Country Status (1)

Country Link
CN (1) CN201946004U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594827A (en) * 2012-02-27 2012-07-18 李予温 Double-host security computer based on satellite system
CN102646177A (en) * 2012-02-27 2012-08-22 李予温 Single-host security computer based on satellite system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594827A (en) * 2012-02-27 2012-07-18 李予温 Double-host security computer based on satellite system
CN102646177A (en) * 2012-02-27 2012-08-22 李予温 Single-host security computer based on satellite system
CN102594827B (en) * 2012-02-27 2014-12-17 李予温 Double-host security computer based on satellite system
CN102646177B (en) * 2012-02-27 2015-04-08 李予温 Single-host security computer based on satellite system

Similar Documents

Publication Publication Date Title
CN101430752B (en) Sensitive data switching control module and method for computer and movable memory device
CN202584138U (en) Security and secrecy computer
CN101038568B (en) Method and device for encrypting date of external computer hard disk
CN102646177B (en) Single-host security computer based on satellite system
CN103198263B (en) By the method that the peripheral hardware key of personal computer sets up enciphering/deciphering memory space
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN102594827B (en) Double-host security computer based on satellite system
WO2019209630A1 (en) File processing method and system, and data processing method
CN102289623A (en) Anti-leakage laptop
CN102855451A (en) Portable computer terminal with safe anti-secret-disclosing function
CN201993771U (en) Portable confidential computer
KR20150128328A (en) Method of providing digital evidence collecting tools, apparatus and method of collecting digital evidence of mobile devices based on domain isolation
CN107798224A (en) A kind of terminal control method and device, user terminal
CN102279814A (en) Encryption anti-copy system and anti-copy method thereof
CN202815852U (en) Portable computer terminal with safety and secrecy
CN105844181A (en) Key instruction processing method and terminal
CN1989496A (en) Computer system and computer equipped with terminal information reporting function
CN201946004U (en) Integrated confidential computer
CN104217177A (en) One-computer double-network physical isolation double-display computer with switching circuit
CN1312551C (en) Portable secret computer
JP2008015655A (en) Information processing apparatus and method of collecting log in information processing apparatus
Culley Computer forensics: past, present and future
CN102768646A (en) Serial port hard disk encryption and decryption device
CN102142066A (en) Computing equipment and backup recovery method thereof
CN201489538U (en) Terminal safety and security equipment

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: ZHONGSHENG GUOJI TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: LI YUWEN

Effective date: 20121019

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 311202 HANGZHOU, ZHEJIANG PROVINCE TO: 100000 DONGCHENG, BEIJING

TR01 Transfer of patent right

Effective date of registration: 20121019

Address after: 100000, A, block 19, imperial International Center, No. 138 anding street, Dongcheng District, Beijing

Patentee after: ZHONGSHENG GUOJI TECHNOLOGY CO., LTD.

Address before: Hangzhou City, Zhejiang province Xiaoshan District 311202 building 34 yuan a Beigan Beigan Street three unit 501 room

Patentee before: Li Yuwen

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20110824