CN204155280U - The data security devices of cross-network segment - Google Patents

The data security devices of cross-network segment Download PDF

Info

Publication number
CN204155280U
CN204155280U CN201420312749.5U CN201420312749U CN204155280U CN 204155280 U CN204155280 U CN 204155280U CN 201420312749 U CN201420312749 U CN 201420312749U CN 204155280 U CN204155280 U CN 204155280U
Authority
CN
China
Prior art keywords
data
security
relay
input
output terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201420312749.5U
Other languages
Chinese (zh)
Inventor
高芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING SFW INFORMATION TECHNOLOGY Co Ltd
Original Assignee
NANJING SFW INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING SFW INFORMATION TECHNOLOGY Co Ltd filed Critical NANJING SFW INFORMATION TECHNOLOGY Co Ltd
Priority to CN201420312749.5U priority Critical patent/CN204155280U/en
Application granted granted Critical
Publication of CN204155280U publication Critical patent/CN204155280U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The data security devices of cross-network segment, it relates to technical field of data security, the right-hand member of shell is provided with data input safe interface, data input safe interface is connected with the input end of data receiving processor by data line, the output terminal of data receiving processor is connected with one end of relay coil by data line, the other end of relay coil is connected with the input end of data encryptor, the output terminal of data encryptor is connected with storage hard disk one end by data line, the other end of storage hard disk is connected with one end of relay normally closed contact, the other end of relay normally closed contact is connected with the input end of data reader, the output terminal of data reader is connected with data security output interface by data line, it can ensure the security of data, easy and simple to handle, controls easy, is convenient to realize.

Description

The data security devices of cross-network segment
Technical field:
The utility model relates to technical field of data security, is specifically related to a kind of data security devices of cross-network segment.
Background technology:
Data security also exists many levels, as: system safety, technical security, computing safety, storage security, transmission security, products & services are safely etc.For Computer Data Security: system is taken stopgap measures safely, technical security effects a permanent cure, other links that are also absolutely necessary safely.Data security is one of important subject of the subject such as computing machine and network.It is not only related to individual privacy, Enterprise business privacy; And Technology On Data Encryption directly affects national security.Namely 2008 be the very example that personal data safety threatens in the Nude Picture Scandal event of Hong-Kong outburst, and as national security, the current network information security has been one of important research project of a national national defence.
The data security devices of existing cross-network segment can not ensure its security in use, causes loss of data, inconvenient operation.
Utility model content:
The purpose of this utility model is to provide a kind of data security devices of cross-network segment, and it can ensure the security of data, easy and simple to handle, controls easy, is convenient to realize.
In order to solve the problem existing for background technology, the utility model adopts following technical scheme: it comprises shell, data input safe interface, data receiving processor, data encryptor, relay, storage hard disk, data reader, data security output interface, the right-hand member of shell is provided with data input safe interface, data input safe interface is connected with the input end of data receiving processor by data line, the output terminal of data receiving processor is connected with one end of relay coil by data line, the other end of relay coil is connected with the input end of data encryptor, the output terminal of data encryptor is connected with storage hard disk one end by data line, the other end of storage hard disk is connected with one end of relay normally closed contact, the other end of relay normally closed contact is connected with the input end of data reader, the output terminal of data reader is connected with data security output interface by data line.
Principle of work of the present utility model is: data enter from data input safe interface, data receiving processor accepts and processes data, and is encrypted by data encryptor, data encryptor by after data encryption stored in storage hard disk, now relay coil obtains electric, relay normally closed contact disconnects, after data upload completes, and relay coil power-off, relay normally closed contact closes, data reader reads data in storage hard disk, and enciphered data is sent, and can ensure the security of data.
The utility model has following beneficial effect: the security that can ensure data, easy and simple to handle, controls easy, is convenient to realize.
Accompanying drawing illustrates:
Fig. 1 is structural representation of the present utility model;
Fig. 2 is the inner connection diagram of the utility model.
Embodiment:
Referring to Fig. 1-Fig. 2, this embodiment adopts following technical scheme: it comprises shell 1, data input safe interface 2, data receiving processor 3, data encryptor 4, relay K M1, storage hard disk 6, data reader 7, data security output interface 8, the right-hand member of shell 1 is provided with data input safe interface 2, data input safe interface 2 is connected by the input end of data line with data receiving processor 3, the output terminal of data receiving processor 3 is connected by data line one end with relay K M1 coil KM1-1, the other end of relay K M1 coil KM1-1 is connected with the input end of data encryptor 4, the output terminal of data encryptor 4 is connected with storage hard disk 6 one end by data line, the other end of storage hard disk 6 is connected with one end of relay K M1 normally closed contact KM1-2, the other end of relay K M1 normally closed contact KM1-2 is connected with the input end of data reader 7, the output terminal of data reader 7 is connected with data security output interface 8 by data line.
The principle of work of this embodiment is: data enter from data input safe interface 2, data receiving processor 3 accepts and processes data, and encrypted by data encryptor 4, data encryptor 4 by after data encryption stored in storage hard disk 6, now relay coil KM1-1 obtains electric, relay K M1 normally closed contact KM1-2 disconnects, after data upload completes, relay K M1 coil blackout, relay K M1 normally closed contact KM1-2 closes, data reader 7 reads data in storage hard disk 6, and enciphered data is sent, and can ensure the security of data.
This embodiment has following beneficial effect: the security that can ensure data, easy and simple to handle, controls easy, is convenient to realize.
The foregoing is only preferred embodiment of the present utility model; not in order to limit the utility model; all within spirit of the present utility model and principle, any amendment done, equivalent replacement, improvement etc., all should be included within protection domain of the present utility model.

Claims (1)

1. the data security devices of cross-network segment, it is characterized in that it comprises shell (1), data input safe interface (2), data receiving processor (3), data encryptor (4), relay (KM1), storage hard disk (6), data reader (7), data security output interface (8), the right-hand member of shell (1) is provided with data input safe interface (2), data input safe interface (2) are connected by the input end of data line with data receiving processor (3), the output terminal of data receiving processor (3) is connected by data line one end with relay (KM1) coil (KM1-1), the other end of relay (KM1) coil (KM1-1) is connected with the input end of data encryptor (4), the output terminal of data encryptor (4) is connected with storage hard disk (6) one end by data line, the other end of storage hard disk (6) is connected with one end of relay (KM1) normally closed contact (KM1-2), the other end of relay (KM1) normally closed contact (KM1-2) is connected with the input end of data reader (7), the output terminal of data reader (7) is connected with data security output interface (8) by data line.
CN201420312749.5U 2014-06-10 2014-06-10 The data security devices of cross-network segment Expired - Fee Related CN204155280U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201420312749.5U CN204155280U (en) 2014-06-10 2014-06-10 The data security devices of cross-network segment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201420312749.5U CN204155280U (en) 2014-06-10 2014-06-10 The data security devices of cross-network segment

Publications (1)

Publication Number Publication Date
CN204155280U true CN204155280U (en) 2015-02-11

Family

ID=52513380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201420312749.5U Expired - Fee Related CN204155280U (en) 2014-06-10 2014-06-10 The data security devices of cross-network segment

Country Status (1)

Country Link
CN (1) CN204155280U (en)

Similar Documents

Publication Publication Date Title
MY193643A (en) Processing method for preventing copy attack, and server and client
CN204155280U (en) The data security devices of cross-network segment
CN105279446A (en) network segment data safety platform
Sepper et al. Nodeless versus nodal scenarios of possible triplet superconductivity in the quasi-one-dimensional layered conductor Li 0.9 Mo 6 O 17
CN105224853A (en) Based on the file encryption-decryption technology of hardware encipher equipment
Cachon Santana Orthogonal Matrix in Cryptography
CN204631876U (en) A kind of computer information security data security defense controls device
Collar Coherent Elastic Neutrino-Nucleus Scattering: the shape of things to come
Liao et al. Deterministic Preparation of Arbitrary Single-Excitation Quantum State by a Shaped Single-Photon Pulse
Rudolph Quantum Quantum-Thermodynamics
Petukhova et al. Practical realization of the Force-free Magnetic Field models
Cachon Santana A Cryptographic Scheme Of Mellin Transform
Gambetta Quantum simulations with noisy quantum computers
Seibert et al. A quick fix for the wet deposition cloud mask in FLEXPART
Siddiqui et al. Typical Medium Dynamical Cluster Approximation For Disordered Superconductors
Maulunida et al. Meningkatkan Keamanan Data Menggunakan Metode Steganografi LSB dan Kriptografi DES pada Citra Digital
Roy et al. Continuous generation and stabilization of Schrödinger cat states in a quantum circuit
Kulkarni et al. Quantum Bath Engineering of Permanent Chiral Currents in Cavity-Qubit Systems
Wang et al. Effect of magnetic and non-magnetic substitution in topological Kondo insulator SmB 6
Lee et al. Local two-level PT symmetric system violates no-signalling condition
Lu et al. Ten-fold way of topological Josephson effects in superconductors
Masood Quantum Entanglement in Jaynes-Cummings Model and its applications
Hua et al. Classification of topological band theories with magnetic wallpaper group symmetries in 2D
Grusdt et al. Dynamics of a single hole in the t-J model
Bardarson et al. Detecting Perfect Transmission in Josephson Junctions on the Surface of Three Dimensional Topological Insulators

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150211

Termination date: 20150610

EXPY Termination of patent right or utility model