CN204155280U - The data security devices of cross-network segment - Google Patents
The data security devices of cross-network segment Download PDFInfo
- Publication number
- CN204155280U CN204155280U CN201420312749.5U CN201420312749U CN204155280U CN 204155280 U CN204155280 U CN 204155280U CN 201420312749 U CN201420312749 U CN 201420312749U CN 204155280 U CN204155280 U CN 204155280U
- Authority
- CN
- China
- Prior art keywords
- data
- security
- relay
- input
- output terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Small-Scale Networks (AREA)
Abstract
The data security devices of cross-network segment, it relates to technical field of data security, the right-hand member of shell is provided with data input safe interface, data input safe interface is connected with the input end of data receiving processor by data line, the output terminal of data receiving processor is connected with one end of relay coil by data line, the other end of relay coil is connected with the input end of data encryptor, the output terminal of data encryptor is connected with storage hard disk one end by data line, the other end of storage hard disk is connected with one end of relay normally closed contact, the other end of relay normally closed contact is connected with the input end of data reader, the output terminal of data reader is connected with data security output interface by data line, it can ensure the security of data, easy and simple to handle, controls easy, is convenient to realize.
Description
Technical field:
The utility model relates to technical field of data security, is specifically related to a kind of data security devices of cross-network segment.
Background technology:
Data security also exists many levels, as: system safety, technical security, computing safety, storage security, transmission security, products & services are safely etc.For Computer Data Security: system is taken stopgap measures safely, technical security effects a permanent cure, other links that are also absolutely necessary safely.Data security is one of important subject of the subject such as computing machine and network.It is not only related to individual privacy, Enterprise business privacy; And Technology On Data Encryption directly affects national security.Namely 2008 be the very example that personal data safety threatens in the Nude Picture Scandal event of Hong-Kong outburst, and as national security, the current network information security has been one of important research project of a national national defence.
The data security devices of existing cross-network segment can not ensure its security in use, causes loss of data, inconvenient operation.
Utility model content:
The purpose of this utility model is to provide a kind of data security devices of cross-network segment, and it can ensure the security of data, easy and simple to handle, controls easy, is convenient to realize.
In order to solve the problem existing for background technology, the utility model adopts following technical scheme: it comprises shell, data input safe interface, data receiving processor, data encryptor, relay, storage hard disk, data reader, data security output interface, the right-hand member of shell is provided with data input safe interface, data input safe interface is connected with the input end of data receiving processor by data line, the output terminal of data receiving processor is connected with one end of relay coil by data line, the other end of relay coil is connected with the input end of data encryptor, the output terminal of data encryptor is connected with storage hard disk one end by data line, the other end of storage hard disk is connected with one end of relay normally closed contact, the other end of relay normally closed contact is connected with the input end of data reader, the output terminal of data reader is connected with data security output interface by data line.
Principle of work of the present utility model is: data enter from data input safe interface, data receiving processor accepts and processes data, and is encrypted by data encryptor, data encryptor by after data encryption stored in storage hard disk, now relay coil obtains electric, relay normally closed contact disconnects, after data upload completes, and relay coil power-off, relay normally closed contact closes, data reader reads data in storage hard disk, and enciphered data is sent, and can ensure the security of data.
The utility model has following beneficial effect: the security that can ensure data, easy and simple to handle, controls easy, is convenient to realize.
Accompanying drawing illustrates:
Fig. 1 is structural representation of the present utility model;
Fig. 2 is the inner connection diagram of the utility model.
Embodiment:
Referring to Fig. 1-Fig. 2, this embodiment adopts following technical scheme: it comprises shell 1, data input safe interface 2, data receiving processor 3, data encryptor 4, relay K M1, storage hard disk 6, data reader 7, data security output interface 8, the right-hand member of shell 1 is provided with data input safe interface 2, data input safe interface 2 is connected by the input end of data line with data receiving processor 3, the output terminal of data receiving processor 3 is connected by data line one end with relay K M1 coil KM1-1, the other end of relay K M1 coil KM1-1 is connected with the input end of data encryptor 4, the output terminal of data encryptor 4 is connected with storage hard disk 6 one end by data line, the other end of storage hard disk 6 is connected with one end of relay K M1 normally closed contact KM1-2, the other end of relay K M1 normally closed contact KM1-2 is connected with the input end of data reader 7, the output terminal of data reader 7 is connected with data security output interface 8 by data line.
The principle of work of this embodiment is: data enter from data input safe interface 2, data receiving processor 3 accepts and processes data, and encrypted by data encryptor 4, data encryptor 4 by after data encryption stored in storage hard disk 6, now relay coil KM1-1 obtains electric, relay K M1 normally closed contact KM1-2 disconnects, after data upload completes, relay K M1 coil blackout, relay K M1 normally closed contact KM1-2 closes, data reader 7 reads data in storage hard disk 6, and enciphered data is sent, and can ensure the security of data.
This embodiment has following beneficial effect: the security that can ensure data, easy and simple to handle, controls easy, is convenient to realize.
The foregoing is only preferred embodiment of the present utility model; not in order to limit the utility model; all within spirit of the present utility model and principle, any amendment done, equivalent replacement, improvement etc., all should be included within protection domain of the present utility model.
Claims (1)
1. the data security devices of cross-network segment, it is characterized in that it comprises shell (1), data input safe interface (2), data receiving processor (3), data encryptor (4), relay (KM1), storage hard disk (6), data reader (7), data security output interface (8), the right-hand member of shell (1) is provided with data input safe interface (2), data input safe interface (2) are connected by the input end of data line with data receiving processor (3), the output terminal of data receiving processor (3) is connected by data line one end with relay (KM1) coil (KM1-1), the other end of relay (KM1) coil (KM1-1) is connected with the input end of data encryptor (4), the output terminal of data encryptor (4) is connected with storage hard disk (6) one end by data line, the other end of storage hard disk (6) is connected with one end of relay (KM1) normally closed contact (KM1-2), the other end of relay (KM1) normally closed contact (KM1-2) is connected with the input end of data reader (7), the output terminal of data reader (7) is connected with data security output interface (8) by data line.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201420312749.5U CN204155280U (en) | 2014-06-10 | 2014-06-10 | The data security devices of cross-network segment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201420312749.5U CN204155280U (en) | 2014-06-10 | 2014-06-10 | The data security devices of cross-network segment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204155280U true CN204155280U (en) | 2015-02-11 |
Family
ID=52513380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201420312749.5U Expired - Fee Related CN204155280U (en) | 2014-06-10 | 2014-06-10 | The data security devices of cross-network segment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204155280U (en) |
-
2014
- 2014-06-10 CN CN201420312749.5U patent/CN204155280U/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MY193643A (en) | Processing method for preventing copy attack, and server and client | |
CN204155280U (en) | The data security devices of cross-network segment | |
CN105279446A (en) | network segment data safety platform | |
Sepper et al. | Nodeless versus nodal scenarios of possible triplet superconductivity in the quasi-one-dimensional layered conductor Li 0.9 Mo 6 O 17 | |
CN105224853A (en) | Based on the file encryption-decryption technology of hardware encipher equipment | |
Cachon Santana | Orthogonal Matrix in Cryptography | |
CN204631876U (en) | A kind of computer information security data security defense controls device | |
Collar | Coherent Elastic Neutrino-Nucleus Scattering: the shape of things to come | |
Liao et al. | Deterministic Preparation of Arbitrary Single-Excitation Quantum State by a Shaped Single-Photon Pulse | |
Rudolph | Quantum Quantum-Thermodynamics | |
Petukhova et al. | Practical realization of the Force-free Magnetic Field models | |
Cachon Santana | A Cryptographic Scheme Of Mellin Transform | |
Gambetta | Quantum simulations with noisy quantum computers | |
Seibert et al. | A quick fix for the wet deposition cloud mask in FLEXPART | |
Siddiqui et al. | Typical Medium Dynamical Cluster Approximation For Disordered Superconductors | |
Maulunida et al. | Meningkatkan Keamanan Data Menggunakan Metode Steganografi LSB dan Kriptografi DES pada Citra Digital | |
Roy et al. | Continuous generation and stabilization of Schrödinger cat states in a quantum circuit | |
Kulkarni et al. | Quantum Bath Engineering of Permanent Chiral Currents in Cavity-Qubit Systems | |
Wang et al. | Effect of magnetic and non-magnetic substitution in topological Kondo insulator SmB 6 | |
Lee et al. | Local two-level PT symmetric system violates no-signalling condition | |
Lu et al. | Ten-fold way of topological Josephson effects in superconductors | |
Masood | Quantum Entanglement in Jaynes-Cummings Model and its applications | |
Hua et al. | Classification of topological band theories with magnetic wallpaper group symmetries in 2D | |
Grusdt et al. | Dynamics of a single hole in the t-J model | |
Bardarson et al. | Detecting Perfect Transmission in Josephson Junctions on the Surface of Three Dimensional Topological Insulators |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150211 Termination date: 20150610 |
|
EXPY | Termination of patent right or utility model |