CN204189172U - A kind of computing machine - Google Patents

A kind of computing machine Download PDF

Info

Publication number
CN204189172U
CN204189172U CN201420511944.0U CN201420511944U CN204189172U CN 204189172 U CN204189172 U CN 204189172U CN 201420511944 U CN201420511944 U CN 201420511944U CN 204189172 U CN204189172 U CN 204189172U
Authority
CN
China
Prior art keywords
enable pin
write
hand switch
read
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201420511944.0U
Other languages
Chinese (zh)
Inventor
林于翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tongsheng Green Technology Co Ltd
Original Assignee
Shenzhen Tongsheng Green Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tongsheng Green Technology Co Ltd filed Critical Shenzhen Tongsheng Green Technology Co Ltd
Priority to CN201420511944.0U priority Critical patent/CN204189172U/en
Application granted granted Critical
Publication of CN204189172U publication Critical patent/CN204189172U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a kind of computing machine, comprising: processor is provided with: first reads Enable Pin, reads enable signal for sending under processor control; First writes Enable Pin, for sending write enable signal under processor control; Storer is provided with: second reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin and first writes Enable Pin and is connected, for receiving write enable signal; First manual switch-linear hybrid is read Enable Pin and second first and is read between Enable Pin, and the first hand switch makes first to read Enable Pin and second through manual control to read to be connected between Enable Pin or to disconnect; Second manual switch-linear hybrid is write Enable Pin and second first and is write between Enable Pin, and the second hand switch makes first to write Enable Pin and second through manual control to write and to be connected between Enable Pin or to disconnect.By the way, the utility model can effectively prevent memory data to be illegally modified, and ensures the security that data store.

Description

A kind of computing machine
Technical field
The utility model relates to computer realm, particularly relates to a kind of computing machine.
Background technology
The write-protect of traditional circuit memory device adopts the I/O mouth of system processor or the dedicated port of controller to carry out write-protect usually.Like this once computer infected trojan horse, be easy to infect storer, the information of storer is illegally modified, computer software may be caused what is more not run, and systemic breakdown, causes serious consequence.
Utility model content
The technical matters that the utility model solves provides a kind of computing machine, can effectively prevent memory data to be illegally modified, and ensures the security that data store.
For solving the problems of the technologies described above, the utility model provides a kind of computing machine, comprising: processor, is provided with: first reads Enable Pin, reads enable signal for sending under processor control; First writes Enable Pin, for sending write enable signal under processor control; Storer, is provided with: second reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin, writes Enable Pin be connected, for receiving write enable signal with first; First hand switch, is arranged on first and reads Enable Pin and second and read between Enable Pin, and the first hand switch makes first to read Enable Pin and second through manual control to read to be connected between Enable Pin or to disconnect; Second hand switch, is arranged on first and writes Enable Pin and second and write between Enable Pin, and the second hand switch makes first to write Enable Pin and second through manual control to write and to be connected between Enable Pin or to disconnect.
Wherein, processor also comprises multiple first data transmission end, and storer also comprises multiple second data transmission terminals be connected with first data transmission end respectively.
Wherein, first hand switch makes first to read Enable Pin and second through manual control and reads to be connected between Enable Pin, and processor is read Enable Pin by first and is sent and read enable signal, making second to read Enable Pin receives when reading enable signal, processor by multiple first data transmission end and multiple second data transmission terminal from memory read data.
Wherein, second hand switch makes first to write Enable Pin and second through manual control and writes between Enable Pin and be connected, and processor is write Enable Pin by first and is sent write enable signal, make second to write Enable Pin when receiving write enable signal, processor writes data by multiple first data transmission end and multiple second data transmission terminal to storer.
Wherein, be set to can by internet user access for storer.
Wherein, the first hand switch and the second hand switch are pullswitch, at least one in knife switch and pushbutton switch.
By such scheme, the beneficial effects of the utility model are: being provided with first by processor and reading Enable Pin, reading enable signal for sending under processor control; First writes Enable Pin for sending write enable signal under processor control; Storer is provided with second and reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin and first writes Enable Pin and is connected, for receiving write enable signal; First manual switch-linear hybrid is read Enable Pin and second first and is read between Enable Pin, and the first hand switch makes first to read Enable Pin and second through manual control to read to be connected between Enable Pin or to disconnect; Second manual switch-linear hybrid is write Enable Pin and second first and is write between Enable Pin, second hand switch makes first to write Enable Pin and second through manual control to write and to be connected between Enable Pin or to disconnect, can effectively prevent memory data to be illegally modified, ensure the security that data store.
Accompanying drawing explanation
Fig. 1 is the structural representation of the computing machine of the utility model first embodiment;
Fig. 2 is the structural representation of the computing machine of the utility model second embodiment;
Fig. 3 is the structural representation of the computing machine of utility model the 3rd embodiment;
Fig. 4 is the schematic flow sheet of the network inbreak detection method of the computing machine of the utility model first embodiment.
Embodiment
Refer to Fig. 1, Fig. 1 is the structural representation of the computing machine of the utility model first embodiment.As shown in Figure 1, computing machine 10 comprises: storer 11, first hand switch 12, second hand switch 13 and processor 14.Wherein, processor 14 is provided with: first reads Enable Pin 141 and first writes Enable Pin 142.First reads Enable Pin 141 reads enable signal for sending under processor 14 control, and first writes Enable Pin 142 sends write enable signal under controlling at processor 14.Storer 11 is provided with: second reads Enable Pin 111 and second writes Enable Pin 112.Second reads Enable Pin 111 and first reads Enable Pin 141 and is connected, and reads enable signal for receiving, and second writes Enable Pin 112 and first writes Enable Pin 142 and be connected, for receiving write enable signal.First hand switch 12 is arranged on first and reads Enable Pin 141 and second and read between Enable Pin 111, and the first hand switch 12 makes first to read Enable Pin 141 and second through manual control to read to be connected between Enable Pin 111 or to disconnect.Second hand switch 13 is arranged on first and writes Enable Pin 142 and second and write between Enable Pin 112, and the second hand switch 13 makes first to write Enable Pin 142 and second through manual control to write and to be connected between Enable Pin 112 or to disconnect.Processor 14 also comprises multiple first data transmission end 143, and storer 11 also comprises multiple second data transmission terminals 113 be connected with first data transmission end 143 respectively.
In the utility model embodiment, computing machine 10 can also comprise a second memory (not shown) identical with storer 11, and second memory is the backup of memory of storer 11, for backing up the data of storer.Second memory read Enable Pin and processor 14 read with writing between Enable Pin of processor 14, hand switch is set respectively to be connected between Enable Pin and in the Enable Pin of writing of second memory.And the digital data transmission end of second memory is also directly connected with the data transmission terminal of processor, to carry out the transmission of data.When storer 11 can normally use, storer 11 is set to can by internet user access, and second memory be set to can not by internet user access.When storer 11 damages or can not normally use, computing machine 10 directly can automatically switch to second memory to carry out the normal read-write of data.
In the utility model embodiment, first hand switch 12 makes first to read Enable Pin 141 and second through manual control and reads to be connected between Enable Pin 111, and processor 14 is read Enable Pin 141 by first and is sent and read enable signal, making second to read Enable Pin 111 receives when reading enable signal, and processor 14 reads data by multiple first data transmission end 143 and multiple second data transmission terminal 113 from storer 11.Second hand switch 13 makes first to write Enable Pin 142 and second through manual control and writes between Enable Pin 112 and be connected, and processor 14 is write Enable Pin 142 by first and is sent write enable signal, make second to write Enable Pin 112 when receiving write enable signal, processor 14 writes data by multiple first data transmission end 143 and multiple second data transmission terminal 113 to storer 11.Wherein, the first hand switch 12 and the second hand switch 13 are at least one of pullswitch, knife switch or pushbutton switch.In the utility model embodiment, manually operate the read-write operation of the first hand switch 12 and the second hand switch 13 and then difference control processor 14 pairs of storeies 11, the data in storer 11 effectively can be prevented to be illegally modified, to ensure the security that data store.
Fig. 2 is the structural representation of the computing machine of the utility model second embodiment.As shown in Figure 2, computing machine 20 comprises: storer 21, first hand switch 22, second hand switch 23, processor 24 and switching manipulation mandate module 25.Processor 24 is provided with: first reads Enable Pin 241 and first writes Enable Pin 242.First reads Enable Pin 241 reads enable signal for sending under processor 24 control, and first writes Enable Pin 242 sends write enable signal under controlling at processor 24.Storer 21 is provided with: second reads Enable Pin 211 and second writes Enable Pin 212.Second reads Enable Pin 211 and first reads Enable Pin 241 and is connected, and reads enable signal for receiving.Second writes Enable Pin 212 and first writes Enable Pin 412 and is connected, for receiving write enable signal.First hand switch 22 is arranged on first and reads Enable Pin 241 and second and read between Enable Pin 211, and the first hand switch 22 makes first to read Enable Pin 241 and second through manual control to read to be connected between Enable Pin 211 or to disconnect.Second hand switch 23 is arranged on first and writes Enable Pin 242 and second and write between Enable Pin 212, and the second hand switch 23 makes first to write Enable Pin 242 and second through manual control to write and to be connected between Enable Pin 212 or to disconnect.Switching manipulation mandate module 25 is for carrying out authentication at least one user of the first hand switch 22 and the second hand switch 23, when authentication is passed through, the open operating right that first hand switch 22 is disconnected with the second hand switch 23 or is connected of switching manipulation mandate module 25.
In the utility model embodiment, computing machine 20 can also comprise a second memory (not shown) identical with storer 21, and second memory is the backup of memory of storer 21, for backing up the data of storer.Second memory read Enable Pin and processor 24 read with writing between Enable Pin of processor 24, hand switch is set respectively to be connected between Enable Pin and in the Enable Pin of writing of second memory.And the digital data transmission end of second memory is also directly connected with the data transmission terminal of processor, to carry out the transmission of data.When storer 21 can normally use, storer 21 is set to can by internet user access, and second memory be set to can not by internet user access.When storer 21 damages or can not normally use, computing machine 20 directly can automatically switch to second memory to carry out the normal read-write of data, now need equally switching manipulation mandate module 25 to be separately positioned on second memory read Enable Pin and processor 24 read carry out authentication between Enable Pin and at least one user writing the hand switch write between Enable Pin of Enable Pin and processor 24 of second memory, and when authentication is passed through, the open operating right that this two hand switch is disconnected or connected of switching manipulation mandate module 25.
In the utility model embodiment, processor 24 also comprises multiple first data transmission end 243, and storer 24 also comprises multiple second data transmission terminals 213 be connected with first data transmission end 243 respectively.First hand switch 22 makes first to read Enable Pin 241 and second through manual control and reads to be connected between Enable Pin 211, and processor 24 is read Enable Pin 241 by first and is sent and read enable signal, making second to read Enable Pin 211 receives when reading enable signal, and processor 24 reads data by multiple first data transmission end 243 and multiple second data transmission terminal 313 from storer 24.Second hand switch 23 makes first to write Enable Pin 242 and second through manual control and writes between Enable Pin 212 and be connected, and processor 24 is write Enable Pin 242 by first and is sent write enable signal, make second to write Enable Pin 212 when receiving write enable signal, processor 24 writes data by multiple first data transmission end 243 and multiple second data transmission terminal 213 to storer 21.Wherein, the first hand switch 22 and the second hand switch 23 are pullswitch, at least one in knife switch and pushbutton switch.So carry out authentication by switching manipulation mandate module 25 at least one user to the first hand switch 22 and the second hand switch 23, and when authentication is passed through, the open operating right that first hand switch 22 is disconnected with the second hand switch 23 or is connected of switching manipulation mandate module 25, the data of storer 21 can be prevented further to be illegally modified, to ensure the security that data store further.
Switching manipulation mandate module 25 comprises: electronic password lock 251 and casing 252.Electronic password lock 251 is for locking casing 252, and the first hand switch 22 and the second hand switch 23 are arranged in casing 252, and electronic password lock 251 gathers the identity information that at least one user provides, and carries out authentication.When determining collected identity information and being consistent with the identity information prestored, authentication is passed through, electronic password lock 251 pairs of casings 252 unlock, when determining collected identity information and being inconsistent with the identity information prestored, authentication is not passed through, and electronic password lock 251 pairs of casings 252 keep locking.Identity information comprises at least one in user profile or password.Namely identity information can only include user profile or password, also can comprise user profile and the password corresponding to user profile.Wherein user profile can be obtained by brush smart card.User profile can be the numbering of smart card, the job number of user or other identity informations relevant to individual subscriber.Password is at least one in password, fingerprint, retina, iris.Identity information comprise user profile and to the password that user profile is corresponding time, first electronic password lock 251 gathers user profile that user provides and carries out certification, and carries out certification at user information authentication by the rear collection password corresponding with this user profile.If when the cipher authentication of electronic password lock 251 pairs of user profile and correspondence all passes through, electronic password lock 251 pairs of casings 252 unlock.
In the utility model embodiment, electronic password lock 251 can gather the identity information that a user provides, and carry out authentication, electronic password lock 251 complete authentication and authentication by time, namely the checking of the identity information provided for first user is provided.If the identity information that the checking that storer 21 operates just needs unique user to provide can complete checking, if then smart card is lost and to be found by others and/or password is known by others, just be easy to cause others arbitrarily can operate the first hand switch 22 and the second hand switch 23, make processor 24 pairs of storeies 21 carry out read operation or write operation, this just makes security performance not high; And only need verify that the user profile of unique user and/or password also easily make this client carrying out verifying carry out random operation.Given this, switching manipulation mandate module 25 can also be verified the identity information that two or more users provide.Particularly, three times are at least verified for the identity information provided for different users, electronic password lock 251 gathers identity information that the second user provides and verifies, and when the identity information checking that the second user provides is correct, the identity information that acquisition one the 3rd user provides also is verified.So at least need the identity information provided two different users to verify and verify to operate the first hand switch 22 and the second hand switch 23 correctly.When the identity information wherein provided three different users is verified, can limit the order of the identity information that these three users provide, namely first regulation must verify the identity information which user provides, and then verify the identity information which user provides, finally verify the identity information which user provides; The order of the identity information checking that also can not provide these three users limits, namely only need the identity information to these three users provide to carry out verifying, and the identity information that these three users provide need not be managed with which type of order verify.Certainly, in other embodiments of the present utility model, also can verify the identity information that more user provides, this is not restricted.Wherein, the user operated the first hand switch 22 and the second hand switch 23 can be one of them in these three users, and also can be other users outside these three users, this is not restricted.So verify at the identity information provided two or more users and just casing 252 unlocked by rear electronic password lock 251, obvious security performance can be improved, simultaneously, due to the identity information needing two or more users to provide, wherein the operation of any one user to the first hand switch 22 and the second hand switch 23 all at least needs the supervision accepting at least another one user, that is wherein any one user can not arbitrarily operate the first hand switch 22 and the second hand switch 23, the security that data are stored improves further.
Switching manipulation mandate module 25 and the first hand switch 22 and the second hand switch 23 are all the independent components independent of processor 24, are not subject to processing the impact of device 24, also just do not affect by the external world such as internet worm, wooden horse etc.
In the utility model embodiment, by switching manipulation mandate module 25, at least one user to the first hand switch 22 and the second hand switch 23 carries out authentication, and when authentication is passed through, the open operating right that first hand switch 22 is disconnected with the second hand switch 23 or is connected of switching manipulation mandate module 25, the data of storer 21 can be prevented further to be illegally modified, to improve the security that data store further.
Fig. 3 is the structural representation of the computing machine of the utility model the 3rd embodiment.As shown in Figure 3, computing machine 30 comprises: storer 31, first hand switch 32, second hand switch 33, processor 34, switching manipulation mandate module 35 and mirroring memory 36.Processor 34 is provided with: first reads Enable Pin 341 and first writes Enable Pin 342.First reads Enable Pin 341 reads enable signal for sending under processor 34 control, and first writes Enable Pin 342 sends write enable signal under controlling at processor 34.Storer 31 is provided with: second reads Enable Pin 311 and second writes Enable Pin 312.Second reads Enable Pin 311 and first reads Enable Pin 341 and is connected, and reads enable signal for receiving, and second writes Enable Pin 312 and first writes Enable Pin 342 and be connected, for receiving write enable signal.First hand switch 32 is arranged on first and reads Enable Pin 341 and second and read between Enable Pin 311, and the first hand switch 32 is read to be connected between Enable Pin 311 or to disconnect through making manual control first read Enable Pin 341 and second.Second hand switch 33 is arranged on first and writes Enable Pin 342 and second and write between Enable Pin 312, and the second hand switch 32 makes first to write Enable Pin 342 and second through manual control to write and to be connected between Enable Pin 312 or to disconnect.Mirroring memory 36 is the mirror image of storer 31, and mirroring memory 36 comprises: third reading Enable Pin 361 and the 3rd writes Enable Pin 362.Third reading Enable Pin 361 and first is read Enable Pin 341 and is directly connected, and reads enable signal for receiving, and the 3rd writes Enable Pin 362 and first writes Enable Pin 342 and be directly connected, for receiving write enable signal.Switching manipulation mandate module 35 is for carrying out authentication at least one user of the first hand switch 32 and the second hand switch 33, when authentication is passed through, the open operating right that first hand switch 32 is disconnected with the second hand switch 33 or is connected of switching manipulation mandate module 35.
In the utility model embodiment, storer 31 is set to can by internet user access, and mirroring memory 36 is set to cannot by internet user access.Processor 34 also comprises multiple first data transmission end 343, storer 32 also comprises multiple second data transmission terminals 313 be connected with first data transmission end 343 respectively, and mirroring memory 36 also comprises multiple 3rd data transmission terminals 363 be connected with first data transmission end 343 respectively.
In the utility model embodiment, first hand switch 32 makes first to read Enable Pin 341 and second through manual control and reads to be connected between Enable Pin 311, processor 34 is read Enable Pin 341 by first and is sent and read enable signal, making second to read Enable Pin 311 and third reading Enable Pin 361 receives when reading enable signal, processor 34 reads data by multiple first data transmission end 343 and multiple second data transmission terminal 313 from storer 31, and reads data by multiple first data transmission end 343 and multiple 3rd data transmission terminal 363 from mirroring memory 36.First hand switch 32 makes first to read Enable Pin 341 and second through manual control and reads the separated of Enable Pin 311, processor 34 is read Enable Pin 341 by first and is sent and read enable signal, when making only have third reading Enable Pin 361 to receive and read enable signal, processor 34 reads data by multiple first data transmission end 341 and multiple 3rd data transmission terminal 361 from mirroring memory 36.
Second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes between Enable Pin 312 and be connected, processor 34 is write Enable Pin 342 by first and is sent write enable signal, make second to write Enable Pin 312 and the 3rd and write Enable Pin 362 when receiving write enable signal, processor 34 writes data by multiple first data transmission end 343 and multiple second data transmission terminal 313 to storer 31, and writes data by multiple first data transmission end 343 and multiple 3rd data transmission terminal 363 to mirroring memory 36.Second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes the separated of Enable Pin 312, processor 34 is write Enable Pin 342 by first and is sent write enable signal, make only to have the 3rd to write Enable Pin 362 when receiving write enable signal, processor 34 writes data by multiple first data transmission end 343 and multiple 3rd data transmission terminal 363 to mirroring memory 36.So when computing machine 30 is connected with internet, second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes the separated of Enable Pin 312, when computing machine 30 is subject to network intrusions, the data stored in mirroring memory 36 are changed according to the write enable signal sent of processor 34, and the data stored in storer 31 are unactually changed.Computing machine 30 also comprises comparison module (not shown), comparison module compares the data in storer 31 and mirroring memory 36, if the two is inconsistent, then judge that computing machine 30 is subject to network intrusions, so can prevent storer 31 from suffering illegal network intrusions.
In the utility model embodiment, computing machine 30 can also comprise a second memory (not shown) identical with storer 31, and second memory is the backup of memory of storer 31, for backing up the data of storer.Second memory read Enable Pin and processor 34 read with writing between Enable Pin of processor 34, hand switch is set respectively to be connected between Enable Pin and in the Enable Pin of writing of second memory.And the digital data transmission end of second memory is also directly connected with the data transmission terminal of processor, to carry out the transmission of data.When storer 31 can normally use, storer 31 is set to can by internet user access, and second memory be set to can not by internet user access.When storer 31 damages or can not normally use, computing machine 30 directly can automatically switch to second memory to carry out the normal read-write of data, and mirroring memory also 36 automatically switches to mirror image to moulding storer.Now need equally switching manipulation mandate module 35 to be separately positioned on second memory read Enable Pin and processor 34 read carry out authentication between Enable Pin and at least one user writing the hand switch write between Enable Pin of Enable Pin and processor 34 of second memory, and when authentication is passed through, the open operating right that this two hand switch is disconnected or connected of switching manipulation mandate module 35.
And when computing machine 30 is connected with internet, hand switch through manual control make second memory write Enable Pin 342 and processor 34 write the separated of Enable Pin 312.When computing machine 30 is subject to network intrusions, the data stored in mirroring memory 36 are changed according to the write enable signal sent of processor 34, and the data stored in second memory are unactual changes.Comparison module compares the data in second memory and mirroring memory 36, if the two is inconsistent, then judges that computing machine 30 is subject to network intrusions.So also can prevent second memory from suffering illegal network intrusions.
In embodiments of the present invention, a part of data that also can limit wherein of the data in storer 31 need just can carry out read-write operation by the manual control of the first hand switch 32 and the second hand switch 33.Particularly, only have certification by switching manipulation mandate module 35 and certification by afterwards, just write operation or read operation can be carried out by this partial data in operation first hand switch 32 or the second hand switch 33 pairs of storeies 31, so illegal network intrusions can be prevented.
Fig. 4 is the schematic flow sheet of the network inbreak detection method of the computing machine of the utility model first embodiment.As shown in Figure 4, the network inbreak detection method of computing machine 30 comprises:
Step S10: arranging that storer 31 is set to can by internet user access, and mirroring memory 36 is set to cannot by internet user access.
Wherein, the concrete structure of computing machine 30 as shown in Figure 3.Mirroring memory 36 is the mirror image of storer 31.
Step S11: the second hand switch 33 makes first to write Enable Pin 342 and second through manual control and writes the separated of Enable Pin 312; Data in storer 31 and mirroring memory 36 are compared, if the two is inconsistent, then judges that computing machine 30 is subject to network intrusions, if the two is consistent, then judge that computing machine 30 is not subject to network intrusions.
In sum, the utility model is provided with first by processor and reads Enable Pin, reads enable signal for sending under processor control; First writes Enable Pin for sending write enable signal under processor control; Storer is provided with second and reads Enable Pin, reads Enable Pin be connected with first, reads enable signal for receiving; Second writes Enable Pin and first writes Enable Pin and is connected, for receiving write enable signal; First manual switch-linear hybrid is read Enable Pin and second first and is read between Enable Pin, and the first hand switch is read Enable Pin and second through manual control first and read to be connected between Enable Pin or to disconnect; Second manual switch-linear hybrid is write Enable Pin and second first and is write between Enable Pin, second hand switch is write Enable Pin and second through manual control first and is write and to be connected between Enable Pin or to disconnect, can effectively prevent memory data to be illegally modified, ensure the security that data store.
The foregoing is only embodiment of the present utility model; not thereby the scope of the claims of the present utility model is limited; every utilize the utility model instructions and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present utility model.

Claims (6)

1. a computing machine, is characterized in that, comprising:
Processor, is provided with:
First reads Enable Pin, reads enable signal for sending under described processor control;
First writes Enable Pin, under controlling at described processor, send write enable signal;
Storer, is provided with:
Second reads Enable Pin, reads Enable Pin and is connected, described in receiving, read enable signal with described first;
Second writes Enable Pin, writes Enable Pin be connected, for receiving described write enable signal with described first;
First hand switch, is arranged on described first and reads Enable Pin and described second and read between Enable Pin, and described first hand switch makes described first to read Enable Pin and described second through manual control to read to be connected between Enable Pin or to disconnect;
Second hand switch, is arranged on described first and writes Enable Pin and described second and write between Enable Pin, and described second hand switch makes described first to write Enable Pin and described second through manual control to write and to be connected between Enable Pin or to disconnect.
2. computing machine according to claim 1, is characterized in that, described processor also comprises multiple first data transmission end, and described storer also comprises multiple second data transmission terminals be connected with described first data transmission end respectively.
3. computing machine according to claim 2, it is characterized in that, described first hand switch makes described first to read Enable Pin through manual control and reads to be connected between Enable Pin with described second, and described processor by described first read Enable Pin send described in read enable signal, make described second read Enable Pin receive described in when reading enable signal, described processor by described multiple first data transmission end and described multiple second data transmission terminal from described memory read data.
4. computing machine according to claim 2, it is characterized in that, described second hand switch makes described first to write Enable Pin and described second through manual control and writes between Enable Pin and be connected, and described processor is write Enable Pin by described first and is sent described write enable signal, make described second to write Enable Pin when receiving described write enable signal, described processor by described multiple first data transmission end and described multiple second data transmission terminal to described storer write data.
5. computing machine according to claim 1, is characterized in that, described storer is set to can by internet user access.
6. computing machine according to claim 1, is characterized in that, described first hand switch and described second hand switch are pullswitch, at least one in knife switch and pushbutton switch.
CN201420511944.0U 2014-09-05 2014-09-05 A kind of computing machine Expired - Fee Related CN204189172U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201420511944.0U CN204189172U (en) 2014-09-05 2014-09-05 A kind of computing machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201420511944.0U CN204189172U (en) 2014-09-05 2014-09-05 A kind of computing machine

Publications (1)

Publication Number Publication Date
CN204189172U true CN204189172U (en) 2015-03-04

Family

ID=52621151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201420511944.0U Expired - Fee Related CN204189172U (en) 2014-09-05 2014-09-05 A kind of computing machine

Country Status (1)

Country Link
CN (1) CN204189172U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016033820A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer and network intrusion detection method therefor
WO2016033819A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer
WO2016033818A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer
US20180089420A1 (en) * 2016-09-28 2018-03-29 Nitzan DAUBE Access control for integrated circuit devices

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016033820A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer and network intrusion detection method therefor
WO2016033819A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer
WO2016033818A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Computer
CN105468991A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Computer
US20180089420A1 (en) * 2016-09-28 2018-03-29 Nitzan DAUBE Access control for integrated circuit devices
WO2018060769A1 (en) * 2016-09-28 2018-04-05 Nanolock Security Inc. Access control for integrated circuit devices
EP3519975A4 (en) * 2016-09-28 2020-03-25 Nanolock Security Inc. Access control for integrated circuit devices
US11144634B2 (en) * 2016-09-28 2021-10-12 Nanolock Security Inc. Access control for integrated circuit devices

Similar Documents

Publication Publication Date Title
CN105554035B (en) A kind of electronic lock system and its control method
CN104318647A (en) Access control system based on intelligent terminal and control method of access control system
CN103942478B (en) A kind of authentication and right management method and equipment
CN204189172U (en) A kind of computing machine
US20160246957A1 (en) Method and Apparatus for Controlling Debug Port of Terminal Device
CN101980235A (en) Safe computing platform
CN106131072A (en) A kind of computer information safe system
CN106295290B (en) Method, device and system for generating authentication information based on fingerprint information
CN106161442A (en) A kind of system control user login method
CN105184135A (en) Fingerprint recognition method and fingerprint recognition system
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN102567682A (en) User access method based on BIOS (Basic Input Output System) setting
CN107295016A (en) Auth method and device
CN104680055A (en) Control method for performing management on U disk after access into industrial control system network
CN106790243A (en) A kind of password remapping method of safe U disc
CN109117638A (en) A kind of credible and secure mainboard of height and its control method based on physics switching
CN205451071U (en) Machine case data destructors that uncaps
WO2015062441A1 (en) Cgi web interface multi-session verification code generation and verification method
CN113641979A (en) Authentication method, authentication system and computer readable storage medium
CN103984901A (en) Trusted computer system and application method thereof
CN104937602B (en) Privacy protection method and electronic equipment
CN105468996A (en) Computer
CN114553444B (en) Identity authentication method, identity authentication device and storage medium
CN105678149A (en) Unlocking method and terminal
CN105871840A (en) Certificate management method and system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150304

Termination date: 20180905