CN205121563U - Computer evidence system of encrypting - Google Patents
Computer evidence system of encrypting Download PDFInfo
- Publication number
- CN205121563U CN205121563U CN201520936575.4U CN201520936575U CN205121563U CN 205121563 U CN205121563 U CN 205121563U CN 201520936575 U CN201520936575 U CN 201520936575U CN 205121563 U CN205121563 U CN 205121563U
- Authority
- CN
- China
- Prior art keywords
- evidence
- storer
- memory
- computing machine
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model provides a computer evidence system of encrypting, including evidence acquisition unit, the primary server, evidence memory and computer operation record appearance, the primary server's one end connection evidence acquisition unit, the connection of evidence acquisition unit is used for verifying whether the user has the evidence of authority visit computer to read the authority device, and computer operation record appearance is used for writing down user's operation action, and the evidence memory is including encrypting memory area and common storage area, and read only protector of evidence and the alarm device who prevents the evidence and distorted is still connected to the evidence memory, and when the evidence memory received the forcible entry, alarm device sent the alarm. The utility model discloses an evidence memory sets up encrypts memory area and common storage area, sets up read only protector of evidence and alarm device to the evidence memory, prevents to trespass or distort the evidence that calculator memory stored up, improves computer evidence system security performance.
Description
Technical field
The utility model relates to computer equipment field, and specifically, the utility model relates to a kind of computing machine evidence encryption system.
Background technology
According to interrelated data display, the computer network of China in Recent Years is subject to the conscious invasion of increasing hacker, and maintaining network safety has had more and more important realistic meaning; Therefore, in the urgent need to providing a kind of computing machine evidence encryption system, online investigation forensics analysis being carried out to computing machine, improving the security of online evidence obtaining, for maintaining network provides foundation safely.
Utility model content
The technical problems to be solved in the utility model is: provide a kind of computing machine evidence encryption system, carry out online investigation forensics analysis to computing machine, improves the security of online evidence obtaining, for maintaining network provides foundation safely.
The utility model solves the technical scheme that its technical matters adopts: provide a kind of computing machine evidence encryption system, comprise evidence collection unit, master server, evidence storer and computer operation registering instrument, one end of described master server connects evidence collection unit, described evidence collection unit connects and is used for the evidence reading authority device whether authentication of users has permission access computer, the other end of described master server connects evidence storer and computer operation registering instrument, described computer operation registering instrument is used for the operational motion of recording user, described evidence storer comprises cryptographic storage district and common storage area, described evidence storer also connects the read-only protector of the evidence preventing evidence to be tampered and warning device, when described evidence storer is subject to trespassing, described warning device gives the alarm.
Preferably, described evidence reading authority device comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
Preferably, described cryptographic storage district connects each safety encipher device generating different secret key.
Preferably, described warning device comprises hummer and display lamp.
Preferably, described evidence storer also connected storage self-destruct circuit, when described evidence storer is subject to trespassing, described evidence storer auto-erasing evidence data.
The utility model provides a kind of computing machine evidence encryption system, structure is simple, convenient to use, evidence is set by evidence collection unit and reads authority device, simultaneously, evidence storer arranges cryptographic storage district and common storage area, the read-only protector of evidence and warning device are arranged to evidence storer, prevents the evidence trespassing or distort calculator memory storage, improve the security performance of computing machine evidence system; In addition, the utility model also arranges computer operation registering instrument, evidence protection is had very high comprehensive and credible, for safeguarding that evidence provides foundation safely.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the utility model embodiment, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only embodiments more of the present utility model, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the structural representation of computing machine evidence encryption system preferred embodiment of the present utility model.
[in figure Reference numeral]:
10. evidence collection unit, 20. master servers, 30. evidence storeies, 31. cryptographic storage districts; 32. common storage areas, 40. computer operation registering instruments, 50. evidences read authority device, the read-only protector of 60. evidence; 70. warning devices, 80. safety encipher devices, 90. storer self-destruct circuits.
Embodiment
For making content of the present utility model clearly understandable, below in conjunction with Figure of description, content of the present utility model is described further.Certain the utility model is not limited to this specific embodiment, and the general replacement known by those skilled in the art is also encompassed in protection domain of the present utility model.Secondly, the utility model detailed statement that utilized schematic diagram to carry out, when describing the utility model example in detail, for convenience of explanation, schematic diagram, should in this, as to restriction of the present utility model not according to general ratio partial enlargement.
Above-mentioned and other technical characteristic and beneficial effect, will in conjunction with the embodiments and accompanying drawing 1 computing machine evidence encryption system of the present utility model is described in detail.As shown in Figure 1, Fig. 1 is the structural representation of computing machine evidence encryption system preferred embodiment of the present utility model.
As shown in Figure 1, the utility model provides a kind of computing machine evidence encryption system, comprise evidence collection unit 10, master server 20, evidence storer 30 and computer operation registering instrument 40, one end of master server 20 connects evidence collection unit 10, evidence collection unit 10 connects and is used for the evidence reading authority device 50 whether authentication of users has permission access computer, the other end of master server 20 connects evidence storer 30 and computer operation registering instrument 40, computer operation registering instrument 40 is for the operational motion of recording user, evidence storer 30 comprises cryptographic storage district 31 and common storage area 32, evidence storer 30 also connects the read-only protector 60 of the evidence preventing evidence to be tampered and warning device 70, when evidence storer 30 is subject to trespassing, warning device 70 gives the alarm.
Concrete, in the present embodiment, evidence reads authority device 50 and comprises China second-generation identity card scanner, fingerprint machine or encryption switch, and warning device 70 comprises hummer and display lamp.
In order to improve the security of evidence system further, cryptographic storage district 31 connects each safety encipher device 80 generating different secret key.In addition, connected storage self-destruct circuit 90 gone back by evidence storer 30, when described evidence storer 30 is subject to trespassing, and described evidence storer 30 auto-erasing evidence data.
In sum, the utility model provides a kind of computing machine evidence encryption system, structure is simple, convenient to use, evidence is set by evidence collection unit 10 and reads authority device 50, meanwhile, evidence storer 30 arranges cryptographic storage district 31 and common storage area 32, arranges the read-only protector 60 of evidence and warning device 70 to evidence storer 30, prevent the evidence trespassing or distort calculator memory storage, improve the security performance of computing machine evidence system; In addition, the utility model also arranges computer operation registering instrument 40, evidence protection is had very high comprehensive and credible, for safeguarding that evidence provides foundation safely.
Although the utility model essentially describes above embodiment, just come as an example to be described, and the utility model is not limited to this.Such as, each parts that embodiment is shown in detail can be revised and run, to described modification with apply relevant difference and can think and be included in protection domain of the present utility model that claims limit.
Embodiment involved in this instructions, its implication is that specially feature, structure or the characteristic described in conjunction with this embodiment is included at least one embodiment of the present utility model.These terms come across in instructions everywhere differ to establish a capital and relate to same embodiment.In addition, when describing special characteristic, structure or characteristic in conjunction with any embodiment, all think that it falls in the scope of these special characteristics, structure or the characteristic that those of ordinary skill in the art just can realize in conjunction with other embodiments.
Claims (5)
1. a computing machine evidence encryption system, it is characterized in that, comprise evidence collection unit, master server, evidence storer and computer operation registering instrument, one end of described master server connects evidence collection unit, described evidence collection unit connects and is used for the evidence reading authority device whether authentication of users has permission access computer, the other end of described master server connects evidence storer and computer operation registering instrument, described computer operation registering instrument is used for the operational motion of recording user, described evidence storer comprises cryptographic storage district and common storage area, described evidence storer also connects the read-only protector of the evidence preventing evidence to be tampered and warning device, when described evidence storer is subject to trespassing, described warning device gives the alarm.
2. computing machine evidence encryption system as claimed in claim 1, is characterized in that, described evidence reads authority device and comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
3. computing machine evidence encryption system as claimed in claim 1, is characterized in that, described cryptographic storage district connects each safety encipher device generating different secret key.
4. computing machine evidence encryption system as claimed in claim 1, it is characterized in that, described warning device comprises hummer and display lamp.
5. computing machine evidence encryption system as claimed in claim 1, is characterized in that, described evidence storer also connected storage self-destruct circuit, when described evidence storer is subject to trespassing, and described evidence storer auto-erasing evidence data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520936575.4U CN205121563U (en) | 2015-11-23 | 2015-11-23 | Computer evidence system of encrypting |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520936575.4U CN205121563U (en) | 2015-11-23 | 2015-11-23 | Computer evidence system of encrypting |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205121563U true CN205121563U (en) | 2016-03-30 |
Family
ID=55577149
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520936575.4U Expired - Fee Related CN205121563U (en) | 2015-11-23 | 2015-11-23 | Computer evidence system of encrypting |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205121563U (en) |
-
2015
- 2015-11-23 CN CN201520936575.4U patent/CN205121563U/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103731475B (en) | A kind of data protection system | |
CN107871081A (en) | A kind of computer information safe system | |
CN102932140A (en) | Key backup method for enhancing safety of cipher machine | |
CN204242232U (en) | A kind of official seal printer with ca authentication and two-dimension code anti-counterfeit technology | |
CN103310141A (en) | Method and system for monitoring of certificate information security | |
CN107341534A (en) | A kind of electronic card copy prevention method, device and management server | |
CN204613932U (en) | A kind of computer data protection system | |
CN207096988U (en) | The cryptosecurity manager that a kind of dynamic random number and authentication combine | |
CN205121563U (en) | Computer evidence system of encrypting | |
CN204731771U (en) | A kind of computer security supervisory systems | |
CN103336928A (en) | Method and device for encrypting and decrypting database | |
CN111815821B (en) | IC card security algorithm applied to intelligent door lock | |
CN204740592U (en) | Computer data monitored control system | |
CN110708302B (en) | Dynamic two-dimensional code key manager based on positioning sensing data and method thereof | |
CN103839026B (en) | Many equipment read can encryption identity card | |
CN204557487U (en) | A kind of computer protection system | |
CN204613953U (en) | A kind of computer management system | |
CN204613954U (en) | A kind of computer network security shielding system | |
KR20080109707A (en) | Randomized shuffling and partitioning method by recursive sampling for distributed storing data | |
CN204576524U (en) | A kind of Computer Data Security management devices | |
CN201111054Y (en) | Digital medium playing apparatus with information safe function | |
CN204576516U (en) | A kind of computerized information encryption system | |
CN105205414A (en) | Data leakage prevention system | |
CN205038646U (en) | Long -range system of collecting evidence of computer | |
CN100469030C (en) | Information resource authority limits managing method for digital household network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160330 Termination date: 20161123 |