CN205621003U - Computer security controller - Google Patents
Computer security controller Download PDFInfo
- Publication number
- CN205621003U CN205621003U CN201620281645.1U CN201620281645U CN205621003U CN 205621003 U CN205621003 U CN 205621003U CN 201620281645 U CN201620281645 U CN 201620281645U CN 205621003 U CN205621003 U CN 205621003U
- Authority
- CN
- China
- Prior art keywords
- computer
- network
- hard disc
- hard disk
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The utility model discloses a computer security controller, including outer network switches, interior network switches, change over switch, computer network interface, server, computer security watch -dog and computer isolating device, outer network switches with interior network switches passes through change over switch with computer network interface connection or disconnection, the computer network interface with the server is connected, the computer security watch -dog with computer isolating device all with the server is connected. The utility model discloses when connecting inner network and outer network simultaneously, two possible networks all are being any time the isolation of complete physics, and the hard disk that uses on hard disk that uses in the intranet and the outer net is kept apart in information totally, can thoroughly solve inner network and outer network's physics like this and keep apart the problem and prevent that the computer virus of outer net from importing the intranet into, realizes network security.
Description
Technical field
This utility model belongs to computer network security technology, is specifically related to a kind of safety controller for computer.
Background technology
Developing rapidly along with socioeconomic, computer becomes the necessary article in people's work and life, leads
Causing computer network scale constantly expanding, therefore, the problem of computer information safe highlights.At meter
In calculation machine protection Question on Network Safety, the technology used at present is a lot, and one is to use isolation card technology, uses
System software controls isolation card selects two pieces of different hard disks;Two is that computer uses two kinds of different operations
System, controls two pieces of hard disks respectively;Three is that one piece of hard disk partition is become different two working areas, with two
Plant different operating system to be controlled;Four is to use duplex computer, and a networking, one does not networks;
Five is to use connected with network cable when surfing the Net, way when not surfing the Net, netting twine disconnected etc., the most above-mentioned employing
, all there is an identical problem in which type of technology hands way, it is simply that either stores security information
Hard disk, the hard disk still storing unclassified information powers up work the most at the same time, and this just gives " network hacker "
Steal user profile from network and provide condition.
In network security problem, mainly the underground information in Intranet and outer net are isolated so that
Unauthorized user in outer net can not access the protected information in Intranet.This is the difficulty of a World Focusing
Topic, in order to solve this problem, some Computer Company have employed various encryption technology or fire wall skill at present
Art carries out information protection, but this method has certain limitation.Because using the method to protect not
During public information, Intranet and outer net communicate physically, just with various software engineerings to information
Carrying out logic isolation, this just invades Intranet to some unauthorized users and provides a kind of possible approach, and
The purpose of information security completely can not be reached.
Utility model content
In view of this, after technical problem to be solved in the utility model is active computer tertiary-structure network
It is the most convenient that computer uses.
In order to solve above-mentioned technical problem, the utility model discloses a kind of safety controller for computer, bag
Include outer network switch, Intra-Network switch, switching switch, computer network interface, server, computer
Security monitor and computer isolating device, described outer network switch and described Intra-Network switch pass through institute
State switching switch be connected with described computer network interface or disconnect;Described computer network interface is with described
Server connects;Described computer safety monitoring device and described computer isolating device all with described server
Connect.
Further, described server includes hard disc module and energy supply control module, described hard disc module with
Described energy supply control module connects.
Further, described hard disc module includes system start-up hard disk;Described system start-up hard disk is with described
Energy supply control module connects.
Further, described hard disc module also includes internal hard drive, described internal hard drive and described power supply control
Molding block connects.
Further, described hard disc module also external hard disc, described external hard disc controls mould with described power supply
Block connects.
Further, described system start-up hard disk, internal hard drive and external hard disc are mechanical hard disk.
Further, control circuit, the input of described control circuit and described computer network are also included
Interface connects, and outfan is connected with described switching switch.
Compared with prior art, this utility model can obtain and include techniques below effect:
1) this utility model have employed independent insulating power supply and is controlled hard disk, it is therefore prevented that security information
Loss.
2), when this utility model can connect Intranet and outer net at the same time, two networks are accomplished at any time
It is all complete physical isolation, thus protects Intranet will not be invaded by the user of outer net, reach network completely
The mesh ground of safety.
3) this utility model is in the application, and Intranet and outer net are all galvanically isolated any time, in Intranet
The hard disk and the hard disk of outer online use that use are completely isolated in information, so can thoroughly solve Intranet and
The physical isolation problem of outer net and prevent the incoming Intranet of computer virus of outer net, it is achieved network security and
Prevent computer virus incoming, be the basic solution of the isolating problem to computer network.
4) this utility model both can provide the user the online merit of convenient internet searching and business relations
Can, solve and both need network to surf the Net, have the information security that can reach to protect computer-internal data to want
Ask.
Certainly, implement arbitrary product of the present utility model must be not necessarily required to reach above-described institute simultaneously
There is technique effect.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing being further appreciated by of the present utility model, constitutes this practicality new
A part for type, schematic description and description of the present utility model is used for explaining this utility model, and
Do not constitute improper restriction of the present utility model.In the accompanying drawings:
Fig. 1 is the module diagram of this utility model embodiment safety controller for computer;
Fig. 2 is the module signal of server described in this utility model embodiment safety controller for computer
Figure;
Fig. 3 is the schematic diagram of hard disc module described in this utility model embodiment safety controller for computer.
Detailed description of the invention
Embodiment of the present utility model is described in detail, thereby to this below in conjunction with drawings and Examples
Utility model how application technology means solve technical problem and reach the process that realizes of technology effect and can fill
Sub-argument solution is also implemented according to this.
This utility model provides a kind of safety controller for computer, as it is shown in figure 1, include that Intranet exchanges
Machine 100, outer network switch 200, switching switch 300, computer network interface 500, server 600,
Computer safety monitoring device 700 and computer isolating device 800, described outer network switch 200 and institute
State Intra-Network switch 100 be connected with described computer network interface 500 by described switching switch 300 or
Disconnect;Described computer network interface 500 is connected with described server 600;Described computer security is supervised
Control device 700 is all connected with described server 600 with described computer isolating device 800;Also include controlling
Circuit 400, the input of described control circuit 400 is connected with described computer network interface 500, defeated
Go out end to be connected with described switching switch 300.
Described computer isolating device 800 solves inner net computer and outer net computer data cannot safe number
Problem according to transmission;When needing data to transmit between outer net computer and inner net computer, the data of transmission
It is required for by entering another computer after described computer isolating device 800 isolation caching.Same
800 and one compunication of computer isolating device described in time, isolates with other computer hardwares.
Described computer safety monitoring device 700 achieves the real-time monitoring to described server 600, it is ensured that
The safety of described server 600.
As in figure 2 it is shown, described server 600 includes hard disc module 610 and energy supply control module 620,
Described hard disc module 610 is connected with described energy supply control module 620.
As it is shown on figure 3, described hard disc module 610 includes system start-up hard disk 611, internal hard drive 612
With external hard disc 613, complete physical isolation between three pieces of described hard disks;Described system start-up hard disk 611
It is connected with described energy supply control module 620;Described internal hard drive 612 and described energy supply control module 620
Connect;Described external hard disc 613 is connected with described energy supply control module 620.
Described system start-up hard disk 611, internal hard drive 612 and external hard disc 613 are mechanical hard disk.
In mechanical hard disk, all of disc is incorporated in a rotary shaft, is parallel between each disc sheet,
Having a magnetic head on the storage face of each disc, the distance between magnetic head and disc is than the diameter of hairline
The least, all of magnetic head is associated on a magnetic head control device, magnetic head control device be responsible for the fortune of each magnetic head
Dynamic.Magnetic head can move along the radial direction of disc, adds the high speed rotating of thousand of turns per minute of disc, magnetic
Head just can be positioned at the read-write operation specifying position enterprising row data of disc.Hard disk as precision equipment,
Dust is its formidable enemy, it is necessary to fully seal.
In the present embodiment, the described independent storage system startup file of system start-up hard disk 611 and system are just
The basic data often run, single system deposits the invasion that system can be made from virus, it is ensured that system
Stable operation.Described internal hard drive 612 individually deposit for internal network user read and amendment interior
Portion's data, this application makes internal data completely isolated with the external world, it is therefore prevented that the loss of security information.Institute
The external hard disc 613 stated individually deposits the external data read for external network user, so, i.e.
Just the virus of external network invasion also cannot be introduced into internal network and system, makes loss be minimized.
Described energy supply control module 620 is to described system start-up hard disk 611, internal hard drive 612 and outer
Portion's hard disk 613 is powered, and when described server 600 is started shooting, system start-up hard disk 611 adds all the time
Electricity;When system is in interior net state, internal hard drive 612 is powered up by described energy supply control module 620,
To external hard disc 613 power-off;When system is in outer net state, described energy supply control module 620 is right
External hard disc 613 powers up, to internal hard drive 612 power-off.
Described control circuit 400 uses closed control circuit, closed control circuit to refer to control object and deposits
Control circuit in feedback contact.Open-loop control circuit simple in construction, low cost, but control accuracy is relatively low.
For keeping the constant of rotating speed in systems, can be added some and measure comparing element composition closed loop system.
Described computer network interface 500 uses RJ-45 interface, RJ-45 interface to be exactly that we are the most normal
The network device interface seen, is commonly called as " crystal head ", and technical term is RJ-45 adapter, belongs to twisted-pair feeder
Ethernet interface type.RJ-45 plug can only insert along fixed-direction, be provided with a plastic shrapnel with
RJ-45 slot blocks in case anti-avulsion falls.This interface is at 10Base-T Ethernet, 100Base-TX ether
Can use in net, 1000Base-TX Ethernet, transmission medium is all twisted-pair feeder, but according to band
Wide difference also has different requirements to medium, when particularly 1000Base-TX gigabit Ethernet connects,
CAT5E UTP cable to be used, it is ensured that also to use 6 class lines if stable high speed.
A kind of safety controller for computer that this utility model provides, have employed independent insulating power supply to firmly
Dish is controlled, it is therefore prevented that the loss of security information;When connecting Intranet and outer net at the same time, can accomplish
Two networks are the most all complete physical isolation, thus protect Intranet will not be entered by the user of outer net
Invade, reach the mesh ground of network security completely;The hard disk used in Intranet and the hard disk of outer online use
In information completely isolated, outside so can thoroughly solving the physical isolation problem of Intranet and outer net and preventing
The incoming Intranet of computer virus of net, it is achieved network security and prevent computer virus incoming, is to calculating
The basic solution of the isolating problem of machine network;This utility model both can provide the user online easily and search
Rope and the function of surfing the Net of business relations, solve and both need network to surf the Net, and has and can reach to protect computer
The information security requirement of internal data.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non-
Comprising of exclusiveness, so that include that the commodity of a series of key element or system not only include those key elements,
But also include other key elements being not expressly set out, or also include for this commodity or system institute
Intrinsic key element.In the case of there is no more restriction, by statement " include one ...... " key element that limits,
It is not precluded from there is also other identical element in the commodity including described key element or system.
Described above illustrate and describes some preferred embodiments of the present utility model, but as it was previously stated, should
When understanding that this utility model is not limited to form disclosed herein, it is not to be taken as other embodiments
Eliminating, and can be used for other combinations various, amendment and environment, and can be in utility model described herein
In contemplated scope, it is modified by above-mentioned teaching or the technology of association area or knowledge.And people from this area
The change that carried out of member and change, the most all should in this practicality newly without departing from spirit and scope of the present utility model
In the protection domain of type claims.
Claims (7)
1. a safety controller for computer, it is characterised in that include outer network switch, Intra-Network switch,
Switching switch, computer network interface, server, computer safety monitoring device and computer isolation dress
Putting, described outer network switch and described Intra-Network switch are by described switching switch and described computer network
Interface connects or disconnects;Described computer network interface is connected with described server;Described computer security
Watch-dog is all connected with described server with described computer isolating device.
2. safety controller for computer as claimed in claim 1, it is characterised in that described server bag
Including hard disc module and energy supply control module, described hard disc module is connected with described energy supply control module.
3. safety controller for computer as claimed in claim 2, it is characterised in that described hard disc module
Including system start-up hard disk;Described system start-up hard disk is connected with described energy supply control module.
4. safety controller for computer as claimed in claim 3, it is characterised in that described hard disc module
Also include that internal hard drive, described internal hard drive are connected with described energy supply control module.
5. safety controller for computer as claimed in claim 4, it is characterised in that described hard disc module
Also external hard disc, described external hard disc is connected with described energy supply control module.
6. safety controller for computer as claimed in claim 5, it is characterised in that described system opens
Dynamic hard disk, internal hard drive and external hard disc are mechanical hard disk.
7. safety controller for computer as claimed in claim 6, it is characterised in that also include controlling electricity
Road, the input of described control circuit is connected with described computer network interface, outfan and described switching
Switch connects.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620281645.1U CN205621003U (en) | 2016-04-06 | 2016-04-06 | Computer security controller |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620281645.1U CN205621003U (en) | 2016-04-06 | 2016-04-06 | Computer security controller |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205621003U true CN205621003U (en) | 2016-10-05 |
Family
ID=57029886
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620281645.1U Expired - Fee Related CN205621003U (en) | 2016-04-06 | 2016-04-06 | Computer security controller |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205621003U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107040542A (en) * | 2017-04-27 | 2017-08-11 | 河南理工大学 | A kind of network security controller of computer |
CN110191601A (en) * | 2019-05-30 | 2019-08-30 | 左燕 | A kind of computer network monitoring device |
-
2016
- 2016-04-06 CN CN201620281645.1U patent/CN205621003U/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107040542A (en) * | 2017-04-27 | 2017-08-11 | 河南理工大学 | A kind of network security controller of computer |
CN107040542B (en) * | 2017-04-27 | 2019-12-31 | 河南理工大学 | Computer network safety controller |
CN110191601A (en) * | 2019-05-30 | 2019-08-30 | 左燕 | A kind of computer network monitoring device |
CN110191601B (en) * | 2019-05-30 | 2021-02-19 | 威海云之卫智能科技有限公司 | Computer network monitoring device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Peng et al. | A survey on security communication and control for smart grids under malicious cyber attacks | |
Pasqualetti et al. | Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems | |
CN103490895B (en) | A kind of industrial control identity authentication applying the close algorithm of state and device | |
CN102118271B (en) | Method for discovering illegally-accessed equipment | |
CN202424769U (en) | Intranet safety management system | |
CN205621003U (en) | Computer security controller | |
CN106102068A (en) | A kind of illegal wireless access point detection and attack method and device | |
Robinson | The SCADA threat landscape | |
CN103546478A (en) | Internal and external network secure access method and system | |
WO2021227465A1 (en) | Security defense method and system for industrial control system network | |
CN105516189A (en) | Network security enforcement system and method based on big data platform | |
CN110162998A (en) | Identity ciphering equivalence test method, device, system and medium based on user group | |
CN103208962A (en) | Initiative risk protection system for variable flow type vector control device of high-capacity thyristor | |
Dorothy et al. | Smart Grid Systems Based Survey on Cyber Security Issues | |
CN109005076A (en) | A kind of intelligent substation switch monitoring system and interchanger monitoring method | |
CN107124400A (en) | Intrusion prevention device and method based on security strategy | |
CN106982358A (en) | A kind of safeguard management and monitoring system based on server | |
CN105939353B (en) | Safety management and information feedback system based on GDOI protocol | |
CN205657709U (en) | Safe control system of thing networking | |
He | Threat assessment for multistage cyber attacks in smart grid communication networks | |
CN205657710U (en) | Safe control system is kept apart to network | |
Kaur et al. | Smart grid with cloud computing: Architecture, security issues and defense mechanism | |
Bangash et al. | LPSDN: Sink-node location privacy in wsns via SDN approach | |
Netkachov et al. | Model-based evaluation of the resilience of critical infrastructures under cyber attacks | |
Kamal et al. | Identifying and scoring vulnerability in scada environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161005 Termination date: 20170406 |
|
CF01 | Termination of patent right due to non-payment of annual fee |