CN205621003U - Computer security controller - Google Patents

Computer security controller Download PDF

Info

Publication number
CN205621003U
CN205621003U CN201620281645.1U CN201620281645U CN205621003U CN 205621003 U CN205621003 U CN 205621003U CN 201620281645 U CN201620281645 U CN 201620281645U CN 205621003 U CN205621003 U CN 205621003U
Authority
CN
China
Prior art keywords
computer
network
hard disc
hard disk
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201620281645.1U
Other languages
Chinese (zh)
Inventor
李敏
胡方霞
陈郑军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Technology and Business Institute
Original Assignee
Chongqing Technology and Business Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Technology and Business Institute filed Critical Chongqing Technology and Business Institute
Priority to CN201620281645.1U priority Critical patent/CN205621003U/en
Application granted granted Critical
Publication of CN205621003U publication Critical patent/CN205621003U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a computer security controller, including outer network switches, interior network switches, change over switch, computer network interface, server, computer security watch -dog and computer isolating device, outer network switches with interior network switches passes through change over switch with computer network interface connection or disconnection, the computer network interface with the server is connected, the computer security watch -dog with computer isolating device all with the server is connected. The utility model discloses when connecting inner network and outer network simultaneously, two possible networks all are being any time the isolation of complete physics, and the hard disk that uses on hard disk that uses in the intranet and the outer net is kept apart in information totally, can thoroughly solve inner network and outer network's physics like this and keep apart the problem and prevent that the computer virus of outer net from importing the intranet into, realizes network security.

Description

Safety controller for computer
Technical field
This utility model belongs to computer network security technology, is specifically related to a kind of safety controller for computer.
Background technology
Developing rapidly along with socioeconomic, computer becomes the necessary article in people's work and life, leads Causing computer network scale constantly expanding, therefore, the problem of computer information safe highlights.At meter In calculation machine protection Question on Network Safety, the technology used at present is a lot, and one is to use isolation card technology, uses System software controls isolation card selects two pieces of different hard disks;Two is that computer uses two kinds of different operations System, controls two pieces of hard disks respectively;Three is that one piece of hard disk partition is become different two working areas, with two Plant different operating system to be controlled;Four is to use duplex computer, and a networking, one does not networks; Five is to use connected with network cable when surfing the Net, way when not surfing the Net, netting twine disconnected etc., the most above-mentioned employing , all there is an identical problem in which type of technology hands way, it is simply that either stores security information Hard disk, the hard disk still storing unclassified information powers up work the most at the same time, and this just gives " network hacker " Steal user profile from network and provide condition.
In network security problem, mainly the underground information in Intranet and outer net are isolated so that Unauthorized user in outer net can not access the protected information in Intranet.This is the difficulty of a World Focusing Topic, in order to solve this problem, some Computer Company have employed various encryption technology or fire wall skill at present Art carries out information protection, but this method has certain limitation.Because using the method to protect not During public information, Intranet and outer net communicate physically, just with various software engineerings to information Carrying out logic isolation, this just invades Intranet to some unauthorized users and provides a kind of possible approach, and The purpose of information security completely can not be reached.
Utility model content
In view of this, after technical problem to be solved in the utility model is active computer tertiary-structure network It is the most convenient that computer uses.
In order to solve above-mentioned technical problem, the utility model discloses a kind of safety controller for computer, bag Include outer network switch, Intra-Network switch, switching switch, computer network interface, server, computer Security monitor and computer isolating device, described outer network switch and described Intra-Network switch pass through institute State switching switch be connected with described computer network interface or disconnect;Described computer network interface is with described Server connects;Described computer safety monitoring device and described computer isolating device all with described server Connect.
Further, described server includes hard disc module and energy supply control module, described hard disc module with Described energy supply control module connects.
Further, described hard disc module includes system start-up hard disk;Described system start-up hard disk is with described Energy supply control module connects.
Further, described hard disc module also includes internal hard drive, described internal hard drive and described power supply control Molding block connects.
Further, described hard disc module also external hard disc, described external hard disc controls mould with described power supply Block connects.
Further, described system start-up hard disk, internal hard drive and external hard disc are mechanical hard disk.
Further, control circuit, the input of described control circuit and described computer network are also included Interface connects, and outfan is connected with described switching switch.
Compared with prior art, this utility model can obtain and include techniques below effect:
1) this utility model have employed independent insulating power supply and is controlled hard disk, it is therefore prevented that security information Loss.
2), when this utility model can connect Intranet and outer net at the same time, two networks are accomplished at any time It is all complete physical isolation, thus protects Intranet will not be invaded by the user of outer net, reach network completely The mesh ground of safety.
3) this utility model is in the application, and Intranet and outer net are all galvanically isolated any time, in Intranet The hard disk and the hard disk of outer online use that use are completely isolated in information, so can thoroughly solve Intranet and The physical isolation problem of outer net and prevent the incoming Intranet of computer virus of outer net, it is achieved network security and Prevent computer virus incoming, be the basic solution of the isolating problem to computer network.
4) this utility model both can provide the user the online merit of convenient internet searching and business relations Can, solve and both need network to surf the Net, have the information security that can reach to protect computer-internal data to want Ask.
Certainly, implement arbitrary product of the present utility model must be not necessarily required to reach above-described institute simultaneously There is technique effect.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing being further appreciated by of the present utility model, constitutes this practicality new A part for type, schematic description and description of the present utility model is used for explaining this utility model, and Do not constitute improper restriction of the present utility model.In the accompanying drawings:
Fig. 1 is the module diagram of this utility model embodiment safety controller for computer;
Fig. 2 is the module signal of server described in this utility model embodiment safety controller for computer Figure;
Fig. 3 is the schematic diagram of hard disc module described in this utility model embodiment safety controller for computer.
Detailed description of the invention
Embodiment of the present utility model is described in detail, thereby to this below in conjunction with drawings and Examples Utility model how application technology means solve technical problem and reach the process that realizes of technology effect and can fill Sub-argument solution is also implemented according to this.
This utility model provides a kind of safety controller for computer, as it is shown in figure 1, include that Intranet exchanges Machine 100, outer network switch 200, switching switch 300, computer network interface 500, server 600, Computer safety monitoring device 700 and computer isolating device 800, described outer network switch 200 and institute State Intra-Network switch 100 be connected with described computer network interface 500 by described switching switch 300 or Disconnect;Described computer network interface 500 is connected with described server 600;Described computer security is supervised Control device 700 is all connected with described server 600 with described computer isolating device 800;Also include controlling Circuit 400, the input of described control circuit 400 is connected with described computer network interface 500, defeated Go out end to be connected with described switching switch 300.
Described computer isolating device 800 solves inner net computer and outer net computer data cannot safe number Problem according to transmission;When needing data to transmit between outer net computer and inner net computer, the data of transmission It is required for by entering another computer after described computer isolating device 800 isolation caching.Same 800 and one compunication of computer isolating device described in time, isolates with other computer hardwares.
Described computer safety monitoring device 700 achieves the real-time monitoring to described server 600, it is ensured that The safety of described server 600.
As in figure 2 it is shown, described server 600 includes hard disc module 610 and energy supply control module 620, Described hard disc module 610 is connected with described energy supply control module 620.
As it is shown on figure 3, described hard disc module 610 includes system start-up hard disk 611, internal hard drive 612 With external hard disc 613, complete physical isolation between three pieces of described hard disks;Described system start-up hard disk 611 It is connected with described energy supply control module 620;Described internal hard drive 612 and described energy supply control module 620 Connect;Described external hard disc 613 is connected with described energy supply control module 620.
Described system start-up hard disk 611, internal hard drive 612 and external hard disc 613 are mechanical hard disk.
In mechanical hard disk, all of disc is incorporated in a rotary shaft, is parallel between each disc sheet, Having a magnetic head on the storage face of each disc, the distance between magnetic head and disc is than the diameter of hairline The least, all of magnetic head is associated on a magnetic head control device, magnetic head control device be responsible for the fortune of each magnetic head Dynamic.Magnetic head can move along the radial direction of disc, adds the high speed rotating of thousand of turns per minute of disc, magnetic Head just can be positioned at the read-write operation specifying position enterprising row data of disc.Hard disk as precision equipment, Dust is its formidable enemy, it is necessary to fully seal.
In the present embodiment, the described independent storage system startup file of system start-up hard disk 611 and system are just The basic data often run, single system deposits the invasion that system can be made from virus, it is ensured that system Stable operation.Described internal hard drive 612 individually deposit for internal network user read and amendment interior Portion's data, this application makes internal data completely isolated with the external world, it is therefore prevented that the loss of security information.Institute The external hard disc 613 stated individually deposits the external data read for external network user, so, i.e. Just the virus of external network invasion also cannot be introduced into internal network and system, makes loss be minimized.
Described energy supply control module 620 is to described system start-up hard disk 611, internal hard drive 612 and outer Portion's hard disk 613 is powered, and when described server 600 is started shooting, system start-up hard disk 611 adds all the time Electricity;When system is in interior net state, internal hard drive 612 is powered up by described energy supply control module 620, To external hard disc 613 power-off;When system is in outer net state, described energy supply control module 620 is right External hard disc 613 powers up, to internal hard drive 612 power-off.
Described control circuit 400 uses closed control circuit, closed control circuit to refer to control object and deposits Control circuit in feedback contact.Open-loop control circuit simple in construction, low cost, but control accuracy is relatively low. For keeping the constant of rotating speed in systems, can be added some and measure comparing element composition closed loop system.
Described computer network interface 500 uses RJ-45 interface, RJ-45 interface to be exactly that we are the most normal The network device interface seen, is commonly called as " crystal head ", and technical term is RJ-45 adapter, belongs to twisted-pair feeder Ethernet interface type.RJ-45 plug can only insert along fixed-direction, be provided with a plastic shrapnel with RJ-45 slot blocks in case anti-avulsion falls.This interface is at 10Base-T Ethernet, 100Base-TX ether Can use in net, 1000Base-TX Ethernet, transmission medium is all twisted-pair feeder, but according to band Wide difference also has different requirements to medium, when particularly 1000Base-TX gigabit Ethernet connects, CAT5E UTP cable to be used, it is ensured that also to use 6 class lines if stable high speed.
A kind of safety controller for computer that this utility model provides, have employed independent insulating power supply to firmly Dish is controlled, it is therefore prevented that the loss of security information;When connecting Intranet and outer net at the same time, can accomplish Two networks are the most all complete physical isolation, thus protect Intranet will not be entered by the user of outer net Invade, reach the mesh ground of network security completely;The hard disk used in Intranet and the hard disk of outer online use In information completely isolated, outside so can thoroughly solving the physical isolation problem of Intranet and outer net and preventing The incoming Intranet of computer virus of net, it is achieved network security and prevent computer virus incoming, is to calculating The basic solution of the isolating problem of machine network;This utility model both can provide the user online easily and search Rope and the function of surfing the Net of business relations, solve and both need network to surf the Net, and has and can reach to protect computer The information security requirement of internal data.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non- Comprising of exclusiveness, so that include that the commodity of a series of key element or system not only include those key elements, But also include other key elements being not expressly set out, or also include for this commodity or system institute Intrinsic key element.In the case of there is no more restriction, by statement " include one ...... " key element that limits, It is not precluded from there is also other identical element in the commodity including described key element or system.
Described above illustrate and describes some preferred embodiments of the present utility model, but as it was previously stated, should When understanding that this utility model is not limited to form disclosed herein, it is not to be taken as other embodiments Eliminating, and can be used for other combinations various, amendment and environment, and can be in utility model described herein In contemplated scope, it is modified by above-mentioned teaching or the technology of association area or knowledge.And people from this area The change that carried out of member and change, the most all should in this practicality newly without departing from spirit and scope of the present utility model In the protection domain of type claims.

Claims (7)

1. a safety controller for computer, it is characterised in that include outer network switch, Intra-Network switch, Switching switch, computer network interface, server, computer safety monitoring device and computer isolation dress Putting, described outer network switch and described Intra-Network switch are by described switching switch and described computer network Interface connects or disconnects;Described computer network interface is connected with described server;Described computer security Watch-dog is all connected with described server with described computer isolating device.
2. safety controller for computer as claimed in claim 1, it is characterised in that described server bag Including hard disc module and energy supply control module, described hard disc module is connected with described energy supply control module.
3. safety controller for computer as claimed in claim 2, it is characterised in that described hard disc module Including system start-up hard disk;Described system start-up hard disk is connected with described energy supply control module.
4. safety controller for computer as claimed in claim 3, it is characterised in that described hard disc module Also include that internal hard drive, described internal hard drive are connected with described energy supply control module.
5. safety controller for computer as claimed in claim 4, it is characterised in that described hard disc module Also external hard disc, described external hard disc is connected with described energy supply control module.
6. safety controller for computer as claimed in claim 5, it is characterised in that described system opens Dynamic hard disk, internal hard drive and external hard disc are mechanical hard disk.
7. safety controller for computer as claimed in claim 6, it is characterised in that also include controlling electricity Road, the input of described control circuit is connected with described computer network interface, outfan and described switching Switch connects.
CN201620281645.1U 2016-04-06 2016-04-06 Computer security controller Expired - Fee Related CN205621003U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620281645.1U CN205621003U (en) 2016-04-06 2016-04-06 Computer security controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620281645.1U CN205621003U (en) 2016-04-06 2016-04-06 Computer security controller

Publications (1)

Publication Number Publication Date
CN205621003U true CN205621003U (en) 2016-10-05

Family

ID=57029886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620281645.1U Expired - Fee Related CN205621003U (en) 2016-04-06 2016-04-06 Computer security controller

Country Status (1)

Country Link
CN (1) CN205621003U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040542A (en) * 2017-04-27 2017-08-11 河南理工大学 A kind of network security controller of computer
CN110191601A (en) * 2019-05-30 2019-08-30 左燕 A kind of computer network monitoring device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040542A (en) * 2017-04-27 2017-08-11 河南理工大学 A kind of network security controller of computer
CN107040542B (en) * 2017-04-27 2019-12-31 河南理工大学 Computer network safety controller
CN110191601A (en) * 2019-05-30 2019-08-30 左燕 A kind of computer network monitoring device
CN110191601B (en) * 2019-05-30 2021-02-19 威海云之卫智能科技有限公司 Computer network monitoring device

Similar Documents

Publication Publication Date Title
Peng et al. A survey on security communication and control for smart grids under malicious cyber attacks
Pasqualetti et al. Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems
CN103490895B (en) A kind of industrial control identity authentication applying the close algorithm of state and device
CN102118271B (en) Method for discovering illegally-accessed equipment
CN202424769U (en) Intranet safety management system
CN205621003U (en) Computer security controller
CN106102068A (en) A kind of illegal wireless access point detection and attack method and device
Robinson The SCADA threat landscape
CN103546478A (en) Internal and external network secure access method and system
WO2021227465A1 (en) Security defense method and system for industrial control system network
CN105516189A (en) Network security enforcement system and method based on big data platform
CN110162998A (en) Identity ciphering equivalence test method, device, system and medium based on user group
CN103208962A (en) Initiative risk protection system for variable flow type vector control device of high-capacity thyristor
Dorothy et al. Smart Grid Systems Based Survey on Cyber Security Issues
CN109005076A (en) A kind of intelligent substation switch monitoring system and interchanger monitoring method
CN107124400A (en) Intrusion prevention device and method based on security strategy
CN106982358A (en) A kind of safeguard management and monitoring system based on server
CN105939353B (en) Safety management and information feedback system based on GDOI protocol
CN205657709U (en) Safe control system of thing networking
He Threat assessment for multistage cyber attacks in smart grid communication networks
CN205657710U (en) Safe control system is kept apart to network
Kaur et al. Smart grid with cloud computing: Architecture, security issues and defense mechanism
Bangash et al. LPSDN: Sink-node location privacy in wsns via SDN approach
Netkachov et al. Model-based evaluation of the resilience of critical infrastructures under cyber attacks
Kamal et al. Identifying and scoring vulnerability in scada environments

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161005

Termination date: 20170406

CF01 Termination of patent right due to non-payment of annual fee