CN205862329U - A kind of data base's Hole Detection and anti-intrusion device - Google Patents

A kind of data base's Hole Detection and anti-intrusion device Download PDF

Info

Publication number
CN205862329U
CN205862329U CN201620611381.1U CN201620611381U CN205862329U CN 205862329 U CN205862329 U CN 205862329U CN 201620611381 U CN201620611381 U CN 201620611381U CN 205862329 U CN205862329 U CN 205862329U
Authority
CN
China
Prior art keywords
main control
control chip
guard shield
data base
communication module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201620611381.1U
Other languages
Chinese (zh)
Inventor
罗远哲
燕楠
孙亚萍
叶俊卫
李冠蕊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHONGCHAO WEIYE INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
BEIJING ZHONGCHAO WEIYE INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHONGCHAO WEIYE INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical BEIJING ZHONGCHAO WEIYE INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201620611381.1U priority Critical patent/CN205862329U/en
Application granted granted Critical
Publication of CN205862329U publication Critical patent/CN205862329U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The utility model discloses a kind of data base's Hole Detection and anti-intrusion device, including guard shield and database host, the upper surface of guard shield is installed with liquid crystal touch screen and operation button, the internally installed of guard shield has main control chip, main control chip connects communication module, independent current source and fingerprint capturer, communication module includes network adapter and switch, and the outfan of switch is provided with RJ45 interface, RJ45 interface is connected to database host by netting twine, communication module is also associated with monitor, main control chip is also associated with alarm module, and between main control chip and independent current source, it is also associated with electrical switch;The side of guard shield is also equipped with USB interface, and USB interface is connected to the digital independent end of main control chip;Alarm module includes buzzer and warning lamp, and warning lamp is arranged on the surface of guard shield.This utility model can carry out authentication, real-time monitoring protection to the database accessor of database host, improves the security performance of data base.

Description

A kind of data base's Hole Detection and anti-intrusion device
Technical field
This utility model relates to technical field of database security, is specially a kind of data base's Hole Detection and fills with anti-intrusion Put.
Background technology
Information technology is a double-edged sword, while offering convenience to us and improve, also brings potential safety hazard and prestige The side of body.With the development of work information technology, substantial amounts of data need to carry out processing efficiently in order, and the use of data base the most more comes The most extensive.During the use of large database, staff typically requires and downloads and upload data with USB flash disk, but has very The staff not having manipulating rights can also be operated by USB flash disk more, has virus inside some USB flash disks, once insert after just Main frame can be attacked, although main frame also has the program of preventing and treating virus attack, but or there is bigger danger.
Utility model content
For problem above, this utility model provides a kind of data base's Hole Detection and anti-intrusion device, it is possible to carry out Identification is verified, real-time detector data transmission state, and effectively preventing and treating virus infects and illegal invasion, can effectively solve background Problem in technology.
For achieving the above object, the following technical scheme of this utility model offer: a kind of data base's Hole Detection and anti-intrusion Device, including guard shield and database host, the upper surface of described guard shield is installed with liquid crystal touch screen and operation Button, and operation button be embedded in below liquid crystal touch screen, the internally installed of described guard shield has main control chip, described master control Chip connects has communication module, independent current source and fingerprint capturer, described fingerprint capturer to be arranged on the upper surface of guard shield, Described communication module includes network adapter and switch, and wherein network adapter is connected with main control chip, and switch is defeated Going out end and be provided with RJ45 interface, RJ45 interface is connected to database host, the network adapter of described communication module by netting twine Being also associated with monitor, described monitor is connected to main control chip, and described main control chip is also associated with alarm module and backup is deposited Reservoir.
As a kind of preferably technical scheme of this utility model, described main control chip uses the ARM11 series of 32 to embed Formula processor, and between main control chip and independent current source, it is also associated with electrical switch.
As a kind of preferably technical scheme of this utility model, the side of described guard shield is also equipped with USB interface, and USB interface is connected to the digital independent end of main control chip.
As a kind of preferably technical scheme of this utility model, described alarm module includes buzzer and warning lamp, and alert Show that lamp is arranged on the surface of guard shield.
Compared with prior art, the beneficial effects of the utility model are: this data base's Hole Detection and anti-intrusion device, logical Cross and fingerprint capturer and backup of memory are set, set up identification system, the safeguard function of intensifier;It is real that monitor is set Time detection network data transmission, effectively stop illegal invasion;Alarm module and electrical switch are set, it is possible to timely automated warning is also Realization automatically powers off protection;Arrange liquid crystal touch screen make operation simpler and improve Man machine interaction;This apparatus structure Simply, it is possible to carry out identification checking, real-time detector data transmission state, effectively preventing and treating virus infects and illegal invasion, protects The safety of card data base is with stable.
Accompanying drawing explanation
Fig. 1 is this utility model electrical block diagram;
Fig. 2 is this utility model surface structure schematic diagram.
In figure: 1-guard shield;2-liquid crystal touch screen;3-operates button;4-backup of memory;5-main control chip;6-leads to Letter module;7-independent current source;8-fingerprint capturer;9-database host;10-network adapter;11-switch;12-RJ45 connects Mouthful;13-monitor;14-alarm module;15-electrical switch;16-USB interface;17-buzzer;18-warning lamp.
Detailed description of the invention
Below in conjunction with the accompanying drawing in this utility model embodiment, the technical scheme in this utility model embodiment is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of this utility model rather than whole Embodiment.Based on the embodiment in this utility model, those of ordinary skill in the art are not under making creative work premise The every other embodiment obtained, broadly falls into the scope of this utility model protection.
Embodiment:
Fig. 1 and Fig. 2, a kind of technical scheme of this utility model offer: a kind of data base's Hole Detection and anti-intrusion are provided Device, including guard shield 1 and database host 9, the upper surface of described guard shield 1 is installed with liquid crystal touch screen 2 He Operating button 3, and operation button 3 is embedded in below liquid crystal touch screen 2, described the internally installed of guard shield 1 has main control chip 5, described main control chip 5 connects communication module 6, independent current source 7 and fingerprint capturer 8, and described fingerprint capturer 8 is arranged on anti- Protecting the upper surface of shell 1, described communication module 6 includes network adapter 10 and switch 11, network adapter 10 and master control core Sheet 5 is connected, and the outfan of switch 11 is provided with RJ45 interface 12, and RJ45 interface 12 is connected to database host by netting twine 9, the network adapter 10 of described communication module 6 is also associated with monitor 13, and described monitor 13 is connected to main control chip 5, institute State main control chip 5 and be also associated with alarm module 14 and backup of memory 4;
Described main control chip 5 uses the ARM11 series flush bonding processor of 32, and main control chip 5 and independent current source 7 it Between be also associated with electrical switch 15;The side of described guard shield 1 is also equipped with usb 16, and usb 16 is connected to main The digital independent end of control chip 5;Described alarm module 14 includes buzzer 17 and warning lamp 18, and warning lamp 18 is arranged on protection The surface of shell 1.
Operation principle of the present utility model: described guard shield 1 is integrated together for detection is protected each unit module, Described liquid crystal touch screen 2 can show that current operating state also can directly carry out manual mode operation order input;Described operation button 3 is used In turning on the power, mode of operation is set;Described main control chip 5 for test access information and carries out associative operation: main control chip 5 By usb 16 direct read/write data or access information can be received from liquid crystal touch screen 2, when main control chip 5 receives visiting After asking request, first have to carry out fingerprint individual verification, i.e. gather current visitor by the fingerprint capturer 8 on guard shield 1 Finger print information, the finger print information that the finger print information collected and backup of memory 4 pre-set is compared by main control chip 5 Right, if met, then carry out next step operation, otherwise will trigger alarm module 14, and close electrical switch 15 and cut off independent electrical Source 7 quits work;If by fingerprint authentication, then main control chip 5 sends access request by communication module 6 to database host 9, Whole device is connected to existing communication network by network adapter 10, then the data transmitted and received by switch 11 docking are carried out Unpacking and packing processes, data are transmitted by netting twine from RJ45 interface 12 between database host 9 and main control chip 5;Described Monitor 13 continues to carry out packet capturing analysis from communication module 6, it is judged that data circulation is the most normal, once occurs that data traffic is abnormal Or illegal invasion person being detected, trigger alarm module 14 the most immediately, buzzer 17 sends audio alarm, and warning lamp 18 starts to dodge Bright, and cut off electrical switch 15, lock whole device.
This data base's Hole Detection and anti-intrusion device, by arranging fingerprint capturer 8 and backup of memory 4, set up body Part identifies system, the safeguard function of intensifier;Arranging monitor 13 and detect network data transmission in real time, effective prevention illegally enters Invade;Alarm module 14 and electrical switch 15 are set, it is possible to timely automated warning realization automatically power off protection;Lcd touch is set Screen 2 makes operation simpler and improves Man machine interaction;This apparatus structure is simple, it is possible to carry out identification checking, real Time detection data transmission state, effectively preventing and treating virus infects and illegal invasion, it is ensured that the safety of data base and stable.
The foregoing is only preferred embodiment of the present utility model, not in order to limit this utility model, all at this Any amendment, equivalent and the improvement etc. made within the spirit of utility model and principle, should be included in this utility model Protection domain within.

Claims (4)

1. data base's Hole Detection and an anti-intrusion device, including guard shield (1) and database host (9), described protection The upper surface of shell (1) is installed with liquid crystal touch screen (2) and operation button (3), and operation button (3) is embedded in liquid crystal and touches Touch screen (2) lower section, it is characterised in that: the internally installed of described guard shield (1) has main control chip (5), described main control chip (5) Connecting and have communication module (6), independent current source (7) and fingerprint capturer (8), described fingerprint capturer (8) is arranged on guard shield (1) upper surface, described communication module (6) includes network adapter (10) and switch (11), wherein network adapter (10) Being connected with main control chip (5), and the outfan of switch (11) is provided with RJ45 interface (12), RJ45 interface (12) passes through netting twine Being connected to database host (9), the network adapter (10) of described communication module (6) is also associated with monitor (13), described prison Surveying device (13) and be connected to main control chip (5), described main control chip (5) is also associated with alarm module (14) and backup of memory (4).
A kind of data base's Hole Detection the most according to claim 1 and anti-intrusion device, it is characterised in that: described master control core Sheet (5) uses the ARM11 series flush bonding processor of 32, and is also associated with electricity between main control chip (5) and independent current source (7) Son switch (15).
A kind of data base's Hole Detection the most according to claim 1 and anti-intrusion device, it is characterised in that: outside described protection The side of shell (1) is also equipped with USB interface (16), and USB interface (16) is connected to the digital independent end of main control chip (5).
A kind of data base's Hole Detection the most according to claim 1 and anti-intrusion device, it is characterised in that: described warning mould Block (14) includes buzzer (17) and warning lamp (18), and warning lamp (18) is arranged on the surface of guard shield (1).
CN201620611381.1U 2016-06-21 2016-06-21 A kind of data base's Hole Detection and anti-intrusion device Active CN205862329U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620611381.1U CN205862329U (en) 2016-06-21 2016-06-21 A kind of data base's Hole Detection and anti-intrusion device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620611381.1U CN205862329U (en) 2016-06-21 2016-06-21 A kind of data base's Hole Detection and anti-intrusion device

Publications (1)

Publication Number Publication Date
CN205862329U true CN205862329U (en) 2017-01-04

Family

ID=57637358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620611381.1U Active CN205862329U (en) 2016-06-21 2016-06-21 A kind of data base's Hole Detection and anti-intrusion device

Country Status (1)

Country Link
CN (1) CN205862329U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881321A (en) * 2018-09-12 2018-11-23 吴江市聚盈电子材料科技有限公司 A kind of network security detection device being able to achieve verifying
CN112364396A (en) * 2020-10-29 2021-02-12 广东电网有限责任公司 Protection network panel and control method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881321A (en) * 2018-09-12 2018-11-23 吴江市聚盈电子材料科技有限公司 A kind of network security detection device being able to achieve verifying
CN112364396A (en) * 2020-10-29 2021-02-12 广东电网有限责任公司 Protection network panel and control method thereof

Similar Documents

Publication Publication Date Title
CN101520833B (en) Anti-data-leakage system and method based on virtual machine
CN105573291B (en) A kind of threat detection method and safety device based on key parameter fusion verification
CN205681457U (en) A kind of data safety network gateway equipment with inherently safe defense function
CN107944302A (en) A kind of security of computer software guard system
CN205862329U (en) A kind of data base's Hole Detection and anti-intrusion device
CN105825599B (en) A kind of multiple-protection system, method and the POS machine of the anti-intrusion of POS machine
CN110188013A (en) A kind of log read-write capability test method, device and electronic equipment and storage medium
CN106327652A (en) System and method for protecting electronic intelligent door locks and fingerprint locks
CN107231360A (en) Network virus protection method, safe wireless router and system based on cloud network
CN107918336A (en) Anti-theft electricity meter box and ammeter box monitoring system
CN105094070B (en) The operation monitoring system and its operating method of passive outdoor equipment
CN103036998A (en) Intrusion detection system based on immune principle in cloud computing
CN107885994A (en) A kind of method, system for detecting operating system security
CN107277070A (en) A kind of computer network instrument system of defense and intrusion prevention method
CN107944268A (en) A kind of host security defense method for HID keyboard attacks
CN106850645A (en) A kind of system and method for detecting invalid access to computer network
CN106407836A (en) Method and device for automatically detecting illegal data modification behavior
CN102514988A (en) Ultrahigh frequency elevator remote control system
CN106254163B (en) Monitor the method and device of the USB port of computer in local area network
CN108924129A (en) One kind being based on computer network instrument system of defense and intrusion prevention method
CN107229869A (en) Secure user data is locked
CN104318187B (en) The guard method of intelligent terminal interactive information based on capacitance detecting and system
CN112784274A (en) Linux platform based malicious sample detection and collection method and system, storage medium and equipment
CN103246845B (en) A kind of Intelligent type wireless terminal safety protection method and device
CN111859473A (en) External terminal protection equipment and protection system based on space detection

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant