CN206042041U - Computer network safety coefficient - Google Patents
Computer network safety coefficient Download PDFInfo
- Publication number
- CN206042041U CN206042041U CN201620716680.1U CN201620716680U CN206042041U CN 206042041 U CN206042041 U CN 206042041U CN 201620716680 U CN201620716680 U CN 201620716680U CN 206042041 U CN206042041 U CN 206042041U
- Authority
- CN
- China
- Prior art keywords
- module
- hard
- data
- primary
- processing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model relates to a computer network safety coefficient, include: first, second processor module, primary hard drive and reserve hard disk, and primary hard drive and reserve hard disk carry out data communication through two -way data pin with the computer respectively, and still include: a network data monitoring module for monitoring whether outer net IP visits local data for carry out the hard disk data monitoring module that hard disk reading and writing switching was monitored to primary hard drive or reserve hard disk, the first processor module is suitable for the corresponding outer net IP who detects the hard disk data monitoring module to send the monitoring module to network data to the reading and writing action of primary hard drive or reserve hard disk, the network data monitoring module regards as malicious IP address to save this outer net IP to shield this IP address.
Description
Technical field
This utility model is related to technical field of the computer network, and in particular to a kind of Computer Network Security System.
Background technology
With the development of computer network, also come more to be taken seriously with regard to the safety issue of computerized information, the network information
Steal, information attack, virus disseminating etc. all exist all the time and occur.On computer network security protection question, mesh
The technology of front employing is a lot, and for example with isolation technology, the data channel of control two pieces of hard disks of switching, to reach security protection
Purpose, the method exist problem be:If the processor module for being responsible for data channel switching is not responded, can cause to isolate
Computer Primary Hard Drive, causes data illegally to be read or write.
The content of the invention
The purpose of this utility model is to provide a kind of Computer Network Security System, when malicious attack is tackled, IP is entered
Row record, and shielded, prevent the IP and aggressive behavior has occurred again.
In order to solve above-mentioned technical problem, this utility model provides a kind of Computer Network Security System, including:The
First, second processing device module, Primary Hard Drive and alternate hard, and Primary Hard Drive passes through bi-directional data plug and meter respectively with alternate hard
Calculation machine carries out data communication, and also includes:Whether the Network Data Control module of local data is accessed for monitoring outer net IP,
For carrying out the hard disc data monitoring module of disk read-write switching monitoring to Primary Hard Drive or alternate hard;The first processor mould
The corresponding outer net IP that block is suitable to detect hard disc data monitoring module is sent for the read-write behavior of Primary Hard Drive or alternate hard
To Network Data Control module, outer net IP is stored by the Network Data Control module as malicious IP addresses, with right
The IP address is shielded.
Further, the hard disc data monitoring module is also connected with second processing device module, the first processor module
The data channel of Primary Hard Drive and alternate hard is switched by switching value output module;Operation is written and read to Primary Hard Drive in outer net IP
When, if data channel is not switched to alternate hard by first processor module, the second processing device module passes through electronic cutting
The power supply of disconnected two hard disks deeply concerned.
Further, the second processing device module is also connected with clock chip, so that second processing device module is in setting
Between reach after, close electrical switch.
The beneficial effects of the utility model are that Computer Network Security System of the present utility model can be processed by first
Device module accesses switching between Primary Hard Drive and alternate hard, and for the IP with malicious attack property is recorded and shielded
Cover, it is to avoid above-mentioned IP repeat attacks again, if second processing device module judges that first processor module cannot realize data channel
Switching, then actively disconnect the power supply of first processor module, make Primary Hard Drive completely isolated.
Description of the drawings
With reference to the accompanying drawings and examples this utility model is further illustrated.
Fig. 1 is the theory diagram of Computer Network Security System of the present utility model.
Specific embodiment
This utility model is described in further detail presently in connection with accompanying drawing.These accompanying drawings are simplified schematic diagram,
Basic structure of the present utility model is only illustrated in a schematic way, therefore which only shows the composition relevant with this utility model.
As shown in figure 1, a kind of Computer Network Security System of the present utility model, including:First, second processor die
Block, Primary Hard Drive and alternate hard, and Primary Hard Drive and alternate hard to carry out data by bi-directional data plug and computer respectively logical
News, and also include:Whether access the Network Data Control module of local data for monitoring outer net IP, for Primary Hard Drive or
Alternate hard carries out the hard disc data monitoring module of disk read-write switching monitoring;The first processor module is suitable to hard disk number
Send to Network Data Control for the read-write behavior of Primary Hard Drive or alternate hard according to the corresponding outer net IP that monitoring module is detected
Outer net IP is stored by module, the Network Data Control module as malicious IP addresses, to shield to the IP address
Cover.
Specifically, the Network Data Control module is suitable to include sub-module stored, to store to malicious IP addresses.
Further, the hard disc data monitoring module is also connected with second processing device module, the first processor module
The data channel of Primary Hard Drive and alternate hard is switched by switching value output module;Operation is written and read to Primary Hard Drive in outer net IP
When, if data channel is not switched to alternate hard by first processor module, the second processing device module passes through electronic cutting
The power supply of disconnected two hard disks deeply concerned, to ensure Primary Hard Drive data safety.Can also be by second processing device module at first
Reason device module sends handshake, if now first processor module is not responded, by disconnecting electrical switch, cuts off two hard disks
Power supply.
The second processing device module is also connected with clock chip, so that second processing device module is reached in setting time
Afterwards, close electrical switch.
Wherein, first, second processor module is suitable for use with STC series monolithics or embedded chip.
The second processing device module is also associated with alarm module, when the control electrical switch cut-out of second processing device module is supplied
After power supply, warning is sent to manager by alarm module.
With it is above-mentioned according to desirable embodiment of the present utility model as enlightenment, by above-mentioned description, related work people
Member can carry out various change and modification completely in the range of without departing from this utility model technological thought.This reality
The content being not limited to new technical scope in description, it is necessary to determine its technology according to right
Property scope.
Claims (1)
1. a kind of Computer Network Security System, it is characterised in that include:First, second processor module, Primary Hard Drive and standby
Hard disk, and Primary Hard Drive carries out data communication by bi-directional data plug and computer respectively with alternate hard, and also include:With
Whether the Network Data Control module of local data is accessed in monitoring outer net IP, for carrying out hard disk to Primary Hard Drive or alternate hard
The hard disc data monitoring module of read-write switching monitoring;
The corresponding outer net IP that the first processor module is suitable to detect hard disc data monitoring module is directed to Primary Hard Drive or standby
Sent to Network Data Control module with the read-write behavior of hard disk, the Network Data Control module is using outer net IP as malice
IP address is stored, to shield to the IP address;
The hard disc data monitoring module is also connected with second processing device module, and the first processor module is defeated by switching value
Go out the data channel of module switching Primary Hard Drive and alternate hard;
When outer net IP is written and read operation to Primary Hard Drive, if data channel is not switched to alternate hard by first processor module
When, the second processing device module cuts off the power supply of two hard disks by electrical switch;
The second processing device module is also connected with clock chip, so that second processing device module is made after setting time arrival
Electrical switch is closed;
The second processing device module is also associated with alarm module, when second processing device module control electrical switch cut-out power supply electricity
Behind source, warning is sent to manager by alarm module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620716680.1U CN206042041U (en) | 2016-07-08 | 2016-07-08 | Computer network safety coefficient |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620716680.1U CN206042041U (en) | 2016-07-08 | 2016-07-08 | Computer network safety coefficient |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206042041U true CN206042041U (en) | 2017-03-22 |
Family
ID=58310352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620716680.1U Expired - Fee Related CN206042041U (en) | 2016-07-08 | 2016-07-08 | Computer network safety coefficient |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206042041U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111523100A (en) * | 2020-04-20 | 2020-08-11 | 宝鸡文理学院 | Platform architecture based on big data of computer |
-
2016
- 2016-07-08 CN CN201620716680.1U patent/CN206042041U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111523100A (en) * | 2020-04-20 | 2020-08-11 | 宝鸡文理学院 | Platform architecture based on big data of computer |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206162540U (en) | Intelligent computer network safety isolation device | |
CN103218575A (en) | Host file security monitoring method | |
CN106502814B (en) | Method and device for recording error information of PCIE (peripheral component interface express) equipment | |
CN101877246A (en) | U disk encryption method | |
CN105825599B (en) | A kind of multiple-protection system, method and the POS machine of the anti-intrusion of POS machine | |
CN108183901B (en) | FPGA-based host security protection physical card and data processing method thereof | |
CN101458667B (en) | Electronic apparatus with electronic security level identification, information exchange flow control system based on electronic security level identification, method and mobile memory | |
CN206042041U (en) | Computer network safety coefficient | |
JP2015052950A (en) | Data storage device, secure io device | |
CN106203130B (en) | A kind of transparent encipher-decipher method based on Intelligent Dynamic driving layer | |
JP2015052951A (en) | Security strengthening device | |
CN106951790B (en) | USB storage medium transparent encryption method | |
CN202110552U (en) | Software protection device based on multi-body interleaved storage technology | |
CN105022335A (en) | Method and device for filtering link command of PLC upper computer based on RS232 communication protocol | |
CN201608722U (en) | Secure physical isolation device for network | |
CN102662873A (en) | Device for realizing insulation blocking of storage carrier data | |
CN205123779U (en) | Support card to carry USB storage device's network security isolating device | |
CN205847318U (en) | A kind of network security controller with self-checking function | |
CN102034040A (en) | Log implementation method in encryption card | |
CN108509319A (en) | A kind of computer safety system and its method | |
CN104883340A (en) | Method for preventing invasions and access equipment | |
CN205003683U (en) | Automatic control device for computer network | |
CN107632782A (en) | A kind of BMC code protection methods and device based on ARM whole machine cabinet server nodes | |
CN206594672U (en) | Highly reliable encryption antivirus flash disk | |
CN210091171U (en) | Security computer based on domestic Loongson processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170322 Termination date: 20190708 |
|
CF01 | Termination of patent right due to non-payment of annual fee |