CN206162540U - Intelligent computer network safety isolation device - Google Patents

Intelligent computer network safety isolation device Download PDF

Info

Publication number
CN206162540U
CN206162540U CN201621049485.4U CN201621049485U CN206162540U CN 206162540 U CN206162540 U CN 206162540U CN 201621049485 U CN201621049485 U CN 201621049485U CN 206162540 U CN206162540 U CN 206162540U
Authority
CN
China
Prior art keywords
input
output end
electrically connects
processor
computer network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201621049485.4U
Other languages
Chinese (zh)
Inventor
王树军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201621049485.4U priority Critical patent/CN206162540U/en
Application granted granted Critical
Publication of CN206162540U publication Critical patent/CN206162540U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses an intelligent computer network safety isolation device, including external network card and treater, the output of ethernet controller is connected to the input of external network card electricity to the output of safe encryption equipment is connected to the input electricity of netting very much the controller, and just external network card is connected with the two -way electricity of isolator, and isolator prevents the two -way electricity of hot wall with hardware and be connected that hot wall's output electricity connect the processor's input is prevented to hardware. This intelligent computer network safety isolation device use to encrypt the hard disk to user's information encryption, and the operational information that receives the treater through computer operation record appearance carries out the record, if take notes and encrypt the hard disk and suffer the invasion, the disconnection of control isolator is protected user info, is equipped with online authority verification device, can confirm that the security measure is perfectd effectively through iris, fingerprint and password to the user, if verify not through break off isolator, keeps apart effectual, the security height.

Description

A kind of intelligent type computer network safety isolator
Technical field
The utility model is related to computer network security technology field, specially a kind of intelligent type computer network security every From device.
Background technology
With developing rapidly for social economy, computer becomes people's work and the necessary article in life, causes computer Network size constantly expanding, therefore, the problem of computer information safe is highlighted.In computer network security protection question On, the technology for adopting at present is a lot, and one is, using isolation card technique, to select different two pieces hard with system software controls isolation card Disk;Two is that computer adopts two kinds of different operating systems, and two pieces of hard disks are controlled respectively;Three is into difference one piece of hard disk partition Two workspaces, be controlled with two kinds of different operating systems;Four is to adopt duplex computer, a networking, and one does not connect Net;Five is to adopt connected with network cable when surfing the Net, and no matter above-mentioned using which type of skill netting twine is disconnected method when not surfing the Net etc. is , all there is an identical in art hand method, be exactly either to store the hard disk of security information, or store unclassified information Hard disk all power up work at the same time, this just steals from network user profile there is provided condition to " network hacker ".
Utility model content
The technical problems to be solved in the utility model is to overcome existing defect, there is provided a kind of intelligent type computer network peace Full isolating device, using various ways the safety of user's hard disk information is ensured, safe, can be with effectively solving background technology Problem.
For achieving the above object, the utility model provides following technical scheme:A kind of intelligent type computer network security every From device, including external network interface card and processor, the output end of the input electrical connection ethernet controller of the external network interface card, with Too the input of net controller electrically connects the output end of safe encryption equipment, and external network interface card is two-way with disconnecting switch electrically connects, every Leave that pass is two-way with hardware firewall to be electrically connected, the input of the output end of hardware firewall electrical connection processor is described Hard disk is two-way electrically connects with encryption for processor, and processor is also two-way with computer operation recorder electrically connects, the processor Output end electrical connection access authority verify the input of device, the output end electrical connection hardware of access authority checking device The input of fire wall.
As a kind of optimal technical scheme of the present utility model, the access authority checking device include iris scanner, Fingerprint Identification Unit and PIN PAD, the output end electrical connection number of the iris scanner, Fingerprint Identification Unit and PIN PAD According to the input of comparing module, the input of comparing module also respectively with iris data memory, finger print data memory Electrically connect with the output end of code data memory, the output end of comparing module electrically connects the input of access control device, The output end of the access control device electrically connects the input of Authority Verification module.
As a kind of optimal technical scheme of the present utility model, the computer operation recorder and Authority Verification module Output end electrically connects the input of disconnecting switch.
Used as a kind of optimal technical scheme of the present utility model, the output end of the processor electrically connects the defeated of warning device Enter end, warning device is the one kind in flash lamp, buzzer.
As a kind of optimal technical scheme of the present utility model, the output end electrical connection server isolation of the external network interface card The input of device.
Compared with prior art, the beneficial effects of the utility model are:This intelligent type computer network safety isolator, The information of user is encrypted using encryption hard disk, the operation information that processor is received is remembered by computer operation recorder Record, if recorded encryption hard disk invaded, control disconnecting switch disconnects, and user profile is protected, and is provided with online power Limit checking device, can confirm, security implementations improve effective, if checking is not by iris, fingerprint and password to user By then disconnecting disconnecting switch, isolation effect is good, and intelligence degree is high, safe.
Description of the drawings
Fig. 1 is the utility model principle schematic.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made The every other embodiment for being obtained, belongs to the scope of the utility model protection.
Fig. 1 is referred to, the utility model provides a kind of technical scheme:A kind of intelligent type computer network security isolation dress Put, including external network interface card and processor, the output end of the input electrical connection ethernet controller of external network interface card, Ethernet control The input of device electrically connects the output end of safe encryption equipment, and every time networking can generate different keys to safe encryption equipment, so as to Prevent the leakage of key, the input of the output end electrical connection server isolator of external network interface card, and external network interface card and keep apart Two-way electrical connection is closed, disconnecting switch is two-way with hardware firewall to be electrically connected, and hardware firewall can tentatively prevent the leakage of information, The output end of hardware firewall electrically connects the input of processor, processor with encrypt that hard disk is two-way to be electrically connected, processor can be with Recall or write information in encryption hard disk, encryption hard disk can be encrypted to information, and processor is also remembered with computer operation The two-way electrical connection of record instrument, computer operation recorder is recorded to the operation information that processor is received, the output end of processor Electrical connection access authority verifies the input of device, and processor networking needs the checking that device is verified by access authority, online The output end of Authority Verification device electrically connects the input of hardware firewall, access authority checking device include iris scanner, Fingerprint Identification Unit and PIN PAD, can respectively gather iris feature, fingerprint characteristic and the password of user, iris scan The output end of instrument, Fingerprint Identification Unit and PIN PAD electrically connects the input of comparing module, comparing module it is defeated Enter end also to electrically connect with the output end of iris data memory, finger print data memory and code data memory respectively, pass through Comparing module to the information that three kinds of information of input are stored originally with three kinds of memories is compared, comparing module Output end electrically connects the input of access control device, and the output end of access control device electrically connects the input of Authority Verification module, The output end of computer operation recorder and Authority Verification module electrically connects the input of disconnecting switch, computer operation recorder If recorded encryption hard disk invaded, control disconnecting switch disconnect, user profile is protected, can by iris, Fingerprint and password confirm that disconnecting switch is not disconnected by if if checking, and security implementations improve effective, isolation effect to user Really good, intelligence degree is high, safe, and the output end of processor electrically connects the input of warning device, and warning device is sudden strain of a muscle One kind in light lamp, buzzer, can control warning device and report to the police, to user while disconnecting switch is disconnected by processor Reminded.
When in use:Verify that device is protected to user profile by computer operation recorder and access authority, such as Fruit finds that encryption hard disk is invaded or user profile checking does not pass through, and control disconnecting switch disconnects, so that network connection Disconnect, it is ensured that the information security of user.
The utility model, is encrypted, by computer operation recorder to processor using encryption hard disk to the information of user The operation information of reception recorded, if recorded encryption hard disk invaded, control disconnecting switch disconnects, and user is believed Breath is protected, and is provided with access authority checking device, can confirm that security is arranged to user by iris, fingerprint and password Apply and improve effective, disconnecting switch is not disconnected by if if checking, isolation effect is good, and intelligence degree is high, safe.
While there has been shown and described that embodiment of the present utility model, for the ordinary skill in the art, It is appreciated that these embodiments can be carried out various changes in the case of without departing from principle of the present utility model and spirit, repaiies Change, replace and modification, scope of the present utility model is defined by the appended claims and the equivalents thereof.

Claims (5)

1. a kind of intelligent type computer network safety isolator, including external network interface card and processor, it is characterised in that:It is described outer The input for connecing network interface card electrically connects the output end of ethernet controller, and the input of ethernet controller electrically connects safe encryption equipment Output end, and external network interface card is two-way with disconnecting switch electrically connects, and disconnecting switch is two-way with hardware firewall to be electrically connected, described hard The output end of part fire wall electrically connects the input of processor, the processor with encrypt that hard disk is two-way to be electrically connected, and processor Also two-way with computer operation recorder to electrically connect, the output end electrical connection access authority of the processor verifies the input of device End, the output end of the access authority checking device electrically connects the input of hardware firewall.
2. a kind of intelligent type computer network safety isolator according to claim 1, it is characterised in that:The online Authority Verification device include iris scanner, Fingerprint Identification Unit and PIN PAD, the iris scanner, Fingerprint Identification Unit and The output end of PIN PAD electrically connects the input of comparing module, the input of comparing module also respectively with iris The output end electrical connection of data storage, finger print data memory and code data memory, the output end of comparing module The input of electrical connection access control device, the output end of the access control device electrically connects the input of Authority Verification module.
3. a kind of intelligent type computer network safety isolator according to claim 1 and 2, it is characterised in that:It is described The output end of computer operation recorder and Authority Verification module electrically connects the input of disconnecting switch.
4. a kind of intelligent type computer network safety isolator according to claim 1, it is characterised in that:The process The output end of device electrically connects the input of warning device, and warning device is the one kind in flash lamp, buzzer.
5. a kind of intelligent type computer network safety isolator according to claim 1, it is characterised in that:It is described external The output end of network interface card electrically connects the input of server isolator.
CN201621049485.4U 2016-08-31 2016-08-31 Intelligent computer network safety isolation device Expired - Fee Related CN206162540U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621049485.4U CN206162540U (en) 2016-08-31 2016-08-31 Intelligent computer network safety isolation device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621049485.4U CN206162540U (en) 2016-08-31 2016-08-31 Intelligent computer network safety isolation device

Publications (1)

Publication Number Publication Date
CN206162540U true CN206162540U (en) 2017-05-10

Family

ID=58651470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621049485.4U Expired - Fee Related CN206162540U (en) 2016-08-31 2016-08-31 Intelligent computer network safety isolation device

Country Status (1)

Country Link
CN (1) CN206162540U (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273062A (en) * 2017-07-12 2017-10-20 重庆工业职业技术学院 A kind of computer digital animation module
CN108182353A (en) * 2018-01-29 2018-06-19 河南中医药大学 A kind of computer network security shielding system
CN108667724A (en) * 2018-03-30 2018-10-16 苏州诺登德智能科技有限公司 A kind of safety type gateway apparatus
CN111263358A (en) * 2020-01-20 2020-06-09 河南经贸职业学院 Computer data safety protection system based on computer network
CN111464551A (en) * 2020-04-10 2020-07-28 广东电网有限责任公司惠州供电局 Network security analysis system
CN111884999A (en) * 2020-06-18 2020-11-03 肖贻富 Method and system for preventing information in intelligent home of safety monitoring system from being leaked
CN112836246A (en) * 2021-02-09 2021-05-25 无锡云动科技发展有限公司 Multi-network isolation cloud desktop connection system based on fingerprint identification

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273062A (en) * 2017-07-12 2017-10-20 重庆工业职业技术学院 A kind of computer digital animation module
CN108182353A (en) * 2018-01-29 2018-06-19 河南中医药大学 A kind of computer network security shielding system
CN108667724A (en) * 2018-03-30 2018-10-16 苏州诺登德智能科技有限公司 A kind of safety type gateway apparatus
CN108667724B (en) * 2018-03-30 2020-09-22 苏州诺登德智能科技有限公司 Safe gateway device
CN111263358A (en) * 2020-01-20 2020-06-09 河南经贸职业学院 Computer data safety protection system based on computer network
CN111464551A (en) * 2020-04-10 2020-07-28 广东电网有限责任公司惠州供电局 Network security analysis system
CN111884999A (en) * 2020-06-18 2020-11-03 肖贻富 Method and system for preventing information in intelligent home of safety monitoring system from being leaked
CN112836246A (en) * 2021-02-09 2021-05-25 无锡云动科技发展有限公司 Multi-network isolation cloud desktop connection system based on fingerprint identification

Similar Documents

Publication Publication Date Title
CN206162540U (en) Intelligent computer network safety isolation device
CN105027498B (en) A kind of method and its system and device by remotely separating and assembling data file realization secure storage
CN103310169B (en) A kind of method protecting SD card data and protection system
CN103559435B (en) The debugging port controlling method and apparatus of terminal device
CN107888609A (en) A kind of information security of computer network system
CN104581008B (en) A kind of video monitoring system information security protection system and method
CN202694329U (en) Wireless storage equipment
AU2012318937A1 (en) Secure integrated cyberspace security and situational awareness system
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
CN205681457U (en) A kind of data safety network gateway equipment with inherently safe defense function
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN110298196A (en) A kind of electronic information security storage system and storage method
CN206039532U (en) Computer USB peripheral hardware safety discernment filter
CN107944307B (en) Computer safety protection management system
CN105208045A (en) Identity authentication method, equipment and system
CN110650151A (en) Computer network safety remote monitoring device
CN104955043B (en) A kind of intelligent terminal security protection system
CN112637172A (en) Novel data security and confidentiality method
CN206470760U (en) A kind of computer network security control device
CN105095780B (en) The access method and device of test port in a kind of chip
CN112000953A (en) Big data terminal safety protection system
CN106027253A (en) Access frequency management and control device for identity card authentication information
CN111898105A (en) External terminal protection equipment with user tracing function and protection system
CN105550602A (en) Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method
CN206594672U (en) Highly reliable encryption antivirus flash disk

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170510

Termination date: 20170831