CN206162540U - Intelligent computer network safety isolation device - Google Patents
Intelligent computer network safety isolation device Download PDFInfo
- Publication number
- CN206162540U CN206162540U CN201621049485.4U CN201621049485U CN206162540U CN 206162540 U CN206162540 U CN 206162540U CN 201621049485 U CN201621049485 U CN 201621049485U CN 206162540 U CN206162540 U CN 206162540U
- Authority
- CN
- China
- Prior art keywords
- input
- output end
- electrically connects
- processor
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The utility model discloses an intelligent computer network safety isolation device, including external network card and treater, the output of ethernet controller is connected to the input of external network card electricity to the output of safe encryption equipment is connected to the input electricity of netting very much the controller, and just external network card is connected with the two -way electricity of isolator, and isolator prevents the two -way electricity of hot wall with hardware and be connected that hot wall's output electricity connect the processor's input is prevented to hardware. This intelligent computer network safety isolation device use to encrypt the hard disk to user's information encryption, and the operational information that receives the treater through computer operation record appearance carries out the record, if take notes and encrypt the hard disk and suffer the invasion, the disconnection of control isolator is protected user info, is equipped with online authority verification device, can confirm that the security measure is perfectd effectively through iris, fingerprint and password to the user, if verify not through break off isolator, keeps apart effectual, the security height.
Description
Technical field
The utility model is related to computer network security technology field, specially a kind of intelligent type computer network security every
From device.
Background technology
With developing rapidly for social economy, computer becomes people's work and the necessary article in life, causes computer
Network size constantly expanding, therefore, the problem of computer information safe is highlighted.In computer network security protection question
On, the technology for adopting at present is a lot, and one is, using isolation card technique, to select different two pieces hard with system software controls isolation card
Disk;Two is that computer adopts two kinds of different operating systems, and two pieces of hard disks are controlled respectively;Three is into difference one piece of hard disk partition
Two workspaces, be controlled with two kinds of different operating systems;Four is to adopt duplex computer, a networking, and one does not connect
Net;Five is to adopt connected with network cable when surfing the Net, and no matter above-mentioned using which type of skill netting twine is disconnected method when not surfing the Net etc. is
, all there is an identical in art hand method, be exactly either to store the hard disk of security information, or store unclassified information
Hard disk all power up work at the same time, this just steals from network user profile there is provided condition to " network hacker ".
Utility model content
The technical problems to be solved in the utility model is to overcome existing defect, there is provided a kind of intelligent type computer network peace
Full isolating device, using various ways the safety of user's hard disk information is ensured, safe, can be with effectively solving background technology
Problem.
For achieving the above object, the utility model provides following technical scheme:A kind of intelligent type computer network security every
From device, including external network interface card and processor, the output end of the input electrical connection ethernet controller of the external network interface card, with
Too the input of net controller electrically connects the output end of safe encryption equipment, and external network interface card is two-way with disconnecting switch electrically connects, every
Leave that pass is two-way with hardware firewall to be electrically connected, the input of the output end of hardware firewall electrical connection processor is described
Hard disk is two-way electrically connects with encryption for processor, and processor is also two-way with computer operation recorder electrically connects, the processor
Output end electrical connection access authority verify the input of device, the output end electrical connection hardware of access authority checking device
The input of fire wall.
As a kind of optimal technical scheme of the present utility model, the access authority checking device include iris scanner,
Fingerprint Identification Unit and PIN PAD, the output end electrical connection number of the iris scanner, Fingerprint Identification Unit and PIN PAD
According to the input of comparing module, the input of comparing module also respectively with iris data memory, finger print data memory
Electrically connect with the output end of code data memory, the output end of comparing module electrically connects the input of access control device,
The output end of the access control device electrically connects the input of Authority Verification module.
As a kind of optimal technical scheme of the present utility model, the computer operation recorder and Authority Verification module
Output end electrically connects the input of disconnecting switch.
Used as a kind of optimal technical scheme of the present utility model, the output end of the processor electrically connects the defeated of warning device
Enter end, warning device is the one kind in flash lamp, buzzer.
As a kind of optimal technical scheme of the present utility model, the output end electrical connection server isolation of the external network interface card
The input of device.
Compared with prior art, the beneficial effects of the utility model are:This intelligent type computer network safety isolator,
The information of user is encrypted using encryption hard disk, the operation information that processor is received is remembered by computer operation recorder
Record, if recorded encryption hard disk invaded, control disconnecting switch disconnects, and user profile is protected, and is provided with online power
Limit checking device, can confirm, security implementations improve effective, if checking is not by iris, fingerprint and password to user
By then disconnecting disconnecting switch, isolation effect is good, and intelligence degree is high, safe.
Description of the drawings
Fig. 1 is the utility model principle schematic.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole
Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made
The every other embodiment for being obtained, belongs to the scope of the utility model protection.
Fig. 1 is referred to, the utility model provides a kind of technical scheme:A kind of intelligent type computer network security isolation dress
Put, including external network interface card and processor, the output end of the input electrical connection ethernet controller of external network interface card, Ethernet control
The input of device electrically connects the output end of safe encryption equipment, and every time networking can generate different keys to safe encryption equipment, so as to
Prevent the leakage of key, the input of the output end electrical connection server isolator of external network interface card, and external network interface card and keep apart
Two-way electrical connection is closed, disconnecting switch is two-way with hardware firewall to be electrically connected, and hardware firewall can tentatively prevent the leakage of information,
The output end of hardware firewall electrically connects the input of processor, processor with encrypt that hard disk is two-way to be electrically connected, processor can be with
Recall or write information in encryption hard disk, encryption hard disk can be encrypted to information, and processor is also remembered with computer operation
The two-way electrical connection of record instrument, computer operation recorder is recorded to the operation information that processor is received, the output end of processor
Electrical connection access authority verifies the input of device, and processor networking needs the checking that device is verified by access authority, online
The output end of Authority Verification device electrically connects the input of hardware firewall, access authority checking device include iris scanner,
Fingerprint Identification Unit and PIN PAD, can respectively gather iris feature, fingerprint characteristic and the password of user, iris scan
The output end of instrument, Fingerprint Identification Unit and PIN PAD electrically connects the input of comparing module, comparing module it is defeated
Enter end also to electrically connect with the output end of iris data memory, finger print data memory and code data memory respectively, pass through
Comparing module to the information that three kinds of information of input are stored originally with three kinds of memories is compared, comparing module
Output end electrically connects the input of access control device, and the output end of access control device electrically connects the input of Authority Verification module,
The output end of computer operation recorder and Authority Verification module electrically connects the input of disconnecting switch, computer operation recorder
If recorded encryption hard disk invaded, control disconnecting switch disconnect, user profile is protected, can by iris,
Fingerprint and password confirm that disconnecting switch is not disconnected by if if checking, and security implementations improve effective, isolation effect to user
Really good, intelligence degree is high, safe, and the output end of processor electrically connects the input of warning device, and warning device is sudden strain of a muscle
One kind in light lamp, buzzer, can control warning device and report to the police, to user while disconnecting switch is disconnected by processor
Reminded.
When in use:Verify that device is protected to user profile by computer operation recorder and access authority, such as
Fruit finds that encryption hard disk is invaded or user profile checking does not pass through, and control disconnecting switch disconnects, so that network connection
Disconnect, it is ensured that the information security of user.
The utility model, is encrypted, by computer operation recorder to processor using encryption hard disk to the information of user
The operation information of reception recorded, if recorded encryption hard disk invaded, control disconnecting switch disconnects, and user is believed
Breath is protected, and is provided with access authority checking device, can confirm that security is arranged to user by iris, fingerprint and password
Apply and improve effective, disconnecting switch is not disconnected by if if checking, isolation effect is good, and intelligence degree is high, safe.
While there has been shown and described that embodiment of the present utility model, for the ordinary skill in the art,
It is appreciated that these embodiments can be carried out various changes in the case of without departing from principle of the present utility model and spirit, repaiies
Change, replace and modification, scope of the present utility model is defined by the appended claims and the equivalents thereof.
Claims (5)
1. a kind of intelligent type computer network safety isolator, including external network interface card and processor, it is characterised in that:It is described outer
The input for connecing network interface card electrically connects the output end of ethernet controller, and the input of ethernet controller electrically connects safe encryption equipment
Output end, and external network interface card is two-way with disconnecting switch electrically connects, and disconnecting switch is two-way with hardware firewall to be electrically connected, described hard
The output end of part fire wall electrically connects the input of processor, the processor with encrypt that hard disk is two-way to be electrically connected, and processor
Also two-way with computer operation recorder to electrically connect, the output end electrical connection access authority of the processor verifies the input of device
End, the output end of the access authority checking device electrically connects the input of hardware firewall.
2. a kind of intelligent type computer network safety isolator according to claim 1, it is characterised in that:The online
Authority Verification device include iris scanner, Fingerprint Identification Unit and PIN PAD, the iris scanner, Fingerprint Identification Unit and
The output end of PIN PAD electrically connects the input of comparing module, the input of comparing module also respectively with iris
The output end electrical connection of data storage, finger print data memory and code data memory, the output end of comparing module
The input of electrical connection access control device, the output end of the access control device electrically connects the input of Authority Verification module.
3. a kind of intelligent type computer network safety isolator according to claim 1 and 2, it is characterised in that:It is described
The output end of computer operation recorder and Authority Verification module electrically connects the input of disconnecting switch.
4. a kind of intelligent type computer network safety isolator according to claim 1, it is characterised in that:The process
The output end of device electrically connects the input of warning device, and warning device is the one kind in flash lamp, buzzer.
5. a kind of intelligent type computer network safety isolator according to claim 1, it is characterised in that:It is described external
The output end of network interface card electrically connects the input of server isolator.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621049485.4U CN206162540U (en) | 2016-08-31 | 2016-08-31 | Intelligent computer network safety isolation device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621049485.4U CN206162540U (en) | 2016-08-31 | 2016-08-31 | Intelligent computer network safety isolation device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206162540U true CN206162540U (en) | 2017-05-10 |
Family
ID=58651470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621049485.4U Expired - Fee Related CN206162540U (en) | 2016-08-31 | 2016-08-31 | Intelligent computer network safety isolation device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206162540U (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107273062A (en) * | 2017-07-12 | 2017-10-20 | 重庆工业职业技术学院 | A kind of computer digital animation module |
CN108182353A (en) * | 2018-01-29 | 2018-06-19 | 河南中医药大学 | A kind of computer network security shielding system |
CN108667724A (en) * | 2018-03-30 | 2018-10-16 | 苏州诺登德智能科技有限公司 | A kind of safety type gateway apparatus |
CN111263358A (en) * | 2020-01-20 | 2020-06-09 | 河南经贸职业学院 | Computer data safety protection system based on computer network |
CN111464551A (en) * | 2020-04-10 | 2020-07-28 | 广东电网有限责任公司惠州供电局 | Network security analysis system |
CN111884999A (en) * | 2020-06-18 | 2020-11-03 | 肖贻富 | Method and system for preventing information in intelligent home of safety monitoring system from being leaked |
CN112836246A (en) * | 2021-02-09 | 2021-05-25 | 无锡云动科技发展有限公司 | Multi-network isolation cloud desktop connection system based on fingerprint identification |
-
2016
- 2016-08-31 CN CN201621049485.4U patent/CN206162540U/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107273062A (en) * | 2017-07-12 | 2017-10-20 | 重庆工业职业技术学院 | A kind of computer digital animation module |
CN108182353A (en) * | 2018-01-29 | 2018-06-19 | 河南中医药大学 | A kind of computer network security shielding system |
CN108667724A (en) * | 2018-03-30 | 2018-10-16 | 苏州诺登德智能科技有限公司 | A kind of safety type gateway apparatus |
CN108667724B (en) * | 2018-03-30 | 2020-09-22 | 苏州诺登德智能科技有限公司 | Safe gateway device |
CN111263358A (en) * | 2020-01-20 | 2020-06-09 | 河南经贸职业学院 | Computer data safety protection system based on computer network |
CN111464551A (en) * | 2020-04-10 | 2020-07-28 | 广东电网有限责任公司惠州供电局 | Network security analysis system |
CN111884999A (en) * | 2020-06-18 | 2020-11-03 | 肖贻富 | Method and system for preventing information in intelligent home of safety monitoring system from being leaked |
CN112836246A (en) * | 2021-02-09 | 2021-05-25 | 无锡云动科技发展有限公司 | Multi-network isolation cloud desktop connection system based on fingerprint identification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206162540U (en) | Intelligent computer network safety isolation device | |
CN105027498B (en) | A kind of method and its system and device by remotely separating and assembling data file realization secure storage | |
CN103310169B (en) | A kind of method protecting SD card data and protection system | |
CN103559435B (en) | The debugging port controlling method and apparatus of terminal device | |
CN107888609A (en) | A kind of information security of computer network system | |
CN104581008B (en) | A kind of video monitoring system information security protection system and method | |
CN202694329U (en) | Wireless storage equipment | |
AU2012318937A1 (en) | Secure integrated cyberspace security and situational awareness system | |
CN104320389A (en) | Fusion identify protection system and fusion identify protection method based on cloud computing | |
CN205681457U (en) | A kind of data safety network gateway equipment with inherently safe defense function | |
WO2015117507A1 (en) | Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor | |
CN110298196A (en) | A kind of electronic information security storage system and storage method | |
CN206039532U (en) | Computer USB peripheral hardware safety discernment filter | |
CN107944307B (en) | Computer safety protection management system | |
CN105208045A (en) | Identity authentication method, equipment and system | |
CN110650151A (en) | Computer network safety remote monitoring device | |
CN104955043B (en) | A kind of intelligent terminal security protection system | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN206470760U (en) | A kind of computer network security control device | |
CN105095780B (en) | The access method and device of test port in a kind of chip | |
CN112000953A (en) | Big data terminal safety protection system | |
CN106027253A (en) | Access frequency management and control device for identity card authentication information | |
CN111898105A (en) | External terminal protection equipment with user tracing function and protection system | |
CN105550602A (en) | Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method | |
CN206594672U (en) | Highly reliable encryption antivirus flash disk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170510 Termination date: 20170831 |