CN206178834U - Computer network information safety coefficient - Google Patents

Computer network information safety coefficient Download PDF

Info

Publication number
CN206178834U
CN206178834U CN201621120666.1U CN201621120666U CN206178834U CN 206178834 U CN206178834 U CN 206178834U CN 201621120666 U CN201621120666 U CN 201621120666U CN 206178834 U CN206178834 U CN 206178834U
Authority
CN
China
Prior art keywords
netkey
computer
hard disk
network
information security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201621120666.1U
Other languages
Chinese (zh)
Inventor
郭盛
金旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taishan Medical University
Original Assignee
Taishan Medical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taishan Medical University filed Critical Taishan Medical University
Priority to CN201621120666.1U priority Critical patent/CN206178834U/en
Application granted granted Critical
Publication of CN206178834U publication Critical patent/CN206178834U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a computer network information safety coefficient, including central processing unit, secret hard disk, unclassified hard disk, network information security module, user authentication module, temperature monitoring module, port controller, wireless network interface card and computer peripheral, wherein, unclassified hard disk, network information security module, user authentication module, port controller and computer peripheral link to each other with central processing unit respectively, secret module links to each other with network information security module. The utility model discloses be divided into secret hard disk and unclassified hard disk with hard disk of the computer, effectually keep apart security information, and be equipped with port controller, guaranteed the security of important information, the simple structure of this system, with low costs, factor of safety is high, convenient to use, can effectively safeguard user's network information safety.

Description

A kind of information security of computer network system
Technical field
This utility model is related to computer safety field, and in particular to a kind of information security of computer network system.
Background technology
Going deep into for several IT application processes is developed rapidly with network, the work of people, studying and living mode are sent out The huge change of life, efficiency is greatly improved, and information resources are farthest shared.But while Informatization Development, Some problems for producing, for example:Information leakage, information pollution etc., serious harm national interests, social benefit and personal or group Body interests, additionally, while people more and more rely on computer, computer usually long-time overload operation, its is hard Part equipment also needs corresponding protection and monitoring device badly, however, being directed to above-mentioned these problems, needs badly and find as early as possible solution, To avoid causing more losses.
Utility model content
To solve the deficiency that prior art is present, the utility model discloses a kind of information security of computer network system, The system simple structure, safety coefficient are high, can effectively safeguard the network information security of user.
For achieving the above object, concrete scheme of the present utility model is as follows:
A kind of information security of computer network system, including central processing unit, secrecy hard disk, unclassified hard disk, network letter Breath security module, SIM, temperature monitoring module, port controller, wireless network card and computer peripheral, Wherein, the unclassified hard disk, network information security module, SIM, port controller and computer external Equipment is connected respectively with central processing unit, and the secrecy hard disk is connected with network information security module.
Further, the network information security module includes that netkey controller, netkey maker, network are close Key decipher and Network Isolation are switched, and the netkey decipher is connected with central processing unit, the netkey controller Connect netkey decipher, netkey maker and Network Isolation switch, the Network Isolation switch connection secrecy respectively Hard disk, the netkey maker is used to generate netkey, and the netkey decipher is used for hard to being stored in secrecy The encryption information of disk is decrypted, and whether the generation that the netkey controller is used for authentication secret is legal, judgement is input into The folding of key whether correct and controlling network disconnecting switch, the Network Isolation switch for secrecy hard disk is carried out network every From further having ensured the safety of information.
Further, the SIM includes that fingerprint or pattern collecting device, computer security open single Unit, self-locking and alarm unit, the fingerprint or pattern collecting device, computer security opening unit, self-locking and alarm unit point Do not connect central processing unit, the fingerprint or pattern collecting device are used to gather the fingerprint or drawing information of user, the calculating Machine safe opening unit is used to recognize the fingerprint or drawing information that the fingerprint or pattern collecting device are collected, after being identified by Computer can be smoothly opened, if user fingerprints or drawing information authentication failed are more than three times, triggering self-locking and warning are single Unit, computer self-locking and alert, to point out related personnel's computer to suffer malicious access.
Further, the source of the data outwards transmitted needed for the central processing unit monitoring, if data come from non-guarantor Then control port controller sends data to close hard disk, if coming from secrecy hard disk to the data of unofficial biography, checks whether it encrypts, Packet only by encrypting just can carry out the transmission of data by port controller, otherwise data are retracted into into secrecy hard Disk simultaneously points out user not to be encrypted data can not to send, and for extraneous incoming data, whether central processing unit monitors it Encryption, if encryption data, is then stored to secrecy hard disk, is otherwise deposited into non-encrypted hard disk.
Further, the temperature monitoring module includes temperature sensor, alarm, the temperature sensor, alarm Connect central processing unit respectively, the temperature sensor is used for the temperature of metering computer mainframe box, when computer host box temperature When degree is higher than threshold value, alarm is triggered, point out user to stop operation or close unnecessary program.
Further, the computer peripheral includes pci interface, printer, mouse, keyboard etc..
Further, the fingerprint or pattern collecting device are using LD-602 capacitive fingerprints instrument and human face recognition machine.
Further, the netkey controller adopts PIC16CE62X single-chip microcomputers.
Further, the netkey maker and netkey decipher adopt AT05SC card microcontrollers.
Further, Network Isolation switch adopts WLGLQ-II-LE+ type physical isolation cards.
The beneficial effects of the utility model:
Hard disc of computer is divided into secrecy hard disk and unclassified hard disk by this utility model, and effectively security information is carried out Isolation, it is ensured that the safety of important information, while the system is provided with temperature monitoring module, is easy to user to pass through main frame Temperature information understand computer system operation conditions in time, to prevent because of computer system overload operation overlong time, master The generation of situations such as too high and caused line fault of machine temperature, wafer damage, additionally, the system adds port controller, protects While demonstrate,proving the safety in data transmission procedure, it is easy to user to know data is activation situation in time, has further ensured network The safety of information, the system simple structure, low cost, safety coefficient are high, easy to use, can effectively safeguard the network information of user Safety.
Description of the drawings
Fig. 1 is structure chart of the present utility model;
Wherein, 1- central processing units, 2- secrecy hard disks, the unclassified hard disks of 3-, 4- port controllers, 5- wireless network cards, 6- SIM, 7- network information security modules, 8- temperature monitoring modules, 9- computer peripherals, 10-- fingerprints Or pattern collecting device, 11- computer security opening units, 12- self-lockings and alarm unit, 13- netkey deciphers, 14- Netkey controller, 15- netkey makers, 16- Network Isolations switch, 17- temperature sensors, 18- alarms, 19- Pci interface, 20- printers, 21- keyboards, mouse.
Specific embodiment:
This utility model is described in detail below in conjunction with the accompanying drawings:
It is as shown in figure 1, a kind of information security of computer network system including central processing unit 1, secrecy hard disk 2, unclassified Hard disk 3, network information security module 7, SIM 6, temperature monitoring module 8, port controller 4, wireless network card 5 And computer peripheral 9, wherein, the unclassified hard disk 3, network information security module 7, SIM 6, end Mouthful controller 4 and computer peripheral 9 are connected respectively with central processing unit 1, the secrecy hard disk 2 and network information security mould Block 7 is connected.
Further, the network information security module 7 include netkey controller 14, netkey maker 15, Netkey decipher 13 and Network Isolation switch 16, the netkey decipher 13 is connected with central processing unit 1, the net Network cipher controlled device 14 connects respectively netkey decipher 13, netkey maker 15 and Network Isolation switch 16, described Network Isolation switch 16 connects secrecy hard disk 2, and the netkey maker 15 is used to generate netkey, the netkey Decipher 13 is used for the encryption information to being stored in secrecy hard disk 2 and is decrypted, and the netkey controller 14 is used to verify Whether the generation of key is legal, the folding of judge be input into key whether correctly simultaneously controlling network disconnecting switch 16, the network Disconnecting switch 16 is used to carry out Network Isolation to secrecy hard disk 2, has further ensured the safety of information.
Further, the SIM 6 includes that fingerprint or pattern collecting device 10, computer security are opened Unit 11, self-locking and alarm unit 12, the fingerprint or pattern collecting device 11, the self-locking of computer security opening unit 11 and report Alert unit 12 connects respectively central processing unit 1, and the fingerprint or pattern collecting device 10 are used to gather the fingerprint or pattern of user Information, the computer security opening unit 1 is used to recognize the fingerprint or pattern that the fingerprint or pattern collecting device are collected Information, after being identified by by smoothly open computer, if user fingerprints or drawing information authentication failed are triggered more than three times Self-locking and alarm unit 12, computer self-locking and alert, to point out related personnel's computer to suffer malicious access.
Further, the source of the data outwards transmitted needed for the central processing unit 1 is monitored, if data come from non-guarantor Then control port controller 4 sends data to close hard disk 3, if coming from secrecy hard disk 2 to the data of unofficial biography, checks whether it adds Close, the packet only by encrypting can just pass through port controller 4 carries out the transmission of data, otherwise data is retracted into into guarantor Close hard disk 2 simultaneously points out user not to be encrypted data can not to send, and for extraneous incoming data, central processing unit 1 is monitored Whether it encrypts, if encryption data, is then stored to secrecy hard disk 4, is otherwise deposited into non-encrypted hard disk 3.
Further, the temperature monitoring module 8 include temperature sensor 17, alarm 18, the temperature sensor 17, Alarm 18 connects respectively central processing unit 1, and the temperature sensor 17 is used for the temperature of metering computer mainframe box, works as calculating When owner's housing temperature is higher than threshold value, alarm 18 is triggered, point out user to stop operation or close unnecessary program.
Further, the computer peripheral 9 includes pci interface 19, printer 20 and mouse, keyboard 21 etc..
Further, the fingerprint or pattern collecting device 10 are using LD-602 capacitive fingerprints instrument and human face recognition machine.
Further, the netkey controller 14 adopts PIC16CE62X single-chip microcomputers.
Further, the netkey maker 13 and netkey decipher 14 adopt AT05SC card microcontrollers.
Further, Network Isolation switch 16 adopts WLGLQ-II-LE+ type physical isolation cards.
It is not new to this practicality although the above-mentioned accompanying drawing that combines is described to specific embodiment of the present utility model The restriction of type protection domain, one of ordinary skill in the art should be understood that on the basis of the technical solution of the utility model, ability Various modifications or deform still in protection model of the present utility model that field technique personnel make by need not paying creative work Within enclosing.

Claims (6)

1. a kind of information security of computer network system, is characterized in that, including central processing unit, secrecy hard disk, unclassified hard disk, Outside network information security module, SIM, temperature monitoring module, port controller, wireless network card and computer Peripheral equipment, outside the unclassified hard disk, network information security module, SIM, port controller and computer Peripheral equipment is connected respectively with central processing unit, and the secrecy hard disk is connected with network information security module;
The network information security module includes netkey maker, netkey controller, netkey decipher and net Network disconnecting switch, the netkey decipher is connected with central processing unit, and the netkey controller connects respectively network Key generator, netkey decipher and Network Isolation switch, the Network Isolation switch connection secrecy hard disk;
The SIM includes fingerprint or pattern collecting device, computer security opening unit, self-locking and warning Unit, the fingerprint or pattern collecting device, computer security opening unit, self-locking and alarm unit connect respectively central process Device;
The temperature monitoring module includes temperature sensor, alarm, and the temperature sensor, alarm connect respectively centre Reason device.
2. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the fingerprint or pattern are gathered Equipment is using LD-602 capacitive fingerprints instrument and human face recognition machine.
3. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the netkey controller Using PIC16CE62X single-chip microcomputers.
4. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the netkey maker And netkey decipher adopts AT05SC card microcontrollers.
5. a kind of information security of computer network system as claimed in claim 1, is characterized in that, Network Isolation switch is adopted WLGLQ-II-LE+ type physical isolation cards.
6. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the computer peripheral Including pci interface, printer, mouse, keyboard.
CN201621120666.1U 2016-10-13 2016-10-13 Computer network information safety coefficient Expired - Fee Related CN206178834U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621120666.1U CN206178834U (en) 2016-10-13 2016-10-13 Computer network information safety coefficient

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621120666.1U CN206178834U (en) 2016-10-13 2016-10-13 Computer network information safety coefficient

Publications (1)

Publication Number Publication Date
CN206178834U true CN206178834U (en) 2017-05-17

Family

ID=58677579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621120666.1U Expired - Fee Related CN206178834U (en) 2016-10-13 2016-10-13 Computer network information safety coefficient

Country Status (1)

Country Link
CN (1) CN206178834U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888609A (en) * 2017-11-29 2018-04-06 滁州市华晨软件科技有限公司 A kind of information security of computer network system
CN108763971A (en) * 2018-08-17 2018-11-06 北京航星中云科技有限公司 A kind of data safety storage device and method, mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888609A (en) * 2017-11-29 2018-04-06 滁州市华晨软件科技有限公司 A kind of information security of computer network system
CN108763971A (en) * 2018-08-17 2018-11-06 北京航星中云科技有限公司 A kind of data safety storage device and method, mobile terminal
CN108763971B (en) * 2018-08-17 2023-04-04 北京航星中云科技有限公司 Data security storage device and method and mobile terminal

Similar Documents

Publication Publication Date Title
CN107888609A (en) A kind of information security of computer network system
CN205670253U (en) A kind of trusted gateway system of industrial control system
CN105915509B (en) A kind of network type voltage monitoring system based on Hybrid Encryption algorithm
CN105117658B (en) A kind of cryptosecurity management method and equipment based on finger print identifying
CN101599188A (en) A kind of gate control system based on the IPA safety certification
CN206162540U (en) Intelligent computer network safety isolation device
CN102609667A (en) Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program
CN205103825U (en) Computer information safety control
CN207150607U (en) A kind of data encrypting and deciphering system based on biological characteristic
CN205584238U (en) Network data encryption equipment
CN206178834U (en) Computer network information safety coefficient
CN115118751B (en) Blockchain-based supervision system, method, equipment and medium
CN102882856A (en) Terminal password device based on system on chip (SoC)
CN206193795U (en) Computer intelligent information secure processing device
CN205354036U (en) Data encryption cloud storage system based on multimode biological identification technique
CN204965508U (en) Intelligent financial management system
CN106372541A (en) U disk security encryption management method
CN206470760U (en) A kind of computer network security control device
CN207475576U (en) A kind of safety mobile terminal system based on safety chip
CN201063642Y (en) Fingerprint USB key
CN201838004U (en) Hardware encryption card for computer interface
CN108038676A (en) A kind of company clerk's management system
CN102831080A (en) Data security protection method for mobile storage equipment
CN103336931A (en) Computer-networking information-safety application system
CN202818328U (en) Security authentication and encryption communication module based on security processor

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170517

Termination date: 20171013

CF01 Termination of patent right due to non-payment of annual fee