CN206178834U - Computer network information safety coefficient - Google Patents
Computer network information safety coefficient Download PDFInfo
- Publication number
- CN206178834U CN206178834U CN201621120666.1U CN201621120666U CN206178834U CN 206178834 U CN206178834 U CN 206178834U CN 201621120666 U CN201621120666 U CN 201621120666U CN 206178834 U CN206178834 U CN 206178834U
- Authority
- CN
- China
- Prior art keywords
- netkey
- computer
- hard disk
- network
- information security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses a computer network information safety coefficient, including central processing unit, secret hard disk, unclassified hard disk, network information security module, user authentication module, temperature monitoring module, port controller, wireless network interface card and computer peripheral, wherein, unclassified hard disk, network information security module, user authentication module, port controller and computer peripheral link to each other with central processing unit respectively, secret module links to each other with network information security module. The utility model discloses be divided into secret hard disk and unclassified hard disk with hard disk of the computer, effectually keep apart security information, and be equipped with port controller, guaranteed the security of important information, the simple structure of this system, with low costs, factor of safety is high, convenient to use, can effectively safeguard user's network information safety.
Description
Technical field
This utility model is related to computer safety field, and in particular to a kind of information security of computer network system.
Background technology
Going deep into for several IT application processes is developed rapidly with network, the work of people, studying and living mode are sent out
The huge change of life, efficiency is greatly improved, and information resources are farthest shared.But while Informatization Development,
Some problems for producing, for example:Information leakage, information pollution etc., serious harm national interests, social benefit and personal or group
Body interests, additionally, while people more and more rely on computer, computer usually long-time overload operation, its is hard
Part equipment also needs corresponding protection and monitoring device badly, however, being directed to above-mentioned these problems, needs badly and find as early as possible solution,
To avoid causing more losses.
Utility model content
To solve the deficiency that prior art is present, the utility model discloses a kind of information security of computer network system,
The system simple structure, safety coefficient are high, can effectively safeguard the network information security of user.
For achieving the above object, concrete scheme of the present utility model is as follows:
A kind of information security of computer network system, including central processing unit, secrecy hard disk, unclassified hard disk, network letter
Breath security module, SIM, temperature monitoring module, port controller, wireless network card and computer peripheral,
Wherein, the unclassified hard disk, network information security module, SIM, port controller and computer external
Equipment is connected respectively with central processing unit, and the secrecy hard disk is connected with network information security module.
Further, the network information security module includes that netkey controller, netkey maker, network are close
Key decipher and Network Isolation are switched, and the netkey decipher is connected with central processing unit, the netkey controller
Connect netkey decipher, netkey maker and Network Isolation switch, the Network Isolation switch connection secrecy respectively
Hard disk, the netkey maker is used to generate netkey, and the netkey decipher is used for hard to being stored in secrecy
The encryption information of disk is decrypted, and whether the generation that the netkey controller is used for authentication secret is legal, judgement is input into
The folding of key whether correct and controlling network disconnecting switch, the Network Isolation switch for secrecy hard disk is carried out network every
From further having ensured the safety of information.
Further, the SIM includes that fingerprint or pattern collecting device, computer security open single
Unit, self-locking and alarm unit, the fingerprint or pattern collecting device, computer security opening unit, self-locking and alarm unit point
Do not connect central processing unit, the fingerprint or pattern collecting device are used to gather the fingerprint or drawing information of user, the calculating
Machine safe opening unit is used to recognize the fingerprint or drawing information that the fingerprint or pattern collecting device are collected, after being identified by
Computer can be smoothly opened, if user fingerprints or drawing information authentication failed are more than three times, triggering self-locking and warning are single
Unit, computer self-locking and alert, to point out related personnel's computer to suffer malicious access.
Further, the source of the data outwards transmitted needed for the central processing unit monitoring, if data come from non-guarantor
Then control port controller sends data to close hard disk, if coming from secrecy hard disk to the data of unofficial biography, checks whether it encrypts,
Packet only by encrypting just can carry out the transmission of data by port controller, otherwise data are retracted into into secrecy hard
Disk simultaneously points out user not to be encrypted data can not to send, and for extraneous incoming data, whether central processing unit monitors it
Encryption, if encryption data, is then stored to secrecy hard disk, is otherwise deposited into non-encrypted hard disk.
Further, the temperature monitoring module includes temperature sensor, alarm, the temperature sensor, alarm
Connect central processing unit respectively, the temperature sensor is used for the temperature of metering computer mainframe box, when computer host box temperature
When degree is higher than threshold value, alarm is triggered, point out user to stop operation or close unnecessary program.
Further, the computer peripheral includes pci interface, printer, mouse, keyboard etc..
Further, the fingerprint or pattern collecting device are using LD-602 capacitive fingerprints instrument and human face recognition machine.
Further, the netkey controller adopts PIC16CE62X single-chip microcomputers.
Further, the netkey maker and netkey decipher adopt AT05SC card microcontrollers.
Further, Network Isolation switch adopts WLGLQ-II-LE+ type physical isolation cards.
The beneficial effects of the utility model:
Hard disc of computer is divided into secrecy hard disk and unclassified hard disk by this utility model, and effectively security information is carried out
Isolation, it is ensured that the safety of important information, while the system is provided with temperature monitoring module, is easy to user to pass through main frame
Temperature information understand computer system operation conditions in time, to prevent because of computer system overload operation overlong time, master
The generation of situations such as too high and caused line fault of machine temperature, wafer damage, additionally, the system adds port controller, protects
While demonstrate,proving the safety in data transmission procedure, it is easy to user to know data is activation situation in time, has further ensured network
The safety of information, the system simple structure, low cost, safety coefficient are high, easy to use, can effectively safeguard the network information of user
Safety.
Description of the drawings
Fig. 1 is structure chart of the present utility model;
Wherein, 1- central processing units, 2- secrecy hard disks, the unclassified hard disks of 3-, 4- port controllers, 5- wireless network cards, 6-
SIM, 7- network information security modules, 8- temperature monitoring modules, 9- computer peripherals, 10-- fingerprints
Or pattern collecting device, 11- computer security opening units, 12- self-lockings and alarm unit, 13- netkey deciphers, 14-
Netkey controller, 15- netkey makers, 16- Network Isolations switch, 17- temperature sensors, 18- alarms, 19-
Pci interface, 20- printers, 21- keyboards, mouse.
Specific embodiment:
This utility model is described in detail below in conjunction with the accompanying drawings:
It is as shown in figure 1, a kind of information security of computer network system including central processing unit 1, secrecy hard disk 2, unclassified
Hard disk 3, network information security module 7, SIM 6, temperature monitoring module 8, port controller 4, wireless network card 5
And computer peripheral 9, wherein, the unclassified hard disk 3, network information security module 7, SIM 6, end
Mouthful controller 4 and computer peripheral 9 are connected respectively with central processing unit 1, the secrecy hard disk 2 and network information security mould
Block 7 is connected.
Further, the network information security module 7 include netkey controller 14, netkey maker 15,
Netkey decipher 13 and Network Isolation switch 16, the netkey decipher 13 is connected with central processing unit 1, the net
Network cipher controlled device 14 connects respectively netkey decipher 13, netkey maker 15 and Network Isolation switch 16, described
Network Isolation switch 16 connects secrecy hard disk 2, and the netkey maker 15 is used to generate netkey, the netkey
Decipher 13 is used for the encryption information to being stored in secrecy hard disk 2 and is decrypted, and the netkey controller 14 is used to verify
Whether the generation of key is legal, the folding of judge be input into key whether correctly simultaneously controlling network disconnecting switch 16, the network
Disconnecting switch 16 is used to carry out Network Isolation to secrecy hard disk 2, has further ensured the safety of information.
Further, the SIM 6 includes that fingerprint or pattern collecting device 10, computer security are opened
Unit 11, self-locking and alarm unit 12, the fingerprint or pattern collecting device 11, the self-locking of computer security opening unit 11 and report
Alert unit 12 connects respectively central processing unit 1, and the fingerprint or pattern collecting device 10 are used to gather the fingerprint or pattern of user
Information, the computer security opening unit 1 is used to recognize the fingerprint or pattern that the fingerprint or pattern collecting device are collected
Information, after being identified by by smoothly open computer, if user fingerprints or drawing information authentication failed are triggered more than three times
Self-locking and alarm unit 12, computer self-locking and alert, to point out related personnel's computer to suffer malicious access.
Further, the source of the data outwards transmitted needed for the central processing unit 1 is monitored, if data come from non-guarantor
Then control port controller 4 sends data to close hard disk 3, if coming from secrecy hard disk 2 to the data of unofficial biography, checks whether it adds
Close, the packet only by encrypting can just pass through port controller 4 carries out the transmission of data, otherwise data is retracted into into guarantor
Close hard disk 2 simultaneously points out user not to be encrypted data can not to send, and for extraneous incoming data, central processing unit 1 is monitored
Whether it encrypts, if encryption data, is then stored to secrecy hard disk 4, is otherwise deposited into non-encrypted hard disk 3.
Further, the temperature monitoring module 8 include temperature sensor 17, alarm 18, the temperature sensor 17,
Alarm 18 connects respectively central processing unit 1, and the temperature sensor 17 is used for the temperature of metering computer mainframe box, works as calculating
When owner's housing temperature is higher than threshold value, alarm 18 is triggered, point out user to stop operation or close unnecessary program.
Further, the computer peripheral 9 includes pci interface 19, printer 20 and mouse, keyboard 21 etc..
Further, the fingerprint or pattern collecting device 10 are using LD-602 capacitive fingerprints instrument and human face recognition machine.
Further, the netkey controller 14 adopts PIC16CE62X single-chip microcomputers.
Further, the netkey maker 13 and netkey decipher 14 adopt AT05SC card microcontrollers.
Further, Network Isolation switch 16 adopts WLGLQ-II-LE+ type physical isolation cards.
It is not new to this practicality although the above-mentioned accompanying drawing that combines is described to specific embodiment of the present utility model
The restriction of type protection domain, one of ordinary skill in the art should be understood that on the basis of the technical solution of the utility model, ability
Various modifications or deform still in protection model of the present utility model that field technique personnel make by need not paying creative work
Within enclosing.
Claims (6)
1. a kind of information security of computer network system, is characterized in that, including central processing unit, secrecy hard disk, unclassified hard disk,
Outside network information security module, SIM, temperature monitoring module, port controller, wireless network card and computer
Peripheral equipment, outside the unclassified hard disk, network information security module, SIM, port controller and computer
Peripheral equipment is connected respectively with central processing unit, and the secrecy hard disk is connected with network information security module;
The network information security module includes netkey maker, netkey controller, netkey decipher and net
Network disconnecting switch, the netkey decipher is connected with central processing unit, and the netkey controller connects respectively network
Key generator, netkey decipher and Network Isolation switch, the Network Isolation switch connection secrecy hard disk;
The SIM includes fingerprint or pattern collecting device, computer security opening unit, self-locking and warning
Unit, the fingerprint or pattern collecting device, computer security opening unit, self-locking and alarm unit connect respectively central process
Device;
The temperature monitoring module includes temperature sensor, alarm, and the temperature sensor, alarm connect respectively centre
Reason device.
2. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the fingerprint or pattern are gathered
Equipment is using LD-602 capacitive fingerprints instrument and human face recognition machine.
3. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the netkey controller
Using PIC16CE62X single-chip microcomputers.
4. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the netkey maker
And netkey decipher adopts AT05SC card microcontrollers.
5. a kind of information security of computer network system as claimed in claim 1, is characterized in that, Network Isolation switch is adopted
WLGLQ-II-LE+ type physical isolation cards.
6. a kind of information security of computer network system as claimed in claim 1, is characterized in that, the computer peripheral
Including pci interface, printer, mouse, keyboard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621120666.1U CN206178834U (en) | 2016-10-13 | 2016-10-13 | Computer network information safety coefficient |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621120666.1U CN206178834U (en) | 2016-10-13 | 2016-10-13 | Computer network information safety coefficient |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206178834U true CN206178834U (en) | 2017-05-17 |
Family
ID=58677579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621120666.1U Expired - Fee Related CN206178834U (en) | 2016-10-13 | 2016-10-13 | Computer network information safety coefficient |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206178834U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888609A (en) * | 2017-11-29 | 2018-04-06 | 滁州市华晨软件科技有限公司 | A kind of information security of computer network system |
CN108763971A (en) * | 2018-08-17 | 2018-11-06 | 北京航星中云科技有限公司 | A kind of data safety storage device and method, mobile terminal |
-
2016
- 2016-10-13 CN CN201621120666.1U patent/CN206178834U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888609A (en) * | 2017-11-29 | 2018-04-06 | 滁州市华晨软件科技有限公司 | A kind of information security of computer network system |
CN108763971A (en) * | 2018-08-17 | 2018-11-06 | 北京航星中云科技有限公司 | A kind of data safety storage device and method, mobile terminal |
CN108763971B (en) * | 2018-08-17 | 2023-04-04 | 北京航星中云科技有限公司 | Data security storage device and method and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888609A (en) | A kind of information security of computer network system | |
CN205670253U (en) | A kind of trusted gateway system of industrial control system | |
CN105915509B (en) | A kind of network type voltage monitoring system based on Hybrid Encryption algorithm | |
CN105117658B (en) | A kind of cryptosecurity management method and equipment based on finger print identifying | |
CN101599188A (en) | A kind of gate control system based on the IPA safety certification | |
CN206162540U (en) | Intelligent computer network safety isolation device | |
CN102609667A (en) | Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program | |
CN205103825U (en) | Computer information safety control | |
CN207150607U (en) | A kind of data encrypting and deciphering system based on biological characteristic | |
CN205584238U (en) | Network data encryption equipment | |
CN206178834U (en) | Computer network information safety coefficient | |
CN115118751B (en) | Blockchain-based supervision system, method, equipment and medium | |
CN102882856A (en) | Terminal password device based on system on chip (SoC) | |
CN206193795U (en) | Computer intelligent information secure processing device | |
CN205354036U (en) | Data encryption cloud storage system based on multimode biological identification technique | |
CN204965508U (en) | Intelligent financial management system | |
CN106372541A (en) | U disk security encryption management method | |
CN206470760U (en) | A kind of computer network security control device | |
CN207475576U (en) | A kind of safety mobile terminal system based on safety chip | |
CN201063642Y (en) | Fingerprint USB key | |
CN201838004U (en) | Hardware encryption card for computer interface | |
CN108038676A (en) | A kind of company clerk's management system | |
CN102831080A (en) | Data security protection method for mobile storage equipment | |
CN103336931A (en) | Computer-networking information-safety application system | |
CN202818328U (en) | Security authentication and encryption communication module based on security processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170517 Termination date: 20171013 |
|
CF01 | Termination of patent right due to non-payment of annual fee |