CN206470760U - A kind of computer network security control device - Google Patents
A kind of computer network security control device Download PDFInfo
- Publication number
- CN206470760U CN206470760U CN201720185200.8U CN201720185200U CN206470760U CN 206470760 U CN206470760 U CN 206470760U CN 201720185200 U CN201720185200 U CN 201720185200U CN 206470760 U CN206470760 U CN 206470760U
- Authority
- CN
- China
- Prior art keywords
- relay
- hard disk
- controller
- network
- opened contact
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model discloses a kind of computer network security control device, including code entry unit, fingerprint identification unit, Authority Verification unit, controller, power supply relay, network relay, network interface card, the network switch, the first relay, the second relay, the 3rd relay, the 4th relay, the 5th relay, common hard disc, the first encryption hard disk, the second encryption hard disk, the 3rd encryption hard disk.The utility model is provided with code entry unit and fingerprint identification unit, controller is by gathering the signal that code entry unit and fingerprint identification unit are inputted, output control signals to corresponding controller, so as to reach selection common hard disc or encrypt the purpose of hard disk, the security that computer is used is enhanced.
Description
Technical field
The utility model is related to a kind of computer network security control device.
Background technology
With the development of Internet technology, computer is also increasingly popularized, and many people are using computer office now and deposit
Data are stored up, computer office is convenient and swift, but computer is subject to hacker when networking harasses, and causes in computer
The loss of data of storage, guard of computer ability now is poor, is easily opened by other people, steals data information, and once
This thing happens will cause irremediable massive losses.On computer network security protection question, many technologies are used
Double-point double-throw switch, but if necessary to secrecy hard disk and unclassified hard disk be connecteds with computer power supply simultaneously transmit data or
During file, potential safety hazard is also had, practicality is not strong.
The content of the invention
In order to solve the above-mentioned technical problem, the utility model provides a kind of simple in construction, security performance high computer network
Network safety control.
The technical scheme that the utility model solves the above problems is:A kind of computer network security control device, including it is close
Code login unit, fingerprint identification unit, Authority Verification unit, controller, power supply relay, network relay, network interface card, network are handed over
Change planes, the first relay, the second relay, the 3rd relay, the 4th relay, the 5th relay, common hard disc, first encryption
Hard disk, the second encryption hard disk, the 3rd encryption hard disk, the output end of the code entry unit are connected with controller, fingerprint recognition
The output end of unit is connected after Authority Verification unit with controller, the power supply relay, the control end of network relay with
Controller is connected, and power supply relay is connected with power supply, and network relay, network interface card, the network switch are sequentially connected in series, the first relay
Device, the second relay, the 3rd relay, the 4th relay, the 5th relay are connected with controller respectively, and the power supply is through first
It is connected after the normally opened contact of relay with common hard disc, the normally opened contact of the normally opened contact of the second relay and the first relay is simultaneously
Connection, power supply is connected with one end of the normally closed electric shock of the first relay, and the other end of the normally closed electric shock of the first relay is through the 3rd relay
Normally opened contact after be connected with the first encryption hard disk, the other end of the normally closed electric shock of the first relay is normally opened tactile through the 4th relay
It is connected after point with the second encryption hard disk, the other end of the normally closed electric shock of the first relay is after the normally opened contact of the 5th relay with the
Three encryption hard disks are connected.
Above computer network security control device also includes safety detection unit, and the input of safety detection unit is with preventing
Wall with flues is connected, and the output end of safety detection unit is connected with controller.
Above computer network security control device also includes state detection unit, and the input of state detection unit is distinguished
It is connected with common hard disc, the first encryption hard disk, the second encryption hard disk, the 3rd encryption hard disk, network interface card, the output of state detection unit
End is connected with controller.
Above computer network security control device also includes display, and display is connected with controller.
Above computer network security control device also includes alarm, and alarm is connected with controller.
The beneficial effects of the utility model are:
1st, the utility model is provided with code entry unit and fingerprint identification unit, and controller is by gathering code entry unit
The signal inputted with fingerprint identification unit, outputs control signals to corresponding relay, so as to reach selection common hard disc or add
The purpose of close hard disk, enhances the security that computer is used.
2nd, the utility model be provided with state detection unit and safety detection unit, state detection unit detect in real time network interface card and
Whether the working condition of each hard disk, safety detection unit detection computer has hacker attacks, so that controller can control power supply
And electrical equipment or network relay, power-off or suspension in time, so as to protect the data of hard disc of computer.
3rd, the utility model is provided with display and alarm, and the working condition of each hard disk can be shown in real time, occurs abnormal
State can also carry out sound and light alarm.
Brief description of the drawings
Fig. 1 structured flowcharts of the present utility model.
Embodiment
The utility model is further described with reference to the accompanying drawings and examples.
As shown in figure 1, the utility model includes code entry unit, fingerprint identification unit, Authority Verification unit, control
Device, power supply relay, network relay, network interface card, the network switch, the first relay, the second relay, the 3rd relay,
Four relays, the 5th relay, common hard disc, the first encryption hard disk, the second encryption hard disk, the 3rd encryption hard disk, safety detection
Unit, state detection unit, display and alarm, the output end of the code entry unit are connected with controller, and fingerprint is known
The output end of other unit is connected after Authority Verification unit with controller, the power supply relay, the control end of network relay
It is connected with controller, power supply relay is connected with power supply, network relay, network interface card, the network switch are sequentially connected in series, the first relay
Device, the second relay, the 3rd relay, the 4th relay, the 5th relay, display and alarm respectively with controller phase
Even, the power supply is connected after the normally opened contact of the first relay with common hard disc, the normally opened contact of the second relay and first
The normally opened contact of relay is in parallel, and power supply is connected with one end of the normally closed electric shock of the first relay, the normally closed electric shock of the first relay
The other end is connected after the normally opened contact of the 3rd relay with the first encryption hard disk, the other end warp of the normally closed electric shock of the first relay
It is connected after the normally opened contact of 4th relay with the second encryption hard disk, the other end of the normally closed electric shock of the first relay is through the 5th relay
It is connected after the normally opened contact of device with the 3rd encryption hard disk, the input of safety detection unit is connected with fire wall, safety detection list
The output end of member is connected with controller, and the input of state detection unit adds with common hard disc, the first encryption hard disk, second respectively
Close hard disk, the 3rd encryption hard disk, network interface card are connected, and the output end of state detection unit is connected with controller.
Operation principle of the present utility model is as follows:User inputs password, the signal feeding of input by code entry unit
Controller, if password is correct, controller controls the first relay KM1 to be powered, the first relay KM1 normally opened contact closure,
Normally closed get an electric shock disconnects, and common hard disc obtains electric, and now secrecy hard disk must not electricity;If wanting to use privacy keyboard, user need to pass through
Fingerprint identification unit inputs fingerprint, and the fingerprint signal feeding Authority Verification unit of input carries out judgement Permission Levels, if one-level
Authority, then the first relay KM1 dead electricity of controller control, network relay disconnection, computer disconnects the network connection with outside,
First relay KM1 normally opened contact disconnects, and normally closed get an electric shock disconnects closure, while controller controls the 3rd relay KM3 to obtain electric,
3rd relay KM3 normally opened contact closure, the first secrecy hard disk obtains electric, according to using needing to can choose whether the of control
Two relay KM2 obtain electric, to use common hard disc;If two grades of authorities, then controller controls the first relay KM1 dead electricity, net
Network relay disconnects, and computer disconnects the network connection with outside, and the first relay KM1 normally opened contact disconnects, normally closed to get an electric shock
Closure is disconnected, while controller controls the 3rd relay KM3, the 4th relay KM4 to obtain electric, the 3rd relay KM3, the 4th relay
Device KM4 normally opened contact closure, the first secrecy hard disk, the second secrecy hard disk obtain electric, control are can choose whether according to using needs
Second relay KM2 of system obtains electric, to use common hard disc;If three-level authority, then controller controls the first relay KM1 to lose
Electricity, network relay disconnect, and computer disconnects the network connection with outside, and the first relay KM1 normally opened contact disconnects, normally closed
Get an electric shock and disconnect closure, while controller controls the 3rd relay KM3, the 4th relay KM4, the 5th relay KM5 to obtain electric, the 3rd
Relay KM3, the 4th relay KM4, the 5th relay KM5 normally opened contact closure, the first secrecy hard disk, the second secrecy are hard
Disk, the 3rd secrecy hard disk obtain electric, obtain electric according to using the second relay KM2 for needing to can choose whether control, with using general
Logical hard disk;State detection unit detects the working condition of network interface card and each hard disk in real time, and by working state signal in the display
It has been shown that, if abnormal, controller control alarm progress sound and light alarm occurs in the working condition of network interface card and each hard disk;Safety
Detection unit detects whether computer has hacker attacks in real time, if so, then controller control power supply and electrical equipment and network relay,
Power-off or suspension in time, so as to protect the data of hard disc of computer.
Claims (5)
1. a kind of computer network security control device, it is characterised in that:Including code entry unit, fingerprint identification unit, power
Limit authentication unit, controller, power supply relay, network relay, network interface card, the network switch, the first relay, the second relay
Device, the 3rd relay, the 4th relay, the 5th relay, common hard disc, the first encryption hard disk, the second encryption hard disk, the 3rd add
Close hard disk, the output end of the code entry unit is connected with controller, and the output end of fingerprint identification unit is through Authority Verification list
It is connected after member with controller, the power supply relay, the control end of network relay are connected with controller, power supply relay and electricity
Source is connected, and network relay, network interface card, the network switch are sequentially connected in series, the first relay, the second relay, the 3rd relay, the
Four relays, the 5th relay are connected with controller respectively, and the power supply is after the normally opened contact of the first relay and common hard
Disk is connected, and the normally opened contact of the second relay is in parallel with the normally opened contact of the first relay, and power supply and the first relay are normally closed tactile
One end of electricity is connected, and the other end of the normally closed electric shock of the first relay encrypts hard disk after the normally opened contact of the 3rd relay with first
It is connected, the other end of the normally closed electric shock of the first relay is connected after the normally opened contact of the 4th relay with the second encryption hard disk, the
The other end of the normally closed electric shock of one relay is connected after the normally opened contact of the 5th relay with the 3rd encryption hard disk.
2. computer network security control device according to claim 1, it is characterised in that:Also include safety detection list
Member, the input of safety detection unit is connected with fire wall, and the output end of safety detection unit is connected with controller.
3. computer network security control device according to claim 1, it is characterised in that:Also include state-detection list
Member, the input of state detection unit respectively with common hard disc, the first encryption hard disk, the second encryption hard disk, the 3rd encryption hard disk,
Network interface card is connected, and the output end of state detection unit is connected with controller.
4. computer network security control device according to claim 1, it is characterised in that:Also include display, display
Device is connected with controller.
5. computer network security control device according to claim 1, it is characterised in that:Also include alarm, alarm
Device is connected with controller.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720185200.8U CN206470760U (en) | 2017-02-28 | 2017-02-28 | A kind of computer network security control device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720185200.8U CN206470760U (en) | 2017-02-28 | 2017-02-28 | A kind of computer network security control device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206470760U true CN206470760U (en) | 2017-09-05 |
Family
ID=59713060
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720185200.8U Expired - Fee Related CN206470760U (en) | 2017-02-28 | 2017-02-28 | A kind of computer network security control device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206470760U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609384A (en) * | 2017-09-08 | 2018-01-19 | 合肥永烨信息科技有限公司 | A kind of computer user's identifying system and its method |
CN107609426A (en) * | 2017-09-26 | 2018-01-19 | 华北理工大学 | A kind of Computer Network Project safety control system |
-
2017
- 2017-02-28 CN CN201720185200.8U patent/CN206470760U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609384A (en) * | 2017-09-08 | 2018-01-19 | 合肥永烨信息科技有限公司 | A kind of computer user's identifying system and its method |
CN107609426A (en) * | 2017-09-26 | 2018-01-19 | 华北理工大学 | A kind of Computer Network Project safety control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206162540U (en) | Intelligent computer network safety isolation device | |
CN103942478B (en) | A kind of authentication and right management method and equipment | |
CN104123768B (en) | A kind of safe and intelligent lock system and unlocking, shut control method | |
CN101901559B (en) | Safety control method for USB (Universal Serial Bus) interface | |
CN104123769B (en) | The unblanking of a kind of safety intelligent lock, close lock control method | |
CN205103825U (en) | Computer information safety control | |
CN105608772A (en) | Intelligent unlocking method and device | |
CN105247833B (en) | Self-certified apparatus and method for | |
CN204904392U (en) | Intelligent lock system is encrypted in high in clouds | |
CN206470760U (en) | A kind of computer network security control device | |
CN105373724A (en) | Wireless Authentication System and Method for USB Storage Device | |
CN101593252A (en) | Control method and system that a kind of computing machine conducts interviews to USB device | |
CN104376631A (en) | Commercial cipher algorithm based security access control system and implementation method thereof | |
CN201654768U (en) | Active type intelligent security USB (Universal Serial Bus) removable storage equipment | |
CN103702323B (en) | A kind of wireless messages security equipment system and method | |
CN106054115A (en) | Safety authentication function testing method and system of charge-control electric energy meter | |
CN104282059A (en) | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods | |
CN105787319A (en) | Iris recognition-based portable terminal and method for same | |
CN205721797U (en) | A kind of novel computer information safe device | |
CN105095780B (en) | The access method and device of test port in a kind of chip | |
CN206178834U (en) | Computer network information safety coefficient | |
CN204066089U (en) | Non-contact audio-frequency demo plant | |
CN104579691A (en) | BYOD mode control method, mobile device and system | |
CN204066090U (en) | Contact audio authentication device | |
CN101799854A (en) | Control device based on handwriting encryption and implementation method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170905 Termination date: 20180228 |
|
CF01 | Termination of patent right due to non-payment of annual fee |