CN207742669U - A kind of novel computer internet information safety control - Google Patents
A kind of novel computer internet information safety control Download PDFInfo
- Publication number
- CN207742669U CN207742669U CN201721795349.4U CN201721795349U CN207742669U CN 207742669 U CN207742669 U CN 207742669U CN 201721795349 U CN201721795349 U CN 201721795349U CN 207742669 U CN207742669 U CN 207742669U
- Authority
- CN
- China
- Prior art keywords
- master control
- control set
- internet information
- separately connected
- computer internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model discloses a kind of novel computer internet information safety controls,Including master control set,External circuits plate and the network port,Master control set both sides are equipped with connection and arrange,The connection row other side is equipped with optical disc storage,Master control set is equipped with Account Logon,Account Logon is separately connected password authentification,Mobile phone is verified and is locally stored,The backup of connection high in the clouds is locally stored,It is locally stored and is separately connected rubbish cleaning with high in the clouds backup,External circuits plate connecting detection device,Detection device is separately connected warning device and breaker device,The network port connects checking and killing virus,Checking and killing virus is separately connected fire wall and prosthetic device,Fire wall is connected with prosthetic device,Pass through 24 hours real time monitoring networks of detection device,Internet worm is removed by checking and killing virus,Pass through high in the clouds backup and the dual backup information data of optical disc storage,It avoids losing,Computer internet information security control is improved comprehensively,The utility model is designed reasonably,It is suitble to promote the use of.
Description
Technical field
The utility model is related to a kind of safety controls, more particularly, to a kind of novel computer internet information safety
Control device.
Background technology
Computer is commonly called as computer, is one of 20th century state-of-the-art science and technology invention, to the production activity of the mankind and society
It movable can produce extremely important influence and develop rapidly with strong vitality its application field from initial military section
Grind application extension to society every field, formd huge computer industry driven the technology of global range into
Thus step has caused deep social change computer and has spread general enterprises and institutions of school.Computer application is got in China
Lead to the fields such as communicating multimedia come the quantity for the later China Computer Users that more generally reforms and opens up to the outside world constantly soaring especially interconnect
Application achieve 1996 to 2009 computer user's quantity of good achievement and rise to 67,100,000 from original 6,300,000
Platform Net-connected computer number of units rises to 59,400,000 by original 2.9 ten thousand.It is wireless mutual that Internet user has reached 3.16 hundred million
Networking have 6.7 hundred million mobile subscribers wherein surfing Internet with cell phone user up to 1.17 hundred million for the whole world first.
In digital Age, the storage of information, transmission safety are particularly significant, and computer can be by disease after being connected to network
The attack of poison, hacker etc., the various important informations stored in a computer can be stolen, it is also possible to showing for computer damage occur
As needing to carry out effective monitoring to the network information security of computer, therefore, designing a kind of novel computer internet information peace
Full control device.
Utility model content
The technical problems to be solved in the utility model is that existing computerized information storage, transmission is overcome to be easy by virus
The defect lost is attacked, a kind of novel computer internet information safety control is provided, to solve the above problems.
To achieve the above object, the utility model provides the following technical solutions:A kind of novel computer internet information peace
Full control device, including master control set, external circuits plate and the network port, the master control set both sides are equipped with connection and arrange, described
Connection row side is equipped with several USB interfaces, and the USB interface bottom is equipped with several circle interfaces, and the connection row other side is set
There are optical disc storage, the master control set to be equipped with Account Logon, the Account Logon is separately connected password authentification, mobile phone is verified and this
Ground stores, and described that the backup of connection high in the clouds is locally stored, described be locally stored is separately connected rubbish cleaning with high in the clouds backup, described outer
Circuit board connecting detection device is connect, the detection device is separately connected warning device and breaker device, the network port connection
Checking and killing virus, the checking and killing virus are separately connected fire wall and prosthetic device, and the fire wall is connected with prosthetic device.
As a kind of optimal technical scheme of the utility model, the rubbish cleaning and high in the clouds backup are separately connected password and test
Card and mobile phone verification.
As a kind of optimal technical scheme of the utility model, the warning device is equipped with light prompt and voice prompt.
As a kind of optimal technical scheme of the utility model, the USB interface of the breaker device connection master control set.
As a kind of optimal technical scheme of the utility model, the fire wall connects master control set with prosthetic device.
As a kind of optimal technical scheme of the utility model, the master control set is equipped with stand-by power supply.
As a kind of optimal technical scheme of the utility model, the external wired or wireless network of network port connection
Network.
Compared with current technology, the utility model has the beneficial effects that:This kind of novel computer internet information is controlled safely
Device processed, structure design is completely compact, detects external network safety by checking and killing virus, it is ensured that master control set connects network security
Property, it is killed virus using checking and killing virus to hostile network, fire wall is protected, when master control set or fire wall are wooden by malice
It when horse encroaches on, is repaired in time using prosthetic device, prevents poisoning intrusion, information data is attacked in order to prevent, detection dress
24 hours real time monitoring network safety is set, destruction Times alarm device sends out police using light prompt and voice prompt when noting abnormalities
The number of notifying, breaker device power themselves down obstruct data transmission, improve the reliability of master control set data, and master control set is equipped with account
Family log in, the locally stored storage of relevant information, connect network after manually select significant data is synchronized be stored into high in the clouds backup
And optical disc storage needs to carry out password authentification and external mobile phone is tested when needing rubbish cleaning information or mobile message
Card two ways uses simultaneously, and extraneous steal is avoided to delete information with malice, improves account security, and information multiple duplication,
The storage for enhancing data, improves the safety of login, the utility model is designed reasonably is suitble to promote the use of.
Description of the drawings
Attached drawing is used to provide a further understanding of the present invention, and a part for constitution instruction, with this practicality
Novel embodiment for explaining the utility model, does not constitute limitations of the present invention together.In the accompanying drawings:
Fig. 1 is the structural schematic diagram of the utility model;
In figure:1, external circuits plate;2, detection device;3, warning device;4, voice prompt;5, light prompt;6, it powers off
Device;7, circle interface;8, USB interface;9, connection row;10, master control set;11, password authentification;12, Account Logon;13, hand
Machine is verified;14, optical disc storage;15, fire wall;16, checking and killing virus;17, the network port;18, prosthetic device;19, rubbish is cleared up;
20, high in the clouds is backed up;21, it is locally stored.
Specific implementation mode
The following will be combined with the drawings in the embodiments of the present invention, carries out the technical scheme in the embodiment of the utility model
Clearly and completely describe, it is clear that the described embodiments are only a part of the embodiments of the utility model, rather than whole
Embodiment is based on the embodiments of the present invention, and those of ordinary skill in the art are without making creative work
The every other embodiment obtained, shall fall within the protection scope of the present invention.
Referring to Fig. 1, the utility model provides a kind of technical solution:A kind of novel computer internet information security control
Device, including master control set 10, external circuits plate 1 and the network port 17,10 both sides of master control set are equipped with connection row 9, connection row 9
Side is equipped with several USB interfaces 8, and 8 bottom of USB interface is equipped with several circle interfaces 7, connects external equipment, 9 other sides of connection row
Equipped with optical disc storage 14, information storage, master control set 10 is equipped with Account Logon 12, and Account Logon 12 is separately connected password authentification
11, mobile phone verifies 13 and is locally stored 21, and specified private client is locally stored 21 connection high in the clouds backup 20, backs up, locally deposit
Storage 21 and high in the clouds backup 20 are separately connected rubbish cleaning 19, and rubbish is removed, 1 connecting detection device 2 of external circuits plate, monitoring network
Network, detection device 2 are separately connected warning device 3 and breaker device 6, alarm power-off protection, and the network port 17 connects checking and killing virus
16, cleaning virus, checking and killing virus 16 is separately connected fire wall 15 and prosthetic device 18, and protection box is repaired, fire wall 15 and reparation
Device 18 is connected, and repairs.
Rubbish cleaning 19 and high in the clouds backup 20 are separately connected password authentification 11 and mobile phone verification 13, authentication, alarm dress
It sets 3 and is equipped with light prompt 5 and voice prompt 4, send out signal, breaker device 6 connects the USB interface 8 of master control set 10, fire wall
15 and prosthetic device 18 connect master control set 10, safeguard, master control set 10 be equipped with stand-by power supply, Emergency use, the network port 17
The external wired or wireless network of connection, network connection.
Concrete principle:When using this kind of novel computer internet information safety control, log on master control set 10
Account Logon 12, information data be locally stored 21 into row information the operations such as store and transmit, the network port 17 is connected
External network, checking and killing virus 16 carry out safety detection scan reset to network, and fire wall 15 obstructs virus, when master control set 10 by
When damage, prosthetic device 18 carries out reparation installation, and master control set 10 connects external circuits plate 1, when detection device 2 detects that network is pacified
When complete under attack, warning device 3 utilizes voice prompt 4 and 5 signal an alert of light prompt, and breaker device 6 closes simultaneously
The power supply of external circuits plate 1 is closed, after master control set 10 connects network, the synchronizing information for being locally stored 21 is transferred to high in the clouds backup 20
In optical disc storage 14, when needing to clear up memory, after verifying 13 two kinds of operational qualifications by password authentification 11 and mobile phone, hand is carried out
It is dynamic to delete information, it is ensured that network security, information security.
This kind of novel computer internet information safety control, structure design is completely compact, passes through checking and killing virus 16
Detect external network safety, it is ensured that master control set 10 connects internet security, is killed using checking and killing virus 16 to hostile network
Poison, fire wall 15 are protected, when master control set 10 or fire wall 15 are encroached on by malice wooden horse, using prosthetic device 18 into
Row is repaired in time, prevents poisoning intrusion, and information data is attacked in order to prevent, 224 hours real time monitoring network peaces of detection device
Entirely, Times alarm device 3 is destroyed using light prompt 5 and 4 signal an alert of voice prompt when noting abnormalities, breaker device 6 is certainly
Row power-off, obstructs data transmission, improves the reliability of 10 data of master control set, master control set 10 is equipped with Account Logon 12, related
Information it is locally stored storage 21, connect network after manually select significant data is synchronized be stored into high in the clouds backup 20 and CD deposit
Storage 14 needs to carry out password authentification 11 and external mobile phone is verified when needing rubbish to clear up 19 information or mobile message
13 two ways use simultaneously, and extraneous steal is avoided to delete information with malice, improve account security, and information multiple duplication,
The storage for enhancing data, improves the safety of login, the utility model is designed reasonably is suitble to promote the use of.
Finally it should be noted that:The above descriptions are merely preferred embodiments of the present invention, is not limited to this
Utility model, although the utility model is described in detail with reference to the foregoing embodiments, for those skilled in the art
For, it still can be with technical scheme described in the above embodiments is modified, or to which part technical characteristic
Equivalent replacement is carried out, within the spirit and principle of the utility model, any modification, equivalent replacement, improvement and so on,
It should be included within the scope of protection of this utility model.
Claims (7)
1. a kind of novel computer internet information safety control, including master control set (10), external circuits plate(1)And net
Network port(17), which is characterized in that master control set (10) both sides are equipped with connection and arrange(9), the connection row(9)Side is equipped with
Several USB interfaces(8), the USB interface(8)Bottom is equipped with several circle interfaces (7), the connection row(9)The other side is equipped with
Optical disc storage(14), the master control set (10) is equipped with Account Logon(12), the Account Logon(12)Password is separately connected to test
Card(11), mobile phone verification(13)Be locally stored(21), described to be locally stored(21)Connect high in the clouds backup(20), the local is deposited
Storage(21)It is backed up with high in the clouds(20)It is separately connected rubbish cleaning(19), the external circuits plate(1)Connecting detection device(2), institute
State detection device(2)It is separately connected warning device(3)And breaker device(6), the network port(17)Connect checking and killing virus
(16), the checking and killing virus(16)It is separately connected fire wall(15)And prosthetic device(18), the fire wall(15)It is filled with repairing
It sets(18)It is connected.
2. a kind of novel computer internet information safety control according to claim 1, which is characterized in that described
Rubbish is cleared up(19)It is backed up with high in the clouds(20)It is separately connected password authentification(11)It is verified with mobile phone(13).
3. a kind of novel computer internet information safety control according to claim 1, which is characterized in that described
Warning device(3)Equipped with light prompt(5)And voice prompt(4).
4. a kind of novel computer internet information safety control according to claim 1, which is characterized in that described
Breaker device(6)Connect the USB interface of master control set (10)(8).
5. a kind of novel computer internet information safety control according to claim 1, which is characterized in that described
Fire wall(15)And prosthetic device(18)Connect master control set (10).
6. a kind of novel computer internet information safety control according to claim 1, which is characterized in that described
Master control set (10) is equipped with stand-by power supply.
7. a kind of novel computer internet information safety control according to claim 1, which is characterized in that described
The network port(17)The external wired or wireless network of connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201721795349.4U CN207742669U (en) | 2017-12-20 | 2017-12-20 | A kind of novel computer internet information safety control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201721795349.4U CN207742669U (en) | 2017-12-20 | 2017-12-20 | A kind of novel computer internet information safety control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN207742669U true CN207742669U (en) | 2018-08-17 |
Family
ID=63118950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201721795349.4U Active CN207742669U (en) | 2017-12-20 | 2017-12-20 | A kind of novel computer internet information safety control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN207742669U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955710A (en) * | 2019-11-26 | 2020-04-03 | 杭州数梦工场科技有限公司 | Method and device for processing dirty data in data exchange operation |
-
2017
- 2017-12-20 CN CN201721795349.4U patent/CN207742669U/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955710A (en) * | 2019-11-26 | 2020-04-03 | 杭州数梦工场科技有限公司 | Method and device for processing dirty data in data exchange operation |
CN110955710B (en) * | 2019-11-26 | 2023-12-26 | 杭州数梦工场科技有限公司 | Dirty data processing method and device in data exchange operation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106650855B (en) | A kind of fire-fighting equipment total management system | |
CN104283889B (en) | APT attack detectings and early warning system inside electric system based on the network architecture | |
CN101848373B (en) | Wireless video monitoring system and video monitoring method thereof | |
CN110493220A (en) | A kind of data sharing method based on block chain, equipment and storage medium | |
CN105337971A (en) | Electric power information system cloud safety guarantee system and implementation method thereof | |
CN205681457U (en) | A kind of data safety network gateway equipment with inherently safe defense function | |
CN108694313A (en) | A kind of computer user's identification system | |
CN103646310A (en) | Rental-estate management system | |
CN107590874A (en) | Safety route inspection method and inspection mobile terminal | |
CN106162649A (en) | A kind of identify the method for WAP legitimacy, terminal and system | |
CN102663503A (en) | Information security assessment method | |
CN102324003A (en) | Multi-strategy self-destruction method for highly-credible embedded computer | |
CN106503524A (en) | A kind of computer network security guard system | |
CN107104958A (en) | Manage the method, private clound and public cloud equipment and storage device of private clound equipment | |
CN207742669U (en) | A kind of novel computer internet information safety control | |
CN112312341A (en) | Intelligent monitoring method and system for communication of Internet of things of electric power based on block chain | |
CN110049028A (en) | Monitor method, apparatus, computer equipment and the storage medium of domain control administrator | |
CN105205581A (en) | Power-supply-enterprise electronic file safety risk evaluation system | |
CN107194265A (en) | A kind of device of the warehouse compartment supervision based on block chain image processing techniques | |
CN114266081A (en) | Operation and maintenance computer safety protection system and method of power monitoring system | |
Tatar et al. | Impact assessment of cyber attacks: A quantification study on power generation systems | |
CN106534110B (en) | Trinity transformer substation secondary system safety protection system framework system | |
CN105525828A (en) | Remote monitoring system of safe | |
CN111400774A (en) | Block chain structure of secondary water supply anti-terrorism anti-poison safety system | |
CN106599654A (en) | Computer network safety controller and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |