Computer lab multichannel intelligent port lock
Technical Field
The utility model relates to a security secret equipment technical field to secret-related network uses specifically is a computer lab multichannel intelligent port lock.
Background
At present information-based times, information-based equipment all connects through the network, even if the measure of having done many safety precautions, still can not stop the illegal external connection accident of secret-related computer and equipment, because network plug and network plug are standardized general device, just like a door that does not have the lock, be difficult to effectively manage and control, anyone can pull out at will and insert, and network connection is the general device, and appearance is the same, can't distinguish which root is secret-related net twine, which root is public network twine. It is obvious that in the work under the environment of the secret-related field at present, the problems that the secret-related network cable, the network port of the secret-related computer can be randomly plugged and unplugged and the network port of the network cable is mistakenly plugged and unplugged commonly exist, and the network switching equipment which can safely manage the secret-related machine room is lacked at present.
SUMMERY OF THE UTILITY MODEL
For solving not enough and the defect that above-mentioned prior art exists, to a great deal of problem on above-mentioned technique, management, the application, the utility model provides a machine room multichannel intelligent port lock solves secret-related computer lab, secret-related network's safe access problem, prevents that the user from inserting wrong net twine, or mistake and pull out the net twine and take place the alarm of the external antithetical couplet of violation. And the visual management of the network ports of the computer and various information equipment can be realized by combining the information management system. The product is convenient to use, does not need a user to have computer professional knowledge, and can better prevent illegal external connection, avoid hidden danger of secret leakage, prevent hacker intrusion, virus attack or unauthorized networking equipment use and the like.
Specifically, the utility model discloses a realize like this:
a machine room multi-path intelligent port lock comprises a shell, a circuit board arranged in the shell, a switching module integrated on the circuit board, a power supply module, a port input terminal, a port output terminal, a controller and a relay connected with the port input terminal and the switching module, wherein the switching module is connected to the port output terminal; the controller can control the physical on-off state of a circuit between the network port input terminal and the exchange module through the relay; the jacks of the at least one network port input terminal and the at least 4 network port output terminals and the power plug of the power module are exposed on the side surface of the shell.
Furthermore, the controller can identify whether a network where a network cable connected to the network port input terminal is located is a secret-involved network or a non-secret-involved network through the embedded intelligent chip, and can send a control signal for keeping disconnection or connection to the relay.
Furthermore, a lock ring structure is arranged in the shell at the area above the net port output terminals, the lock ring structure comprises a rotatable lock ring arranged above each net port output terminal, the rotatable lock ring can rotate in or out of the net port output terminals, and the rotated rotatable lock ring is positioned below the lock spring sheet of the net cable plug inserted into the net port output terminals and can limit the downward movement displacement of the lock spring sheet.
Furthermore, a corresponding slot for accommodating the rotation of the rotatable locking ring is arranged in the area above the net port output terminal in the shell, the outer side surfaces of the rotatable locking rings are of a toothed structure, the top area of each rotatable locking ring is matched and connected with the same telescopic rack, the tail end of each telescopic rack is connected with a lock body motor arranged in the shell, the lock body motor is connected to a controller, and the telescopic racks can drive each rotatable locking ring to rotate in or out of the corresponding slot relative to the net port output terminal through extending or retracting displacement.
Furthermore, the tooth-shaped structure is replaced by an extension rod and a rotating gear, the rotating gear is installed at the tail end of the extension rod, the front end of the extension rod is connected to the ring center of the rotatable locking ring, and the rotating gear is matched with the telescopic rack.
Furthermore, a radio frequency identification module (13) is also installed in the top of the shell and connected with the controller.
The technical scheme of the utility model adopted principle: the utility model discloses a product is a computer lab multichannel intelligent network port lock, including integrated on the circuit board exchange module, power module, net gape input terminal, net gape output terminal, controller, and the relay that net gape input terminal and exchange module are connected, exchange module is connected to net gape output terminal; the controller can control the physical on-off state of a circuit between the network port input terminal and the exchange module through the relay; the basic function of the power supply module is the exchanger equipment used in the machine room, the improvement is the on-off control between the exchange module and the net port output terminal, and the design of the controller, when a net wire is connected to the net port input terminal or the net port output terminal, the program on the controller accesses the net port input terminal or the net port output terminal and verifies whether the network to which the net wire belongs is a secret-involved network or a public network, once the public net wire is confirmed, the net port output terminal is not actually connected, only the secret-involved network or the internal network is confirmed, the controller actually connects the net port output terminal, and the exchange function and the network connection function are realized. Meanwhile, the network port output terminal on the switch body is also designed with a lock body, when a network cable is inserted into the network port output terminal, the network is ensured to be normal, the rotatable lock ring can rotate in the network port output terminal, the part extending out after the rotation of the rotatable lock ring is positioned below the lock spring sheet of the network cable plug inserted into the network port output terminal, the downward displacement of the lock spring sheet can be limited, namely, at the moment, a general person cannot pull down the network cable inserted into the switch of the multi-path intelligent network port lock of the machine room or randomly replace the network cable to insert, on one hand, the rotatable lock ring can limit the lock spring sheet of the inserted network cable not to be pressed down and pulled out, and on the other hand, the other network cable can be prevented from being inserted into the switch to be connected into the internal network, and the network port input terminal is also provided with a rotatable structure, but the rotatable lock ring of the input end and the output end is independently controlled. To release the locking state between the RJ45 terminal and the network port, an operating user needs to have two kinds of management authorities, one of which is a common authority and can be used for controlling the unlocking of the network port output terminal; one is administrator authority, and realizes data exchange, unlocking of the internet access input terminal and other operations through radio frequency information.
The utility model has the advantages that:
(1) this computer lab multichannel intelligent network port lock is through the design to the rotatable catch of RJ45 terminal, realize forming the lock body structure to the RJ45 terminal with reasonable structure, in case insert the net gape of switch, under the state of assigned lock at the controller, rotatable catch is changeed in, pin the RJ45 terminal, unable manual unblock is extracted, need carry out identity authority authentication to operating personnel, operating personnel who has the authority could drive rotatable catch through the removal of built-in lock body motor control through flexible rack and roll out, unblock RJ45 terminal, just can extract, the effectual condition that other personnel maloperation will be involved in secret net twine of secret calculation and extract at will has been prevented, prevent other people and connect privately, the function of private network twine.
(2) The built-in verification program that this computer lab multichannel intelligent network mouth lock passes through can insert the net twine at net gape input terminal, net gape output terminal of switch simultaneously can carry out the verification of whether for secret-involved network or public network extranet at this equipment, prevents that the condition of just discovering wrong insertion after the outer net twine wrong insertion secret-involved computer, has effectually avoided consequence and risk that wrong insertion secret-involved calculation brought.
Drawings
FIG. 1 is a schematic diagram of an internal structure of a multi-path intelligent port lock of a machine room;
FIG. 2 is a perspective view of a multi-channel intelligent port lock of a machine room;
FIG. 3 is a schematic diagram of a structural application of a rotatable locking ring of a multi-path intelligent port lock of a machine room;
FIG. 4 is a schematic diagram illustrating the locking and unlocking principle of a rotatable locking ring of a multi-channel intelligent network port lock of a machine room;
wherein: the intelligent lock comprises a shell 1, an exchange module 2, a power supply module 3, a net mouth input terminal 4, a net mouth output terminal 5, a rotatable locking ring 6, a locking spring piece 7, a net line plug 8, a slot 9, a lock body motor 10, an extension rod 101, a rotating gear 102, a telescopic rack 11, an intelligent chip 12, a radio frequency identification module 13, a controller 14 and a relay 15.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the description is intended to be illustrative only and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
It is required to state, controller, intelligent chip be the processor element that has programming, processing and control function that can purchase on the existing market, and the procedure of its operation is that the technical staff can be according to the utility model discloses a function and demand are compiled the realization, not the utility model discloses the content of protection, the utility model discloses it is to protect, is the relation of connection and the structural configuration characteristics of the whole and the inside device of this product.
Example 1: introduction to structure and function of product embodiments
A machine room multi-path intelligent port lock comprises a shell 1, a circuit board arranged in the shell 1, a switching module 2, a power module 3, a network port input terminal 4, a network port output terminal 5, a controller 14 and a relay 15, wherein the switching module 2, the power module 3, the network port input terminal 4, the network port output terminal 5, the controller 14 and the relay 15 are integrated on the circuit board, and the switching module 2 is connected to the network port output terminal 5; the controller 14 can control the physical on-off state of the circuit between the network port input terminal 4 and the exchange module 2 through the relay 15; jacks of at least one network port input terminal 4 and at least 4 network port output terminals 5 and power plugs of the power supply module 3 are exposed on the side surface of the shell 1. The power plug is used for an external power supply to supply power to a circuit board, electronic devices and modules of the whole equipment, the exchange module 2 is an existing product and is used for exchanging and transferring network data, the network port input terminal 4 is a network signal input port, the network port output terminal 5 is a network signal output port for completing distribution after exchange, and the controller 14 can identify whether a network where a network cable connected to the network port input terminal 4 is located is a secret-related network or a non-secret-related network through the embedded intelligent chip 12 and can send a control signal for keeping disconnection or connection to the relay 15. After the network condition of the accessed network cable is verified by the controller 14, if the network risk of accessing the external network does not exist and the network belongs to the verified secret-related internal network, the controller 14 controls the built-in relay 15 to connect the circuit from the switching module 2 to the network port output terminal 5, so that the access interaction of the secret-related network is realized; when the network to which the network cable belongs is detected to be in an external network environment, the circuit between the switching module 2 and the network port output terminal 5 is kept in a disconnected state, and a confidential computer connected with the confidential network cannot be connected with the network cable, so that the purpose of protection is achieved. It verifies can be to net gape input terminal 4 male net twine verify, also can be to net gape input terminal 4, net gape output terminal 5 male net twine all verify, consequently, relay 15 is installed between every net gape output terminal 5 and exchange module 2, the break-make of the physical connection of data between certain net gape output terminal 5 of directional independent control and the switch, and when the net twine was inserted the back, it has been conventional technique to discern the net twine and insert, the utility model discloses only write in on controller 14 and discern the net twine and insert the back, the program that preferentially verifies carries out the function and adds successively, and such technical step has been prior art.
Preferably, the housing 1 is provided with a lock ring structure in an area above the net gape output terminal 5, the lock ring structure includes a rotatable lock ring 6 mounted above each net gape output terminal 5 or net gape input terminal 4, the rotatable lock ring 6 can be rotated in or out of the net gape output terminal 5, and the rotated rotatable lock ring 6 is located below the lock spring 7 of the net twine plug 8 inserted into the net gape output terminal 5 or net gape input terminal 4, and can limit the amount of downward movement of the lock spring 7.
The inside regional above net gape output terminal 5 that is equipped with in shell 1 and holds rotatable catch 6 pivoted corresponding fluting 9, the outside surface of rotatable catch 6 is tooth structure, and the top region of every rotatable catch 6 all agrees with same flexible rack 11 and is connected mutually, the end of flexible rack 11 links to each other with the lock body motor 10 of installing in the inside of shell 1, lock body motor 10 is connected to controller 14, flexible rack 11 can drive every rotatable catch 6 in respective fluting 9 through the displacement of stretching out or retracting, for net gape output terminal 5 commentaries on classics in or roll out. For example, under normal conditions, the net mouth output terminal 5 is in an unlocked state, the retractable rack 11 is in a retracted state, at this time, the end of the rotatable lock ring 6 retracts into the slot 9, the net mouth output terminal 5 or the net mouth input terminal 4 is not shielded, the net cable can be normally inserted, after the construction of the secret-related network is completed and normal operation is performed, a controller 14 is operated by a controller to start the locked state, at this time, the lock body motor 10 is started to drive the retractable rack 11 to extend, in the process of extending the retractable rack 11, the tooth-shaped structure of the rotatable lock ring 6 matched with the retractable rack is driven to rotate along with the retractable rack, the rotatable lock ring 6 rotates from the slot 9 to enter the area of the net mouth output terminal 5 or the net mouth input terminal 4, specifically, below the locking spring leaf 7 of the net cable plug 8 inserted into the net mouth output terminal 5 or the net mouth input terminal 4, the displacement of the locking spring leaf 7 can be limited, at this time, the network cable plug 8 cannot be pulled out from the network port output terminal 5 or the network port input terminal 4, or cannot be inserted. Control to controller 14, still install radio frequency identification module 13 in can 1 top through the shell and go on, radio frequency identification module 13 is connected with controller 14, through the radio frequency card authentication, only through system authentication, accord with the authority, could control controller 14 and carry out command control, control lock body motor 10 corotation, receive and release through flexible rack 11, and it is rotatory to drive rotatable catch 6, lock, the unblock state between going on net gape output terminal 5 or net gape input terminal 4, just can be manual to the net twine on the switch pull out and insert the operation.
Example 2: practical operation demonstration case
The method comprises the following steps that firstly, a service management end is preset and installed in a secret-related network, and the service management end comprises an intranet authentication server stored with authentication information; a public network authentication server is preset in an external network, and the public network authentication server comprises authentication information stored in the public network authentication server; the verification servers have the functions of data information storage and verification operation and can make verification feedback;
secondly, a network port input terminal is connected into a network port of a network cable, and a verification program is started;
thirdly, the verification program carries out home network verification on the network cable inserted into the network port input terminal or the network port output terminal, and sends verification access information to a preset intranet verification server through the network cable and also sends verification access information to a public network verification server;
fourthly, after receiving the verification access information, the internal network verification server and the public network verification server can respectively feed back verification information to the verification program; thirdly, if the specified preset program is operated, the verification server sends a feedback instruction to the verification program;
after receiving the feedback instruction, the verification program can determine whether the network to which the network belongs is a secret-related intranet or a public network extranet or whether the network can be accessed to the extranet, that is, the verification program receives the feedback verification information and judges the network type to which the network cable belongs based on the verification information;
sixthly, when the network type of the network cable is a non-public network and the network cable is verified to be a secret-related internal network, controlling a relay to switch on a circuit between a network port input terminal or an output terminal and the exchange module; as long as the feedback verification information contains information from the public network, the circuit is not connected, and misconnection information is recorded. The switch is prevented from being inserted wrongly, and the condition of internal and external networks can be accessed simultaneously.
The network type of the network cable is a non-public network (secret-related network), and the verification access information sent by the verification server is correct, but the feedback verification information does not contain the verification access information from the public network, and the relay is controlled to be connected with a line between the network port input terminal or output terminal and the exchange module.
The radio frequency identification module 13 is connected with the controller, and the radio frequency card divide into the unblock card and locks the card, through the radio frequency card authentication, only through system authentication, accords with the authority, just can control the controller and carry out command control, and control lock body motor corotation is through receiving and releasing of flexible rack, and it is rotatory to drive rotatable catch, carries out locking, the unblock state between net gape output terminal or the net gape input terminal, just can manually pull out the operation of inserting to the net twine on the switch. If the user does not have the authority, a rejection prompt is sent.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.