CN2879281Y - Computer hacker, virus attack and data theft proof device based on physical isolation - Google Patents
Computer hacker, virus attack and data theft proof device based on physical isolation Download PDFInfo
- Publication number
- CN2879281Y CN2879281Y CNU2006200786778U CN200620078677U CN2879281Y CN 2879281 Y CN2879281 Y CN 2879281Y CN U2006200786778 U CNU2006200786778 U CN U2006200786778U CN 200620078677 U CN200620078677 U CN 200620078677U CN 2879281 Y CN2879281 Y CN 2879281Y
- Authority
- CN
- China
- Prior art keywords
- hard disk
- backup hard
- virus attack
- hacker
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
A computer hacker, virus attack and data theft proof device based on physical isolation includes a backup hard disk connecting with the computer via a data wire and a power wire, wherein the backup hard disk connects with a CD driver data wire and further connects with the power wire by a spst switch (K1 or K2). The utility model adds a backup hard disk and a spst switch in the computer to switch between a system hard disk and the backup hard disk, thus the aim of computer hacker, virus attack and data theft proof can be achieved.
Description
Technical field
The utility model belongs to computer data protection field, is specifically related to a kind of computing machine that completely cuts off based on physics and prevents hacker and virus attack and steal data set.
Background technology
Present PC computing machine or notebook computer are made up of CPU microprocessor, internal storage, hard disk, CD-ROM drive and floppy drive, and the operating system of employing is the above operating systems of WINDOWS 98 series.And computer virus is mainly propagated by data file; its object of attack is a computer operating system; existing anti-hacker and virus attack technology all are by firewall software and the antivirus software that anti-hacker and virus enter being installed in computing machine, being reached the purpose of anti-hacker and virus attack protected data.Yet, things is development and change, virus is a kind of understanding antagonistic process that finishes that do not have forever with anti-virus software, hacker and anti-hacker software, therefore, fail to upgrade in time for virus firewall software, hacker master-hand finds new operating system leak, and all these may make the whole operation systemic breakdown, if and at this moment do not have a Backup Data, loss can't be estimated so.
Summary of the invention
The purpose of this utility model is to overcome the shortcoming of above-mentioned prior art, provides a kind of and can effectively prevent preventing hacker and virus attack and steal data set based on the isolated computing machine of physics based on what physics completely cutting off of computer virus.
For achieving the above object, the technical solution adopted in the utility model is: the backup hard disk that is connected with computing machine by data line and power lead.The backup hard disk directly is connected with the CD-ROM drive data line, and the backup hard disk then is connected with power lead by a single-pole single-throw switch (SPST) (K1 or K2).
Backup hard disk of the present utility model connects according to " Slave " item in " Cable Select " jumper list.
The utility model increases a backup hard disk and single-pole single-throw switch (SPST) (K1 or K2) in computing machine, realize the switching of system disk and backup hard disk, thereby reaches computing machine anti-hacker and virus attack and steal the purpose of data.
Description of drawings
Accompanying drawing is a structure principle chart of the present utility model.
Embodiment
Below in conjunction with accompanying drawing structural principle of the present utility model and principle of work are described in further detail.
Referring to accompanying drawing, the utility model increases a backup hard disk 3 on the basis of existing P C computing machine or notebook computer hardware setting and the red line of wire harness that is used for cutting off the electricity supply (+5V) or yellow line (+12V) single-pole single-throw switch (SPST) K1 or K2.To back up hard disk 3 according to " Cable Select " jumper list, and select " Slave " item, and then be connected on the data line 2 of CD-ROM drive in PC or the notebook computer, and backup hard disk 3 is connected with power lead 4 by a single-pole single-throw switch (SPST) K1 or K2.When adopting the utility model online, disconnect the power lead 4 of backup hard disk 3 by single-pole single-throw switch (SPST) (K1 or K2).At this moment, PC computing machine or notebook computer can be surfed the Net as common computer.Because backup hard disk 3 is not worked, and enters in the computing machine so virus or hacker have both made, and also can't destroy or steal private data; In the time will handling important clothesline, disconnect network, connect the power connection that single-pole single-throw switch (SPST) (K1 or K2) makes backup hard disk 3, restart computing machine, can handle clothesline carefreely.In view of backup hard disk 3 of the present utility model is separately independently with computer operating system hard disk 1, can prevent effectively that like this computer virus and hacker from destroying and stealing user's private data.In addition, because significant data had both made operating system be damaged on backup hard disk 3, data can not lost yet.
Claims (2)
1, prevents hacker and virus attack and steal data set based on the isolated computing machine of physics, comprise a backup hard disk [3] that is connected with computing machine by data line [2] and power lead [4], it is characterized in that: backup hard disk [3] is connected with CD-ROM drive data line [2], and backup hard disk [3] also is connected with power lead [4] by a single-pole single-throw switch (SPST) (K1 or K2).
2, the computing machine that completely cuts off based on physics according to claim 1 is prevented hacker and virus attack and stolen data set, it is characterized in that: said backup hard disk [3] is connected with CD-ROM drive data line [2] according to " Slave " item in " CableSelect " jumper list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2006200786778U CN2879281Y (en) | 2006-03-30 | 2006-03-30 | Computer hacker, virus attack and data theft proof device based on physical isolation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2006200786778U CN2879281Y (en) | 2006-03-30 | 2006-03-30 | Computer hacker, virus attack and data theft proof device based on physical isolation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2879281Y true CN2879281Y (en) | 2007-03-14 |
Family
ID=37861701
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNU2006200786778U Expired - Fee Related CN2879281Y (en) | 2006-03-30 | 2006-03-30 | Computer hacker, virus attack and data theft proof device based on physical isolation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2879281Y (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530556A (en) * | 2013-08-14 | 2014-01-22 | 南通腾启电子商务有限公司 | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing |
US10331884B2 (en) | 2016-10-10 | 2019-06-25 | Stephen Rosa | Method and system for countering ransomware |
-
2006
- 2006-03-30 CN CNU2006200786778U patent/CN2879281Y/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530556A (en) * | 2013-08-14 | 2014-01-22 | 南通腾启电子商务有限公司 | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing |
US10331884B2 (en) | 2016-10-10 | 2019-06-25 | Stephen Rosa | Method and system for countering ransomware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101714197B (en) | Hardware-based anti-virus scan service | |
CN1925926B (en) | Device including cooperative embedded agents, related system and method | |
WO2005038598A3 (en) | Policy-based network security management | |
EP2463782A3 (en) | Encapsulated Accelerator | |
WO2007130354A3 (en) | Methods and apparatus providing computer and network security for polymorphic attacks | |
WO2009085977A3 (en) | Virtual computing management systems and methods | |
US20120131371A1 (en) | Method for obtaining power states of a computer | |
CN2879281Y (en) | Computer hacker, virus attack and data theft proof device based on physical isolation | |
JP2010157229A (en) | Method, apparatus, article, and removable storage device for pre-boot recovery of locked computer system | |
CN110505246B (en) | Client network communication detection method, device and storage medium | |
CN2785015Y (en) | Network safe system based on NC system | |
TWI470472B (en) | Anti-theft device and method and related computer system | |
US20110154502A1 (en) | Data Protection | |
TW200736891A (en) | Thermal throttling duty estimation methods and systems for a CPU | |
CN2556721Y (en) | Device for anti-hacker and anti-virus and stealing data for computer | |
CN203204625U (en) | Information anti-theft device of computer | |
CN101436241A (en) | Computer network security control system | |
CN102708068A (en) | Implementation method of software tool for flash drive privacy protection | |
CN103530556A (en) | Control system effectively preventing computer from being attacked by hacker and viruses and data stealing | |
CN202103700U (en) | Double network isolation system | |
Cisco | Using Peripherals With Cisco ICS 7750 SPEs | |
CN106714161A (en) | Method for cutting off network connection of unauthorized mobile terminal, equipment and system | |
WO2012156782A1 (en) | Safety system and portable filter module with several connection means for reading, virus identification and removal from data transport devices and computers in general | |
CN102890619A (en) | Novel desk computer hard disk selector | |
CN212966172U (en) | Computer software encryption protection device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |