Background technology
Along with constantly popularizing of computing machine, a lot of users have not only one computer, all dispose different computers in different places such as office, family, laboratories, and different computers all has own different operating system, application software and data.In order to use consistent data in different places, utilize USB flash disk to copy mutually usually at present at the computer in different places, so be difficult to guarantee the synchronism of each computer data, the risk that has also brought virus between each computer, to propagate simultaneously.In case and existing computing machine infective virus, the lighter causes the collapse of system, weight person can cause the losing of data or the damage of computer hardware, brings serious loss to the user.Another aspect, existing computing machine generally adopts the structure of soft or hard one, the execution command of operating system software is based on carry out concrete instruction as the computer hardware of carrying out body, and application software is based on concrete operating system execution command, promptly from the application software to the operating system software up to computer hardware, execute instruction and execution body close-coupled, this makes transplanting of carrying out body become very difficult, and carrying out body and execution command has to be separated.In order to guarantee can to work smoothly on each computer, all computers all must be installed all application software, have brought the waste of resource and the lifting of cost.。
Existing personal computer user is more and more pursued the personalization of use and the protection of privacy, comprises the personalized requirement to operating system, application software and personal data.And existing personal computer need have the hardware of independent completions such as mainboard, central processing unit, internal memory, hard disk, application software must be moved based on the hardware of above-mentioned personal computer independent completion simultaneously, software closely relies on hardware, make the application software on the personal computer can not be transplanted to easily in other the computer environment, application software lacks universality; And on the other hand, because the operating system software of personal computer is based on its concrete hardware operation, and its application software is based on its operating system software operation, this makes the application software of personal computer carry out the body hard disk and can not conveniently be transplanted in other the computer environment that the hard disk of personal computer can't be carried and be transplanted to other computing machine and use.For personalization and the privacy that guarantees the user, can only be the computer that each one disposes a platform independent, the wasting phenomenon of a computer of staff in the one family has so just appearred.
In order to realize the personalized application and the unification of application software and data, the previous general solution of order be the user at the conversion working environment or when going on business, carry thick and heavy notebook computer to use own personalized operating system and corresponding application.But notebook computer is difficult on high-performance and the high convenience and obtains doulbe-sides' victory, the often volume and weight of superior performance is big, the dirigibility that influence is gone on business and taken action, small and exquisite often arithmetic capability has been subjected to very big constraint, and the size of input-output device also has been subjected to very big constraint and can't have used easily simultaneously.Make that like this user who carries notebook can't enjoy high convenience and high-performance simultaneously, satisfactory to both parties because present notebook computer is difficult to accomplish.Simultaneously, notebook computer has also brought potential safety hazard, and the carrier is owing to target obviously needs to strengthen the dynamics of keeping, even simultaneously in case lose that will to cause losing of significant data be serious consequence such as divulge a secret.
To sum up, conclude the not enough as follows of existing computing machine:
1) can't realize the synchronous of each computer data simply;
2) can't realize effective protection of virus with protected data farthest from hardware point of view;
3) can't realize the integrated of application software, operating system conveniently to be transplanted to different computers;
4) the no portable function of carrying;
5) can't economy satisfy user's individual demand and protection user's privacy easily;
6) can't take care of and lose warning easily.
Summary of the invention
Fundamental purpose of the present invention is the deficiency at active computer, and a kind of soft computer and implementation method are provided.This soft computer is inserted environment and backup machine and is constituted by intelligent terminal.This soft computer has data automatically synchronously and the function of backup, has the hardware protection function, has user's authentication and loses warning function, has hardware firewall to realize that the function of the hardware isolated of virus is had portable function of carrying.The intelligent terminal of this soft computer has been realized driver, operating system, application software and data integrated framework, has realized viral isolation features in data field and software district, is a kind of novel structure and implementation method.
The present invention is achieved by the following technical solutions:
A kind of soft computer and implementation method, its feature comprises:
This soft computer is made of intelligent terminal, access environment and backup machine.
Wherein intelligent terminal is made of memory bank and outer junctor two parts: memory bank comprises the data field, viral isolated area, application software, operating system and driver; Outer junctor comprises that CPU reaches and the hardware protection module of its interconnection, and authentication module is lost alarm module and hardware anti-virus module.
Wherein insert environment by input/output peripheral and show that peripheral hardware, computing platform constitute.
Wherein backup machine is that an access environment can have the function of data backup by the computing machine of access to netwoks.
The memory bank of intelligent terminal, it has the carrier of memory function for certain, can be based on the high capacity memory carrier of flash memory, also can be based on the high capacity memory carrier of magnetic disc, is used for storage data and software.Memory bank is characterised in that: memory bank is divided into data field and software district according to the difference of memory contents.
Wherein the data field is in order to preserve user's data.
Wherein viral isolated area is carried out soft isolation, virus-isolating at software area and data area.
Wherein application software is the application software that is installed in the personalization on the memory bank, in order to working and learning at ordinary times.
Wherein operating system is the individual operation system that is installed on the memory bank, and it both can be the operating system software of industrywide standard, and as form Windows, Linux etc. also can be other self-defining or independently developed operating system softwares.
Wherein driver is the general driver that is installed on the memory bank, inserts in other environment automatically more newer driver to adapt to the access environment to adapt to intelligent terminal.
The outer junctor of intelligent terminal is characterized in that:
CPU, be used for control and management hardware protection module, authentication, lose and report to the police and hardware firewall module and with memory bank and insert environment and link to each other.
The hardware protection module is not subjected to the influence of abnormal voltage or electric current in order to the memory bank of protection intelligent terminal.
Authentication is meant that intelligent terminal utilizes biometric sensor to carry out biological information identification and carries out identification authentication, and this biological information can be a hand information, comprises fingerprint, palmmprint and hand-type, can be eye information, comprise iris and retina, can be head, comprise face, ear-lobe and lip can be biochemical informations, comprise DNA and body odour, can be behavioural information, comprise sound, signature, gait etc.
Losing reports to the police be meant intelligent terminal detect its with the user between whether satisfy the condition of losing and send alerting signal to related alarm, whether exceed the threshold value that sets as the distance that detects between intelligent terminal and the user.
Hardware firewall can be from hardware view interception virus, with the safety of protection memory bank.
A kind of structure of soft computer and implementation method, access environment wherein comprise input/output peripheral and show peripheral hardware and computing platform two parts.
Wherein input/output peripheral and demonstration peripheral hardware comprise input peripherals such as keyboard, mouse, and display etc. show peripheral hardware, input/output peripherals such as network interface card, sound card, USB interface.Various input/output peripherals and demonstration peripheral hardware insert with the user in order to the intelligent terminal of giving soft computer and carry out alternately.
Wherein computing platform is meant and inserts the platform that environment has the computing data, it can be the computing power that inserts the independently computing machine that environment this locality had, promptly inserting environment is the complete computing machine of a platform independent, computer environment has the hardware of independent completion, also can be the computing platform that remote server provides.
A kind of structure of soft computer and implementation method, backup machine wherein be for inserting the backup computer that environment can long-range connection, insert that environment can long-rangely be connected to backup machine and with the data field backed up in synchronization of intelligent terminal to backup machine.
A kind of soft computer and implementation method is characterized in that: intelligent terminal realizes that intelligent terminal inserts and the backup machine backed up in synchronization.
Intelligent terminal is realized may further comprise the steps:
Step 101: on memory bank, mark off data field, viral isolated area, application software, operating system and 5 subregions of driver,
Step 102: the partly integrated CPU of junctor outside, CPU be used for control and management hardware protection module, authentication, lose and report to the police and hardware firewall module and with memory bank and insert environment and link to each other,
Step 103: memory bank and outer junctor are coupled together the formation intelligent terminal.
Intelligent terminal inserts and may further comprise the steps:
Step 201: the interface that the high-speed interface that intelligent terminal provides by described CPU is corresponding with inserting environment connects,
Step 202: whether the electrical specification that intelligent terminal hardware protection module detect to insert in safe range, as in safe range, and execution in step 203, as not in safe range, the hardware protection module is reported to the police,
Step 203: intelligent terminal carries out authentication to the user and judges its whether validated user, as is validated user, execution in step 204, otherwise report to the police,
Step 204: intelligent terminal obtains its control that inserts the computing machine of environment automatically,
Step 205: the intelligent terminal kernel that starts the operating system, initialization system also loads initiating task, and detect the hardware device that inserts computer environment and install driver automatically automatically, and dispose automatically,
Step 206: the intelligent terminal os starting finishes, and waits for authentication user use corresponding application,
Step 207: in the use, intelligent terminal carries out the hardware anti-virus to all data stream that enter and detects, as finds that virus then carries out hardware isolated outside memory bank,
Step 208: in the use, the application software of intelligent terminal is put into viral isolated area with doubtful virus, with the further diffusion that prevents that it is possible,
Step 209: after finishing using, intelligent terminal with the data field backed up in synchronization to backup machine.
The backup machine backed up in synchronization may further comprise the steps:
Step 301: insert environment after intelligent terminal inserts, send inquiry to backup machine,
Step 302: backup machine is replied, and allows backup,
Step 303: the intelligent terminal that has inserted backups to the data of data field on the backup machine by inserting environment.
A kind of soft computer and implementation method, its authentication module and lose alarm module is characterised in that:
Authentication may further comprise the steps:
The input of subscriber identity information:
Step 401: carry out user's corresponding biological characteristic extraction according to the biometric information sensor of soft computer,
Step 402: the biological characteristic according to extracting, generate corresponding Wave data or view data,
Step 403: the Wave data of corresponding generation or view data are carried out filtering, smoothly reached pre-service such as noise reduction,
Step 404: pretreated data are carried out binaryzation and thinning processing,
Step 405: data after the refinement are carried out feature point extraction,
Step 406: the unique point of extracting is stored to database.
The affirmation of subscriber identity information:
Step 501: carry out user's corresponding biological characteristic extraction according to the biometric information sensor of soft computer,
Step 502: the biological characteristic according to extracting, generate corresponding Wave data or view data,
Step 503: the Wave data of corresponding generation or view data are carried out filtering, smoothly reached pre-service such as noise reduction,
Step 504: pretreated data are carried out binaryzation and thinning processing,
Step 505: data after the refinement are carried out feature point extraction,
Step 506: the unique point extracted and step 406 are stored to data of database compare and export comparison result.
Soft computer is lost to report to the police and be may further comprise the steps:
Step 601: the user is provided with the warning attribute and the alarm threshold value of soft computer, as leaves user's distance, or the variation of certain biological characteristic of user,
Step 602: soft computer reported to the police to be associated with on the other-end that the user carries, as mobile phone,
Step 603: the warning attribute that detects soft computer as the alarm terminal of soft computer association exceeds alarm threshold value, then sends alerting signal, and whether the user checks soft computer and lose.
A kind of soft computer and implementation method, the hardware protection module of its intelligent terminal is characterized in that:
Step 701: detect the electrical specification of interface, as voltage and electric current,
Step 702: whether the electrical specification that judgement is detected as in safe range, then opens circuit interface and memory bank between in safe range, otherwise, send warning message,
Step 703: receive warning message, disconnect connection.
A kind of soft computer and implementation method, the hardware anti-virus of its intelligent terminal is characterized in that, utilizes the hardware chip that has processing power to finish following step:
Step 801: hold back the data stream that inserts environment,
Step 802: whether analysis detecting data stream contains virus,
Step 803: killing virus,
Step 804: the data stream after the killing virus is passed to memory bank.
Soft computer of the present invention and implementation method have following advantage, and be as shown in table 1.
Table 1 soft computer and active computer are relatively
|
Soft computer |
Active computer |
Portable degree |
Volume is little, in light weight |
Volume is big, Heavy Weight |
Data sync and backup |
Automatically |
Manually |
Personalized |
Well |
Generally |
The hardware protection measure |
Well |
Generally |
The antivirus protection measure |
Hardware safety, software is isolated |
Single software protecting |
Safe and secret measure |
Subscription authentication and lose warning |
Do not have |
Embodiment
Describe the structure and the implementation method of soft computer in detail below in conjunction with accompanying drawing.
As shown in Figure 1, soft computer of the present invention is a kind of novel computer organization, no longer is the active computer structure of traditional software and hardware one, but a kind of " flexibility " computing machine.Soft computer is made up of 3 parts, is respectively 1 intelligent terminal, and 2 insert environment, 3 backup machines.。In soft computer, 1 portable equipment that can carry at any time for the user, 2 for the user provides 1 environment that inserts, and 3 provide the remote backup machine of backed up in synchronization for 110 in 1.Wherein 1 comprises memory bank 11 and 12 two parts of outer junctor, and 11 are used for storing the data and the software of user individual, specifically comprise data field 110, viral isolated area 111, application software 112, operating system 113, driver 114.Outer junctor 12 provides necessary peripheral interface and other subsidiary function for 11; its core is CPU 120; also comprise hardware anti-virus 122; lose alarm module 124; authentication module 123; hardware protection module 121; wherein 122 adopt the method for hardware to carry out the isolation and the killing of virus, it has the function that virus base upgrades, and 124 can inform in time whether validated user 1 is lost; 123 in order to differentiate that whether the user is 1 the legal owner; 110 provide and insert 2 high speed IO interface for 1, as USB2.0, and IEEE1394; Ethernet interfaces etc., 121 are 11 protections that the electrical specification aspect is provided.2 comprise input/output peripheral and show peripheral hardware 21 and computing platform 22,21 inserts the back and provides necessary input-output device and display device to the user for 1, and 22 provide the computing platform for 1, have independently calculation process ability after inserting 2 with box lunch 1.
As shown in Figure 2, the using method of soft computer comprises following flow process:
Flow process 201: intelligent terminal 1 provides the high-speed interface interface corresponding with inserting environment 2 to connect by CPU 120,
Flow process 202: whether intelligent terminal hardware protection module 121 detects the electrical specification that inserts in safe range, as in safe range, carries out flow process 203, and as not in safe range, the hardware protection module is reported to the police,
Flow process 203: intelligent terminal carries out authentication to the user and judges its whether validated user, and wherein subscription authentication comprises subscriber identity information input and user identity identification, sees Fig. 4 and Fig. 5 in detail, as be validated user, carry out flow process 204, lose warning otherwise enter flow process 210, see Fig. 6 for details
Flow process 204: intelligent terminal obtains its control that inserts the computing machine of environment automatically,
Flow process 205: the intelligent terminal kernel that starts the operating system, initialization system also loads initiating task, detects the hardware device that inserts computer environment and install driver automatically automatically, and disposes automatically; The intelligent terminal os starting finishes, and waits for authentication user use corresponding application,
Flow process 206: in the use, intelligent terminal carries out the hardware anti-virus to all data stream that enter and detects, as finds that virus then carries out hardware isolated outside memory bank, sees Fig. 3 for details,
Flow process 207: in the use, the application software of intelligent terminal is put into viral isolated area with doubtful virus, with the further diffusion that prevents that it is possible,
Flow process 208: after finishing using, 1 carries out 110 backed up in synchronization by 23,
Flow process 209: disconnect 1 and be connected with 2.
As shown in Figure 3, the detailed operation flow process of 122 among Fig. 1 and flow process 207 is as follows, its all flow processs all are based on the hardware chip that has processing power and finish, and do not need computer based operating system and application software, wherein a kind of hardware from the Yoggie Security Systems of Israel company is killed virus, and product---Yoggie Pico is the hardware with this hardware anti-virus ability:
Flow process 301: hold back the data stream that inserts environment,
Flow process 302: whether analysis detecting data stream contains virus,
Flow process 303: killing virus,
Flow process 304: the data stream after the killing virus is passed to memory bank.
In Fig. 4, will be input as the subscriber identity information input flow process that example explanation plastic flow journey 203 is comprised with fingerprint.The fingerprint input comprises following detailed process:
Flow process 401: utilize fingerprint sensor such as chip AES2510 to carry out fingerprint collecting,
Flow process 402: the fingerprint of sensor acquisition is changed into fingerprint image,
Flow process 403: the fingerprint image that generates is carried out a series of pre-service, comprise preprocess methods such as extreme value filtering, a filtering, sharpening, secondary is level and smooth,
Flow process 404: pretreated fingerprint image data is carried out binaryzation,
Flow process 405: the fingerprint image data after the binaryzation is carried out refinement,
Flow process 406: to the fingerprint image data extract minutiae after the refinement, with convenient storage and identification,
Flow process 407: the fingerprint feature point that extracts is stored, be stored in the usefulness of fingerprint base 408 in order to identification, wherein fingerprint base 408 is positioned at memory bank 103.
As shown in Figure 5, the user identity identification detailed process in the flow process 203 among Fig. 2 is as follows, will be example with the fingerprint equally, describes its authorizing procedure in detail, comprises fingerprint collecting and compares two parts:
At first, comprise flow process 501 ~ flow process 506 with flow process 401 ~ flow process 406 the same fingerprint collectings that carry out.
Flow process 501: utilize fingerprint sensor such as AES2510 to carry out fingerprint collecting,
Flow process 502: the fingerprint of sensor acquisition is changed into fingerprint image,
Flow process 503: the fingerprint image that generates is carried out a series of pre-service, comprise preprocess methods such as extreme value filtering, a filtering, sharpening, secondary is level and smooth,
Flow process 504: pretreated fingerprint image data is carried out binaryzation,
Flow process 505: the fingerprint image data after the binaryzation is carried out refinement,
Flow process 506: to the fingerprint image data extract minutiae after the refinement, with convenient comparison identification,
Flow process 507: the fingerprint feature point of extraction and the finger print data of fingerprint 408 storages are compared,
Flow process 508: the result that will compare exports to 203, whether has the right that starts this soft computer to determine the user who holds soft computer.
As shown in Figure 6, the detailed operation flow process of losing alarm module 124 and flow process 210 in Fig. 1 soft computer is as follows, and this sentences the distance that detects soft computer and user is the example explanation:
Flow process 601: the warning attribute that soft computer is set is a distance of leaving the user, and its alarm threshold value is set is 5 meters, promptly when soft computer and user's distance less than 5 meters, soft computer is in normal condition; When soft computer and user's distance more than or equal to 5 meters, soft computer is in lost condition;
Flow process 602: the mobile phone terminal that related soft calculating and user carry promptly is provided with mobile phone terminal and can knows distance between soft computer and the user at any time;
Flow process 603: mobile phone detects the distance of itself and soft computer, can utilize simple technological means such as infrared distance measurement to know the distance of mobile phone and soft computer;
Flow process 604: whether judging distance does not change flow process 603 over to and continues to detect distance greater than 5 meters, in this way, then changes flow process 605 over to;
Flow process 605: mobile phone sends soft computer and loses alerting signal.