CN201072548Y - Multi-hard disk anti-disclosure safety recovery device for computer - Google Patents
Multi-hard disk anti-disclosure safety recovery device for computer Download PDFInfo
- Publication number
- CN201072548Y CN201072548Y CNU2007200915966U CN200720091596U CN201072548Y CN 201072548 Y CN201072548 Y CN 201072548Y CN U2007200915966 U CNU2007200915966 U CN U2007200915966U CN 200720091596 U CN200720091596 U CN 200720091596U CN 201072548 Y CN201072548 Y CN 201072548Y
- Authority
- CN
- China
- Prior art keywords
- disk
- switch
- network
- domain
- recovery device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000011084 recovery Methods 0.000 title claims abstract description 25
- 238000004891 communication Methods 0.000 claims abstract description 5
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000013461 design Methods 0.000 abstract description 2
- 238000009776 industrial production Methods 0.000 abstract 1
- 241000700605 Viruses Species 0.000 description 9
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 7
- 230000002155 anti-virotic effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 239000012467 final product Substances 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000003612 virological effect Effects 0.000 description 2
- UPLPHRJJTCUQAY-WIRWPRASSA-N 2,3-thioepoxy madol Chemical compound C([C@@H]1CC2)[C@@H]3S[C@@H]3C[C@]1(C)[C@@H]1[C@@H]2[C@@H]2CC[C@](C)(O)[C@@]2(C)CC1 UPLPHRJJTCUQAY-WIRWPRASSA-N 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 231100000572 poisoning Toxicity 0.000 description 1
- 230000000607 poisoning effect Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses a computer multi hard disks anti leakage security recovery device, which comprises a network disk connected with an external network and at least a local disk provided with no external communication channel. A hard disk jumper of the network disk is connected as a slave disk, and a hard disk jumper of the local disk is connected as a master disk; the network disk is connected with the local disk by a tri-state switch used for controlling the communication between the local disk, the network disk and a computer power lead and on off action of the network disk with the external network. By arranging a switch for isolating the network disk and the local disk, mutual switch among three computer operating environments which are local operating mode, online operating mode the disk merging operating mode can be realized. Therefore, the utility model can effectively prevent network leakage and local leakage, and lead data exchange to be safe and reliable as well as system recovery to be extremely convenient; the utility model has novel design and a concise circuit, which is easy to be realized, beneficial to being put to industrial production and has safe and reliable operation.
Description
Technical field:
The utility model relates to computer security device, and specifically data prevent divulging a secret, system is easily recovered, the computer security device of physical isolation method multi-user management.
Background technology:
No matter be which kind of computing machine, all be operated in following three kinds of working environments: 1, online working environment; 2, local working environment; 3, online working environment and local working environment exist simultaneously.In case computing machine is under the online working environment, chance is provided just for poisoning intrusion, hacker attacks, also just caused user's trade secret or individual privacy to leak possibility.And computing machine is on the method for leading subscriber, all be to distinguish different user by appropriation account and log-in password, shortcoming is: no matter what are arranged with using a computer under a system per family, and be on same hard disk, to use, theoretically, can lean on hacker's knowledge to crack system mask fully, finally reach the purpose of stealing secret information.And the antivirus software of everybody common usefulness and fire wall prevent the virus intrusion, viral relatively time of occurrence, the virus killing function of antivirus software lags behind, fire wall is the same with antivirus software, all be to belong to lag behind to prevent technology, therefore in theory, no matter be antivirus software or fire wall, all can't thoroughly solve computer user's the problem of divulging a secret.Publication number is that the Chinese patent of CN2444265Y discloses a kind of " inside and outside net hard disc physical is isolated change-over switch ", be provided with an independent change-over switch, the Intranet hard-disk interface that is provided with is connected with the Intranet hard disk, the outer net hard-disk interface is connected with the outer net hard disk, inside/outside net hard-disk interface and computer motherboard system, when this switch uses, as long as install a hard disk additional, also computing machine can be become the computing machine that a network security is isolated, but in the same time, computing machine can only be operated in a hard disk and network, is subjected to certain limitation at work.
The utility model content:
Technical problem to be solved in the utility model is exactly to provide the many hard disks of a kind of computing machine the anti-security recovery device of divulging a secret at above deficiency, this device is by being provided with switch isolation network disk and this domain, realize the mutual switching of three kinds of environment of computer operation, therefore can effectively preventing surfs the Net divulges a secret, and the exchange of data becomes safe and reliable, and system recovery is also very convenient, it is terse to have circuit, novel, it is convenient to realize, characteristics such as work safety.
Technical solution adopted in the utility model is:
The anti-security recovery device of divulging a secret of the many hard disks of a kind of computing machine, comprise network disk and at least one and extraneous this domain that does not have communication channel of being connected with external network, the hard disk wire jumper of network disk is connected to from dish, the hard disk wire jumper in this domain is connected to master, network disk is connected by tri-state switch with this domain, and tri-state switch is controlled this domain, network disk and the break-make that reaches network disk and external network whether being communicated with of computer power supply line.
Tri-state switch is three grades of interlock rotary switches or combination button switch or push-and-pull multiple-pole switch, makes computer operation three kinds of mode of operations: local mode of operation, and promptly this domain circuit is connected, and the network disk circuit disconnects, and external network disconnects; The online mode of operation, promptly this domain circuit disconnects, and the network disk circuit is connected, and is connected with external network; Hard disk merges mode of operation, and promptly this domain circuit is connected, and the network disk circuit is connected, and has external network only and disconnects.
Tri-state switch comprises housing, rotary body and relay, and housing central authorities have rotary body, has three lockholes on the rotary body, has lock pin on the relay, and lock pin and lockhole are movable pegs graft, and relay is connected with the computer power supply line, is powered by computer power supply.
Also be provided with subscriber switch between this domain and the computer power supply line, make each computer user the independently right to use be arranged this domain.
Subscriber switch is ganged switch or IC-card electronic switch or Fingerprint Lock switch.
The beneficial effect that the utility model can reach is:
1, the utility model is provided with physically-isolated from dish-network disk and master-this domain mutually, when hard disk merges under the mode of operation system start-up, has only the os starting on this domain, operating system on the network disk can not start, even could guarantee to have on the network disk virus, trojan horse program etc. like this, the automatic startup virus that stops to cause registering in this system because of system own, trojan horse program etc. can't start automatically, virus, trojan horse program stop all sabotages because of starting automatically, have thoroughly guaranteed the safety of data.
2, do not store significant data on the utility model network disk, and there is backup in the system on the network disk in this domain, in case the network disk system crash only needs to merge at hard disk and recovers the network disk system under the mode of operation and get final product, make the recovery of system become very simple and easy and safety.
3, the utility model hard disk merges under the mode of operation, is document copying safe to network disk from this domain, from network disk document copying to this domain through safety verification, so dropped to the danger of file transfer minimum.
4, the utility model has adopted the electromagnetism tri-state switch, and it is under open state, because the lock pin closure causes the tri-state switch rotary body locked and can't use.The benefit that gets thus is: forbidden user's transformation working pattern under open state first, thereby prevented to reside in the possibility that virus, trojan horse program in the internal memory destroys these domain data; The 2nd, computing machine prevents maloperation under powering-off state not.
5, the utility model also is provided with subscriber switch between this domain and computer power supply line, makes each computer user have the independently right to use to this domain, thereby reaches the purpose of this machine multi-user management.
6, the utility model is novel, circuit is terse, realization is convenient, be easy to suitability for industrialized production, safe and reliable.
Description of drawings:
Fig. 1 is the circuit theory diagrams under the local operational mode state of the utility model.
Fig. 2 is the circuit theory diagrams under the utility model online operational mode state.
Fig. 3 is the circuit theory diagrams under the utility model hard disk merging operational mode state.
Fig. 4 is the fundamental diagram of the utility model electromagnetism tri-state switch.
Embodiment:
The utility model will be further described below in conjunction with accompanying drawing:
As Fig. 1, Fig. 2, Fig. 3, shown in Figure 4: at first at least two hard disks of inside computer system setting, a hard disk is used for online work usefulness, and another piece hard disk is used for local work and uses.Like this, each working environment all had oneself, exclusive hard drive space, relatively and the hacker, the variation of essence has taken place in this computing machine.The online working environment adds independently, complete hard drive space, and we just define it and are the online mode of operation, and to define this hard disk be network disk, and principal and subordinate's wire jumper of hard disk jumps to from dish; Local working environment adds independently, complete hard drive space, and we just define it and are local mode of operation, and defines this hard disk and be this domain, and principal and subordinate's wire jumper of hard disk jumps to master.Have a critical problem to be exactly herein: it is that this domain is a master from dish that network disk must be set.If these two hard disks are not on same hard disc data line, this domain must be articulated on first hard-disk interface of mainboard, has so just guaranteed to merge under the mode of operation at hard disk, and local disc system starts, and the network disk system stops.Except that above definition, other hardware of computing machine are constant, as CPU, internal memory, mainboard etc., in order thoroughly to solve the problem of divulging a secret.Stipulate as follows: 1, the design of vital document, draft, edit, preservation etc., must the pattern of working in this locality carry out; 2, work in this locality under the pattern, all external storeies connect must carry out safety inspection, as the file preserved on the file preserved on the floppy disk, the CD-ROM drive, have and preserve file etc. on the USB interface storer, completely must be through safety inspection, discovery belongs to external suspicious storer, must forbid connecting; 3, the general and extraneous information interchange that takes place is arranged under the online mode of operation as far as possible and carries out, and this comprises that not merely network connection information exchanges, and comprises the message file exchange of various storeies.In sum, in two kinds of mode of operations of computing machine, having only online mode of operation wherein is unique leak channel, and local mode of operation is not because of divulging a secret with the channel of external world's communication.Like this, prevent that the problem of divulging a secret just has been readily solved.
Among Fig. 1: at first, according to switch open order regulation, " user 1 " opens the power supply in this domain 1 of oneself for " subscriber switch " oneself allotted with the computer administrator, and this domain 1 needed 5V, 12V operating voltage are connected.Then, " user 1 " chooses " this domain circuit is connected, and the network disk circuit disconnects, and the network make-and-break control switch disconnects " state to " ternary linked switch ".Like this, connect from 5V, the 12V voltage of computer-internal, according to the connecting and disconnecting of the circuit situation, this domain 1 has possessed the operating voltage condition.If after opening the total starting switch of computing machine this moment " user 1 ", he just can be operated in local mode of operation normally and descend, in like manner user 2, user 3...... user N open switch according to same operation and get final product work.
Among Fig. 2: because network disk is that all users share, therefore, do not need subscriber switch to open any hard disk, just need the user " ternary linked switch " to be chosen " this domain power supply disconnects; network disk and network make-and-break control switch closure " state, open the total starting switch of computing machine then and just can be operated in the mode of operation of surfing the Net and descended.
Among Fig. 3: this mode of operation is identical with the first step of local mode of operation, at first will use subscriber switch to open this domain switch lock of oneself.Then, " ternary linked switch " being chosen hard disk merging mode of operation just can work.At this moment, this domain circuit is connected, and the network disk circuit is connected, and has extraneous network only and disconnects.Opening the total starting switch of computing machine then just can work.As seen hard disk merges mode of operation and refers to that this domain and network disk work simultaneously; The safety practice that hard disk merges mode of operation and local mode of operation is identical, promptly disconnects with all of extraneous network being connected; After network disk operating system, general common tool install, just should backup to this domain to the system partitioning file with clone technology, simultaneously, recovery system also is installed to this domain.Cause and extraneous network disconnect, and network disk is from dish, thus hard disk to merge that network under the mode of operation divulges a secret also be impossible.
Also need to prove: 1, when under the online mode of operation, after operating system on the network disk is suffered viral havoc, just start hard disk and merge mode of operation, under this pattern, because network disk is from dish, the automatic startup project of all registrations all stops in the dish, in this case, virus might as well, trojan horse program completely can not start automatically, therefore, they also just can't infect or destroy this domain, thereby have reached the purpose of the recovery operation system of our safety.And the system recovery operation is very simple, and do not require that the user possesses any computer system installable knowledge, only need be according to the description operation of recovery system software document, behind the click system recovery executable file, remaining system recovery work is just given computing machine and has been finished.Like this, it not merely provides the channel of easy recovery system to the user, also avoids simultaneously after operating system and backup file and system recovery software are destroyed simultaneously, and the user can't pass through the difficult problem of the normal recovery system of system recovery software.2, transmit file between network disk, this domain and mainly contain following dual mode: file is delivered to this domain from network disk uses; File is delivered to network disk to be used from this domain.The file in this domain is safe, the file of its storage is that not need safety inspection just can be optimum file certainly, we know again simultaneously, merge under the mode of operation at hard disk, from this domain is document copying safe to network disk, in other words, have only first kind of file transfers mode, promptly be delivered to this domain and have potential safety hazard from network disk.Therefore, must pass through safety inspection, potential safety hazard be reduced to minimum through the file that transmits.3, since computing machine under powering-off state not, virus, trojan horse program can terminate-and-stay-residents, when the user arrives local mode of operation to the online working mode change at this moment, reside in the virus in the internal memory, the data that trojan horse program just has an opportunity to destroy this domain; The 2nd, computing machine is under powering-off state not, charged transformation working pattern blindly is unsafe, be easy to the related elements in the computer hardware that is converted is damaged, therefore, the tri-state switch of present embodiment comprises housing 1, rotary body 2 and relay 4, housing 1 central authorities have rotary body 2, have three lockholes 6 on the rotary body 2, have lock pin 3 on the relay 4, lock pin 3 and lockhole 6 movable pegging graft, relay 4 is connected with computer power supply line 5, is powered by computer power supply.Like this after the total starting switch of computing machine starts power supply; relay 4 produces electromagnetic force because of obtaining operating voltage; after electromagnetic force acts on the lock pin 3; lock pin 3 left lateral locking tri-state switch rotary body 2, thus the open state maloperation avoided, cause unsafe factor to occur; when computing machine in stopped status; electromagnetic relay 4 does not quit work because of there being operating voltage, and lock pin 3 is return, and tri-state switch just can rotate freely has selected a certain mode of operation.
Claims (9)
1. the many hard disks of computing machine prevent divulging a secret the security recovery device, comprise network disk and at least one and extraneous this domain that does not have communication channel of being connected with external network, it is characterized in that: the hard disk wire jumper of network disk is connected to from dish, the hard disk wire jumper in this domain is connected to master, network disk is connected by tri-state switch with this domain, and tri-state switch is controlled this domain, network disk and the break-make that reaches network disk and external network whether being communicated with of computer power supply line.
2. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 1, it is characterized in that: tri-state switch is three grades of interlock rotary switches.
3. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 1, it is characterized in that: tri-state switch is the combination button switch
4. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 1, it is characterized in that: tri-state switch is plug-type multiple-pole switch.
5. as claim or the anti-security recovery device of divulging a secret of the many hard disks of 2 described computing machines, it is characterized in that: tri-state switch comprises housing (1), rotary body (2) and relay (4), housing (1) central authorities have rotary body (2), have three lockholes (6) on the rotary body (2), has lock pin (3) on the relay (4), lock pin (3) is pegged graft with lockhole (6) is movable, and relay (4) is connected with computer power supply line (5).
6. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 1 is characterized in that: also be provided with subscriber switch between this domain and the computer power supply line, make each computer user to this domain the independently right to use be arranged.
7. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 6, it is characterized in that: subscriber switch is a ganged switch.
8. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 6, it is characterized in that: subscriber switch is the IC-card electronic switch.
9. the anti-security recovery device of divulging a secret of the many hard disks of computing machine as claimed in claim 6, it is characterized in that: subscriber switch is the Fingerprint Lock switch.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNU2007200915966U CN201072548Y (en) | 2007-08-23 | 2007-08-23 | Multi-hard disk anti-disclosure safety recovery device for computer |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNU2007200915966U CN201072548Y (en) | 2007-08-23 | 2007-08-23 | Multi-hard disk anti-disclosure safety recovery device for computer |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN201072548Y true CN201072548Y (en) | 2008-06-11 |
Family
ID=39551105
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNU2007200915966U Expired - Fee Related CN201072548Y (en) | 2007-08-23 | 2007-08-23 | Multi-hard disk anti-disclosure safety recovery device for computer |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN201072548Y (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105468968A (en) * | 2014-09-05 | 2016-04-06 | 深圳市同盛绿色科技有限公司 | Computer and network intrusion detection method therefor |
| CN107480545A (en) * | 2017-08-10 | 2017-12-15 | 合肥联宝信息技术有限公司 | A kind of data guard method and electronic equipment |
-
2007
- 2007-08-23 CN CNU2007200915966U patent/CN201072548Y/en not_active Expired - Fee Related
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105468968A (en) * | 2014-09-05 | 2016-04-06 | 深圳市同盛绿色科技有限公司 | Computer and network intrusion detection method therefor |
| CN107480545A (en) * | 2017-08-10 | 2017-12-15 | 合肥联宝信息技术有限公司 | A kind of data guard method and electronic equipment |
| CN107480545B (en) * | 2017-08-10 | 2020-09-11 | 合肥联宝信息技术有限公司 | Data protection method and electronic equipment |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bessani et al. | The CRUTIAL way of critical infrastructure protection | |
| CN103227776B (en) | Configuration method, configuration device, computer program product and control system | |
| CN109561071B (en) | Data flow control's external terminal protective equipment and protection system | |
| RU2764292C1 (en) | Protection apparatus of an external terminal and protection system | |
| KR101939078B1 (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
| US8930598B2 (en) | Isolated protected access device | |
| EP3876121B1 (en) | Data forwarding control method and system based on hardware control logic | |
| US20230297678A1 (en) | Ransomware mitigation system and method for mitigating a ransomware attack | |
| CN103532980A (en) | Internal and external network security access terminal | |
| CN105379213A (en) | Dedicated control path architecture for stacked packet switches | |
| US7409563B2 (en) | Method and apparatus for preventing un-authorized attachment of computer peripherals | |
| CN203618018U (en) | Internal and external network security access terminal | |
| CN101888284B (en) | Method and device used for one-way transmission of data | |
| CN106446654A (en) | Isolation method based on fingerprint recognition of computer input and output devices | |
| CN201072548Y (en) | Multi-hard disk anti-disclosure safety recovery device for computer | |
| US7818790B1 (en) | Router for use in a monitored network | |
| US9251385B2 (en) | Computer system for accessing confidential data by means of at least one remote unit and remote unit | |
| US8954624B2 (en) | Method and system for securing input from an external device to a host | |
| CN100471107C (en) | One-way data transmission system based on one-way isolated hardware channel | |
| KR20110088981A (en) | Network switching computer using dual port LAN card | |
| CN115238323A (en) | A kind of server USB interface security design method, computer equipment and storage medium | |
| US8661523B2 (en) | Mass storage lockout for USB devices on extended USB system | |
| WO2019215442A1 (en) | Secure data storage, exchange and processing system | |
| US20070214331A1 (en) | Selectable mass storage system | |
| KR20240116499A (en) | Power outage monitoring devices, methods and external protection devices |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C17 | Cessation of patent right | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080611 |