Unlock instant, AI-driven research and patent intelligence for your innovation.

Personal computer system and method for preventing passive network disclosure

A computer system, passive technology, applied in the direction of transmission system, electrical components, etc., can solve the problem of source code invisibility of Windows operating system, complex configuration management of security program security issues, etc.

Inactive Publication Date: 2013-01-30
龚华清
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] Due to the loopholes in the operating system itself and the invisibility of the source code of the popular Windows operating system, the security program based on the operating system has the risk of being bypassed in the security control, and the security problem of the security program itself may be complicated. Configuration management is contradictory to simplicity of use, and once any software is breached by viruses, Trojans, worms and spyware, these viruses, Trojans, worms and spyware may control and use the entire computer resource

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal computer system and method for preventing passive network disclosure
  • Personal computer system and method for preventing passive network disclosure
  • Personal computer system and method for preventing passive network disclosure

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0070] Specific implementation mode one: use personal computer anti-network passive leakage system in the family

[0071] Purchase a computer for a dual-host system;

[0072] Purchase switch C with only one-way switching function. The unidirectional switch is built into the dual host system chassis.

[0073] Dual computer systems A and B, each computer system contains two network ports, the two ports of computer system A are h and l, the two ports of computer system B are m and n, and l of computer system A is connected to the internet network , h and then connect the port d of the one-way switch C; connect the m of the computer system B with the e port of the switch C.

[0074] Install the one-way file transfer sending end on computer system A, and install the one-way file transfer receiving end on computer system B.

[0075] On computer system A, configure l port IP as 192.168.0.100, socket as 10000, target multicast IP address as 235.0.0.0.1, specify the string name as "...

specific Embodiment approach 2

[0080] Specific implementation mode two: Enterprise employees who need to keep secret use personal computer anti-network passive leakage system

[0081] In some scientific research units, especially those related to military industry, the information involves confidentiality, but it is also necessary to contact other organizations on the Internet.

[0082] Purchase a computer for a dual-host system with a built-in one-way switch;

[0083] Dual computer systems A and B, each computer system contains two network ports, the two ports of computer system A are h and l, the two ports of computer system B are m and n, and l of computer system A is connected to the internet network , h and then connect the port d of the one-way switch C; connect the m of the computer system B with the e port of the switch C.

[0084] Install the one-way file transfer sending end on computer system A, and install the one-way file transfer receiving end on computer system B.

[0085] The h port on com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personal computer system and method for preventing passive network disclosure and relates to the technical field of network information security of a personal computer. The personal computer system comprises two host personal computer systems A and B and a unidirectional switchboard C, wherein one network port of the computer system A is connected with an Internet network, and the other network port of the computer system A is connected with the unidirectional switchboard C; one network port of the computer system B is connected with the unidirectional switchboard C; the unidirectional switchboard C cannot be managed through configuration and can only receive data of A and transfer the data to B; the data sent by B to C are lost by C; and C can block information in B from being passively leaked by C. A file transmission protocol from A to B is provided; the system B is indirectly connected with the internet network through A; and important information is operated on the system B. The personal computer system realizes network life and network work and allows the computers to be invaded, can safeguard the information in the invaded computer system B from being passively leaked to the network.

Description

technical field [0001] The invention relates to a dual-host personal computer system, in particular to a personal terminal dual-host computer system capable of preventing passive network leakage. Background technique [0002] Mature dual host computer system [0003] With the modularization and standardization of computer system hardware and the maturity of integrated electronic technology, today's personal computer systems have matured; on the basis of satisfying a single computer system, with the help of a server model, it has also developed into a variety of dual computer systems. With the standardization of module interfaces and the development of electronic technology, the accessories of computer systems are also developing rapidly, such as KVM, and private switches that provide a shared display, mouse, and keyboard for dual computer systems. [0004] Although this dual-host computing system can share a set of peripherals, the dual hosts are either independent of each ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 龚华清
Owner 龚华清