Power information system anti-violation outreach device

A power information and outreach technology, applied in the protection of internal/peripheral computer components, platform integrity maintenance, etc., can solve problems such as forgetting and losing lock keys, troublesome carrying keys, and failure of computer managers to open them, so as to ensure safety, The effect of safe and reliable control

Active Publication Date: 2016-08-24
NANYANG POWER SUPPLY COMPANY OF STATE GRID HENAN ELECTRIC POWER
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages are: it is easy to forget and lose the lock key, which makes the computer management personnel unable to open it. In addition, it is troublesome to carry the key with you.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power information system anti-violation outreach device
  • Power information system anti-violation outreach device
  • Power information system anti-violation outreach device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Such as Figure 1-Figure 5 As shown, a power information system anti-violation outreach device includes a hardware part and a software part. The hardware part includes a box body 6 and a control circuit board 5 arranged in the box body 6. The control circuit board 5 A USB socket 8 and a data line 4 leading out of the box body are connected, and the data line 4 is connected with the computer 1 through the data interface 2; the software part includes an anti-violation external device hardware driver installed on the computer 1 Program 13 and Management Control Program 14.

[0027] As an optimized solution of the present invention, the control circuit board 5 includes a USB-HUB chip 9 and a high-speed switch chip 11 connected in sequence, the USB-HUB chip 9 is connected to the data line 4, and the high-speed switch chip 11 is connected to the data line 4. The USB socket 8 is connected, and the USB-HUB chip 9 is also connected with a USB communication chip 10 , and the USB...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-violation external connection device for a power information system, comprising a hardware part and a software part, the hardware part includes a box body and a control circuit board arranged in the box body, the control circuit board is connected with a lead-out The USB socket of the box body and the data line are connected with the computer through the data interface; the software part includes the anti-violation external device driver and management control program installed on the computer. Through the combination of software and hardware, the internal network of the power information system is effectively protected from being connected and accessed by external devices without authorization, thereby preventing the internal network from being attacked by viruses or criminals, and ensuring the security and stability of the power information system. .

Description

technical field [0001] The invention belongs to the technical field of information security protection, and in particular relates to an anti-violation outreach device for an electric power information system. Background technique [0002] In places with confidential electronic data such as government departments, enterprises and institutions, and commercial companies, the computers used are usually only used by internal networks and internal personnel, and connections to external networks, external storage devices, and smart phones are strictly prohibited. With the rapid development of information technology, smart phones, wireless networks and other USB interface devices emerge in an endless stream. The computer USB interface has become an important way for computer information leakage. Illegal outreach incidents on the intranet occur from time to time, posing a great threat to information security. , the information security issues involved in the internal network of the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/85G06F21/86
CPCG06F21/50G06F21/85G06F21/86
Inventor 杜明哲李吉浩张明凯王珏桂建廷
Owner NANYANG POWER SUPPLY COMPANY OF STATE GRID HENAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products