Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Realizing the Isolation of Computer Peripheral Devices

A technology for external devices and computers, applied in the protection of internal/peripheral computer components, instruments, electrical digital data processing, etc., can solve the problems of inability to isolate peripheral devices, low security, hidden dangers, etc., to prevent malicious tampering and isolation. , the effect of maintaining information security and improving security

Active Publication Date: 2017-09-05
南京神易网络科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The device and method for realizing the safe operation of the state conversion device of computing equipment; the patent number is 201210560729.5. This patent does not have a peripheral conversion signal input locking module, which cannot effectively isolate the introduction of the outside world, and has low security. At the same time, a single pole double throw switch is used for management The two peripherals cannot effectively isolate the two peripherals, and there are still hidden dangers in security
[0005] The name is isolation switching method, device, chip, computer motherboard and computer between internal and external networks; the patent number is 200310106120.1, and the patent is aimed at the isolation part, which is basically implemented by hardware layer isolation, and some external networks are also implemented at the chip level. The established isolation cannot effectively protect the safety and setting of the isolated state, and there are potential safety hazards;
[0006] The patent number is 201110204801.6, the name is a device and method for saving and restoring the state of computing equipment, and the patent number is 01115545.0. This patent only mentions the preservation and restoration of the internal operating state of the computer, and the preservation and restoration are carried out in the CPU , which increases the risk of information leakage of the computer, and cannot effectively isolate storage devices such as peripherals;
[0007] The name is hard disk access indexing device and hard disk indexing access method; the patent number is 02113032.9, and the name is a device and method for realizing hard disk security isolation; although the patent mentions the way of hardware triggering isolation conversion, it does not propose The recovery method of peripheral isolation when the system fails still cannot effectively improve the reliability and safety of isolation;
[0008] To sum up, according to the different security needs of users, there will be different levels of requirements for peripheral isolation, and the existing technologies cannot meet the needs.
The existing isolation method can only select one of the two peripherals to work and the other not to work among multiple peripherals of the same type. It is impossible to choose to work or not to work at the same time. At the same time, the above patents cannot Double-lock the isolated state and effectively isolate the peripherals. In addition, for all the peripherals that can be isolated, the selected parts are not isolated, so that multiple operating systems can be shared, saving costs, and improving the switching speed, which are urgently needed at present. one of the problems solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Realizing the Isolation of Computer Peripheral Devices
  • A Method for Realizing the Isolation of Computer Peripheral Devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0029] The invention discloses a method for realizing the isolation of computer peripheral equipment, such as figure 1 , figure 2 As shown, the system architecture includes a user selection center, a state selection input module, a control conversion module, and peripherals; the control conversion module is equipped with a hardware interrupt processing module, a state latch module, a selection state controller, and a peripheral controller. It is connected with the state selection input module, the state selection input module is connected with the selection state controller in the control conversion module, the selection state controller, the peripheral controller, the state latch module, and the peripherals are connected in turn, and the peripheral controller has multiple , each peripheral controller is connected to a peripheral device through a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer peripheral equipment isolation method. A system framework comprises a user selection center, a state selection input module, a control switching module and peripherals; the control switching module is provided with a hardware interrupt processing module, a state latch module, a selection state controller and peripheral controllers; the user selection center is connected with the state selection input module which is connected with the state selection controller in the control switching module; the state selection controller, the peripheral controllers, the state latch module and the peripherals are connected in sequence; one peripheral controller is connected with one ends of two switches through the latch module, and the other ends of the two switches are connected with the two peripherals of the same type. Through the switches, the peripherals of the same type can be used or turned off simultaneously, isolation among the peripherals is enhanced, and security in information is improved; during peripheral switching, a double-locking isolation mode is adopted, the isolated state can be effectively prevented from being tampered maliciously, and information security is maintained.

Description

technical field [0001] The invention belongs to the technical field of computer safety isolation, and in particular relates to an isolation method for realizing computer peripheral equipment. Background technique [0002] At present, in the field of computer security, especially the government and enterprises and institutions, due to security considerations, the internal network (government office or confidential network) is physically isolated from the external network (such as the Internet). To solve this problem, first use two computers to access the internal network and external network respectively. Obviously, the solution cost of this solution is relatively high. Therefore, physical isolation, a branch of computer information security, was developed on this basis. [0003] The problem to be solved by physical isolation includes two parts. One is the physical isolation of peripherals, which include hard disks, optical drives, memory, networks, and USB ports. Any phys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74
CPCG06F21/74G06F21/83G06F2221/2149
Inventor 罗冰康丹丹
Owner 南京神易网络科技有限公司