Unlock instant, AI-driven research and patent intelligence for your innovation.

Information safety computer circuit

An information security and computer technology, applied in the protection of internal/peripheral computer components, electrical components, electronic switches, etc., to enhance security and prevent Trojans from stealing

Inactive Publication Date: 2017-04-26
陈丹丹
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Secrecy units have extremely high requirements for information confidentiality and information security. Computer viruses and Trojan horses are the destroyers of information security. Removable storage media are indispensable office supplies. Removable storage media are usually viruses and Trojan horses. The important reason for the unit is that if there is a computer that specifically checks and kills viruses and Trojan horses in removable storage media, virus and Trojan horse scanning and killing of removable storage media can prevent removable storage media from bringing in viruses; computer antivirus Anti-virus software is used for anti-virus. Computer network security attack and defense is a contest of information. Usually, both sides are constantly upgrading their technology. Some viruses can even kill anti-virus software and make it useless (such as the famous The Panda Burning Incense virus once made the anti-virus software of Rising, Jinshan and other companies invalid), so the continuous upgrading of anti-virus software is very important. The anti-virus software on the computers in the existing internal security network usually needs to be connected to the main server through the internal security network. Upgrade, if there is a dedicated computer for checking and killing the removable storage medium for viruses, if there is a network when the removable storage medium is inserted, there is an information channel between the removable storage medium and the main server, and the virus may destroy the antivirus software and make the antivirus software After the virus is invalid, it will spread in the network, and it may also spread before the action of the anti-virus software. If the special anti-virus computer is connected to the internal network during anti-virus, it will provide a possible channel for the virus to attack the main server, so the removable storage media To scan and kill a dedicated computer, it is necessary to ensure that the network is upgraded to update the virus database or the main program of the anti-virus software as soon as possible. It is also necessary to ensure that the dedicated computer will be disconnected from the network when the removable storage medium is inserted. Removable storage media are allowed to be used internally, which is conducive to internal network security and reduces the possibility of virus introduction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety computer circuit
  • Information safety computer circuit
  • Information safety computer circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] Implementation example 1, such as figure 1 , one An information security computer is designed for a computer having a network interface and a removable storage medium interface, and is characterized in that: the entity of the network interface (RJ45) is fixed on the computer, and the entity of the removable storage medium interface (USB) is fixed on the on the computer;

[0016] It also has a push rod (TG), a guide groove (DXC), a limit post (XWZ), a base (DZ), a spring (TH), and a contact piece (CP);

[0017] The entities of the base (DZ) and the guide groove (DXC) are fixed on the computer;

[0018] Whether the electronic circuit between the network interface (RJ45) entity and the computing mainboard is controlled by the contact piece (CP);

[0019] One end of the spring (TH) is in contact with the end of the push rod (TG), and the other end of the spring (TH) is in contact with the base (DZ);

[0020] The limit column (XWZ) is located on the push rod (TG) to pre...

Embodiment 2

[0032] Implementation example 2, such as figure 2 , one An information security computer interface entity is designed for a computer having a network interface and a removable storage medium interface hardware, and is characterized in that: the entity of the network interface (RJ45) is fixed on the computer, and the entity of the removable storage medium interface (USB) fixed on the computer;

[0033] It also has the first slide bar (HG1), the second slide bar (HG2), the lever (GG), the first guide groove (DXC1), the second guide groove (DXC2), the first slide shaft (HZ1), the second slide axis(HZ2);

[0034] The first guide groove (DXC1), the first slider (HG1), and the entity of the network interface are coaxial;

[0035] The first slide bar (HG1) slides in the first guide groove (DXC1);

[0036] The front end of the first slide bar (HG1) has a first pusher (TDT1), and the first pusher (TDT1) can move in the entity of the network interface to realize the opening and cl...

Embodiment 3

[0059] Implementation example 3, such as image 3 , one An information security computer circuit is designed for a computer with a network interface, a network card, a power supply, and a removable storage medium interface. The network interface is connected to the network card, and is characterized in that:

[0060] Contains touch switch (SW), current limiting resistor (R), optocoupler (GO);

[0061] The touch switch (SW) is a normally closed type, and the touch switch (SW) is installed on the entity of the removable storage medium interface. When the entity of the removable storage medium interface is inserted, the state of the touch switch (SW) will be changed to make the touch switch ( SW) becomes disconnected state;

[0062] One end of the touch switch (SW) is connected to the positive pole of the light-emitting side of the optocoupler (GO), and the other end of the touch switch (SW) is connected to a DC output point of the power supply of the computer;

[0063] The n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information safety computer circuit. The information safety computer circuit is designed for a computer having a network interface, a network card power supply point, a network card and a movable storage medium interface, wherein the network interface is connected with the network card, and comprises a triggering switch (SW); one end of the triggering switch (SW) is connected with the network card power supply point for taking power for the network card, and the other end of the triggering switch (SW) is connected with a power supply pin of the network card; and when an entity of the movable storage medium interface is inserted, the triggering switch (SW) is disconnected, the network card is powered off and stops working, and the network interface cannot be used, thereby protecting the information safety. The information safety computer circuit has the beneficial effects that a network is disconnected when the movable storage medium is inserted, so that the network safety is enhanced, and important files can be protected from being stolen by a Trojan horse.

Description

technical field [0001] In the computer field, it specifically relates to an information security computer circuit. [0002] technical background [0003] Secrecy units have extremely high requirements for information confidentiality and information security. Computer viruses and Trojan horses are the destroyers of information security. Removable storage media are indispensable office supplies. Removable storage media are usually viruses and Trojan horses. The important reason for the unit is that if there is a computer that specifically checks and kills viruses and Trojan horses in removable storage media, virus and Trojan horse scanning and killing of removable storage media can prevent removable storage media from bringing in viruses; computer antivirus Anti-virus software is used for anti-virus. Computer network security attack and defense is a contest of information. Usually, both sides are constantly upgrading their technology. Some viruses can even kill anti-virus softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71G06F21/81H03K17/78
CPCG06F21/71G06F21/81H03K17/78
Inventor 陈丹丹
Owner 陈丹丹
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More