Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security implementation method, computer and security network

An implementation method and information security technology, which are applied in the field of information security implementation to achieve the effect of strengthening security and preventing Trojan horse theft

Inactive Publication Date: 2017-05-31
陈丹丹
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Secrecy units have extremely high requirements for information confidentiality and information security. Computer viruses and Trojan horses are the destroyers of information security. Removable storage media are indispensable office supplies. Removable storage media are usually viruses and Trojan horses. The important reason for the unit is that if there is a computer that specifically checks and kills viruses and Trojan horses in removable storage media, virus and Trojan horse scanning and killing of removable storage media can prevent removable storage media from bringing in viruses; computer antivirus Anti-virus software is used for anti-virus. Computer network security attack and defense is a contest of information. Usually, both sides are constantly upgrading their technology. Some viruses can even kill anti-virus software and make it useless (such as the famous The Panda Burning Incense virus once made the anti-virus software of Rising, Jinshan and other companies invalid), so the continuous upgrading of anti-virus software is very important. The anti-virus software on the computers in the existing internal security network usually needs to be connected to the main server through the internal security network. Upgrade, if there is a dedicated computer for checking and killing the removable storage medium for viruses, if there is a network when the removable storage medium is inserted, there is an information channel between the removable storage medium and the main server, and the virus may destroy the antivirus software and make the antivirus software After the virus is invalid, it will spread in the network, and it may also spread before the action of the anti-virus software. If the special anti-virus computer is connected to the internal network during anti-virus, it will provide a possible channel for the virus to attack the main server, so the removable storage media To scan and kill a dedicated computer, it is necessary to ensure that the network is upgraded to update the virus database or the main program of the anti-virus software as soon as possible. It is also necessary to ensure that the dedicated computer will be disconnected from the network when the removable storage medium is inserted. Removable storage media are allowed to be used internally, which is conducive to internal network security and reduces the possibility of virus introduction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security implementation method, computer and security network
  • Information security implementation method, computer and security network
  • Information security implementation method, computer and security network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] Implementation example 1, such as figure 1 , one An information security computer is designed for a computer having a network interface and a removable storage medium interface, and is characterized in that: the entity of the network interface (RJ45) is fixed on the computer, and the entity of the removable storage medium interface (USB) is fixed on the on the computer;

[0019] It also has a push rod (TG), a guide groove (DXC), a limit post (XWZ), a base (DZ), a spring (TH), and a contact piece (CP);

[0020] The entities of the base (DZ) and the guide groove (DXC) are fixed on the computer;

[0021] Whether the electronic circuit between the network interface (RJ45) entity and the computing mainboard is controlled by the contact piece (CP);

[0022] One end of the spring (TH) is in contact with the end of the push rod (TG), and the other end of the spring (TH) is in contact with the base (DZ);

[0023] The limit column (XWZ) is located on the push rod (TG) to pre...

Embodiment 2

[0035] Implementation example 2, such as figure 2 , one An information security computer interface entity is designed for a computer having a network interface and a removable storage medium interface hardware, and is characterized in that: the entity of the network interface (RJ45) is fixed on the computer, and the entity of the removable storage medium interface (USB) fixed on the computer;

[0036] It also has the first slide bar (HG1), the second slide bar (HG2), the lever (GG), the first guide groove (DXC1), the second guide groove (DXC2), the first slide shaft (HZ1), the second slide axis(HZ2);

[0037] The first guide groove (DXC1), the first slider (HG1), and the entity of the network interface are coaxial;

[0038] The first slide bar (HG1) slides in the first guide groove (DXC1);

[0039] The front end of the first slide bar (HG1) has a first pusher (TDT1), and the first pusher (TDT1) can move in the entity of the network interface to realize the opening and cl...

Embodiment 3

[0062] Implementation example 3, such as image 3 , one An information security computer circuit is designed for a computer with a network interface, a network card, a power supply, and a removable storage medium interface. The network interface is connected to the network card, and is characterized in that:

[0063] Contains touch switch (SW), current limiting resistor (R), optocoupler (GO);

[0064] The touch switch (SW) is a normally closed type, and the touch switch (SW) is installed on the entity of the removable storage medium interface. When the entity of the removable storage medium interface is inserted, the state of the touch switch (SW) will be changed to make the touch switch ( SW) becomes disconnected state;

[0065] One end of the touch switch (SW) is connected to the positive pole of the light-emitting side of the optocoupler (GO), and the other end of the touch switch (SW) is connected to a DC output point of the power supply of the computer;

[0066] The n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information security implementation method is designed for a hardware computer with a network interface and a removable storage medium interface. The method is characterized by comprising the steps that the network is completely disconnected when at least one removable storage medium interface on the computer is in use, the implementation mode is executed by means of a physical method, the computer can be disconnected with the network interface before an information access channel between the computer and a removable storage medium is built, and the phenomenon that the removable storage medium interface on the computer and the network interface are used at the same time; the method is used for protecting information security by means of a mechanical device. By means of an electronic circuit, the method is implemented by means of the combination of the electronic circuit and the mechanical device. The computer has any one technical scheme, and a security network has any one technical scheme. The information security implementation method, the computer and the security network have the advantages that the network is disconnected once the removable storage medium is inserted, the network security can be enhanced, and important files can be prevented from being stolen by Trojan viruses.

Description

technical field [0001] In the computer field, it specifically relates to a method for realizing information security. [0002] technical background [0003] Secrecy units have extremely high requirements for information confidentiality and information security. Computer viruses and Trojan horses are the destroyers of information security. Removable storage media are indispensable office supplies. Removable storage media are usually viruses and Trojan horses. The important reason for the unit is that if there is a computer that specifically checks and kills viruses and Trojan horses in removable storage media, virus and Trojan horse scanning and killing of removable storage media can prevent removable storage media from bringing in viruses; computer antivirus Anti-virus software is used for anti-virus. Computer network security attack and defense is a contest of information. Usually, both sides are constantly upgrading their technology. Some viruses can even kill anti-virus so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71G06F21/56
CPCG06F21/71G06F21/56
Inventor 陈丹丹
Owner 陈丹丹