Network security emergency isolation anti-theft device

A network security and emergency technology, applied in the field of network security, can solve the problems of unfavorable network security protection work convenience and stability, affecting the query of malicious attack sources on the external network, etc., to ensure convenience and stability, strengthen security protection, The effect of protecting data security

Inactive Publication Date: 2022-06-24
HENAN VOCATIONAL COLLEGE OF APPLIED TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the network isolation work, an encryption card is usually set between the internal network and the external network, and an encryption module is installed on the encryption card. When the internal network needs to access the external network, or when the external network needs to access the internal network, it needs to pass through the encryption module. , when it is found that the internal network is under malicious attack from the external network, the emergency isolation of the internal network and the external network can be quickly realized by disconnecting the encryption card. However, this processing step is usually handled across the board. After that, it will affect the connection between other users in the internal network and the external network, and after the internal network and the external network are disconnected, the malicious attack signal from the external network will be interrupted, which will affect the query of the source of malicious attacks on the external network, which is not conducive to network security protection Convenience and stability of work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security emergency isolation anti-theft device
  • Network security emergency isolation anti-theft device
  • Network security emergency isolation anti-theft device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] In the embodiment of the present invention, both the first elastic member 203 and the second elastic member 403 use a spring member, and the telescopic member 309 uses a miniature electric push rod.

[0029] A network security emergency isolation anti-theft device, such as Figure 1-Figure 9 As shown, it includes a sliding cover unit, a card insertion unit, an isolation and anti-theft unit, a main casing 1, an inner casing 2, a cover plate 3, a safety lock 31, a power supply module 4, an external interface 5, a security interface 6, and an encryption module 7. , the storage module 8, the first cable 51, the second cable 71, the third cable 81 and the heat dissipation module 9; the inner casing 2 is fixed in the middle of the upper side of the main casing 1; the upper side of the main casing 1 passes through two Each safety lock 31 is plugged with a cover plate 3; the right side of the main casing 1 is fixedly connected with a power supply module 4; the front side of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network security, in particular to network security emergency isolation anti-theft equipment. In order to solve the technical problem of one-step processing of leaving emergency isolation, the technical problem of ensuring the convenience and stability of network security protection work is solved. The network security emergency isolation anti-theft equipment provided by the invention comprises an inner shell, an isolation anti-theft unit and the like, the lower side of the inner machine shell is connected with an isolation anti-theft unit. According to the technical scheme, a plurality of devices are respectively and independently installed at the connection terminals of the intranet and the extranet, when a certain extranet connection terminal suffers from hostile attacks of the extranet, the intranet and the extranet are disconnected, and an external hostile attack end is induced to browse false information in the storage module, so that time is bought for query work of hostile attack sources of the extranet, and the query efficiency of the hostile attack sources of the extranet is improved. In addition, the equipment is provided with a locking part, so that the safety protection of the equipment is enhanced.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security emergency isolation and anti-theft device. Background technique [0002] Network isolation technology is divided into logical network isolation and physical network isolation. The internal and external networks are isolated by non-physical methods, such as building a firewall, adding passwords and other isolation means to separate the internal and external networks. It is called logical network isolation. Physical isolation of internal and external networks, such as adding switches and using encryption cards to separate internal and external networks is called physical network isolation. [0003] In network isolation work, an encryption card is usually set between the internal network and the external network, and an encryption module is set on the encryption card. When the internal network needs to access the external network, or when the external network needs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04Q1/02H01R31/06
CPCH04L63/02H04Q1/028H04Q1/035H01R31/06H04L2209/12
Inventor 王利勤范颖颖齐峰刘瑞红王珊珊常昆苏丽娟杨方圆杨洺源
Owner HENAN VOCATIONAL COLLEGE OF APPLIED TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products