CN204946014U - A kind of computer security control system - Google Patents
A kind of computer security control system Download PDFInfo
- Publication number
- CN204946014U CN204946014U CN201520719683.6U CN201520719683U CN204946014U CN 204946014 U CN204946014 U CN 204946014U CN 201520719683 U CN201520719683 U CN 201520719683U CN 204946014 U CN204946014 U CN 204946014U
- Authority
- CN
- China
- Prior art keywords
- master controller
- control system
- security control
- computer security
- authentication means
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Power Sources (AREA)
Abstract
The utility model discloses a kind of computer security control system, comprise master controller, described master controller is connected to electric power management circuit, display, invasion detecting device, data encryption device, internal inspection device, input media, logon information record and dispensing device, wherein, described invasion detecting device is connected with data-interface, described data encryption device is connected with system and starts hard disk, internal hard drive and external hard disc, and described electric power management circuit is connected to power-supply device and standby power supply; Antivirus protection circuit and authentication means is provided with in described invasion detecting device, wherein, described antivirus protection circuit is connected with described authentication means, and described antivirus protection circuit is also connected with described master controller with described data-interface respectively with described authentication means; System hardware integrity measurement device and system software integrity measurement device is provided with in described internal inspection device.
Description
Technical field
The utility model relates to computer equipment field, specifically, relates to a kind of computer security control system.
Background technology
Along with the develop rapidly of the day by day universal of computing machine and Internet technology, computer security control technology is also in continuous progress.There is huge change in work, the studying and living mode of people, efficiency greatly improves, and information resources are farthest shared.But, while Informatization Development, some problems also produced, such as: information leakage, information pollution, information are uncontrolled, serious harm national interests, social benefit and individual or group interest.When system generation hardware anomalies or poisoning intrusion, computer documents is lost, system perturbations, the abnormal occurrence such as normally cannot to run, power-off suddenly simultaneously also can cause File lose when being in work, and this can bring great loss unavoidably.
So when developing a kind of use, strong, the data of security of system are not easily lost or stolen, that system run all right is good safety control system, just become the problem that insider needs solution badly.
Utility model content
For the problem in correlation technique, the utility model proposes a kind of computer security control system, during use, not only security of system is strong, and system run all right is good, and data are not easily lost or stolen simultaneously.
For realizing above-mentioned technical purpose, the technical solution of the utility model is achieved in that
A kind of computer security control system, comprise master controller, described master controller is connected to electric power management circuit, display, invasion detecting device, data encryption device, internal inspection device, input media, logon information record and dispensing device, wherein, described invasion detecting device is connected with data-interface, described data encryption device is connected with system and starts hard disk, internal hard drive and external hard disc, and described electric power management circuit is connected to power-supply device and standby power supply; Antivirus protection circuit and authentication means is provided with in described invasion detecting device, wherein, described antivirus protection circuit is connected with described authentication means, and described antivirus protection circuit is also connected with described master controller with described data-interface respectively with described authentication means; System hardware integrity measurement device and system software integrity measurement device is provided with in described internal inspection device.
Further, described master controller is connected with Temperature sampler.
Further, connection mode number converter between described temperature collection circuit and described master controller.
Further, described master controller is connected with fan.
Further, described data-interface comprises computer interface and external memory interface.
Further, reset circuit is provided with in described authentication means.
Further, described display is provided with some pilot lamp.
The beneficial effects of the utility model: by the acting in conjunction of invasion detecting device and internal inspection device, thus effectively raise the security of system and the stability of system cloud gray model, simultaneously by the effect of data encryption device, standby power supply and some hard disks, make computing machine in use data not easily to lose or stolen, and then make this computer security control system have more wide development space.
Accompanying drawing explanation
In order to be illustrated more clearly in the utility model embodiment or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only embodiments more of the present utility model, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the computer security control system according to the utility model embodiment.
In figure:
1, master controller; 2, electric power management circuit; 3, display; 4, invasion detecting device; 5, data encryption device; 6, internal inspection device; 7, input media; 8, data-interface; 9, system starts hard disk; 10, internal hard drive; 11, external hard disc; 12, power-supply device; 13, standby power supply; 14, antivirus protection circuit; 15, authentication means; 16, system hardware integrity measurement device; 17, system software integrity measurement device; 18, Temperature sampler; 19, analog to digital converter; 20, fan; 21, reset circuit; 22, logon information record and dispensing device.
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, be clearly and completely described the technical scheme in the utility model embodiment, obviously, described embodiment is only the utility model part embodiment, instead of whole embodiments.
Based on the embodiment in the utility model, other embodiments all that those of ordinary skill in the art obtain, all belong to the scope of the utility model protection.
As shown in Figure 1, a kind of computer security control system according to embodiment of the present utility model, comprise master controller 1, described master controller 1 is connected to electric power management circuit 2, display 3, invasion detecting device 4, data encryption device 5, internal inspection device 6, input media 7, logon information record and dispensing device 22, wherein, described invasion detecting device 4 is connected with data-interface 8, described data encryption device 5 is connected with system and starts hard disk 9, internal hard drive 10 and external hard disc 11, described electric power management circuit 2 is connected to power-supply device 12 and standby power supply 13, antivirus protection circuit 14 and authentication means 15 is provided with in described invasion detecting device 4, wherein, described antivirus protection circuit 14 is connected with described authentication means 15, further, described antivirus protection circuit 14 is also connected with described master controller 1 with described data-interface 8 respectively with described authentication means 15, system hardware integrity measurement device 16 and system software integrity measurement device 17 is provided with in described internal inspection device 6.
In one embodiment, described master controller 1 is connected with Temperature sampler 18.
In one embodiment, connection mode number converter 19 between described temperature collection circuit 18 and described master controller 1.
In one embodiment, described master controller 1 is connected with fan 20.
In one embodiment, described data-interface 8 comprises computer interface and external memory interface.
In one embodiment, reset circuit 21 is provided with in described authentication means 15.
In one embodiment, described display 3 is provided with some pilot lamp.
Conveniently understand technique scheme of the present utility model, below by way of in concrete use-pattern, technique scheme of the present utility model is described in detail.
When specifically using, described antivirus protection circuit 14 and described authentication means 15 carry out protection constantly for the data message of multi input, verify the identity of user simultaneously, avoid other people without permission to use, prevent data stolen; Autonomous test is carried out in the operation of described system hardware integrity measurement device 16 and described system software integrity measurement device 17 pairs of whole systems, is also convenient to remind user trouble spot simultaneously; Described data encryption device 5 is encrypted for the data deposited, and described internal hard drive 10 is deposited only for the inner internal data reading and revise, and described external hard disc 11 is deposited the external data read for external network user; Described electric power management circuit 2 carries out the selection of power supply as the case may be, simultaneously when described standby power supply 13 does not have electricity or when electricity is not enough, carries out Charge Management; The described logon information record that described master controller 1 connects and dispensing device 22, can be sent to each landing time on the mobile terminal device of binding.
In sum, by means of technique scheme of the present utility model, by the acting in conjunction of invasion detecting device 4 and internal inspection device 6, thus effectively raise the security of system and the stability of system cloud gray model, simultaneously by the effect of data encryption device 5, standby power supply 13 and some hard disks, make computing machine in use data not easily to lose or stolen, and then make this computer security control system have more wide development space.
The foregoing is only preferred embodiment of the present utility model; not in order to limit the utility model; all within spirit of the present utility model and principle, any amendment done, equivalent replacement, improvement etc., all should be included within protection domain of the present utility model.
Claims (7)
1. a computer security control system, comprise master controller (1), it is characterized in that, described master controller (1) is connected to electric power management circuit (2), display (3), invasion detecting device (4), data encryption device (5), internal inspection device (6), input media (7), logon information record and dispensing device (22), wherein, described invasion detecting device (4) is connected with data-interface (8), described data encryption device (5) is connected with system and starts hard disk (9), internal hard drive (10) and external hard disc (11), described electric power management circuit (2) is connected to power-supply device (12) and standby power supply (13), antivirus protection circuit (14) and authentication means (15) is provided with in described invasion detecting device (4), wherein, described antivirus protection circuit (14) is connected with described authentication means (15), further, described antivirus protection circuit (14) is also connected with described master controller (1) with described data-interface (8) respectively with described authentication means (15), system hardware integrity measurement device (16) and system software integrity measurement device (17) is provided with in described internal inspection device (6).
2. computer security control system according to claim 1, is characterized in that, described master controller (1) is connected with Temperature sampler (18).
3. computer security control system according to claim 2, is characterized in that, connection mode number converter (19) between described temperature collection circuit (18) and described master controller (1).
4. computer security control system according to claim 1, is characterized in that, described master controller (1) is connected with fan (20).
5. computer security control system according to claim 1, is characterized in that, described data-interface (8) comprises computer interface and external memory interface.
6. computer security control system according to claim 1, is characterized in that, is provided with reset circuit (21) in described authentication means (15).
7. computer security control system according to claim 1, is characterized in that, described display (3) is provided with some pilot lamp.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520719683.6U CN204946014U (en) | 2015-09-16 | 2015-09-16 | A kind of computer security control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520719683.6U CN204946014U (en) | 2015-09-16 | 2015-09-16 | A kind of computer security control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204946014U true CN204946014U (en) | 2016-01-06 |
Family
ID=55013420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520719683.6U Expired - Fee Related CN204946014U (en) | 2015-09-16 | 2015-09-16 | A kind of computer security control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204946014U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355076A (en) * | 2016-08-28 | 2017-01-25 | 广西小草信息产业有限责任公司 | Computer security control system |
CN106446644A (en) * | 2016-06-16 | 2017-02-22 | 陕西理工学院 | Computer encryption/decryption device and method |
-
2015
- 2015-09-16 CN CN201520719683.6U patent/CN204946014U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446644A (en) * | 2016-06-16 | 2017-02-22 | 陕西理工学院 | Computer encryption/decryption device and method |
CN106355076A (en) * | 2016-08-28 | 2017-01-25 | 广西小草信息产业有限责任公司 | Computer security control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10142357B1 (en) | Systems and methods for preventing malicious network connections using correlation-based anomaly detection | |
US9529990B2 (en) | Systems and methods for validating login attempts based on user location | |
US10061916B1 (en) | Systems and methods for measuring peer influence on a child | |
US9256727B1 (en) | Systems and methods for detecting data leaks | |
US10348755B1 (en) | Systems and methods for detecting network security deficiencies on endpoint devices | |
US10887307B1 (en) | Systems and methods for identifying users | |
US9100440B1 (en) | Systems and methods for applying data loss prevention policies to closed-storage portable devices | |
US10282557B1 (en) | Systems and methods for protecting sensitive data against data loss | |
US9038158B1 (en) | Systems and methods for enforcing geolocation-based policies | |
US11275831B1 (en) | Systems and methods for detecting anomalous system command line data | |
US10200359B1 (en) | Systems and methods for creating credential vaults that use multi-factor authentication to automatically authenticate users to online services | |
US10015768B1 (en) | Systems and methods for locating unrecognized computing devices | |
CN106506484A (en) | A kind of method of data backup, apparatus and system | |
US9153120B1 (en) | Systems and methods for locating lost devices | |
US9122869B1 (en) | Systems and methods for detecting client types | |
CN204946014U (en) | A kind of computer security control system | |
US10033732B1 (en) | Systems and methods for detecting cloning of security tokens | |
US10348758B1 (en) | Systems and methods for providing interfaces for visualizing threats within networked control systems | |
JP7121146B2 (en) | Systems and methods for identifying data breaches | |
WO2019195051A1 (en) | Systems and methods for utilizing an information trail to enforce data loss prevention policies on potentially malicious file activity | |
US10193880B1 (en) | Systems and methods for registering user accounts with multi-factor authentication schemes used by online services | |
US10055586B1 (en) | Systems and methods for determining the trustworthiness of files within organizations | |
US10966050B1 (en) | Systems and methods for virtual boundary enforcement using network filters | |
US11146537B1 (en) | Systems and methods for protecting geolocation information | |
US10581781B1 (en) | Systems and methods for facilitating negotiation and exchange of information between parties |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160106 Termination date: 20170916 |