[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN204946014U - A kind of computer security control system - Google Patents

A kind of computer security control system Download PDF

Info

Publication number
CN204946014U
CN204946014U CN201520719683.6U CN201520719683U CN204946014U CN 204946014 U CN204946014 U CN 204946014U CN 201520719683 U CN201520719683 U CN 201520719683U CN 204946014 U CN204946014 U CN 204946014U
Authority
CN
China
Prior art keywords
master controller
control system
security control
computer security
authentication means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520719683.6U
Other languages
Chinese (zh)
Inventor
李俊
陶俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201520719683.6U priority Critical patent/CN204946014U/en
Application granted granted Critical
Publication of CN204946014U publication Critical patent/CN204946014U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Power Sources (AREA)

Abstract

The utility model discloses a kind of computer security control system, comprise master controller, described master controller is connected to electric power management circuit, display, invasion detecting device, data encryption device, internal inspection device, input media, logon information record and dispensing device, wherein, described invasion detecting device is connected with data-interface, described data encryption device is connected with system and starts hard disk, internal hard drive and external hard disc, and described electric power management circuit is connected to power-supply device and standby power supply; Antivirus protection circuit and authentication means is provided with in described invasion detecting device, wherein, described antivirus protection circuit is connected with described authentication means, and described antivirus protection circuit is also connected with described master controller with described data-interface respectively with described authentication means; System hardware integrity measurement device and system software integrity measurement device is provided with in described internal inspection device.

Description

A kind of computer security control system
Technical field
The utility model relates to computer equipment field, specifically, relates to a kind of computer security control system.
Background technology
Along with the develop rapidly of the day by day universal of computing machine and Internet technology, computer security control technology is also in continuous progress.There is huge change in work, the studying and living mode of people, efficiency greatly improves, and information resources are farthest shared.But, while Informatization Development, some problems also produced, such as: information leakage, information pollution, information are uncontrolled, serious harm national interests, social benefit and individual or group interest.When system generation hardware anomalies or poisoning intrusion, computer documents is lost, system perturbations, the abnormal occurrence such as normally cannot to run, power-off suddenly simultaneously also can cause File lose when being in work, and this can bring great loss unavoidably.
So when developing a kind of use, strong, the data of security of system are not easily lost or stolen, that system run all right is good safety control system, just become the problem that insider needs solution badly.
Utility model content
For the problem in correlation technique, the utility model proposes a kind of computer security control system, during use, not only security of system is strong, and system run all right is good, and data are not easily lost or stolen simultaneously.
For realizing above-mentioned technical purpose, the technical solution of the utility model is achieved in that
A kind of computer security control system, comprise master controller, described master controller is connected to electric power management circuit, display, invasion detecting device, data encryption device, internal inspection device, input media, logon information record and dispensing device, wherein, described invasion detecting device is connected with data-interface, described data encryption device is connected with system and starts hard disk, internal hard drive and external hard disc, and described electric power management circuit is connected to power-supply device and standby power supply; Antivirus protection circuit and authentication means is provided with in described invasion detecting device, wherein, described antivirus protection circuit is connected with described authentication means, and described antivirus protection circuit is also connected with described master controller with described data-interface respectively with described authentication means; System hardware integrity measurement device and system software integrity measurement device is provided with in described internal inspection device.
Further, described master controller is connected with Temperature sampler.
Further, connection mode number converter between described temperature collection circuit and described master controller.
Further, described master controller is connected with fan.
Further, described data-interface comprises computer interface and external memory interface.
Further, reset circuit is provided with in described authentication means.
Further, described display is provided with some pilot lamp.
The beneficial effects of the utility model: by the acting in conjunction of invasion detecting device and internal inspection device, thus effectively raise the security of system and the stability of system cloud gray model, simultaneously by the effect of data encryption device, standby power supply and some hard disks, make computing machine in use data not easily to lose or stolen, and then make this computer security control system have more wide development space.
Accompanying drawing explanation
In order to be illustrated more clearly in the utility model embodiment or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only embodiments more of the present utility model, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the computer security control system according to the utility model embodiment.
In figure:
1, master controller; 2, electric power management circuit; 3, display; 4, invasion detecting device; 5, data encryption device; 6, internal inspection device; 7, input media; 8, data-interface; 9, system starts hard disk; 10, internal hard drive; 11, external hard disc; 12, power-supply device; 13, standby power supply; 14, antivirus protection circuit; 15, authentication means; 16, system hardware integrity measurement device; 17, system software integrity measurement device; 18, Temperature sampler; 19, analog to digital converter; 20, fan; 21, reset circuit; 22, logon information record and dispensing device.
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, be clearly and completely described the technical scheme in the utility model embodiment, obviously, described embodiment is only the utility model part embodiment, instead of whole embodiments.
Based on the embodiment in the utility model, other embodiments all that those of ordinary skill in the art obtain, all belong to the scope of the utility model protection.
As shown in Figure 1, a kind of computer security control system according to embodiment of the present utility model, comprise master controller 1, described master controller 1 is connected to electric power management circuit 2, display 3, invasion detecting device 4, data encryption device 5, internal inspection device 6, input media 7, logon information record and dispensing device 22, wherein, described invasion detecting device 4 is connected with data-interface 8, described data encryption device 5 is connected with system and starts hard disk 9, internal hard drive 10 and external hard disc 11, described electric power management circuit 2 is connected to power-supply device 12 and standby power supply 13, antivirus protection circuit 14 and authentication means 15 is provided with in described invasion detecting device 4, wherein, described antivirus protection circuit 14 is connected with described authentication means 15, further, described antivirus protection circuit 14 is also connected with described master controller 1 with described data-interface 8 respectively with described authentication means 15, system hardware integrity measurement device 16 and system software integrity measurement device 17 is provided with in described internal inspection device 6.
In one embodiment, described master controller 1 is connected with Temperature sampler 18.
In one embodiment, connection mode number converter 19 between described temperature collection circuit 18 and described master controller 1.
In one embodiment, described master controller 1 is connected with fan 20.
In one embodiment, described data-interface 8 comprises computer interface and external memory interface.
In one embodiment, reset circuit 21 is provided with in described authentication means 15.
In one embodiment, described display 3 is provided with some pilot lamp.
Conveniently understand technique scheme of the present utility model, below by way of in concrete use-pattern, technique scheme of the present utility model is described in detail.
When specifically using, described antivirus protection circuit 14 and described authentication means 15 carry out protection constantly for the data message of multi input, verify the identity of user simultaneously, avoid other people without permission to use, prevent data stolen; Autonomous test is carried out in the operation of described system hardware integrity measurement device 16 and described system software integrity measurement device 17 pairs of whole systems, is also convenient to remind user trouble spot simultaneously; Described data encryption device 5 is encrypted for the data deposited, and described internal hard drive 10 is deposited only for the inner internal data reading and revise, and described external hard disc 11 is deposited the external data read for external network user; Described electric power management circuit 2 carries out the selection of power supply as the case may be, simultaneously when described standby power supply 13 does not have electricity or when electricity is not enough, carries out Charge Management; The described logon information record that described master controller 1 connects and dispensing device 22, can be sent to each landing time on the mobile terminal device of binding.
In sum, by means of technique scheme of the present utility model, by the acting in conjunction of invasion detecting device 4 and internal inspection device 6, thus effectively raise the security of system and the stability of system cloud gray model, simultaneously by the effect of data encryption device 5, standby power supply 13 and some hard disks, make computing machine in use data not easily to lose or stolen, and then make this computer security control system have more wide development space.
The foregoing is only preferred embodiment of the present utility model; not in order to limit the utility model; all within spirit of the present utility model and principle, any amendment done, equivalent replacement, improvement etc., all should be included within protection domain of the present utility model.

Claims (7)

1. a computer security control system, comprise master controller (1), it is characterized in that, described master controller (1) is connected to electric power management circuit (2), display (3), invasion detecting device (4), data encryption device (5), internal inspection device (6), input media (7), logon information record and dispensing device (22), wherein, described invasion detecting device (4) is connected with data-interface (8), described data encryption device (5) is connected with system and starts hard disk (9), internal hard drive (10) and external hard disc (11), described electric power management circuit (2) is connected to power-supply device (12) and standby power supply (13), antivirus protection circuit (14) and authentication means (15) is provided with in described invasion detecting device (4), wherein, described antivirus protection circuit (14) is connected with described authentication means (15), further, described antivirus protection circuit (14) is also connected with described master controller (1) with described data-interface (8) respectively with described authentication means (15), system hardware integrity measurement device (16) and system software integrity measurement device (17) is provided with in described internal inspection device (6).
2. computer security control system according to claim 1, is characterized in that, described master controller (1) is connected with Temperature sampler (18).
3. computer security control system according to claim 2, is characterized in that, connection mode number converter (19) between described temperature collection circuit (18) and described master controller (1).
4. computer security control system according to claim 1, is characterized in that, described master controller (1) is connected with fan (20).
5. computer security control system according to claim 1, is characterized in that, described data-interface (8) comprises computer interface and external memory interface.
6. computer security control system according to claim 1, is characterized in that, is provided with reset circuit (21) in described authentication means (15).
7. computer security control system according to claim 1, is characterized in that, described display (3) is provided with some pilot lamp.
CN201520719683.6U 2015-09-16 2015-09-16 A kind of computer security control system Expired - Fee Related CN204946014U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520719683.6U CN204946014U (en) 2015-09-16 2015-09-16 A kind of computer security control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520719683.6U CN204946014U (en) 2015-09-16 2015-09-16 A kind of computer security control system

Publications (1)

Publication Number Publication Date
CN204946014U true CN204946014U (en) 2016-01-06

Family

ID=55013420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520719683.6U Expired - Fee Related CN204946014U (en) 2015-09-16 2015-09-16 A kind of computer security control system

Country Status (1)

Country Link
CN (1) CN204946014U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355076A (en) * 2016-08-28 2017-01-25 广西小草信息产业有限责任公司 Computer security control system
CN106446644A (en) * 2016-06-16 2017-02-22 陕西理工学院 Computer encryption/decryption device and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446644A (en) * 2016-06-16 2017-02-22 陕西理工学院 Computer encryption/decryption device and method
CN106355076A (en) * 2016-08-28 2017-01-25 广西小草信息产业有限责任公司 Computer security control system

Similar Documents

Publication Publication Date Title
US10142357B1 (en) Systems and methods for preventing malicious network connections using correlation-based anomaly detection
US9529990B2 (en) Systems and methods for validating login attempts based on user location
US10061916B1 (en) Systems and methods for measuring peer influence on a child
US9256727B1 (en) Systems and methods for detecting data leaks
US10348755B1 (en) Systems and methods for detecting network security deficiencies on endpoint devices
US10887307B1 (en) Systems and methods for identifying users
US9100440B1 (en) Systems and methods for applying data loss prevention policies to closed-storage portable devices
US10282557B1 (en) Systems and methods for protecting sensitive data against data loss
US9038158B1 (en) Systems and methods for enforcing geolocation-based policies
US11275831B1 (en) Systems and methods for detecting anomalous system command line data
US10200359B1 (en) Systems and methods for creating credential vaults that use multi-factor authentication to automatically authenticate users to online services
US10015768B1 (en) Systems and methods for locating unrecognized computing devices
CN106506484A (en) A kind of method of data backup, apparatus and system
US9153120B1 (en) Systems and methods for locating lost devices
US9122869B1 (en) Systems and methods for detecting client types
CN204946014U (en) A kind of computer security control system
US10033732B1 (en) Systems and methods for detecting cloning of security tokens
US10348758B1 (en) Systems and methods for providing interfaces for visualizing threats within networked control systems
JP7121146B2 (en) Systems and methods for identifying data breaches
WO2019195051A1 (en) Systems and methods for utilizing an information trail to enforce data loss prevention policies on potentially malicious file activity
US10193880B1 (en) Systems and methods for registering user accounts with multi-factor authentication schemes used by online services
US10055586B1 (en) Systems and methods for determining the trustworthiness of files within organizations
US10966050B1 (en) Systems and methods for virtual boundary enforcement using network filters
US11146537B1 (en) Systems and methods for protecting geolocation information
US10581781B1 (en) Systems and methods for facilitating negotiation and exchange of information between parties

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106

Termination date: 20170916