Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security controller of computer

A computer network and security controller technology, applied in computing, data exchange networks, instruments, etc., can solve problems such as the inability to guarantee the absolute security of user computer information, and achieve the effect of easy popularization, easy production, and absolute security protection

Inactive Publication Date: 2006-05-31
吴晓明
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From a technical point of view, as long as the computer is connected to the Internet and the hard disk is powered on, "network hackers" can change the working mode of the user's computer from the Internet, and there is no technical measure that cannot be taken to steal user information. Neither protective measures nor measures can guarantee the absolute security of user computer information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security controller of computer
  • Network security controller of computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention comprises computer internal power supply 1, computer hard disk 2 with confidential information, common computer hard disk 3, network switchboard 4 (model can adopt SF2316D), computer network hub 5, network card 6, common computer hard disk 3 communicates with network switchboard 4 respectively The network card 6 and the computer network hub 5 are connected, and also include a double-pole double-throw switch K, and the internal power supply 1 of the computer can be connected with the ordinary computer hard disk 3 via a double port of the double-pole double-throw switch K, and the other of the double-pole double-throw switch K Dual ports are connected with computer hard disk 2 with confidential information.

[0015] The +12V and +5V power lines of the plug A of the computer internal power supply 1 are respectively connected with the joints K5 and K2 of the double-pole double-throw switch K, and the +12V and +5V power lines of the plug B of the compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A safety controller of computer network consists of computer internal power supply, computer hard disc with secret information, normal computer hard disc, network switching board, computer network concentrator, network card and double ¿C point double ¿C throw switch. It is featured as connecting normal computer hard disc to network card, computer network concentrator separately through network switching board, connecting computer internal power supply to normal computer hard disc through one double port of double ¿C point double ¿C throw switch and connecting another double port to computer hard disc with secret information.

Description

Technical field: [0001] The invention relates to the improvement of computer hardware structure, especially belongs to the field of computer network security. Background technique: [0002] With the continuous expansion of the scale of computer networks, the contradictions of computer information security issues have become increasingly prominent. On the issue of computer network security protection, there are many technologies and methods adopted in the society at present. One is to use the isolation card technology, and use the system software to control the isolation card to select two different hard disks; the other is to use two different operating systems for the computer. Control two hard disks; the third is to divide one hard disk into two different work areas and use two different operating systems for control; the fourth is to use dual computers, one connected to the Internet and one not connected to the Internet; the fifth is to use the Internet No matter what ki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00H04L12/24
Inventor 吴晓明
Owner 吴晓明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products