Safety screw host and safety system for preventing disassembly of 5G confidential information technology

文档序号:1378826 发布日期:2020-08-14 浏览:32次 中文

阅读说明:本技术 5g保密信息技术的防止拆机的安全螺钉主机和安全系统 (Safety screw host and safety system for preventing disassembly of 5G confidential information technology ) 是由 刘长礼 周晶 于 2020-04-29 设计创作,主要内容包括:本发明涉及电脑和信息安全领域,尤其涉及5G保密信息技术的防止拆机的安全螺钉主机和安全系统。主机壳体的螺钉(34)能将主机可拆的侧板安装再主机壳体上,在螺钉(34)安装的安装孔(35)的底部包含压力传感器(36);压力传感器(36)通信连接中控部分,当有人拧转螺钉(34)的时候,压力传感器(36)失去信号,则判定有人准备拆机。(The invention relates to the field of computers and information security, in particular to a safety screw host and a safety system for preventing disassembly in a 5G confidential information technology. A detachable side plate of the host can be installed on the host shell by a screw (34) of the host shell, and the bottom of an installation hole (35) for installing the screw (34) comprises a pressure sensor (36); the pressure sensor (36) is in communication connection with the central control part, when a person screws the screw (34), the pressure sensor (36) loses signals, and then the fact that the person is ready to disassemble is judged.)

The safety screw host machine for preventing the machine from being disassembled in the 1.5G confidential information technology is characterized in that a detachable side plate of the host machine can be installed on the host machine shell through a screw (34) of the host machine shell, and the bottom of an installation hole (35) installed on the screw (34) comprises a pressure sensor (36); the pressure sensor (36) is in communication connection with the central control part, when a person screws the screw (34), the pressure sensor (36) loses a signal, and then the fact that the person is ready to disassemble is judged;

after the preparation of a person is judged, if the hard disk is judged to have the risk of being stolen, a self-destruction system is started for self-destruction; a detachable side plate of the host can be installed on the host shell by a screw (34) of the host shell, and the bottom of an installation hole (35) for installing the screw (34) comprises a pressure sensor (36); the pressure sensor (36) is in communication connection with the central control part, when a person screws the screw (34), the pressure sensor (36) loses a signal, and then the fact that the person is ready to disassemble the hard disk is judged; at the moment, starting a self-destruction system;

the system A storage battery (20) and the system B storage battery (21) are respectively connected with an inverter to generate instant high voltage, and after water spraying is finished, the system A storage battery (20) and the system B storage battery (21) generate instant high voltage to guide the system A and the system B; even if the outside commercial power is cut off by a broken person, the system A and the system B can be instantly damaged by taking water as a conductor; warning persons who maliciously contact the computer; and (4) keeping confidential information.

2. The 5G confidential information technology tamper-resistant security screw host of claim 1, wherein the pressure sensor is a small pressure sensor or a small push switch that is activated upon being pressed.

3. The safety screw host machine for preventing disassembly of 5G confidential information technology according to claim 1, further comprising a central control part, wherein the central control part can acquire signals of a plurality of pressure sensors and perform centralized control.

4. A safety system for whether screws are screwed or not is characterized in that screws (34) are adopted as all screws of an outer shell of a machine, and a pressure sensor (36) is contained at the bottom of a mounting hole (35) for mounting the screws (34); the pressure sensor (36) is in communication connection with the central control part, when a person screws the screw (34), the pressure sensor (36) loses signals, and the fact that the person is ready to disassemble the machine or the screw is loose is judged.

5. A safety system for the tightening or non-tightening of screws according to claim 4, characterised in that the pressure sensors (36) are periodically inspected to see if the machine is being disassembled or tightened by a person, indicating maintenance.

Technical Field

The invention relates to the field of computers and information security, in particular to a safety screw host and a safety system for preventing disassembly in a 5G confidential information technology.

Background

Confidential computers or computers of ordinary people are not willing to be seen by others because of the many confidential or private information inside.

The current technology has no way to protect information.

Disclosure of Invention

The purpose of the invention is as follows: in order to provide a safety screw host and a safety system for preventing disassembly of a 5G confidential information technology with better effect, the specific purpose is to see a plurality of substantial technical effects of the specific implementation part.

In order to achieve the purpose, the invention adopts the following technical scheme:

the first scheme is as follows:

the anti-theft tomb central control 5G double-hardware isolated unconscious security computer system is characterized by comprising a button 1 which is a starting button of a computer, wherein the extrusion head of the button is hollow, an identification area 2 is arranged on the extrusion head, a fingerprint identification system 10 is arranged in the middle of the extrusion head, and the system also comprises a button battery 11 or a mains supply system which can supply power to the fingerprint identification system 10; the fingerprint identification system 10 is connected with the starting control part in a communication way; the computer comprises two systems, wherein the systems are hardware systems, each hardware system comprises a storage battery, namely a system A storage battery 20 and a system B storage battery 21, the system A storage battery 20 and the system B storage battery 21 respectively supply power for the system A and the system B, and different systems are started according to the identification result of the fingerprint identification system 10; the two systems share one host shell.

The invention further adopts the technical scheme that the starting control part is an independent chip and can collect and judge the identification effect of the fingerprint identification system; the system is communicated with two sets of hardware systems and is communicated with a remote safety host; the person with correct fingerprint needs to stay on the start key for fingerprint identification to be successfully started, and stay for 1-3 seconds for fingerprint silent identification starting.

The technical scheme of the invention is that the fingerprint identification is silent identification without influence, and the external display of the starting process is consistent no matter which set of system is started.

The invention further adopts the technical scheme that two sets of hardware systems share one display card, one memory, one sound card, one fan and one mainboard or respectively have the respective display card, the memory, the sound card, the fan and the mainboard.

The invention has the further technical scheme that the two hardware systems respectively comprise respective hard disks.

The invention further adopts the technical scheme that the unconscious security computer system comprises a security mode and an alert mode; under the safe mode, hard disks contained in the two hardware systems can be backed up with each other; under the alert mode, the hard disk of the system A is internally provided with the core data of a real computer, and the system B is provided with the non-core data which confuses an unauthorized boot-up person.

The invention further adopts the technical scheme that the system also comprises a host self-destruction system.

The method for preventing secret leakage by unconsciously and safely isolating the central control type double hardware of the anti-theft tomb is characterized in that the unconscious safety computer system is utilized, and the method comprises the following steps:

when a layman directly presses the button 1 with a finger, the fingerprint identification system 10 identifies the fingerprint; if the gear identification is correct, normally starting a system A with hardware isolation; and recording the fingerprint and the starting time;

when the identification is wrong, the fingerprint and the starting time are recorded, and the system B with isolated hardware is started at the same time; the boot-strap person can think that the boot-strap person boots up himself, search information on the disguised hard disk, and simultaneously carry out unconscious alarm; meanwhile, the central control system carries out safety platform alarm in a wireless communication mode, and simultaneously carries out information recording and real-time remote transmission of a boot loader by using a camera.

The invention further adopts the technical scheme that after the hard disk is identified by mistake and if the hard disk is judged to have the risk of being stolen, the self-destruction system is started for self-destruction; the detachable side plate of the host can be installed on the host shell by a screw 34 of the host shell, and the bottom of an installation hole 35 where the screw 34 is installed comprises a pressure sensor 36; the pressure sensor 36 is in communication connection with the central control part, when a person screws the screw 34, the pressure sensor 36 loses signals, and then the fact that the person is ready to disassemble the hard disk is judged; at this point the self-destruct system is started.

A method for automatic backup of double hard disks and supplying power to a computer by adopting storage batteries is characterized in that a system A storage battery 20 and a system B storage battery 21 are connected in parallel and are respectively connected with a system A and a system B; therefore, when a temporary power failure occurs, the a-system battery 20 and the B-system battery 21 continue to supply power to the a-system; meanwhile, because the system A and the system B respectively comprise hard disks, when the computer is positioned as a safe computer, the two hard disks are backed up with each other; data recovery is required to prepare the hard disk for corruption.

Scheme II:

the water-cooling 5G computer host system based on information security is characterized in that a central water control plate 13 is arranged in a host shell, the middle of the central water control plate 13 is a cavity, and one side of the central water control plate 13 comprises a water inlet 16 and a water outlet 17; the water inlet 16 and the water outlet 17 are respectively connected to a water pump 18 in a water tank 19; water is pumped by the water pump to enter the central water control plate 13 for circulation; the system A and the system B are respectively arranged on two sides of the central water control plate 13; the heat generated by the operation of the system A and the system B can be taken away by the circulating water; the water tank 19 is provided as a separate part or as a part of the housing of the main unit, and a water-proof treatment is included between the water tank and the central water control panel 13.

The invention further adopts the technical scheme that the host shell is square, the square host shell comprises side plates capable of being opened, and the upper part and the lower part of the square host shell respectively comprise a first clamping lath 23, a clamping gap 24 and a second clamping lath 25; the upper and lower clamping gaps 24 are used for clamping the central water control plate 13.

A further technical solution of the present invention is that the water tank includes a tank opening part 26, and water can be changed by opening the tank opening part 26.

The invention further adopts the technical scheme that the self-destruction type water heater also comprises a self-destruction part, wherein the self-destruction part comprises a self-destruction water pipe 29, the self-destruction water pipe 29 comprises a self-destruction valve 30, and the end part of the self-destruction water pipe 29 is provided with a self-destruction spray head 31; the self-destruction spray heads 31 are directed to hardware parts of the system a and the system B.

The invention further has the technical scheme that the invention also comprises a self-destruction part and a safety protection inverse high-voltage part, wherein the safety protection inverse high-voltage part refers to that the storage battery 20 of the system A and the storage battery 21 of the system B are respectively connected with an inverter to generate instantaneous high voltage, and after water spraying is finished, the storage battery 20 of the system A and the storage battery 21 of the system B generate instantaneous high voltage to guide the system A and the system B; even if the outside commercial power is cut off by a broken person, the system A and the system B can be instantly damaged by taking water as a conductor; warning people who maliciously contact the computer.

The invention further adopts the technical scheme that the main machine shell comprises a first insertion hole 27 and a second insertion hole 28; the handle 32 can be inserted therein to lift the entire host.

A method for providing self-destruction while water cooling is characterized in that an unconscious safety computer system comprises a button 1 which is a starting button of a computer, an extrusion head of the button is hollow, an identification area 2 is arranged on the extrusion head, a fingerprint identification system 10 is arranged in the middle of the extrusion head, and a button battery 11 or a button battery which can supply power to the fingerprint identification system 10 is also included; the fingerprint identification system 10 is connected with the starting control part in a communication way; the computer comprises two systems, wherein the systems are hardware systems, each hardware system comprises a storage battery, namely a system A storage battery 20 and a system B storage battery 21, the system A storage battery 20 and the system B storage battery 21 respectively supply power for the system A and the system B, and different systems are started according to the identification result of the fingerprint identification system 10; the two systems share one host shell;

when a layman directly presses the button 1 with a finger, the fingerprint identification system 10 identifies the fingerprint; if the gear identification is correct, normally starting a system A with hardware isolation; and recording the fingerprint and the starting time;

when the identification is wrong, the fingerprint and the starting time are recorded, and the system B with isolated hardware is started at the same time; the boot-strap person can think that the boot-strap person boots up himself, search information on the disguised hard disk, and simultaneously carry out unconscious alarm; meanwhile, the central control system performs security platform alarm in a wireless communication mode, and performs information recording and real-time remote transmission of a boot loader by using a camera; the operator can mistakenly think that the operator enters the computer system and actually enters the fishing system or the false system;

after the hard disk is identified wrongly, if the hard disk is judged to have the risk of being stolen, a self-destruction system is started for self-destruction; the detachable side plate of the host can be installed on the host shell by a screw 34 of the host shell, and the bottom of an installation hole 35 where the screw 34 is installed comprises a pressure sensor 36; the pressure sensor 36 is in communication connection with the central control part, when a person screws the screw 34, the pressure sensor 36 loses signals, and then the fact that the person is ready to disassemble the hard disk is judged; at the moment, starting a self-destruction system;

the system A storage battery 20 and the system B storage battery 21 are respectively connected with an inverter to generate instant high voltage, and after water spraying is finished, the system A storage battery 20 and the system B storage battery 21 generate instant high voltage to guide the system A and the system B; even if the outside commercial power is cut off by a broken person, the system A and the system B can be instantly damaged by taking water as a conductor; warning persons who maliciously contact the computer; and (4) keeping confidential information.

The invention further adopts the technical scheme that the stored fingerprint information and image information of the boot starter are remotely transmitted to the security platform.

The invention further adopts the technical scheme that after self-destruction, the hard disk of the system A integrally comprises an insulating layer, and high-voltage electricity cannot penetrate the insulating layer; the storage battery discharges continuously, the hard disk still cannot be contacted with the outside of the hard disk, the mainboard is provided with water belt high voltage electricity, and people cannot contact the mainboard.

The further technical scheme of the invention is that before self-destruction, the stored information in the whole hard disk of the system A is remotely transmitted to a safe cloud platform; namely, the hard disk of the system A is provided with a small-sized communication antenna and a disk reading system, and the hard disk of the system A can be read and written and can be remotely communicated with a cloud platform.

The third scheme is as follows:

the safety screw host machine for preventing machine disassembly in 5G confidential information technology is characterized in that a detachable side plate of the host machine can be installed on the host machine shell through a screw 34 of the host machine shell, and the bottom of an installation hole 35 installed on the screw 34 comprises a pressure sensor 36; the pressure sensor 36 is in communication connection with the central control part, when a person screws the screw 34, the pressure sensor 36 loses signals, and then the fact that the person is ready to disassemble is judged;

after the preparation of a person is judged, if the hard disk is judged to have the risk of being stolen, a self-destruction system is started for self-destruction; the detachable side plate of the host can be installed on the host shell by a screw 34 of the host shell, and the bottom of an installation hole 35 where the screw 34 is installed comprises a pressure sensor 36; the pressure sensor 36 is in communication connection with the central control part, when a person screws the screw 34, the pressure sensor 36 loses signals, and then the fact that the person is ready to disassemble the hard disk is judged; at the moment, starting a self-destruction system;

the system A storage battery 20 and the system B storage battery 21 are respectively connected with an inverter to generate instant high voltage, and after water spraying is finished, the system A storage battery 20 and the system B storage battery 21 generate instant high voltage to guide the system A and the system B; even if the outside commercial power is cut off by a broken person, the system A and the system B can be instantly damaged by taking water as a conductor; warning persons who maliciously contact the computer; and (4) keeping confidential information.

The invention further adopts the technical scheme that the pressure sensor is a small pressure sensor or a small push switch, and the small push switch is started after being pressed.

The invention further adopts the technical scheme that the pressure sensor system further comprises a central control part, and the central control part can acquire signals of a plurality of pressure sensors and perform centralized control.

A safety system for whether screws are screwed or not is characterized in that screws 34 are adopted as all screws of an outer shell of a machine, and a pressure sensor 36 is contained at the bottom of a mounting hole 35 where the screws 34 are mounted; the pressure sensor 36 is in communication connection with the central control part, when a person screws the screw 34, the pressure sensor 36 loses signals, and the fact that the person is ready to disassemble the machine or the screw is loose is judged.

The further technical scheme of the invention is that a plurality of pressure sensors 36 are regularly inspected to know whether the field machine is disassembled or loosened by people or not, and maintenance is indicated.

Compared with the prior art, the invention adopting the technical scheme has the following beneficial effects: the intelligent water-cooling system is safer, good in camouflage, capable of self-destroying and integrally water-cooling, and has a better cloud alternating current mode when being provided with a dual-power-supply dual system.

Drawings

To further illustrate the present invention, further description is provided below with reference to the accompanying drawings:

FIG. 1 is a schematic view of the power button of the present invention;

FIG. 2 is a logic diagram of fingerprint recognition;

FIG. 3 is an overall logic diagram;

FIG. 4 is an internal structural view of the button;

FIG. 5 is a schematic diagram of an external structure of the host;

FIG. 6 is a schematic structural diagram of the integrated host; FIG. 7 is a schematic structural diagram of the novel mainframe;

FIG. 8 is a schematic view of a further development;

FIG. 9 is a diagram of a conventional host start-up circuit;

FIG. 10 is a schematic diagram of an improved host startup circuit;

FIG. 11 is a block diagram of a self-destructing waterway;

FIG. 12 is a modified view of the structure with a handle;

fig. 13 shows an on-start warning structure.

Wherein: 1. a button; 2. identifying an area; 3. a communication line; 4. a fingerprint identification system; 5, a USB interface I; 6. an audio jack I; 7. a main housing; 8, a USB interface II; 9. an audio jack II; 10. a fingerprint identification system; 11. a button cell; 12. starting a communication system; 13. a central water control plate; 14. the side clamps the fixed strip; 15. clamping the fixing hole; 16. a water inlet; 17. a water outlet; 18. a water pump; 19. a water tank; system a battery; a B-system battery; 22. fingerprint identification storage battery; 23. clamping the first lath; 24. a clamping gap; 25. a second clamping lath; 26. a water tank opening part; 27. a first insertion hole; 28. a second insertion hole; 29. self-destroying the water pipe; 30. a self-destructing valve; 31. a self-destructing spray head; 32. a handle; 33. an interface back plate; 34. a screw; 35. mounting holes; 36. a pressure sensor; 37. a communication line.

Detailed Description

The present invention will be further illustrated with reference to the accompanying drawings and specific embodiments, which are to be understood as merely illustrative of the invention and not as limiting the scope of the invention. In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", "top", "bottom", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention. Furthermore, unless expressly stated or limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, as they may be fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.

It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.

The patent provides a plurality of parallel schemes, and different expressions belong to an improved scheme based on a basic scheme or a parallel scheme. Each solution has its own unique features.

Multiple sets of schemes can be combined with each other.

The first scheme is as follows:

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于计算机机箱的内部信息防盗取机构

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类