Method and device suitable for computer information security protection

文档序号:241831 发布日期:2021-11-12 浏览:45次 中文

阅读说明:本技术 一种适用于计算机信息安全防护的方法及装置 (Method and device suitable for computer information security protection ) 是由 陈家俊 于 2021-08-03 设计创作,主要内容包括:本发明公开了一种适用于计算机信息安全防护的方法,包括:低速硬盘、连接设备、储存硬盘、电磁块;S1、开机:打开计算机,计算机电源通电;S2、开启诱饵:低速硬盘跟随计算机电源得电运转;S3、辅助连接:电磁块得到计算机电源供电,产生磁性;S4、正常使用:利用物理按下的方式使连接设备接通储存硬盘电源,计算机开始检测识别存储硬盘,可以进行写入/读取信息(按压时,连接设备靠近电磁块,并吸附在其表面);S5、备份:手动制作或AI合成虚假信息。该适用于计算机信息安全防护的方法及装置,通过使用连接装置,利用物理隔断的方法,在计算机关闭时,自动断开存储硬盘的电源连接,防止被入侵者查看,提高了计算机信息保存的安全性。(The invention discloses a method suitable for computer information security protection, which comprises the following steps: the device comprises a low-speed hard disk, a connecting device, a storage hard disk and an electromagnetic block; s1, starting up: turning on the computer, and electrifying the computer; s2, bait opening: the low-speed hard disk is operated by getting electricity along with the power supply of the computer; s3, auxiliary connection: the electromagnetic block obtains power supply of a computer power supply to generate magnetism; s4, normal use: the connection equipment is connected with a power supply of the storage hard disk in a physical pressing mode, and the computer starts to detect and identify the storage hard disk, so that information can be written in/read out (when the connection equipment is pressed, the connection equipment is close to the electromagnetic block and is adsorbed on the surface of the electromagnetic block); s5, backup: manually produced or AI synthesized dummy information. According to the method and the device for protecting the computer information, the power connection of the storage hard disk is automatically disconnected when the computer is closed by using the connecting device and a physical partition method, so that the computer information is prevented from being checked by an intruder, and the safety of computer information storage is improved.)

1. A method suitable for computer information security protection is characterized in that: the method comprises the following steps:

the device comprises a low-speed hard disk, a connecting device, a storage hard disk and an electromagnetic block;

s1, starting up: turning on the computer, and electrifying the computer;

s2, bait opening: the low-speed hard disk is operated by getting electricity along with the power supply of the computer;

s3, auxiliary connection: the electromagnetic block obtains power supply of a computer power supply to generate magnetism;

s4, normal use: the connection equipment is connected with a power supply of the storage hard disk in a physical pressing mode, and the computer starts to detect and identify the storage hard disk, so that information can be written in/read out (when the connection equipment is pressed, the connection equipment is close to the electromagnetic block and is adsorbed on the surface of the electromagnetic block);

s5, backup: manually making or AI synthesizing false information, and transmitting the false information into a low-speed hard disk (only storing and deleting, and triggering a tracking system when reading or downloading);

s6, shutdown: when the power supply of the computer is cut off, the electromagnetic block loses magnetism, and the connecting device is reset to disconnect the storage hard disk;

s7, intrusion protection: if someone invades the computer when the computer is shut down, the false information in the low-speed hard disk can be read only;

s8, backward tracing: the low-speed hard disk limits the information reading or downloading speed of an intruder and provides enough time for the tracking system to reversely track the IP of the other side;

s9, data retention: if the address of the other party is tracked, the address and the intrusion time are recorded together, and the next time the computer is started, the computer can be reminded to check.

2. The method of claim 1, wherein the method further comprises: the iron plates are arranged around the connecting device, and when the iron plates are not close to the electromagnetic blocks, the magnetism of the electromagnetic blocks does not act on the electromagnetic blocks.

3. The method and apparatus for computer information security protection as claimed in claim 1, wherein: the output speed of the low-speed hard disk does not exceed 1 KB/s.

4. An auxiliary device suitable for a method of computer information security protection as claimed in claim 1, comprising a hard disk socket (1) and a power line (2), characterized in that: and a control connecting piece (3) for controlling the plugging and unplugging of the power supply is installed at the top of the power supply line (2).

5. The assistance device of claim 4, wherein the method comprises: the control connecting piece (3) comprises a mounting rack (31), an air cavity (32) is arranged at the top of the mounting rack (31), the top of the air cavity (32) is inserted with a button (33), the bottom of the mounting rack (31) is embedded with two air bags (34), the bottom of the air bag (34) is inserted with a connecting rod (35), an air hole (36) is arranged between the air bag (34) and the air cavity (32), a control groove (37) is arranged on the bottom wall of the air cavity (32), a control rod (38) is fixedly connected with the bottom of the button (33), a control sleeve (39) is rotatably connected inside the control groove (37), a push groove (310) is arranged in the control sleeve (39), a push rod (311) is connected in the push groove (310) in a sliding mode, and one end, close to the air bag (34), of the push rod (311) is connected with an extrusion block (312).

6. The auxiliary device for a method of securing computer information according to claim 1, wherein: the top of the control connecting piece (3) is connected with the wall of the computer box.

7. An auxiliary device adapted for use in a method of securing computer information according to claim 6, wherein: the mounting rack (31) is connected with the power line (2) through a connecting rod (35), the button (33) extends to the outer side of the wall of the computer box, and a return spring is arranged in the button (33); and an extrusion space is arranged on the outer side above the air bag (34), and the extrusion space is communicated with the control groove (37).

8. An auxiliary device adapted for use in a method of securing computer information according to claim 6, wherein: the control sleeve (39) is annular, one-way threads are arranged in the inner portion of the control sleeve, openings corresponding to the push rods (311) are formed in the two sides of the control sleeve (39), the push grooves (310) are located in the openings, the control rods (38) are inserted into the control sleeve (39), sliding blocks extending into the one-way threads are arranged on the outer side of the control rods (38), and the extrusion blocks (312) are attached to the air bag (34).

Technical Field

The invention relates to the technical field of computer security protection, in particular to a method and a device suitable for computer information security protection.

Background

With the development of intelligent science and technology, computers have been popularized to each household, and no matter entertainment, study and work are not separated from the computers, so that the computers have been thoroughly integrated into our lives, but the computers bring convenience to people and have great information safety hidden dangers, particularly office data of some governments and confidential documents of enterprises.

Once the computer is connected with the network, the computer is likely to be invaded, and in order to reduce the possibility of being discovered, an invader generally chooses to invade in the non-office time such as midnight or early morning, opens the computer by a high-level technical means, reads/downloads the information in the computer, and when a person to be dealt with finds that the time is too late, in order to prevent information leakage, people usually choose methods such as dual-computer operation and USB flash disk storage, but the methods have great disadvantages:

1. double-machine operation: the use is troublesome, and a large amount of office space is occupied;

2. and (4) storing the USB flash disk: are easily lost and lost, and have the problem of forgetting to pull out from the computer.

In order to better facilitate office work and protect computer information security, a method and a device suitable for computer information security protection are provided.

Disclosure of Invention

In order to overcome the defects of the prior art, the invention aims to provide a method and a device suitable for computer information security protection, which have the function of information security.

The invention has the following beneficial effects:

1. according to the method and the device for protecting the computer information, the power connection of the storage hard disk is automatically disconnected when the computer is closed by using the connecting device and a physical partition method, so that the computer information is prevented from being checked by an intruder, and the safety of computer information storage is improved.

2. The method and the device for the computer information safety protection inform that a low-speed hard disk is set as bait, when an intruder finds the hard disk, the intruder is puzzled by false information in the hard disk, when the file content is started to be read or downloaded, a tracking system is triggered and limited by the reading speed of the hard disk, a large amount of time is spent on reading/downloading, the tracking system has sufficient time to inquire the IP address of the intruder, the intruder is prevented from being unable to find after leaving, and the problem of computer information safety can be solved from the source.

3. The method and the device for computer information safety protection inform the insertion mode of the control connecting piece, the contact area of a power line and a current conducting plate of a hard disk socket is gradually increased along with use, and excessive contact abrasion and poor contact caused by continuous plugging and unplugging are prevented.

The invention adopts the following technical scheme for realizing the technical purpose: a method for computer information security protection, comprising: the device comprises a low-speed hard disk, a connecting device, a storage hard disk and an electromagnetic block;

s1, starting up: turning on the computer, and electrifying the computer;

s2, bait opening: the low-speed hard disk is operated by getting electricity along with the power supply of the computer;

s3, auxiliary connection: the electromagnetic block obtains power supply of a computer power supply to generate magnetism;

s4, normal use: the connection equipment is connected with a power supply of the storage hard disk in a physical pressing mode, and the computer starts to detect and identify the storage hard disk, so that information can be written in/read out (when the connection equipment is pressed, the connection equipment is close to the electromagnetic block and is adsorbed on the surface of the electromagnetic block);

s5, backup: manually making or AI synthesizing false information, and transmitting the false information into a low-speed hard disk (only storing and deleting, and triggering a tracking system when reading or downloading);

s6, shutdown: when the power supply of the computer is cut off, the electromagnetic block loses magnetism, and the connecting device is reset to disconnect the storage hard disk;

s7, intrusion protection: if someone invades the computer when the computer is shut down, the false information in the low-speed hard disk can be read only;

s8, backward tracing: the low-speed hard disk limits the information reading or downloading speed of an intruder and provides enough time for the tracking system to reversely track the IP of the other side;

s9, data retention: if the address of the other party is tracked, the address and the intrusion time are recorded together, and the next time the computer is started, the computer can be reminded to check.

Preferably, iron plates are arranged around the connecting device, and when the iron plates are not close to the electromagnetic blocks, the magnetism of the electromagnetic blocks does not act on the electromagnetic blocks.

As optimization, the output speed of the low-speed hard disk does not exceed 1 KB/s.

As optimization, AI synthesized false information includes public related information, schedule of time disorder, report with modified data, etc

The auxiliary device suitable for the computer information safety protection method comprises a hard disk socket and a power line, wherein a control connecting piece for controlling the plugging and unplugging of the power supply is installed at the top of the power line.

As optimization, the control connecting piece includes the mounting bracket, and the top of above-mentioned mounting bracket begins to have the air cavity, and it has the button to peg graft at the top of above-mentioned air cavity, and two gasbags have been inlayed to the bottom of above-mentioned mounting bracket, peg graft in the bottom of gasbag has the connecting rod, set up the gas pocket between gasbag and the air cavity, the control flume has been seted up to the diapire of air cavity, the bottom fixedly connected with control lever of button, the inside rotation of control flume is connected with the control cover, the promotion groove has been seted up to the memory of control cover, sliding connection has the catch bar in the promotion groove, the one end that the catch bar is close to the gasbag is connected with the extrusion piece.

As optimization, the top of the control connecting piece is connected with the wall of a computer box,

preferably, the mounting rack is connected with a power line through a connecting rod, the button extends to the outer side of the wall of the computer case, and a return spring is arranged in the button; and an extrusion space is arranged on the outer side above the air bag and communicated with the control groove.

Preferably, the control sleeve is annular, one-way threads are arranged inside the control sleeve, openings corresponding to the push rods are formed in two sides of the control sleeve, the push grooves are located in the openings, sliding blocks extending into the one-way threads are arranged on the outer side of the control rods, the control rods are inserted into the control sleeve, and the extrusion blocks are attached to the air bag.

Drawings

In the figure: 1. a hard disk socket; 2. a power line; 3. a control connection; 31. a mounting frame; 32. an air cavity; 33. a button; 34. an air bag; 35. a connecting rod; 36. air holes; 37. a control slot; 38. a control lever; 39. a control sleeve; 310. a push groove; 311. a push rod; 312. and extruding the block.

FIG. 1 is a schematic structural diagram of a method and an apparatus for computer information security protection according to the present invention.

FIG. 2 is an enlarged view of a portion of FIG. 1 illustrating a method and apparatus for securing computer information according to the present invention.

FIG. 3 is an enlarged view of a portion of FIG. 2 illustrating a method and apparatus for securing computer information according to the present invention.

FIG. 4 is a partial top view of the method and apparatus for computer information security protection of the present invention, shown in FIG. 3.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

Example 1:

a method for computer information security protection, comprising: the device comprises a low-speed hard disk, a connecting device, a storage hard disk and an electromagnetic block;

s1, starting up: turning on the computer, and electrifying the computer;

s2, auxiliary connection: the electromagnetic block obtains power supply of a computer power supply to generate magnetism;

s3, normal use: the connection equipment is connected with a power supply of the storage hard disk in a physical pressing mode, and the computer starts to detect and identify the storage hard disk, so that information can be written in/read out (when the connection equipment is pressed, the connection equipment is close to the electromagnetic block and is adsorbed on the surface of the electromagnetic block);

s4, shutdown: when the power supply of the computer is cut off, the electromagnetic block loses magnetism, and the connecting device is reset to disconnect the storage hard disk;

by means of the physical partition method, when the computer is closed, the power supply connection of the storage hard disk is automatically disconnected, so that the computer is prevented from being checked by an intruder, and the safety of computer information storage is improved.

Example 2:

a method for computer information security protection, comprising: the device comprises a low-speed hard disk, a connecting device, a storage hard disk and an electromagnetic block;

s1, starting up: turning on the computer, and electrifying the computer;

s2, bait opening: the low-speed hard disk is operated by getting electricity along with the power supply of the computer;

s3, backup: manually forge or AI synthesize false information, transmit into the low-speed hard disk (can only store and delete, while reading or downloading, will trigger the tracing system);

s4, intrusion protection: if someone invades the computer when the computer is shut down, the false information in the low-speed hard disk can be read only;

s5, backward tracing: the low-speed hard disk limits the information reading or downloading speed of an intruder and provides enough time for the tracking system to reversely track the IP of the other side;

s6, data retention: if the address of the other party is tracked, the address and the intrusion time are recorded together, and the next time the computer is started, the computer can be reminded to check.

The AI synthesized false information includes the network's public related information, the schedule of time confusion, the report with modified data, etc.

The notice sets up the low-speed hard disk as the bait, finds the hard disk when the intruder, puzzles the intruder through the false information in the hard disk, when beginning to read or download the file content, triggers the tracking system, is restricted by hard disk reading speed in addition, reads/downloads and need spend a large amount of time, makes the tracking system have sufficient time to inquire intruder IP address, prevents that the intruder from leaving the back and can solve computer information security problem from the source.

Example 3:

a method for computer information security protection, comprising: the device comprises a low-speed hard disk, a connecting device, a storage hard disk and an electromagnetic block;

s1, starting up: turning on the computer, and electrifying the computer;

s2, bait opening: the low-speed hard disk is operated by getting electricity along with the power supply of the computer;

s3, auxiliary connection: the electromagnetic block obtains power supply of a computer power supply to generate magnetism;

s4, normal use: the connection equipment is connected with a power supply of the storage hard disk in a physical pressing mode, and the computer starts to detect and identify the storage hard disk, so that information can be written in/read out (when the connection equipment is pressed, the connection equipment is close to the electromagnetic block and is adsorbed on the surface of the electromagnetic block);

s5, backup: manually making or AI synthesizing false information, and transmitting the false information into a low-speed hard disk (only storing and deleting, and triggering a tracking system when reading or downloading);

s6, shutdown: when the power supply of the computer is cut off, the electromagnetic block loses magnetism, and the connecting device is reset to disconnect the storage hard disk;

s7, intrusion protection: if someone invades the computer when the computer is shut down, the false information in the low-speed hard disk can be read only;

s8, backward tracing: the low-speed hard disk limits the information reading or downloading speed of an intruder and provides enough time for the tracking system to reversely track the IP of the other side;

s9, data retention: if the address of the other party is tracked, the address and the intrusion time are recorded together, and the next time the computer is started, the computer can be reminded to check.

The iron plates are arranged around the connecting device, when the iron plates are not close to the electromagnetic blocks, the magnetism of the electromagnetic blocks does not act on the electromagnetic blocks, the output speed of the low-speed hard disk does not exceed 1KB/s, and the false information synthesized by the AI comprises network related public data, a schedule table with time disorder, a report table with modified data and the like.

Example 4:

referring to fig. 1, an auxiliary device for the method for computer information security protection includes a hard disk socket 1 and a power cord 2, and a control connector 3 for controlling the plugging and unplugging of the power cord 2 is installed on the top of the power cord.

The hard disk power supply is connected when the computer is started up through the control connecting piece 3, and the hard disk power supply is disconnected when the computer is shut down, so that the information safety of the computer is ensured.

Example 5:

referring to fig. 1-4, an auxiliary device for the method for computer information security protection includes a hard disk socket 1 and a power cord 2, and a control connector 3 for controlling the plugging and unplugging of the power cord 2 is installed on the top of the power cord.

Control connection spare 3 includes mounting bracket 31, the top of above-mentioned mounting bracket 31 begins to have air cavity 32, peg graft at the top of above-mentioned air cavity 32 has button 33, two gasbags 34 have been inlayed to the bottom of above-mentioned mounting bracket 31, peg graft in the bottom of gasbag 34 has connecting rod 35, set up gas pocket 36 between gasbag 34 and the air cavity 32, control box 37 has been seted up to the diapire of air cavity 32, button 33's bottom fixedly connected with control lever 38, control box 37's internal rotation is connected with control cover 39, push groove 310 has been seted up to control cover 39's memory, sliding connection has catch bar 311 in the catch bar 310, the one end that catch bar 311 is close to gasbag 34 is connected with extrusion piece 312.

The top of the control connecting piece 3 is connected with the wall of the computer box.

The mounting rack 31 is connected with the power line 2 through a connecting rod 35, the button 33 extends to the outer side of the wall of the computer case, and a return spring is arranged in the button 33; a pressing space is provided outside above the airbag 34, and the pressing space communicates with the control groove 37.

The control sleeve 39 is in a ring shape, one-way threads are arranged inside the ring, openings corresponding to the push rods 311 are formed in two sides of the control sleeve 39, the push grooves 310 are located in the openings, the control rod 38 is inserted into the control sleeve 39, a sliding block extending into the one-way threads is arranged on the outer side of the control rod 38, and the extrusion block 312 is attached to the air bag 34.

An electromagnetic block is arranged on the hard disk socket 1, and an iron plate is arranged on the control connecting piece 3.

When the hard disk drive is started, the button 33 is pressed, air in the air cavity 32 is pushed into the air bag 34 through the air hole 36 by the button 33, the connecting rod 35 is pushed out by the increased air in the air bag 34, the power wire 2 is inserted into the hard disk socket 1 by the connecting rod 35, meanwhile, in the process that the button 33 moves downwards, the control rod 38 moves in the control sleeve 39, the control sleeve 39 slightly rotates through the matching of a sliding block and a one-way thread, the control sleeve 39 drives the extrusion block 312 to move through the push groove 310 and the push rod 311 to extrude the air bag 34, so that the volume of the part above the air bag 34 is reduced, when the button 33 is pressed again, the volume of the air bag 34 is reduced, after the air in the air cavity 32 enters the air bag 34, the connecting rod 35 can be positioned more, and the power wire 2 is inserted deeper into the hard disk socket 1.

Therefore, the contact area of the power line 2 and the conducting plate of the hard disk socket 1 is gradually increased along the use, and the contact wear is excessive and poor due to continuous plugging and unplugging.

Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

10页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:远程控制界面显示的方法、系统、设备及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类