Information safety computer circuit
An information security and computer technology, applied in the protection of internal/peripheral computer components, electrical components, electronic switches, etc., to enhance security and prevent Trojans from stealing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0015] Implementation example 1, such as figure 1 , one An information security computer is designed for a computer having a network interface and a removable storage medium interface, and is characterized in that: the entity of the network interface (RJ45) is fixed on the computer, and the entity of the removable storage medium interface (USB) is fixed on the on the computer;
[0016] It also has a push rod (TG), a guide groove (DXC), a limit post (XWZ), a base (DZ), a spring (TH), and a contact piece (CP);
[0017] The entities of the base (DZ) and the guide groove (DXC) are fixed on the computer;
[0018] Whether the electronic circuit between the network interface (RJ45) entity and the computing mainboard is controlled by the contact piece (CP);
[0019] One end of the spring (TH) is in contact with the end of the push rod (TG), and the other end of the spring (TH) is in contact with the base (DZ);
[0020] The limit column (XWZ) is located on the push rod (TG) to pre...
Embodiment 2
[0032] Implementation example 2, such as figure 2 , one An information security computer interface entity is designed for a computer having a network interface and a removable storage medium interface hardware, and is characterized in that: the entity of the network interface (RJ45) is fixed on the computer, and the entity of the removable storage medium interface (USB) fixed on the computer;
[0033] It also has the first slide bar (HG1), the second slide bar (HG2), the lever (GG), the first guide groove (DXC1), the second guide groove (DXC2), the first slide shaft (HZ1), the second slide axis(HZ2);
[0034] The first guide groove (DXC1), the first slider (HG1), and the entity of the network interface are coaxial;
[0035] The first slide bar (HG1) slides in the first guide groove (DXC1);
[0036] The front end of the first slide bar (HG1) has a first pusher (TDT1), and the first pusher (TDT1) can move in the entity of the network interface to realize the opening and cl...
Embodiment 3
[0059] Implementation example 3, such as image 3 , one An information security computer circuit is designed for a computer with a network interface, a network card, a power supply, and a removable storage medium interface. The network interface is connected to the network card, and is characterized in that:
[0060] Contains touch switch (SW), current limiting resistor (R), optocoupler (GO);
[0061] The touch switch (SW) is a normally closed type, and the touch switch (SW) is installed on the entity of the removable storage medium interface. When the entity of the removable storage medium interface is inserted, the state of the touch switch (SW) will be changed to make the touch switch ( SW) becomes disconnected state;
[0062] One end of the touch switch (SW) is connected to the positive pole of the light-emitting side of the optocoupler (GO), and the other end of the touch switch (SW) is connected to a DC output point of the power supply of the computer;
[0063] The n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



