Information security protection mechanism

A technology for protecting institutions and information security, applied in the computer field, can solve the problem that the host is easy to be stolen by others, and achieve the effect of protecting information security

Pending Publication Date: 2018-11-16
CHINA MCC17 GRP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem in the prior art that the host is easily stolen by others and the information stored in the host is easily obtained by others, and proposes an information security protection mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protection mechanism
  • Information security protection mechanism
  • Information security protection mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0026] In describing the present invention, it should be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", " The orientation or positional relationship indicated by "outside", etc. is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, so as to Specific orientation configurations and operations, therefore, are not to be construed as limitations on the invention.

[0027] refer to Figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security protection mechanism. The mechanism comprises a box, a main unit body and a USB interface formed in the main unit body; sliding grooves are formed in the two opposite inner side walls of the bottom of the box, a sliding plate is in sliding connection with the interiors of the two sliding grooves, a containing groove matched with the main unit body isformed in the top of the sliding plate, the main unit body is sleeved with the containing groove, an opening is formed in the side, close to the USB interface, of the box, a limiting groove is formedin the side, close to the opening, of the bottom in the box, a first groove is formed in the side, close to the opening, of the top of the sliding plate, a limiting rod is arranged in the first groove, one end of the limiting rod penetrates through the first groove and extends into the limiting groove, the other end of the limiting rod extends to the upper portion of the first groove and is provided with a first through hole, the outer side wall of the limiting rod is fixedly sleeved with a limiting plate, and the limiting plate is located in the first groove. Accordingly, the phenomenon thatinformation stored in the main unit body is stolen by others easily can be avoided.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an information security protection mechanism. Background technique [0002] The host computer refers to the main body part of the computer except the input and output devices. It is also a control box for placing the main board and other main components. Usually includes CPU, memory, hard disk, optical drive, power supply, and other input and output controllers and interfaces. In network technology, it is a terminal device for sending and receiving information. [0003] Existing mainframes are generally placed directly on the ground for use, which easily leads to easy theft of the mainframe by others, thereby causing the information stored inside the mainframe to be easily obtained by others. Contents of the invention [0004] The purpose of the present invention is to solve the problem in the prior art that the mainframe is easily stolen by others, so that the information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/86G06F1/18
CPCG06F21/86G06F1/182
Inventor 柳荣芳葛强蔡得菊
Owner CHINA MCC17 GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products