A computer data security management device

A data security and management device technology, applied in the protection of internal/peripheral computer components, digital data authentication, etc., can solve the problems of missing information, the computer does not have a backup power supply, information is easily stolen, etc., to improve security performance, prevent Effects of Missing Information Delivery Events

Pending Publication Date: 2019-03-12
ZIBO VOCATIONAL INST
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a computer data security management device, which solves the problem that the existing computer USB jack is often operated synchronously with the computer, making it more convenient for people to transfer information in the computer. When you forget to turn off the computer, the internal information is easy to be stolen, and it is difficult to be detected if it is stolen from the USB jack. Existing computers often do not have a backup power supply. If a power failure occurs during data transmission It is easy to cause the problem of missing information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer data security management device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] Such as figure 1 As shown, the present invention provides a technical solution: a computer data security management device, including a central processing unit 1, the input end of the central processing unit 1 is electrically connected to the output end of the microprocessor 2, and the microprocessor 2 is respectively connected to the main The power supply 3 and the backup power supply 4 are bidirectionally electrically connected, and the output termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer data security management device, the invention relates to the technical field of computer information security, include a central processor, The input end of the central processor is electrically connected with the output end of the microprocessor, the microprocessor is respectively bidirectionally electrically connected with the main power supply and the standbypower supply, and the output end of the main power supply is electrically connected with the input end of the voltage comparison module, and the input end of the voltage comparison module is electrically connected with the output end of the microprocessor. According to the invention, Through the fingerprint acquisition module, fingerprint data processing module, Central Processor, fingerprint comparison module, cooperation between the second feedback module and the database, The first USB socket, the second USB socket and the third USB socket are turned on when the fingerprint is matched, thereby preventing a person from stealing information in the computer through the first USB socket, the second USB socket or the third USB socket, thereby improving the security performance of the computer.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a computer data security management device. Background technique [0002] Electronic computer, commonly known as computer, referred to as computer, is a modern machine that uses electronic technology and related principles to process data according to a series of instructions. A computer can be divided into two parts: a software system and a hardware system. [0003] In order to facilitate people's transfer and use of electronic information, people have added several expansion interfaces, i.e. USB jacks, on the computer. When people forget to turn off the computer, its internal information is easy to be stolen, and it is difficult to be detected if it is stolen from the USB jack. Existing computers often do not have backup power. If a power failure occurs, it is easy to cause information loss, so there is an urgent need for a computer data security managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/81H02J7/35
CPCG06F21/81G06F21/32H02J7/35
Inventor 李雪妍
Owner ZIBO VOCATIONAL INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products