Safety protection device for computer information

An information security and protection device technology, applied in the computer field, can solve the problems of no network control function, insufficient security, single function, etc., and achieve the effect of facilitating office work, preventing theft and preventing operation.

Inactive Publication Date: 2019-03-29
兴城市祥安畜牧养殖有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the economy and the continuous innovation of information technology, computers, as a product of information technology, have been developing at an extremely rapid speed since their birth. The application field has expanded from the initial military scientific research application to various fields of society, which has changed. In daily life, we often use computers for office and study operations. The computer data information generated often has certain value, and even involves company secrets and business competition. People will take various In order to ensure the security of information, information protection methods are generally divided into two methods in information security protection, namely software protection and hardware protection. Software protection can solve the problem of information theft when computers are connected to the Internet. Hardware protection is mostly a protection device. It can prevent irrelevant personnel from stealing data information by copying data. This type of protection device has a relatively simple structure, relatively single function, and the storage method of internal information is also single. It does not have the function of controlling the network, and it is not safe enough to use. , in order to ensure sufficient security, users need to install additional protection software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection device for computer information
  • Safety protection device for computer information
  • Safety protection device for computer information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0015] see Figure 1-3 , an embodiment provided by the present invention: a computer information security protection device, including a main table body 3, a protective table body 7 and a host 23, a display 12 is installed on the top of the main table body 3, and the power is provided by an external power supply, which can Used in conjunction with the host 23, its circuit input terminal is connected to the host 23 through a wire, and is controlled by the host ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety protection device for computer information. The device comprises a main table body, a protection table body and a host, an operation cabinet is installed in the main table body, and an auxiliary shell body is installed on the surface of one side of the main table body; a supporting leg is installed at the bottom of the auxiliary shell body, a storage cavity is formed in the auxiliary shell body, and a protection cavity is formed in the protection table body; a power button is installed on the surface of the host, an external network port is formed in the portion, below the power button, of the surface of the host, and a switching key is installed on the portion, below the external network port, of the surface of the host; an audible and visual alarm is installed on the portion, below the switching key, of the surface of the host, a reinforcing cover is installed on the top of the host, and a USB socket is formed in the reinforcing cover. By arranging aseries of structures, the device has quite high safety performance in the using process, information is sorted and stored, networking control is convenient, and the safety of computer information is ensured.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a computer information security protection device. Background technique [0002] With the development of the economy and the continuous innovation of information technology, computers, as a product of information technology, have been developing at an extremely rapid speed since their birth. The application field has expanded from the initial military scientific research application to various fields of society, which has changed. In daily life, we often use computers for office and study operations. The computer data information generated in it often has certain value, and even involves company secrets and business competition. People will take various In order to ensure the security of information, information protection methods are generally divided into two methods in information security protection, namely software protection and hardware protection. Software protection ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): A47B21/04A47B97/00G06F21/88G07C9/00G08B13/00
CPCA47B21/04A47B97/00A47B2200/008G06F21/88G07C9/00563G08B13/00
Inventor 刘健民周丽丽李明阳
Owner 兴城市祥安畜牧养殖有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products