Unlock instant, AI-driven research and patent intelligence for your innovation.

A big data computer network security protection device

A security protection device and computer network technology, applied in the field of network security, can solve the problems of large data computer network security damage, inability to protect big data computers, poor protection effect, etc., and achieve good fire protection effect, low loss, and easy cleaning. and the effect of overhaul

Active Publication Date: 2020-09-01
温州红秀招信息科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there is still no good solution for the network security protection of big data computers. If a big data computer is damaged without protection, it will cause immeasurable losses to an enterprise or system, especially in the case of concentrated network circuits. In places where fires and other uncontrollable disasters are likely to occur, it will cause huge damage to the network security of big data computers. In the prior art, there are few devices for preventing fire disasters for big data computers, and the protection effect is poor, which cannot protect big data computers. Computers play a very good protective role, therefore, we urgently need a big data computer network security protection device to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A big data computer network security protection device
  • A big data computer network security protection device
  • A big data computer network security protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0022] refer to Figure 1-3 , a design of a big data computer network security protection device, including a box body 1, an asbestos net 8 is installed through an opening on the side wall of the box body 1, a big data computer 9 is placed in the box body 1 through a buffer structure, and the box body 1. Visible windows 2 are vertically installed on both sides of the upper end surface, and a fireproof device 3 is installed on the top of the visible window 2. The fireproof device 3 includes a trigger mechanism, a controller, a buzzer 302, a liquid nitrogen tank 304, a solenoid valve 305 and a mist The trigger mechanism is installed on the top of the visible window 2, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security and particularly relates to a big data computer network security protection device. The device comprises a box body, wherein a big datacomputer is arranged in the box body through a buffer structure, visible windows are vertically installed on two sides of an upper end face of the box body, a fire extinguishing device is mounted ata top end of the visible windows, a fireproof device comprises a trigger mechanism, a controller, a buzzer, liquid nitrogen tanks, electromagnetic valves and an atomizer, the trigger mechanism is installed at the top end of the visible windows, the buzzer is installed on the side of the trigger mechanism and at the top end of the visible windows, the liquid nitrogen tanks are installed in the middle of top walls in the visible windows, and the electromagnetic valves are installed at outlets of the liquid nitrogen tanks. The device is advantaged in that the fireproof device can control the electromagnetic valves to atomize and spray high-pressure liquid nitrogen in the liquid nitrogen tanks, can well protect big data computers, is good in fire protection effect, and effectively minimizes loss of the big data computers caused by a fire.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a big data computer network security protection device. Background technique [0002] Big data refers to a collection of data that cannot be captured, managed, and processed by conventional software tools within a certain period of time. It is a massive, high-growth rate that requires a new processing model to have stronger decision-making power, insight and discovery, and process optimization capabilities. and diverse information assets. Today's society is a rapidly developing society, with advanced technology, information flow, people's communication is getting closer and closer, and life is becoming more and more convenient. Big data is the product of this high-tech era. Some people compare data to coal mines that store energy. According to the nature of coal, there are coking coal, anthracite coal, fat coal, lean coal, etc., and the mining costs of open-pit coal mi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H05K5/02H05K7/20G08B17/11G08B3/10
CPCG08B3/10G08B17/11H05K5/02H05K7/20345H05K7/20481
Inventor 李尚杰彭书友何守统
Owner 温州红秀招信息科技有限公司