Water-cooling 5G computer host system based on information security and water-cooling self-destruction method

An information security, computer host technology, applied in the direction of data processing power supply, electrical digital data processing, internal/peripheral computer component protection, etc., can solve the problem that technology has no way to protect information, achieve good camouflage, good cloud communication mode Effect

Inactive Publication Date: 2020-08-14
刘长礼
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Current technology has no way to protect information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Water-cooling 5G computer host system based on information security and water-cooling self-destruction method
  • Water-cooling 5G computer host system based on information security and water-cooling self-destruction method
  • Water-cooling 5G computer host system based on information security and water-cooling self-destruction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Embodiment 1: Combining all the accompanying drawings; an unconscious security computer system with 5G dual hardware isolation in the anti-theft tomb, characterized in that the unconscious security computer system includes button 1, which is the start button of the computer, and the extrusion head of the button Hollow, on which the identification area 2 is arranged, and the fingerprint identification system 10 is arranged in the middle of the extrusion head, and also includes a button battery 11 or a mains power system that can supply power to the fingerprint identification system 10; the fingerprint identification system 10 is connected to the boot control part in communication The computer includes two sets of systems, the systems are hardware systems, and the two sets of hardware systems each include a storage battery, which are respectively A system storage battery 20 and B system storage battery 21, and the A system storage battery 20 and the B system storage battery...

Embodiment 2

[0067] Embodiment 2: As a further improved solution or a side-by-side solution or an optional independent solution, the power-on control part is a separate chip, which can collect and judge the recognition effect of the fingerprint recognition system; Communication, at the same time communicate with the remote security host; the person with the correct fingerprint needs to stay on the power button for a while to allow the fingerprint recognition to be successfully turned on. The substantive technical effect and its realization process that the technical scheme of this place plays are as follows: that is to say, in case time stays not enough, proves that the person who starts the machine is not familiar with this main frame, so just proves that there is no power-on authority. That is to say, there is also the requirement to start the action, which is a groundbreaking improvement.

Embodiment 3

[0068] Embodiment 3: As a further improved solution or a side-by-side solution or an optional independent solution, the fingerprint recognition is an unaffected silent recognition, no matter which system is turned on, the external display during the boot process is consistent. The substantive technical effect and the realization process of the technical solution here are as follows: do not startle the snake, and facilitate safety management.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computers and information security, in particular to a water-cooling 5G computer host system based on information security and a water-cooling self-destruction method. A water inlet (16) and a water outlet (17) are formed in one side of a central water control plate (13); the water inlet (16) and the water outlet (17) are connected to a water pump (18) in a water tank (19); water is pumped by the water pump to enter the central water control plate (13) for circulation; a system A and a system B are respectively mounted on two sides of the central water control plate (13); heat generated by operation of the system A and the system B can be taken away by circulating water; the water tank (19) serves as an independent part or a part of a shell of a main machine, and waterproof treatment is included between the water tank and the central water control plate (13).

Description

technical field [0001] The invention relates to the field of computer and information security, in particular to a water-cooled 5G computer host system based on information security and a water-cooled self-destruction method. Background technique [0002] Confidential computers or ordinary people's computers are not willing to be viewed by others, because there are a lot of confidential or private information in them. [0003] Current technology has no way to protect information. Contents of the invention [0004] Purpose of the invention: In order to provide a water-cooled 5G computer host system and a water-cooled self-destruction method based on information security with better effects, see the multiple substantive technical effects in the specific implementation part for the specific purpose. [0005] In order to achieve the above object, the present invention takes the following technical solutions: [0006] Option One: [0007] The anti-theft tomb central control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74G06F21/86G06F21/87G06F21/32G06F1/26G06F1/20
CPCG06F1/20G06F1/263G06F21/32G06F21/74G06F21/86G06F21/87
Inventor 刘长礼周晶
Owner 刘长礼
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products