Special device for computer information security protection

A technology of information security and special devices, applied in the protection of internal/peripheral computer components, computing, instruments, etc., can solve the problems of computer information leakage, easy cracking, etc., achieve mechanical self-destruction, improve safety performance, and increase service life Effect

Inactive Publication Date: 2021-08-06
郑州财经学院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the advent of the information age and the continuous advancement of science and technology, the use of computers has become more extensive. Computer networks have brought greater convenience to our daily lives, but at the same time, the crisis it caused It has also been lurking. Although the existing computer data security functions are becoming more and more perfect, there are still some deficiencies that need to be improved. The most important thing in computer security is the security of stored data. Existing high-precision computers generally have multiple security settings. Data encryption, but most of this is only realized through software programs. Some high-end hackers pour the Trojan horse into the computer through the USB socket on the computer box, and it is easy to crack the above encryption software or programs. Therefore, a small number of enterprises adopt mechanical protection. Organizations provide security protection for computers. This method improves the security of computer information to a certain extent. However, when high-end hackers cannot obtain computer information through the USB socket, they usually disassemble the computer host case and disassemble the circuit inside. Take out the board, and then crack it. During the disassembly process of the computer host case, the circuit board cannot be mechanically self-destructed, and there is still a risk of computer information leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Special device for computer information security protection
  • Special device for computer information security protection
  • Special device for computer information security protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Examples, see Figure 1-6 , the present embodiment provides a special device for computer information security protection, including a host housing 1, a groove 2 is provided on the upper left side of the host housing, a baffle 3 is provided inside the groove 2, and the lower side of the baffle 3 is slidably connected There is a chute 4, the lower part of the baffle plate 3 is provided with a lock hole 5, the lower side of the baffle plate 3 is provided ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a special device for computer information safety protection. The device comprises a host shell, a groove is formed in the upper side of the left portion of the host shell, a baffle is arranged on the inner side of the groove, a fan is arranged behind a circuit board support and connected with a drill bit, a strip-shaped plate is fixed to the rear side of the fan, and sliding rods are symmetrically arranged on the front side of the strip-shaped plate up and down. A second sliding pipe is slidably connected to the front portion of each sliding rod, a wire protection assembly is arranged on the lower portion of the right wall of the main machine shell, a fingerprint switch is installed on the upper wall of the main machine shell, a chip and a storage battery are arranged in the main machine shell, and the storage battery, an electromagnet and the fingerprint switch are all electrically connected with the chip. The contact switch is electrically connected with the fan. A USB socket has a mechanical protection function, the structure is simple, the occupied space is small, the protection effect is good, meanwhile, the circuit board self-destruction function is achieved, and self-destruction is more thorough through organic combination of the drill bit and the fan.

Description

technical field [0001] The invention belongs to the technical field of computer security protection, and in particular relates to a special device for computer information security protection. Background technique [0002] With the advent of the information age and the continuous advancement of science and technology, the use of computers has become more extensive. Computer networks have brought greater convenience to our daily lives, but at the same time, the crisis it caused It has also been lurking. Although the existing computer data security functions are becoming more and more perfect, there are still some deficiencies that need to be improved. The most important thing in computer security is the security of stored data. Existing high-precision computers generally have multiple security settings. Data encryption, but most of this is only realized through software programs. Some high-end hackers pour the Trojan horse into the computer through the USB socket on the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/86G06F21/88G07C9/00G06F1/18G06F1/20
CPCG06F1/181G06F1/20G06F21/86G06F21/88G07C9/00563
Inventor 郑金芳
Owner 郑州财经学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products