Computer network information safety control device

A computer network and information security technology, applied in the field of computer network information security control devices, can solve the problems of easy cracking of passwords, unsatisfactory computer information anti-theft methods, and inability to effectively prevent computer information from being stolen, etc. Effect

Inactive Publication Date: 2021-08-20
长春财经学院
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With its large amount of information storage and fast information processing speed, computers have given wings to enterprise management, scientific and technological research and development, military construction, and enterprise development. Computers store a large number of company secrets, including business secrets, technical secrets, and decision-making management. Confidentiality, etc. The security of computer information is particularly important for companies. Therefore, secret-related units will take many measures to prevent the risk of computer information being stolen. Most of the methods used to prevent foreign thieves are to install monitoring equipment in the company, Alarm equipment, etc., the conventional means to prevent the company's internal personnel from stealing information data is that the computer does not have an external transmission interface, but these still cannot effectively prevent computer information from being stolen
[0004] At present, in the prior art, in order to prevent the information of the computer from being stolen by illegal users, computer users often adopt a power-on password to prevent other illegal users from opening the computer. It is convenient to start up, but the password is often set too simple, so the password is easy to be cracked
In addition, many tools for cracking computer power-on passwords have appeared in the prior art. Even if the personnel who use the computer sets a complicated power-on password, the illegal power-on person only needs to spend a certain amount of time to start the computer. Therefore, the existing The anti-theft method of computer information is still not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network information safety control device
  • Computer network information safety control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0019] A computer network information security control device, comprising a chassis 1, a power cord plug 2 is installed on one side of the chassis 1, an electric push rod 3 is installed on the other side of the chassis 2, and the electric push rod 3. The end is connected to the power supply device 4, the power cord plug 2 is connected to the power supply device 5 through a wire, the inner bottom surface of the chassis 1 is equipped with a fixing seat 6, and the power supply device 5 is fixed on the fixing seat 6. The power supply device 4 is fixed on the movable seat 7, the top surface of the power supply device 4 is connected with a vertical line pipe 8, the top of the line pipe 8 is electrically connected to the USB interface 9, and the top surface of the chassis 1 is provided with a The through hole 10 corresponding to the USB interface 9, the inner wall o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer network information safety control device which comprises a case, a power line plug is installed on the inner wall of one side of the case, an electric push rod is installed on the inner wall of the other side of the case, the end of the electric push rod is connected with a power supply device, the power line plug is connected with a power supply device through a wire, the top surface of the power supply device is connected with a vertical wire passing pipe, the top of the wire passing pipe is electrically connected with a USB interface, the top surface of the case is provided with a through hole corresponding to the USB interface, the inner wall of the case is provided with an infrared sensor, the outer side of the case is provided with an alarm and a controller, the controller is electrically connected with the infrared sensor, the alarm and the electric push rod, and a display screen, a keyboard, a face recognition camera, a coded lock module and a fingerprint lock are arranged on the controller. Compared with the prior art, the method has the advantages that other illegal users are prevented from opening the computer, and the safety control capability is high.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a computer network information security control device. Background technique [0002] Computer network is a technology that people often use nowadays, through which multiple computer devices can be connected to complete operations such as data exchange. A computer network is composed of various devices, and only when these devices are in normal working condition can the smooth flow of the network be guaranteed. [0003] With its large amount of information storage and fast information processing speed, computers have given wings to enterprise management, scientific and technological research and development, military construction, and enterprise development. Computers store a large number of company secrets, including business secrets, technical secrets, and decision-making management. Confidentiality, etc. The security of computer information is particularly important...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/18G06F11/32
CPCG06F1/181G06F11/325
Inventor 何颖
Owner 长春财经学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products