Network information security protection device and use method thereof

A security protection device, network information technology, applied in the field of protection devices, can solve the problems of unavoidable computer, computer damage, damage and so on

Active Publication Date: 2021-10-08
安徽兴淮智能科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing computers are generally relatively fragile, and are prone to damage after being hit and bumped, and the computer will inevitably be transported. During transportation, if there is no protective device, it is easy to cause damage to the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network information security protection device and use method thereof
  • Network information security protection device and use method thereof
  • Network information security protection device and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] Please refer to figure 1 with figure 2 , figure 1 It is a schematic diagram of the unfolded structure of the protective device according to the embodiment of the present invention; figure 2 It is a schematic diagram of the side view structure of the protective device according to the embodiment of the present invention;

[0043] The embodiment of the present application provides a network information security protection device, which includes a box body 1 and a protective shell 2 slidably arranged in the box body 1. A plurality of shock absorbers 201 are installed on the inner bottom of the protective shell 2, and a plurality of shock absorbers 201 The top is connected with a bottom plate 2011, and the top of the protective shell 2 is equipped with an elastic locking mechanism. The top of the protective shell 2 is provided with a top plate 202 connected with the elastic locking mechanism. The elastic locking mechanism includes a limit block 2022, a spring and a conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network information security protection device and a use method thereof, and relates to the technical field of protection devices. An embodiment of the invention provides the network information security protection device which comprises a box body and a protection shell arranged in the box body in a sliding mode, wherein a plurality of shock absorbers are installed at the bottom in the protection shell, the top parts of the shock absorbers are connected with a bottom plate, an elastic locking mechanism is installed at the top part of the protection shell, and a top plate connected with the elastic locking mechanism is arranged at the top in the protection shell. By means of the double-layer design of the box body and the protection shell, powerful protection of a computer is achieved, meanwhile, the computer is fixed in the protective shell through clamping of the top plate and the bottom plate, the situation that the computer is separated from a placement position and is collided and damaged is avoided, the practical value is greatly improved, and large-scale application and popularization are facilitated.

Description

technical field [0001] The invention relates to the technical field of protection devices, in particular to a network information security protection device and a method for using the same. Background technique [0002] Computer security operating systems, various security protocols, security mechanisms, and even security systems, such as UniNAC, DLP, etc., as long as there are security holes, they can threaten the overall security. Information security means that the information system is protected from being damaged, changed and leaked due to accidental or malicious reasons, the system runs continuously and reliably, the information service is not interrupted, and business continuity is finally achieved. [0003] Existing computers are generally relatively fragile, and are prone to damage after being hit and knocked, and the computer is inevitably dropped and transported. During the transportation, if there is no protective device, it is easy to cause damage to the compute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H05K5/02H05K7/14H05K7/20F16F15/02
CPCH05K5/0217H05K7/1401H05K7/20718H05K7/20409F16F15/02H05K5/03
Inventor 袁森
Owner 安徽兴淮智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products