Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer information security monitoring device and use method thereof

A monitoring device and information security technology, applied in the field of computer aided equipment, can solve the problems of easy impact on the monitoring device, damage to electronic components, damage to the monitoring device, etc., to avoid impact damage, reduce the frequency of vibration, and prolong the service life.

Inactive Publication Date: 2022-05-06
河南经贸职业学院
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] After searching, the Chinese patent No. CN111984087A discloses a computer information security monitoring device, which includes a monitoring device and a protection box. The left and right sides of the protection box are symmetrically equipped with buffer boxes, and the buffer tanks are arranged symmetrically up and down. The telescopic spring is symmetrically fixed up and down in the groove, and the slider is arranged symmetrically up and down in the buffer groove. The side of the slider close to the monitoring device is movably connected to the buffer rod, and the end of the buffer rod far away from the slider is movably connected to the splint, and the buffer box is connected to the fastening screw; When subjected to severe external force, although a shock-absorbing structure is provided, the monitoring device will vibrate correspondingly with the protection box. During the vibration process of the monitoring device, it is easy to cause damage to the internal electronic components. When the protection box is When crashing, it is easy to hit the monitoring device, which is easy to cause damage to the monitoring device, and its protection effect is poor, which reduces its practicality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security monitoring device and use method thereof
  • Computer information security monitoring device and use method thereof
  • Computer information security monitoring device and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] see Figure 1-4 , a computer information security monitoring device, comprising a base 1, a monitoring device body 2 and a protection box 3, characterized in that the outer bottom side of the base 1 is fixedly connected with a mounting ring 4, and the inside of the base 1 is provided with a square groove, and the square groove Slip ring 5 is installed in the inner slide of the square groove, and the slip ring 5 is set in a square structure to prevent the slip ring 5 from rotating inside the square groove. The inner side wall of the square groove is evenly connected with a plurality of dampers 6, and the plurality of dampers 6 are far away from the square groove. One end of the inner wall of the groove is evenly in contact with the outer wall of the slip ring 5, and the outer walls of a plurality of dampers 6 are provided with first damping springs 7, and the top of the base 1 is provided with a connecting groove communicating with the square groove, and the connecting gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer auxiliary equipment, in particular to a computer information safety monitoring device and a use method thereof.The computer information safety monitoring device comprises a base, a monitoring device body and a protection box and is characterized in that the outer bottom side of the base is fixedly connected with an installation ring, a square groove is formed in the base, and a sliding ring is slidably arranged in the square groove; a plurality of dampers are evenly and fixedly connected to the inner side wall of the square groove, the ends, away from the inner side wall of the square groove, of the dampers make contact with the outer side wall of the sliding ring, the outer side walls of the dampers are all sleeved with first damping springs, a connecting groove communicating with the square groove is formed in the top end of the base, and a connecting pipe is arranged in the connecting groove; the bottom end of the connecting pipe is fixedly connected with the top end of the slip ring; the monitoring device body is always in a static state, so that the monitoring device body is prevented from shaking, internal electronic elements are prevented from being damaged, the service life of the monitoring device body is prolonged, the protection box is prevented from colliding with the monitoring device body, and the monitoring device body is prevented from being damaged by collision.

Description

technical field [0001] The invention relates to the technical field of computer auxiliary equipment, in particular to a computer information security monitoring device and a use method thereof. Background technique [0002] As we all know, a computer, commonly known as a computer, is an electronic computing machine used for high-speed calculations. It can perform numerical calculations, logic calculations, and storage and memory functions. It is a modern intelligence that can run according to programs and process massive data automatically and at high speed. For electronic equipment, in order to ensure the security of computer information, most computers are equipped with computer information security monitoring devices. [0003] After retrieval, the Chinese patent No. CN111984087A discloses a computer information security monitoring device, which includes a monitoring device and a protection box. The left and right sides of the protection box are symmetrically equipped with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): F16M11/04F16M1/08F16M1/00F16M7/00F16F15/067F16F15/02F16F15/023F16F15/04F16F15/06B01D46/10B01D46/74H05K7/20
CPCF16M11/04F16M1/08F16M1/00F16M7/00F16F15/067F16F15/022F16F15/0232F16F15/046F16F15/06B01D46/10H05K7/20136H05K7/20172H05K7/20209
Inventor 孙建召陈晓刚陈明璨李金萌刘婉婉杨昆
Owner 河南经贸职业学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products