CN203350883U - Computer data information anti-stealing device - Google Patents

Computer data information anti-stealing device Download PDF

Info

Publication number
CN203350883U
CN203350883U CN 201320467651 CN201320467651U CN203350883U CN 203350883 U CN203350883 U CN 203350883U CN 201320467651 CN201320467651 CN 201320467651 CN 201320467651 U CN201320467651 U CN 201320467651U CN 203350883 U CN203350883 U CN 203350883U
Authority
CN
China
Prior art keywords
circuit
input end
processor
signal output
hard disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201320467651
Other languages
Chinese (zh)
Inventor
吕海涛
赫荣洁
郭瑞波
蒋海岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Finance University
Original Assignee
Harbin Finance University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Finance University filed Critical Harbin Finance University
Priority to CN 201320467651 priority Critical patent/CN203350883U/en
Application granted granted Critical
Publication of CN203350883U publication Critical patent/CN203350883U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model provides a computer data information anti-stealing device, which relates to the field of computers. The device is characterized in that the image signal output end of a camera is connected with the image signal input end of a processor, the fingerprint signal output end of a fingerprint acquisition circuit is connected with the fingerprint signal input end of the processor, the verification code signal output end of a verification code acquisition circuit is connected with the verification code signal input end of the processor, the password signal output end of a password input circuit is connected with the password input end of the processor, the hard disc control signal output end of a relay driving circuit is connected with the control signal input end of a secret hard disc selector switch, and the output end of a secret hard disc self-destruction circuit is connected with the input end of the secret hard disc selector switch. The computer data information anti-stealing device is simple in structure, high in safety factor and low in manufacturing cost, and can be effectively preventing computer data from being stolen.

Description

Anti-theft device for computer data information
Technical field:
The utility model relates to computer realm, is specifically related to anti-theft device for computer data information.
Background technology:
Data information security refers to that hardware, software and the data of data message are protected, and is not subject to the former of accidental or malice thereby suffers to destroy, change, reveals, and system is reliably normally operation continuously, and information service is not interrupted.He is one and relates to the multi-disciplinary comprehensive branches of learning such as computer science, network technology, the communication technology, cryptographic technique, information security technology, applied mathematics, number theory, information theory.The wide range that data information security comprises, large to secret safety such as the military politics of country, little to as take precautions against that commercial enterprise's secret is revealed, the strick precaution teenager is to the leakage of the browsing of flame, personal information etc.
The safety of software adopts anti-virus software usually, but can only be used for anti-known virus, helpless to emerging virus; Therefore, when user's computer internet, very difficult assurance is not invaded by internet worm, will cause thus computer hard disk data damaged.
The utility model content:
The purpose of this utility model is to provide anti-theft device for computer data information, and it is simple in structure, and safety coefficient is high, can effectively prevent that computer data is stolen, and its cost of manufacture is low.
In order to solve the existing problem of background technology, the utility model is by the following technical solutions: it comprises camera 1, fingerprint collecting circuit 2, identifying code Acquisition Circuit 3, Password Input circuit 4, processor 5, relay drive circuit 6, concerning security matters hard disk change-over switch 7, concerning security matters hard disk self-destruct circuit 8, the image signal output end of camera 1 is connected with the picture signal input end of processor 5, the fingerprint signal output terminal of fingerprint collecting circuit 2 is connected with the fingerprint signal input end of processor 5, the verification code signal output terminal of identifying code Acquisition Circuit 3 is connected with the verification code signal input end of processor 5, the code signal output terminal of Password Input circuit 4 is connected with the Password Input end of processor 5, the output terminal of processor 5 is connected with the input end of relay drive circuit 6, the hard disk control signal output terminal of relay drive circuit 6 is connected with the control signal input end of concerning security matters hard disk change-over switch 7, the output terminal of the self-destruct circuit of processor 5 is connected with the input end of the self-destruct circuit of concerning security matters hard disk self-destruct circuit 8, the output terminal of concerning security matters hard disk self-destruct circuit 8 is connected with the input end of concerning security matters hard disk change-over switch 7.
In the utility model when operation,, operating personnel first will pass through the checking of head portrait, fingerprint, identifying code and password, if wherein one can not be by opening the concerning security matters hard disk, after operating for several times still can not by with checking, the concerning security matters hard disk will destroy automatically.
The beneficial effects of the utility model: simple in structure, safety coefficient is high, can effectively prevent that computer data is stolen, and its cost of manufacture is low.
The accompanying drawing explanation:
Fig. 1 is structural representation of the present utility model.
Embodiment:
With reference to Fig. 1, this embodiment by the following technical solutions: it comprises camera 1, fingerprint collecting circuit 2, identifying code Acquisition Circuit 3, Password Input circuit 4, processor 5, relay drive circuit 6, concerning security matters hard disk change-over switch 7, concerning security matters hard disk self-destruct circuit 8, the image signal output end of camera 1 is connected with the picture signal input end of processor 5, the fingerprint signal output terminal of fingerprint collecting circuit 2 is connected with the fingerprint signal input end of processor 5, the verification code signal output terminal of identifying code Acquisition Circuit 3 is connected with the verification code signal input end of processor 5, the code signal output terminal of Password Input circuit 4 is connected with the Password Input end of processor 5, the output terminal of processor 5 is connected with the input end of relay drive circuit 6, the hard disk control signal output terminal of relay drive circuit 6 is connected with the control signal input end of concerning security matters hard disk change-over switch 7, the output terminal of the self-destruct circuit of processor 5 is connected with the input end of the self-destruct circuit of concerning security matters hard disk self-destruct circuit 8, the output terminal of concerning security matters hard disk self-destruct circuit 8 is connected with the input end of concerning security matters hard disk change-over switch 7.
In this embodiment when operation,, operating personnel first will pass through the checking of head portrait, fingerprint, identifying code and password, if wherein one can not be by opening the concerning security matters hard disk, after operating for several times still can not by with checking, the concerning security matters hard disk will destroy automatically.
This embodiment is simple in structure, and safety coefficient is high, can effectively prevent that computer data is stolen, and its cost of manufacture is low.

Claims (1)

1. anti-theft device for computer data information, is characterized in that it comprises camera (1), fingerprint collecting circuit (2), identifying code Acquisition Circuit (3), Password Input circuit (4), processor (5), relay drive circuit (6), concerning security matters hard disk change-over switch (7), concerning security matters hard disk self-destruct circuit (8), the image signal output end of camera (1) is connected with the picture signal input end of processor (5), the fingerprint signal output terminal of fingerprint collecting circuit (2) is connected with the fingerprint signal input end of processor (5), the verification code signal output terminal of identifying code Acquisition Circuit (3) is connected with the verification code signal input end of processor (5), the code signal output terminal of Password Input circuit (4) is connected with the Password Input end of processor (5), the output terminal of processor (5) is connected with the input end of relay drive circuit (6), the hard disk control signal output terminal of relay drive circuit (6) is connected with the control signal input end of concerning security matters hard disk change-over switch (7), the output terminal of the self-destruct circuit of processor (5) is connected with the input end of the self-destruct circuit of concerning security matters hard disk self-destruct circuit (8), the output terminal of concerning security matters hard disk self-destruct circuit (8) is connected with the input end of concerning security matters hard disk change-over switch (7).
CN 201320467651 2013-08-01 2013-08-01 Computer data information anti-stealing device Expired - Fee Related CN203350883U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201320467651 CN203350883U (en) 2013-08-01 2013-08-01 Computer data information anti-stealing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201320467651 CN203350883U (en) 2013-08-01 2013-08-01 Computer data information anti-stealing device

Publications (1)

Publication Number Publication Date
CN203350883U true CN203350883U (en) 2013-12-18

Family

ID=49750753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201320467651 Expired - Fee Related CN203350883U (en) 2013-08-01 2013-08-01 Computer data information anti-stealing device

Country Status (1)

Country Link
CN (1) CN203350883U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104078074A (en) * 2014-06-25 2014-10-01 北京福莱达斯科技有限公司 Portable type light disk safe storage device
CN109664007A (en) * 2019-01-08 2019-04-23 温岭阿凡达机电有限公司 A kind of welding machine of numerically controlled tape starting and charge function

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104078074A (en) * 2014-06-25 2014-10-01 北京福莱达斯科技有限公司 Portable type light disk safe storage device
CN104078074B (en) * 2014-06-25 2017-01-04 北京福莱达斯科技有限公司 A kind of portable optic disk safe storage device
CN109664007A (en) * 2019-01-08 2019-04-23 温岭阿凡达机电有限公司 A kind of welding machine of numerically controlled tape starting and charge function

Similar Documents

Publication Publication Date Title
US9077747B1 (en) Systems and methods for responding to security breaches
US20150244778A1 (en) Assembling of Isolated Remote Data
US9323930B1 (en) Systems and methods for reporting security vulnerabilities
CN102902928A (en) Method and device for webpage integrity assurance
CN105005720A (en) Computer security control system
Husein et al. Analisis Manajemen Risiko Teknologi Informasi Penerapan Pada Document Management System di PT. JABAR TELEMATIKA (JATEL)
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN205103825U (en) Computer information safety control
CN204463132U (en) A kind of anti-theft device for computer data information
US9166995B1 (en) Systems and methods for using user-input information to identify computer security threats
CN107169368A (en) A kind of computer system ensured information security
CN203350883U (en) Computer data information anti-stealing device
CN206619143U (en) A kind of computer network security shielding system
CN205721797U (en) A kind of novel computer information safe device
CN201608722U (en) Secure physical isolation device for network
CN104010021A (en) Network consultation platform
CN204613932U (en) A kind of computer data protection system
US9256766B1 (en) Systems and methods for collecting thief-identifying information on stolen computing devices
CN205788190U (en) A kind of office computer information security managing and control system based on fingerprint identification technology
CN111030982B (en) Strong management and control method, system and storage medium for confidential files
CN205003683U (en) Automatic control device for computer network
KR102004505B1 (en) System for real-time protection of computer storage devices using user behavior analysis and control method thereof
CN205451074U (en) Information anti -theft device of computer
CN206270962U (en) A kind of computer security control system
CN211429342U (en) Network safety monitoring device

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131218

Termination date: 20140801

EXPY Termination of patent right or utility model