CN203350883U - Computer data information anti-stealing device - Google Patents
Computer data information anti-stealing device Download PDFInfo
- Publication number
- CN203350883U CN203350883U CN 201320467651 CN201320467651U CN203350883U CN 203350883 U CN203350883 U CN 203350883U CN 201320467651 CN201320467651 CN 201320467651 CN 201320467651 U CN201320467651 U CN 201320467651U CN 203350883 U CN203350883 U CN 203350883U
- Authority
- CN
- China
- Prior art keywords
- circuit
- input end
- processor
- signal output
- hard disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The utility model provides a computer data information anti-stealing device, which relates to the field of computers. The device is characterized in that the image signal output end of a camera is connected with the image signal input end of a processor, the fingerprint signal output end of a fingerprint acquisition circuit is connected with the fingerprint signal input end of the processor, the verification code signal output end of a verification code acquisition circuit is connected with the verification code signal input end of the processor, the password signal output end of a password input circuit is connected with the password input end of the processor, the hard disc control signal output end of a relay driving circuit is connected with the control signal input end of a secret hard disc selector switch, and the output end of a secret hard disc self-destruction circuit is connected with the input end of the secret hard disc selector switch. The computer data information anti-stealing device is simple in structure, high in safety factor and low in manufacturing cost, and can be effectively preventing computer data from being stolen.
Description
Technical field:
The utility model relates to computer realm, is specifically related to anti-theft device for computer data information.
Background technology:
Data information security refers to that hardware, software and the data of data message are protected, and is not subject to the former of accidental or malice thereby suffers to destroy, change, reveals, and system is reliably normally operation continuously, and information service is not interrupted.He is one and relates to the multi-disciplinary comprehensive branches of learning such as computer science, network technology, the communication technology, cryptographic technique, information security technology, applied mathematics, number theory, information theory.The wide range that data information security comprises, large to secret safety such as the military politics of country, little to as take precautions against that commercial enterprise's secret is revealed, the strick precaution teenager is to the leakage of the browsing of flame, personal information etc.
The safety of software adopts anti-virus software usually, but can only be used for anti-known virus, helpless to emerging virus; Therefore, when user's computer internet, very difficult assurance is not invaded by internet worm, will cause thus computer hard disk data damaged.
The utility model content:
The purpose of this utility model is to provide anti-theft device for computer data information, and it is simple in structure, and safety coefficient is high, can effectively prevent that computer data is stolen, and its cost of manufacture is low.
In order to solve the existing problem of background technology, the utility model is by the following technical solutions: it comprises camera 1, fingerprint collecting circuit 2, identifying code Acquisition Circuit 3, Password Input circuit 4, processor 5, relay drive circuit 6, concerning security matters hard disk change-over switch 7, concerning security matters hard disk self-destruct circuit 8, the image signal output end of camera 1 is connected with the picture signal input end of processor 5, the fingerprint signal output terminal of fingerprint collecting circuit 2 is connected with the fingerprint signal input end of processor 5, the verification code signal output terminal of identifying code Acquisition Circuit 3 is connected with the verification code signal input end of processor 5, the code signal output terminal of Password Input circuit 4 is connected with the Password Input end of processor 5, the output terminal of processor 5 is connected with the input end of relay drive circuit 6, the hard disk control signal output terminal of relay drive circuit 6 is connected with the control signal input end of concerning security matters hard disk change-over switch 7, the output terminal of the self-destruct circuit of processor 5 is connected with the input end of the self-destruct circuit of concerning security matters hard disk self-destruct circuit 8, the output terminal of concerning security matters hard disk self-destruct circuit 8 is connected with the input end of concerning security matters hard disk change-over switch 7.
In the utility model when operation,, operating personnel first will pass through the checking of head portrait, fingerprint, identifying code and password, if wherein one can not be by opening the concerning security matters hard disk, after operating for several times still can not by with checking, the concerning security matters hard disk will destroy automatically.
The beneficial effects of the utility model: simple in structure, safety coefficient is high, can effectively prevent that computer data is stolen, and its cost of manufacture is low.
The accompanying drawing explanation:
Fig. 1 is structural representation of the present utility model.
Embodiment:
With reference to Fig. 1, this embodiment by the following technical solutions: it comprises camera 1, fingerprint collecting circuit 2, identifying code Acquisition Circuit 3, Password Input circuit 4, processor 5, relay drive circuit 6, concerning security matters hard disk change-over switch 7, concerning security matters hard disk self-destruct circuit 8, the image signal output end of camera 1 is connected with the picture signal input end of processor 5, the fingerprint signal output terminal of fingerprint collecting circuit 2 is connected with the fingerprint signal input end of processor 5, the verification code signal output terminal of identifying code Acquisition Circuit 3 is connected with the verification code signal input end of processor 5, the code signal output terminal of Password Input circuit 4 is connected with the Password Input end of processor 5, the output terminal of processor 5 is connected with the input end of relay drive circuit 6, the hard disk control signal output terminal of relay drive circuit 6 is connected with the control signal input end of concerning security matters hard disk change-over switch 7, the output terminal of the self-destruct circuit of processor 5 is connected with the input end of the self-destruct circuit of concerning security matters hard disk self-destruct circuit 8, the output terminal of concerning security matters hard disk self-destruct circuit 8 is connected with the input end of concerning security matters hard disk change-over switch 7.
In this embodiment when operation,, operating personnel first will pass through the checking of head portrait, fingerprint, identifying code and password, if wherein one can not be by opening the concerning security matters hard disk, after operating for several times still can not by with checking, the concerning security matters hard disk will destroy automatically.
This embodiment is simple in structure, and safety coefficient is high, can effectively prevent that computer data is stolen, and its cost of manufacture is low.
Claims (1)
1. anti-theft device for computer data information, is characterized in that it comprises camera (1), fingerprint collecting circuit (2), identifying code Acquisition Circuit (3), Password Input circuit (4), processor (5), relay drive circuit (6), concerning security matters hard disk change-over switch (7), concerning security matters hard disk self-destruct circuit (8), the image signal output end of camera (1) is connected with the picture signal input end of processor (5), the fingerprint signal output terminal of fingerprint collecting circuit (2) is connected with the fingerprint signal input end of processor (5), the verification code signal output terminal of identifying code Acquisition Circuit (3) is connected with the verification code signal input end of processor (5), the code signal output terminal of Password Input circuit (4) is connected with the Password Input end of processor (5), the output terminal of processor (5) is connected with the input end of relay drive circuit (6), the hard disk control signal output terminal of relay drive circuit (6) is connected with the control signal input end of concerning security matters hard disk change-over switch (7), the output terminal of the self-destruct circuit of processor (5) is connected with the input end of the self-destruct circuit of concerning security matters hard disk self-destruct circuit (8), the output terminal of concerning security matters hard disk self-destruct circuit (8) is connected with the input end of concerning security matters hard disk change-over switch (7).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201320467651 CN203350883U (en) | 2013-08-01 | 2013-08-01 | Computer data information anti-stealing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201320467651 CN203350883U (en) | 2013-08-01 | 2013-08-01 | Computer data information anti-stealing device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN203350883U true CN203350883U (en) | 2013-12-18 |
Family
ID=49750753
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201320467651 Expired - Fee Related CN203350883U (en) | 2013-08-01 | 2013-08-01 | Computer data information anti-stealing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN203350883U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104078074A (en) * | 2014-06-25 | 2014-10-01 | 北京福莱达斯科技有限公司 | Portable type light disk safe storage device |
CN109664007A (en) * | 2019-01-08 | 2019-04-23 | 温岭阿凡达机电有限公司 | A kind of welding machine of numerically controlled tape starting and charge function |
-
2013
- 2013-08-01 CN CN 201320467651 patent/CN203350883U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104078074A (en) * | 2014-06-25 | 2014-10-01 | 北京福莱达斯科技有限公司 | Portable type light disk safe storage device |
CN104078074B (en) * | 2014-06-25 | 2017-01-04 | 北京福莱达斯科技有限公司 | A kind of portable optic disk safe storage device |
CN109664007A (en) * | 2019-01-08 | 2019-04-23 | 温岭阿凡达机电有限公司 | A kind of welding machine of numerically controlled tape starting and charge function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9077747B1 (en) | Systems and methods for responding to security breaches | |
US20150244778A1 (en) | Assembling of Isolated Remote Data | |
US9323930B1 (en) | Systems and methods for reporting security vulnerabilities | |
CN102902928A (en) | Method and device for webpage integrity assurance | |
CN105005720A (en) | Computer security control system | |
Husein et al. | Analisis Manajemen Risiko Teknologi Informasi Penerapan Pada Document Management System di PT. JABAR TELEMATIKA (JATEL) | |
CN201397508Y (en) | Stand-alone terminal secure login and monitoring device | |
CN205103825U (en) | Computer information safety control | |
CN204463132U (en) | A kind of anti-theft device for computer data information | |
US9166995B1 (en) | Systems and methods for using user-input information to identify computer security threats | |
CN107169368A (en) | A kind of computer system ensured information security | |
CN203350883U (en) | Computer data information anti-stealing device | |
CN206619143U (en) | A kind of computer network security shielding system | |
CN205721797U (en) | A kind of novel computer information safe device | |
CN201608722U (en) | Secure physical isolation device for network | |
CN104010021A (en) | Network consultation platform | |
CN204613932U (en) | A kind of computer data protection system | |
US9256766B1 (en) | Systems and methods for collecting thief-identifying information on stolen computing devices | |
CN205788190U (en) | A kind of office computer information security managing and control system based on fingerprint identification technology | |
CN111030982B (en) | Strong management and control method, system and storage medium for confidential files | |
CN205003683U (en) | Automatic control device for computer network | |
KR102004505B1 (en) | System for real-time protection of computer storage devices using user behavior analysis and control method thereof | |
CN205451074U (en) | Information anti -theft device of computer | |
CN206270962U (en) | A kind of computer security control system | |
CN211429342U (en) | Network safety monitoring device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20131218 Termination date: 20140801 |
|
EXPY | Termination of patent right or utility model |