CN204613932U - A kind of computer data protection system - Google Patents
A kind of computer data protection system Download PDFInfo
- Publication number
- CN204613932U CN204613932U CN201520243359.1U CN201520243359U CN204613932U CN 204613932 U CN204613932 U CN 204613932U CN 201520243359 U CN201520243359 U CN 201520243359U CN 204613932 U CN204613932 U CN 204613932U
- Authority
- CN
- China
- Prior art keywords
- hard disc
- encipher
- protection system
- computer data
- data protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model provides a kind of computer data protection system, comprise processor, common hard disc and encipher hard disc, processor connects encipher hard disc by power supply relay, to control the keying of encipher hard disc, encipher hard disc is connected with hard disk self-destruct circuit and safe external device, hard disk self-destruct circuit is used for assigning command-destruct to described encipher hard disc, whether safe external device has authority for authentication of users is accessed described encipher hard disc, processor is also connected with operation note instrument and operation detection device, operation note instrument is used for the operational motion of recording user, whether operation detection device is trespassed for detecting described encipher hard disc.The utility model provides a kind of computer data protection system; by arranging power supply relay, hard disk self-destruct circuit, safe external device and operation detection device; safeguard protection is carried out to hard disc of computer; prevent other user's illegal invasion hard disc of computer systems, improve the security performance of computing machine.
Description
Technical field
The utility model relates to computer equipment field, and specifically, the utility model relates to a kind of computer data protection system.
Background technology
Along with the progress of computer technology, computing machine is with its exclusive function and powerful ability to work, and computing machine has become the necessary instrument of people's life and work.Existing computing machine exists following not enough: the network information security is poor, management inconvenience, especially in public, computing machine is not easy to management, cause sensitive information leakage, especially show the aspect such as to steal of hard disk and Internet resources, great impact is caused on the use of computing machine.When for the problems referred to above, those skilled in the art need badly provides new a kind of computer data protection system, strengthens the security performance of computing machine.
Utility model content
The technical problems to be solved in the utility model is: provide a kind of computer data protection system, strengthens the security performance of computerized information.
The utility model solves the technical scheme that its technical matters adopts: provide a kind of computer data protection system, comprise processor, common hard disc and encipher hard disc, described processor connects encipher hard disc by power supply relay, to control the keying of encipher hard disc, described encipher hard disc is connected with hard disk self-destruct circuit and safe external device, described hard disk self-destruct circuit is used for assigning command-destruct to described encipher hard disc, whether described safe external device has authority for authentication of users is accessed described encipher hard disc, described processor is also connected with operation note instrument and operation detection device, described operation note instrument is used for the operational motion of recording user, whether described operation detection device is trespassed for detecting described encipher hard disc.
Preferably, described operation detection device connects warning device, and when detecting that described encipher hard disc is subject to illegal invasion, described warning device gives the alarm.
Preferably, described warning device comprises hummer and display lamp.
Preferably, described processor is also connected with identity authenticating unit.
Preferably, described identity authenticating unit comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
The utility model provides a kind of computer data protection system, by arranging power supply relay, hard disk self-destruct circuit, safe external device and operation detection device, safeguard protection is carried out to hard disc of computer, prevent other user's illegal invasion hard disc of computer systems, improve the security performance of computing machine; The utility model can available protecting Computer Data Security, guarantees the safe operation of computing machine, and control combination is easy to realize, and structure is simple, with low cost, is easy to apply.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the utility model embodiment, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only embodiments more of the present utility model, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the structural representation of computer data protection system preferred embodiment of the present utility model.
[in figure Reference numeral]:
10. processor, 20. common hard discs, 30. power supply relays, 40. encipher hard discs, 50. hard disk self-destruct circuits, 60. safe external devices, 70. operation note instrument, 80. operation detection devices, 90. warning devices, 100. identity authenticating unit.
Embodiment
For making content of the present utility model clearly understandable, below in conjunction with Figure of description, content of the present utility model is described further.Certain the utility model is not limited to this specific embodiment, and the general replacement known by those skilled in the art is also encompassed in protection domain of the present utility model.Secondly, the utility model detailed statement that utilized schematic diagram to carry out, when describing the utility model example in detail, for convenience of explanation, schematic diagram, should in this, as to restriction of the present utility model not according to general ratio partial enlargement.
Above-mentioned and other technical characteristic and beneficial effect, will in conjunction with the embodiments and accompanying drawing 1 computer data protection system of the present utility model is described in detail.As shown in Figure 1, Fig. 1 is the structural representation of computer data protection system preferred embodiment of the present utility model.
As shown in Figure 1, the utility model provides a kind of computer data protection system, comprise processor 10, common hard disc 20 and encipher hard disc 40, processor 10 connects encipher hard disc 40 by power supply relay 30, to control the keying of encipher hard disc 40, encipher hard disc 40 is connected with hard disk self-destruct circuit 50 and safe external device 60, hard disk self-destruct circuit 50 is for assigning command-destruct to encipher hard disc 40, whether safe external device 60 has authority access encipher hard disc 40 for authentication of users, processor 10 is also connected with operation note instrument 70 and operation detection device 80, operation note instrument 70 is for the operational motion of recording user, whether operation detection device 80 is trespassed for detecting encipher hard disc 40.
Concrete, in the present embodiment, operation detection device 80 connects warning device 90, and when detecting that encipher hard disc 40 is subject to illegal invasion, warning device 90 gives the alarm, and warning device 90 comprises hummer and display lamp.
For improving the security performance of computing machine further, processor 10 is also connected with identity authenticating unit 100, and identity authenticating unit 100 comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
In sum, the utility model provides a kind of computer data protection system, by arranging power supply relay 30, hard disk self-destruct circuit 50, safe external device 60 and operation detection device 80, safeguard protection is carried out to hard disc of computer, prevent other user's illegal invasion hard disc of computer systems, improve the security performance of computing machine; The utility model can available protecting Computer Data Security, guarantees the safe operation of computing machine, and control combination is easy to realize, and structure is simple, with low cost, is easy to apply.
Although the utility model essentially describes above embodiment, just come as an example to be described, and the utility model is not limited to this.Such as, each parts that embodiment is shown in detail can be revised and run, to described modification with apply relevant difference and can think and be included in protection domain of the present utility model that claims limit.
Embodiment involved in this instructions, its implication is that specially feature, structure or the characteristic described in conjunction with this embodiment is included at least one embodiment of the present utility model.These terms come across in instructions everywhere differ to establish a capital and relate to same embodiment.In addition, when describing special characteristic, structure or characteristic in conjunction with any embodiment, all think that it falls in the scope of these special characteristics, structure or the characteristic that those of ordinary skill in the art just can realize in conjunction with other embodiments.
Claims (5)
1. a computer data protection system, it is characterized in that, comprise processor, common hard disc and encipher hard disc, described processor connects encipher hard disc by power supply relay, to control the keying of encipher hard disc, described encipher hard disc is connected with hard disk self-destruct circuit and safe external device, described hard disk self-destruct circuit is used for assigning command-destruct to described encipher hard disc, whether described safe external device has authority for authentication of users is accessed described encipher hard disc, described processor is also connected with operation note instrument and operation detection device, described operation note instrument is used for the operational motion of recording user, whether described operation detection device is trespassed for detecting described encipher hard disc.
2. computer data protection system as claimed in claim 1, is characterized in that, described operation detection device connects warning device, and when detecting that described encipher hard disc is subject to illegal invasion, described warning device gives the alarm.
3. computer data protection system as claimed in claim 2, it is characterized in that, described warning device comprises hummer and display lamp.
4. computer data protection system as claimed in claim 1, it is characterized in that, described processor is also connected with identity authenticating unit.
5. computer data protection system as claimed in claim 4, is characterized in that, described identity authenticating unit comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520243359.1U CN204613932U (en) | 2015-04-21 | 2015-04-21 | A kind of computer data protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520243359.1U CN204613932U (en) | 2015-04-21 | 2015-04-21 | A kind of computer data protection system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204613932U true CN204613932U (en) | 2015-09-02 |
Family
ID=53966468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520243359.1U Expired - Fee Related CN204613932U (en) | 2015-04-21 | 2015-04-21 | A kind of computer data protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204613932U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096368A (en) * | 2016-06-16 | 2016-11-09 | 成都才智圣有科技有限责任公司 | Computer data storage Anti-theft system |
CN106650379A (en) * | 2016-12-26 | 2017-05-10 | 长沙准光里电子科技有限公司 | Computer control device based on identity authentication |
CN108073834A (en) * | 2016-11-17 | 2018-05-25 | 天津凯溢华升科技发展有限公司 | A kind of information security of computer network technological service device |
-
2015
- 2015-04-21 CN CN201520243359.1U patent/CN204613932U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096368A (en) * | 2016-06-16 | 2016-11-09 | 成都才智圣有科技有限责任公司 | Computer data storage Anti-theft system |
CN108073834A (en) * | 2016-11-17 | 2018-05-25 | 天津凯溢华升科技发展有限公司 | A kind of information security of computer network technological service device |
CN106650379A (en) * | 2016-12-26 | 2017-05-10 | 长沙准光里电子科技有限公司 | Computer control device based on identity authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN204613932U (en) | A kind of computer data protection system | |
CN205103825U (en) | Computer information safety control | |
CN204731771U (en) | A kind of computer security supervisory systems | |
CN104424403B (en) | A kind of information processing method and electronic equipment | |
CN204740592U (en) | Computer data monitored control system | |
CN204576516U (en) | A kind of computerized information encryption system | |
CN204613945U (en) | A kind of computer data supervisory systems | |
CN204576521U (en) | A kind of anti-computer network system of divulging a secret | |
CN204576524U (en) | A kind of Computer Data Security management devices | |
CN204613954U (en) | A kind of computer network security shielding system | |
CN204613953U (en) | A kind of computer management system | |
CN204557487U (en) | A kind of computer protection system | |
CN204576525U (en) | A kind of computer security protection system | |
CN207475576U (en) | A kind of safety mobile terminal system based on safety chip | |
CN204559617U (en) | A kind of computer safety monitoring system | |
CN204557491U (en) | A kind of computerized information guard system | |
CN204740591U (en) | Computer information management system | |
CN205788190U (en) | A kind of office computer information security managing and control system based on fingerprint identification technology | |
CN205179095U (en) | Computer network safety control system | |
CN208110604U (en) | A kind of long-distance monitorng device based on Internet | |
CN203350883U (en) | Computer data information anti-stealing device | |
CN205003682U (en) | Computer network security isolation system | |
CN204559594U (en) | A kind of computer network supervisory systems | |
CN204576523U (en) | A kind of data-storage system of computing machine | |
CN205003683U (en) | Automatic control device for computer network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150902 Termination date: 20160421 |