CN204613932U - A kind of computer data protection system - Google Patents

A kind of computer data protection system Download PDF

Info

Publication number
CN204613932U
CN204613932U CN201520243359.1U CN201520243359U CN204613932U CN 204613932 U CN204613932 U CN 204613932U CN 201520243359 U CN201520243359 U CN 201520243359U CN 204613932 U CN204613932 U CN 204613932U
Authority
CN
China
Prior art keywords
hard disc
encipher
protection system
computer data
data protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520243359.1U
Other languages
Chinese (zh)
Inventor
张春平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou College of Information Technology CCIT
Original Assignee
Changzhou College of Information Technology CCIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou College of Information Technology CCIT filed Critical Changzhou College of Information Technology CCIT
Priority to CN201520243359.1U priority Critical patent/CN204613932U/en
Application granted granted Critical
Publication of CN204613932U publication Critical patent/CN204613932U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model provides a kind of computer data protection system, comprise processor, common hard disc and encipher hard disc, processor connects encipher hard disc by power supply relay, to control the keying of encipher hard disc, encipher hard disc is connected with hard disk self-destruct circuit and safe external device, hard disk self-destruct circuit is used for assigning command-destruct to described encipher hard disc, whether safe external device has authority for authentication of users is accessed described encipher hard disc, processor is also connected with operation note instrument and operation detection device, operation note instrument is used for the operational motion of recording user, whether operation detection device is trespassed for detecting described encipher hard disc.The utility model provides a kind of computer data protection system; by arranging power supply relay, hard disk self-destruct circuit, safe external device and operation detection device; safeguard protection is carried out to hard disc of computer; prevent other user's illegal invasion hard disc of computer systems, improve the security performance of computing machine.

Description

A kind of computer data protection system
Technical field
The utility model relates to computer equipment field, and specifically, the utility model relates to a kind of computer data protection system.
Background technology
Along with the progress of computer technology, computing machine is with its exclusive function and powerful ability to work, and computing machine has become the necessary instrument of people's life and work.Existing computing machine exists following not enough: the network information security is poor, management inconvenience, especially in public, computing machine is not easy to management, cause sensitive information leakage, especially show the aspect such as to steal of hard disk and Internet resources, great impact is caused on the use of computing machine.When for the problems referred to above, those skilled in the art need badly provides new a kind of computer data protection system, strengthens the security performance of computing machine.
Utility model content
The technical problems to be solved in the utility model is: provide a kind of computer data protection system, strengthens the security performance of computerized information.
The utility model solves the technical scheme that its technical matters adopts: provide a kind of computer data protection system, comprise processor, common hard disc and encipher hard disc, described processor connects encipher hard disc by power supply relay, to control the keying of encipher hard disc, described encipher hard disc is connected with hard disk self-destruct circuit and safe external device, described hard disk self-destruct circuit is used for assigning command-destruct to described encipher hard disc, whether described safe external device has authority for authentication of users is accessed described encipher hard disc, described processor is also connected with operation note instrument and operation detection device, described operation note instrument is used for the operational motion of recording user, whether described operation detection device is trespassed for detecting described encipher hard disc.
Preferably, described operation detection device connects warning device, and when detecting that described encipher hard disc is subject to illegal invasion, described warning device gives the alarm.
Preferably, described warning device comprises hummer and display lamp.
Preferably, described processor is also connected with identity authenticating unit.
Preferably, described identity authenticating unit comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
The utility model provides a kind of computer data protection system, by arranging power supply relay, hard disk self-destruct circuit, safe external device and operation detection device, safeguard protection is carried out to hard disc of computer, prevent other user's illegal invasion hard disc of computer systems, improve the security performance of computing machine; The utility model can available protecting Computer Data Security, guarantees the safe operation of computing machine, and control combination is easy to realize, and structure is simple, with low cost, is easy to apply.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the utility model embodiment, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only embodiments more of the present utility model, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the structural representation of computer data protection system preferred embodiment of the present utility model.
[in figure Reference numeral]:
10. processor, 20. common hard discs, 30. power supply relays, 40. encipher hard discs, 50. hard disk self-destruct circuits, 60. safe external devices, 70. operation note instrument, 80. operation detection devices, 90. warning devices, 100. identity authenticating unit.
Embodiment
For making content of the present utility model clearly understandable, below in conjunction with Figure of description, content of the present utility model is described further.Certain the utility model is not limited to this specific embodiment, and the general replacement known by those skilled in the art is also encompassed in protection domain of the present utility model.Secondly, the utility model detailed statement that utilized schematic diagram to carry out, when describing the utility model example in detail, for convenience of explanation, schematic diagram, should in this, as to restriction of the present utility model not according to general ratio partial enlargement.
Above-mentioned and other technical characteristic and beneficial effect, will in conjunction with the embodiments and accompanying drawing 1 computer data protection system of the present utility model is described in detail.As shown in Figure 1, Fig. 1 is the structural representation of computer data protection system preferred embodiment of the present utility model.
As shown in Figure 1, the utility model provides a kind of computer data protection system, comprise processor 10, common hard disc 20 and encipher hard disc 40, processor 10 connects encipher hard disc 40 by power supply relay 30, to control the keying of encipher hard disc 40, encipher hard disc 40 is connected with hard disk self-destruct circuit 50 and safe external device 60, hard disk self-destruct circuit 50 is for assigning command-destruct to encipher hard disc 40, whether safe external device 60 has authority access encipher hard disc 40 for authentication of users, processor 10 is also connected with operation note instrument 70 and operation detection device 80, operation note instrument 70 is for the operational motion of recording user, whether operation detection device 80 is trespassed for detecting encipher hard disc 40.
Concrete, in the present embodiment, operation detection device 80 connects warning device 90, and when detecting that encipher hard disc 40 is subject to illegal invasion, warning device 90 gives the alarm, and warning device 90 comprises hummer and display lamp.
For improving the security performance of computing machine further, processor 10 is also connected with identity authenticating unit 100, and identity authenticating unit 100 comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
In sum, the utility model provides a kind of computer data protection system, by arranging power supply relay 30, hard disk self-destruct circuit 50, safe external device 60 and operation detection device 80, safeguard protection is carried out to hard disc of computer, prevent other user's illegal invasion hard disc of computer systems, improve the security performance of computing machine; The utility model can available protecting Computer Data Security, guarantees the safe operation of computing machine, and control combination is easy to realize, and structure is simple, with low cost, is easy to apply.
Although the utility model essentially describes above embodiment, just come as an example to be described, and the utility model is not limited to this.Such as, each parts that embodiment is shown in detail can be revised and run, to described modification with apply relevant difference and can think and be included in protection domain of the present utility model that claims limit.
Embodiment involved in this instructions, its implication is that specially feature, structure or the characteristic described in conjunction with this embodiment is included at least one embodiment of the present utility model.These terms come across in instructions everywhere differ to establish a capital and relate to same embodiment.In addition, when describing special characteristic, structure or characteristic in conjunction with any embodiment, all think that it falls in the scope of these special characteristics, structure or the characteristic that those of ordinary skill in the art just can realize in conjunction with other embodiments.

Claims (5)

1. a computer data protection system, it is characterized in that, comprise processor, common hard disc and encipher hard disc, described processor connects encipher hard disc by power supply relay, to control the keying of encipher hard disc, described encipher hard disc is connected with hard disk self-destruct circuit and safe external device, described hard disk self-destruct circuit is used for assigning command-destruct to described encipher hard disc, whether described safe external device has authority for authentication of users is accessed described encipher hard disc, described processor is also connected with operation note instrument and operation detection device, described operation note instrument is used for the operational motion of recording user, whether described operation detection device is trespassed for detecting described encipher hard disc.
2. computer data protection system as claimed in claim 1, is characterized in that, described operation detection device connects warning device, and when detecting that described encipher hard disc is subject to illegal invasion, described warning device gives the alarm.
3. computer data protection system as claimed in claim 2, it is characterized in that, described warning device comprises hummer and display lamp.
4. computer data protection system as claimed in claim 1, it is characterized in that, described processor is also connected with identity authenticating unit.
5. computer data protection system as claimed in claim 4, is characterized in that, described identity authenticating unit comprises China second-generation identity card scanner, fingerprint machine or encryption switch.
CN201520243359.1U 2015-04-21 2015-04-21 A kind of computer data protection system Expired - Fee Related CN204613932U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520243359.1U CN204613932U (en) 2015-04-21 2015-04-21 A kind of computer data protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520243359.1U CN204613932U (en) 2015-04-21 2015-04-21 A kind of computer data protection system

Publications (1)

Publication Number Publication Date
CN204613932U true CN204613932U (en) 2015-09-02

Family

ID=53966468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520243359.1U Expired - Fee Related CN204613932U (en) 2015-04-21 2015-04-21 A kind of computer data protection system

Country Status (1)

Country Link
CN (1) CN204613932U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096368A (en) * 2016-06-16 2016-11-09 成都才智圣有科技有限责任公司 Computer data storage Anti-theft system
CN106650379A (en) * 2016-12-26 2017-05-10 长沙准光里电子科技有限公司 Computer control device based on identity authentication
CN108073834A (en) * 2016-11-17 2018-05-25 天津凯溢华升科技发展有限公司 A kind of information security of computer network technological service device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096368A (en) * 2016-06-16 2016-11-09 成都才智圣有科技有限责任公司 Computer data storage Anti-theft system
CN108073834A (en) * 2016-11-17 2018-05-25 天津凯溢华升科技发展有限公司 A kind of information security of computer network technological service device
CN106650379A (en) * 2016-12-26 2017-05-10 长沙准光里电子科技有限公司 Computer control device based on identity authentication

Similar Documents

Publication Publication Date Title
CN204613932U (en) A kind of computer data protection system
CN205103825U (en) Computer information safety control
CN204731771U (en) A kind of computer security supervisory systems
CN104424403B (en) A kind of information processing method and electronic equipment
CN204740592U (en) Computer data monitored control system
CN204576516U (en) A kind of computerized information encryption system
CN204613945U (en) A kind of computer data supervisory systems
CN204576521U (en) A kind of anti-computer network system of divulging a secret
CN204576524U (en) A kind of Computer Data Security management devices
CN204613954U (en) A kind of computer network security shielding system
CN204613953U (en) A kind of computer management system
CN204557487U (en) A kind of computer protection system
CN204576525U (en) A kind of computer security protection system
CN207475576U (en) A kind of safety mobile terminal system based on safety chip
CN204559617U (en) A kind of computer safety monitoring system
CN204557491U (en) A kind of computerized information guard system
CN204740591U (en) Computer information management system
CN205788190U (en) A kind of office computer information security managing and control system based on fingerprint identification technology
CN205179095U (en) Computer network safety control system
CN208110604U (en) A kind of long-distance monitorng device based on Internet
CN203350883U (en) Computer data information anti-stealing device
CN205003682U (en) Computer network security isolation system
CN204559594U (en) A kind of computer network supervisory systems
CN204576523U (en) A kind of data-storage system of computing machine
CN205003683U (en) Automatic control device for computer network

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150902

Termination date: 20160421