CN205594622U - Computer storage system - Google Patents

Computer storage system Download PDF

Info

Publication number
CN205594622U
CN205594622U CN201620384405.4U CN201620384405U CN205594622U CN 205594622 U CN205594622 U CN 205594622U CN 201620384405 U CN201620384405 U CN 201620384405U CN 205594622 U CN205594622 U CN 205594622U
Authority
CN
China
Prior art keywords
module
identity
data
memory module
authenticating unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201620384405.4U
Other languages
Chinese (zh)
Inventor
李春燕
李�根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201620384405.4U priority Critical patent/CN205594622U/en
Application granted granted Critical
Publication of CN205594622U publication Critical patent/CN205594622U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a computer storage technical field especially relates to a computer storage system, including storage module and the backup module that backs up in realtime to storage module, storage module is connected with the port that reads of writing the port into with being used for reading its internal data that is used for data to write into, read the port with be provided with the first authentication unit that is used for verifying user id between the storage module, when correct identity is verified to first authentication unit, storage module with read the port switch -on, work as when wrong identity is verified to first authentication unit, storage module with read the port disconnection, storage module still is connected with the data deletion module that is used for deleting the storage module internal data, data deletions module with first authentication unit connection. Directly avoid the leakage of data, prevented that improper user from acquireing the data in the storage module through other means, further prevented the possibility that data leaked.

Description

A kind of computer memory system
Technical field
This utility model relates to computer memory technical field, particularly relates to a kind of computer memory system.
Background technology
Along with the progress of computer technology, computer, with its exclusive function and powerful ability to work, has become For the necessary instrument of people's life and work.
In current computer system, there are following deficiency: information privacy is bad, management inconvenience.Especially In public, computer is not easy to management, causes sensitive information leakage, especially shows letting out of hard disk resources Leakage, the stealing of Internet resources, the use to computer causes strong influence.
For the problems referred to above, need a kind of safe and reliable computer memory system at present badly.
Utility model content
The purpose of this utility model is that for the problems referred to above present in current computer system, it is provided that one Plant and be not only convenient for management, the most also there is the storage system of higher-security energy.
To achieve these goals, the technical solution adopted in the utility model is:
A kind of computer memory system, including memory module and the backup mould of backing up in realtime described memory module Block, described memory module and backup module with between be connected and have ciphering unit, described memory module connect have for What data write writes port and for reading the read port of interior data, at described read port with described The first identity authenticating unit for verifying user identity it is provided with, when described first identity is tested between memory module When card unit authenticates to correct identity, described memory module is connected with described read port, when described first identity When authentication unit authenticates to mistake identity, described memory module disconnects with described read port, described memory module Being also associated with the data deletion module for deleting memory module internal data, described data deletion module is with described First identity authenticating unit connects.
In this application, memory module is used for storing data, and backs up data to, in backup module, work as user When needing to read the data in memory module, it is necessary first to can be passed through by the first identity authenticating unit checking Read port reads data, and when authentication is incorrect, user then cannot read the data in memory module, So ensure that the safety that data store, meanwhile, the storage system of the application also includes data deletion module, When the first identity authenticating unit authenticates to wrong data, data deletion module deletes the data in memory module, Directly avoid the leakage of data, prevent improper user from obtaining the data in memory module by other means, Further prevent the probability of data leak.
Preferably, it is connected between described data deletion module with described first identity authenticating unit and has counting module, Described counting module is used for counting the continuous authentication error identity number of times of described first identity authenticating unit, When the continuous authentication error identity number of times of the first identity authenticating unit reaches the set point number of counting module, described Counting module controls described data deletion module and starts, and makes described data deletion module delete the inside of memory module Data.
In this application, it is connected between data deletion module with the first identity authenticating unit and has counting module, the most just Make, in the present embodiment, when the first identity authenticating unit authenticates to mistake identity, can't delete immediately Data in memory module, give the wrong chance that user is certain, it is to avoid normal users causes because of operational error In authentication mistake causes memory module, data are deleted.
Preferably, described first identity authenticating unit is also associated with alarm device, when described first authentication When unit authenticates to mistake identity, described alarm activation also sends alarm.By arranging alarm device, enter Raising the application of one step stores the safety of system.
Preferably, described alarm device includes buzzer and warning lamp.Further improve the peace of storage system Quan Xing.
Preferably, described backup module is remote backup module, when there being data to write described memory module, and institute State memory module by wireless network transmissions to backup module.
In this application, backup module is set to genuine backup module, i.e. when improper in memory module When user obtains, the data in backup module can not be obtained, so, further improve data storage Safety and reliability.
Preferably, the second body for verifying user identity it is also associated with between memory module and said write port Part authentication unit, when described second identity authenticating unit authenticates to correct identity, described memory module is with described Write port is connected, when described second identity authenticating unit authenticates to mistake identity, and described memory module and institute State write port to disconnect.
By arranging the second identity authenticating unit, it is ensured that also user is carried out identity when memory module writes data Checking, prevents improper user from virus or Rogue program being write in memory module, so, further carries The high safety and reliability of storage system.
Preferably, described second identity authenticating unit is connected with described alarm device.
Preferably, described computer memory system also includes mobile terminal, and described mobile terminal is with described Alarm device communication connects.
Owing to have employed technique scheme, the beneficial effects of the utility model are:
In this application, memory module is used for storing data, and backs up data to, in backup module, work as user When needing to read the data in memory module, it is necessary first to can be passed through by the first identity authenticating unit checking Read port reads data, and when authentication is incorrect, user then cannot read the data in memory module, So ensure that the safety that data store, meanwhile, the storage system of the application also includes data deletion module, When the first identity authenticating unit authenticates to wrong data, data deletion module deletes the data in memory module, Directly avoid the leakage of data, prevent improper user from obtaining the data in memory module by other means, Further prevent the probability of data leak.
Accompanying drawing explanation
Fig. 1 is structural representation of the present utility model,
In figure: 1, memory module;2, backup module;3, ciphering unit;4, write port;5, read Port;6, the first identity authenticating unit;7, data deletion module;8, counting module;9, alarm device; 10, the second identity authenticating unit;11, mobile terminal.
Detailed description of the invention
For making the purpose of this utility model embodiment, technical scheme and advantage clearer, below in conjunction with this reality With the accompanying drawing in new embodiment, the technical scheme in this utility model embodiment is clearly and completely retouched State, it is clear that described embodiment is a part of embodiment of this utility model rather than whole embodiments, Based on the embodiment in this utility model, those of ordinary skill in the art are not under making creative work premise The every other embodiment obtained, broadly falls into the scope of this utility model protection.
Embodiment 1, as shown in Figure 1:
A kind of computer memory system, including memory module 1 and described memory module 1 is backed up in realtime standby Part module 2, described memory module 1 and backup module 2 with between be connected and have ciphering unit 3, described storage mould Block 1 connects to be had for the write port 4 of data write with for reading the read port 5 of interior data, The first authentication for verifying user identity it is provided with between described read port 5 and described memory module 1 Unit 6, when described first identity authenticating unit 6 authenticates to correct identity, described memory module 1 is with described Read port 5 is connected, when described first identity authenticating unit 6 authenticates to mistake identity, and described memory module 1 disconnects with described read port 5, and described memory module 1 is also associated with for deleting the internal number of memory module 1 According to data deletion module 7, described data deletion module 7 is connected with described first identity authenticating unit 6.
In the present embodiment, memory module 1 is used for storing data, and backs up data in backup module 2, When user needs to read the data in memory module 1, it is necessary first to verified by the first identity authenticating unit 6 Can read data by read port 5, when authentication is incorrect, user then cannot read storage mould Data in block 1, so ensure that the safety that data store, and meanwhile, the storage system of the present embodiment is also wrapped Include data deletion module 7, when the first identity authenticating unit 6 authenticates to wrong data, data deletion module 7 Delete the data in memory module 1, directly avoid the leakage of data, prevent improper user by other handss Section obtains the data in memory module 1, further prevents the probability of data leak.
Preferably, it is connected between described data deletion module 7 with described first identity authenticating unit 6 and has count module Block 8, described counting module 8 is for the continuous authentication error identity number of times to described first identity authenticating unit 6 Count, when the continuous authentication error identity number of times of the first identity authenticating unit 6 reaches setting of counting module 8 When determining number of times, described counting module 8 controls described data deletion module 7 and starts, and makes described data deletion module 7 internal datas deleting memory module 1.
In the present embodiment, it is connected between data deletion module 7 with the first identity authenticating unit 6 and has counting module 8, also allow for, in the present embodiment, when the first identity authenticating unit 6 authenticates to mistake identity, not The data in memory module 1 can be deleted immediately, give the wrong chance that user is certain, it is to avoid normal users is because of behaviour Slip up and cause authentication mistake to cause data in memory module 1 to be deleted.
Preferably, described first identity authenticating unit 6 is also associated with alarm device 9, when described first identity When authentication unit 6 authenticates to mistake identity, described alarm device 9 starts and sends alarm.By arranging warning Device 9, further improves the application and stores the safety of system.
Preferably, described alarm device 9 includes buzzer and warning lamp.Further improve storage system Safety.
Preferably, described backup module 2 is remote backup module 2, writes described memory module 1 when there being data Time, described memory module 1 passes through wireless network transmissions to backup module 2.
In the present embodiment, backup module 2 is set to genuine backup module 2, i.e. when in memory module 1 When being obtained by improper user, the data in backup module 2 can not be obtained, so, further improve The safety and reliability of data storage.
Preferably, be also associated with between memory module 1 and said write port 4 for verify user identity Two identity authenticating unit 10, when described second identity authenticating unit 10 authenticates to correct identity, described storage Module 1 is connected with said write port 4, when described second identity authenticating unit 10 authenticates to mistake identity, Described memory module 1 disconnects with said write port 4.
By arranging the second identity authenticating unit 10, it is ensured that also user is entered when memory module 1 writes data Row authentication, prevents improper user from virus or Rogue program being write in memory module 1, so, enters The safety and reliability that improve storage system of one step.
Preferably, described second identity authenticating unit 10 is connected with described alarm device 9.
Preferably, described computer memory system also includes mobile terminal 11, described mobile terminal 11 and institute State described alarm device 9 communication to connect.
The above, detailed description of the invention the most of the present utility model, but protection domain of the present utility model is not Being confined to this, any those familiar with the art, can in the technical scope that this utility model discloses Readily occur in change or replace, all should contain within protection domain of the present utility model.Therefore, this practicality is new The protection domain of type should be as the criterion with scope of the claims.

Claims (8)

  1. null1. a computer memory system,Including memory module and backup module that described memory module is backed up in realtime,It is characterized in that: described memory module and backup module with between be connected and have ciphering unit,Described memory module connects to be had for the write port of data write with for reading the read port of interior data,The first identity authenticating unit for verifying user identity it is provided with between described read port and described memory module,When described first identity authenticating unit authenticates to correct identity,Described memory module is connected with described read port,When described first identity authenticating unit authenticates to mistake identity,Described memory module disconnects with described read port,Described memory module is also associated with the data deletion module for deleting memory module internal data,Described data deletion module is connected with described first identity authenticating unit.
  2. 2. computer memory system as claimed in claim 1, it is characterized in that: being connected between described data deletion module with described first identity authenticating unit has counting module, described counting module is for counting the continuous authentication error identity number of times of described first identity authenticating unit, when the continuous authentication error identity number of times of the first identity authenticating unit reaches the set point number of counting module, described counting module controls described data deletion module and starts, and makes described data deletion module delete the internal data of memory module.
  3. 3. computer memory system as claimed in claim 2, it is characterised in that: being also associated with alarm device in described first identity authenticating unit, when described first identity authenticating unit authenticates to mistake identity, described alarm activation also sends alarm.
  4. 4. computer memory system as claimed in claim 3, it is characterised in that: described alarm device includes buzzer and warning lamp.
  5. 5. computer memory system as claimed in claim 4, it is characterised in that: described backup module is remote backup module, and when there being data to write described memory module, described memory module passes through wireless network transmissions to backup module.
  6. 6. computer memory system as claimed in claim 5, it is characterized in that: between memory module and said write port, be also associated with the second identity authenticating unit for verifying user identity, when described second identity authenticating unit authenticates to correct identity, described memory module is connected with said write port, when described second identity authenticating unit authenticates to mistake identity, described memory module disconnects with said write port.
  7. 7. computer memory system as claimed in claim 6, it is characterised in that: described second identity authenticating unit is connected with described alarm device.
  8. 8. computer memory system as claimed in claim 7, it is characterised in that: described computer memory system also includes mobile terminal, and described mobile terminal is connected with described alarm device communication.
CN201620384405.4U 2016-04-28 2016-04-28 Computer storage system Expired - Fee Related CN205594622U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620384405.4U CN205594622U (en) 2016-04-28 2016-04-28 Computer storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620384405.4U CN205594622U (en) 2016-04-28 2016-04-28 Computer storage system

Publications (1)

Publication Number Publication Date
CN205594622U true CN205594622U (en) 2016-09-21

Family

ID=56933558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620384405.4U Expired - Fee Related CN205594622U (en) 2016-04-28 2016-04-28 Computer storage system

Country Status (1)

Country Link
CN (1) CN205594622U (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529348A (en) * 2016-10-31 2017-03-22 余必亚 Computer storage system with double storage modules
CN106548056A (en) * 2016-10-31 2017-03-29 余必亚 A kind of computer memory system
CN106557685A (en) * 2016-10-31 2017-04-05 黄建文 A kind of computer information safe guard system
CN106557686A (en) * 2016-10-31 2017-04-05 余必亚 A kind of computer memory system of duplicate protection
CN106570374A (en) * 2016-10-31 2017-04-19 余必亚 Computer storage system with network monitoring function
CN107767514A (en) * 2017-10-26 2018-03-06 界首市鸿志物联科技有限公司 Key of safety encryption matrix contact type electronic lock
CN109246087A (en) * 2018-08-17 2019-01-18 苏州格目软件技术有限公司 A kind of information storage system based on network security

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529348A (en) * 2016-10-31 2017-03-22 余必亚 Computer storage system with double storage modules
CN106548056A (en) * 2016-10-31 2017-03-29 余必亚 A kind of computer memory system
CN106557685A (en) * 2016-10-31 2017-04-05 黄建文 A kind of computer information safe guard system
CN106557686A (en) * 2016-10-31 2017-04-05 余必亚 A kind of computer memory system of duplicate protection
CN106570374A (en) * 2016-10-31 2017-04-19 余必亚 Computer storage system with network monitoring function
CN107767514A (en) * 2017-10-26 2018-03-06 界首市鸿志物联科技有限公司 Key of safety encryption matrix contact type electronic lock
CN107767514B (en) * 2017-10-26 2020-11-17 界首市鸿志物联科技有限公司 Key of safety encryption matrix contact type electronic lock
CN109246087A (en) * 2018-08-17 2019-01-18 苏州格目软件技术有限公司 A kind of information storage system based on network security

Similar Documents

Publication Publication Date Title
CN205594622U (en) Computer storage system
CN103516518B (en) Safe verification method and device
US9292680B2 (en) Mobile terminal detection method and mobile terminal
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
CN103559435B (en) The debugging port controlling method and apparatus of terminal device
BR102014003873A2 (en) application protection method and device
TW201328395A (en) Apparatus for deleting data of mobile phone
CN102883047A (en) Method and system for realizing data security of intelligent mobile terminals
CN106022181A (en) System and method for preventing unauthorized use of IC card
CN103870759A (en) NFC encryption method, NFC encryption system and terminal
CN102480726A (en) Password protection method, password protection system and mobile terminal with same
CN102902633B (en) Remote encryption system and remote encryption method for solid-state disk
CN110474081A (en) A kind of lithium ion battery and its encryption method
CN108270798A (en) A kind of mobile terminal device safety management system
CN205809895U (en) A kind of clone's IC-card identification device
CN106211163B (en) The method and apparatus of safe networking
CN102158823A (en) Method and system for tracking stolen mobile terminal as well as mobile terminal
CN211506487U (en) Cross-platform security audit device
CN112306410B (en) Data processing method and device for electric energy meter, storage medium and electric energy meter
CN108055380A (en) Double screen unlocking method, mobile terminal and storage medium
CN114157754A (en) Lost mobile phone retrieving method, system and storage medium based on eSIM card
CN105549914A (en) Mounting method and system of external storage equipment
CN101674581B (en) Safe private network wireless access method and wireless terminal
CN105159847A (en) Disk change record method based on trusted chip
CN103778073B (en) Data guard method, device for mobile communication and memorizer memory devices

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160921

Termination date: 20170428

CF01 Termination of patent right due to non-payment of annual fee