CN205594622U - Computer storage system - Google Patents
Computer storage system Download PDFInfo
- Publication number
- CN205594622U CN205594622U CN201620384405.4U CN201620384405U CN205594622U CN 205594622 U CN205594622 U CN 205594622U CN 201620384405 U CN201620384405 U CN 201620384405U CN 205594622 U CN205594622 U CN 205594622U
- Authority
- CN
- China
- Prior art keywords
- module
- identity
- data
- memory module
- authenticating unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model relates to a computer storage technical field especially relates to a computer storage system, including storage module and the backup module that backs up in realtime to storage module, storage module is connected with the port that reads of writing the port into with being used for reading its internal data that is used for data to write into, read the port with be provided with the first authentication unit that is used for verifying user id between the storage module, when correct identity is verified to first authentication unit, storage module with read the port switch -on, work as when wrong identity is verified to first authentication unit, storage module with read the port disconnection, storage module still is connected with the data deletion module that is used for deleting the storage module internal data, data deletions module with first authentication unit connection. Directly avoid the leakage of data, prevented that improper user from acquireing the data in the storage module through other means, further prevented the possibility that data leaked.
Description
Technical field
This utility model relates to computer memory technical field, particularly relates to a kind of computer memory system.
Background technology
Along with the progress of computer technology, computer, with its exclusive function and powerful ability to work, has become
For the necessary instrument of people's life and work.
In current computer system, there are following deficiency: information privacy is bad, management inconvenience.Especially
In public, computer is not easy to management, causes sensitive information leakage, especially shows letting out of hard disk resources
Leakage, the stealing of Internet resources, the use to computer causes strong influence.
For the problems referred to above, need a kind of safe and reliable computer memory system at present badly.
Utility model content
The purpose of this utility model is that for the problems referred to above present in current computer system, it is provided that one
Plant and be not only convenient for management, the most also there is the storage system of higher-security energy.
To achieve these goals, the technical solution adopted in the utility model is:
A kind of computer memory system, including memory module and the backup mould of backing up in realtime described memory module
Block, described memory module and backup module with between be connected and have ciphering unit, described memory module connect have for
What data write writes port and for reading the read port of interior data, at described read port with described
The first identity authenticating unit for verifying user identity it is provided with, when described first identity is tested between memory module
When card unit authenticates to correct identity, described memory module is connected with described read port, when described first identity
When authentication unit authenticates to mistake identity, described memory module disconnects with described read port, described memory module
Being also associated with the data deletion module for deleting memory module internal data, described data deletion module is with described
First identity authenticating unit connects.
In this application, memory module is used for storing data, and backs up data to, in backup module, work as user
When needing to read the data in memory module, it is necessary first to can be passed through by the first identity authenticating unit checking
Read port reads data, and when authentication is incorrect, user then cannot read the data in memory module,
So ensure that the safety that data store, meanwhile, the storage system of the application also includes data deletion module,
When the first identity authenticating unit authenticates to wrong data, data deletion module deletes the data in memory module,
Directly avoid the leakage of data, prevent improper user from obtaining the data in memory module by other means,
Further prevent the probability of data leak.
Preferably, it is connected between described data deletion module with described first identity authenticating unit and has counting module,
Described counting module is used for counting the continuous authentication error identity number of times of described first identity authenticating unit,
When the continuous authentication error identity number of times of the first identity authenticating unit reaches the set point number of counting module, described
Counting module controls described data deletion module and starts, and makes described data deletion module delete the inside of memory module
Data.
In this application, it is connected between data deletion module with the first identity authenticating unit and has counting module, the most just
Make, in the present embodiment, when the first identity authenticating unit authenticates to mistake identity, can't delete immediately
Data in memory module, give the wrong chance that user is certain, it is to avoid normal users causes because of operational error
In authentication mistake causes memory module, data are deleted.
Preferably, described first identity authenticating unit is also associated with alarm device, when described first authentication
When unit authenticates to mistake identity, described alarm activation also sends alarm.By arranging alarm device, enter
Raising the application of one step stores the safety of system.
Preferably, described alarm device includes buzzer and warning lamp.Further improve the peace of storage system
Quan Xing.
Preferably, described backup module is remote backup module, when there being data to write described memory module, and institute
State memory module by wireless network transmissions to backup module.
In this application, backup module is set to genuine backup module, i.e. when improper in memory module
When user obtains, the data in backup module can not be obtained, so, further improve data storage
Safety and reliability.
Preferably, the second body for verifying user identity it is also associated with between memory module and said write port
Part authentication unit, when described second identity authenticating unit authenticates to correct identity, described memory module is with described
Write port is connected, when described second identity authenticating unit authenticates to mistake identity, and described memory module and institute
State write port to disconnect.
By arranging the second identity authenticating unit, it is ensured that also user is carried out identity when memory module writes data
Checking, prevents improper user from virus or Rogue program being write in memory module, so, further carries
The high safety and reliability of storage system.
Preferably, described second identity authenticating unit is connected with described alarm device.
Preferably, described computer memory system also includes mobile terminal, and described mobile terminal is with described
Alarm device communication connects.
Owing to have employed technique scheme, the beneficial effects of the utility model are:
In this application, memory module is used for storing data, and backs up data to, in backup module, work as user
When needing to read the data in memory module, it is necessary first to can be passed through by the first identity authenticating unit checking
Read port reads data, and when authentication is incorrect, user then cannot read the data in memory module,
So ensure that the safety that data store, meanwhile, the storage system of the application also includes data deletion module,
When the first identity authenticating unit authenticates to wrong data, data deletion module deletes the data in memory module,
Directly avoid the leakage of data, prevent improper user from obtaining the data in memory module by other means,
Further prevent the probability of data leak.
Accompanying drawing explanation
Fig. 1 is structural representation of the present utility model,
In figure: 1, memory module;2, backup module;3, ciphering unit;4, write port;5, read
Port;6, the first identity authenticating unit;7, data deletion module;8, counting module;9, alarm device;
10, the second identity authenticating unit;11, mobile terminal.
Detailed description of the invention
For making the purpose of this utility model embodiment, technical scheme and advantage clearer, below in conjunction with this reality
With the accompanying drawing in new embodiment, the technical scheme in this utility model embodiment is clearly and completely retouched
State, it is clear that described embodiment is a part of embodiment of this utility model rather than whole embodiments,
Based on the embodiment in this utility model, those of ordinary skill in the art are not under making creative work premise
The every other embodiment obtained, broadly falls into the scope of this utility model protection.
Embodiment 1, as shown in Figure 1:
A kind of computer memory system, including memory module 1 and described memory module 1 is backed up in realtime standby
Part module 2, described memory module 1 and backup module 2 with between be connected and have ciphering unit 3, described storage mould
Block 1 connects to be had for the write port 4 of data write with for reading the read port 5 of interior data,
The first authentication for verifying user identity it is provided with between described read port 5 and described memory module 1
Unit 6, when described first identity authenticating unit 6 authenticates to correct identity, described memory module 1 is with described
Read port 5 is connected, when described first identity authenticating unit 6 authenticates to mistake identity, and described memory module
1 disconnects with described read port 5, and described memory module 1 is also associated with for deleting the internal number of memory module 1
According to data deletion module 7, described data deletion module 7 is connected with described first identity authenticating unit 6.
In the present embodiment, memory module 1 is used for storing data, and backs up data in backup module 2,
When user needs to read the data in memory module 1, it is necessary first to verified by the first identity authenticating unit 6
Can read data by read port 5, when authentication is incorrect, user then cannot read storage mould
Data in block 1, so ensure that the safety that data store, and meanwhile, the storage system of the present embodiment is also wrapped
Include data deletion module 7, when the first identity authenticating unit 6 authenticates to wrong data, data deletion module 7
Delete the data in memory module 1, directly avoid the leakage of data, prevent improper user by other handss
Section obtains the data in memory module 1, further prevents the probability of data leak.
Preferably, it is connected between described data deletion module 7 with described first identity authenticating unit 6 and has count module
Block 8, described counting module 8 is for the continuous authentication error identity number of times to described first identity authenticating unit 6
Count, when the continuous authentication error identity number of times of the first identity authenticating unit 6 reaches setting of counting module 8
When determining number of times, described counting module 8 controls described data deletion module 7 and starts, and makes described data deletion module
7 internal datas deleting memory module 1.
In the present embodiment, it is connected between data deletion module 7 with the first identity authenticating unit 6 and has counting module
8, also allow for, in the present embodiment, when the first identity authenticating unit 6 authenticates to mistake identity, not
The data in memory module 1 can be deleted immediately, give the wrong chance that user is certain, it is to avoid normal users is because of behaviour
Slip up and cause authentication mistake to cause data in memory module 1 to be deleted.
Preferably, described first identity authenticating unit 6 is also associated with alarm device 9, when described first identity
When authentication unit 6 authenticates to mistake identity, described alarm device 9 starts and sends alarm.By arranging warning
Device 9, further improves the application and stores the safety of system.
Preferably, described alarm device 9 includes buzzer and warning lamp.Further improve storage system
Safety.
Preferably, described backup module 2 is remote backup module 2, writes described memory module 1 when there being data
Time, described memory module 1 passes through wireless network transmissions to backup module 2.
In the present embodiment, backup module 2 is set to genuine backup module 2, i.e. when in memory module 1
When being obtained by improper user, the data in backup module 2 can not be obtained, so, further improve
The safety and reliability of data storage.
Preferably, be also associated with between memory module 1 and said write port 4 for verify user identity
Two identity authenticating unit 10, when described second identity authenticating unit 10 authenticates to correct identity, described storage
Module 1 is connected with said write port 4, when described second identity authenticating unit 10 authenticates to mistake identity,
Described memory module 1 disconnects with said write port 4.
By arranging the second identity authenticating unit 10, it is ensured that also user is entered when memory module 1 writes data
Row authentication, prevents improper user from virus or Rogue program being write in memory module 1, so, enters
The safety and reliability that improve storage system of one step.
Preferably, described second identity authenticating unit 10 is connected with described alarm device 9.
Preferably, described computer memory system also includes mobile terminal 11, described mobile terminal 11 and institute
State described alarm device 9 communication to connect.
The above, detailed description of the invention the most of the present utility model, but protection domain of the present utility model is not
Being confined to this, any those familiar with the art, can in the technical scope that this utility model discloses
Readily occur in change or replace, all should contain within protection domain of the present utility model.Therefore, this practicality is new
The protection domain of type should be as the criterion with scope of the claims.
Claims (8)
- null1. a computer memory system,Including memory module and backup module that described memory module is backed up in realtime,It is characterized in that: described memory module and backup module with between be connected and have ciphering unit,Described memory module connects to be had for the write port of data write with for reading the read port of interior data,The first identity authenticating unit for verifying user identity it is provided with between described read port and described memory module,When described first identity authenticating unit authenticates to correct identity,Described memory module is connected with described read port,When described first identity authenticating unit authenticates to mistake identity,Described memory module disconnects with described read port,Described memory module is also associated with the data deletion module for deleting memory module internal data,Described data deletion module is connected with described first identity authenticating unit.
- 2. computer memory system as claimed in claim 1, it is characterized in that: being connected between described data deletion module with described first identity authenticating unit has counting module, described counting module is for counting the continuous authentication error identity number of times of described first identity authenticating unit, when the continuous authentication error identity number of times of the first identity authenticating unit reaches the set point number of counting module, described counting module controls described data deletion module and starts, and makes described data deletion module delete the internal data of memory module.
- 3. computer memory system as claimed in claim 2, it is characterised in that: being also associated with alarm device in described first identity authenticating unit, when described first identity authenticating unit authenticates to mistake identity, described alarm activation also sends alarm.
- 4. computer memory system as claimed in claim 3, it is characterised in that: described alarm device includes buzzer and warning lamp.
- 5. computer memory system as claimed in claim 4, it is characterised in that: described backup module is remote backup module, and when there being data to write described memory module, described memory module passes through wireless network transmissions to backup module.
- 6. computer memory system as claimed in claim 5, it is characterized in that: between memory module and said write port, be also associated with the second identity authenticating unit for verifying user identity, when described second identity authenticating unit authenticates to correct identity, described memory module is connected with said write port, when described second identity authenticating unit authenticates to mistake identity, described memory module disconnects with said write port.
- 7. computer memory system as claimed in claim 6, it is characterised in that: described second identity authenticating unit is connected with described alarm device.
- 8. computer memory system as claimed in claim 7, it is characterised in that: described computer memory system also includes mobile terminal, and described mobile terminal is connected with described alarm device communication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620384405.4U CN205594622U (en) | 2016-04-28 | 2016-04-28 | Computer storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620384405.4U CN205594622U (en) | 2016-04-28 | 2016-04-28 | Computer storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205594622U true CN205594622U (en) | 2016-09-21 |
Family
ID=56933558
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620384405.4U Expired - Fee Related CN205594622U (en) | 2016-04-28 | 2016-04-28 | Computer storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205594622U (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529348A (en) * | 2016-10-31 | 2017-03-22 | 余必亚 | Computer storage system with double storage modules |
CN106548056A (en) * | 2016-10-31 | 2017-03-29 | 余必亚 | A kind of computer memory system |
CN106557685A (en) * | 2016-10-31 | 2017-04-05 | 黄建文 | A kind of computer information safe guard system |
CN106557686A (en) * | 2016-10-31 | 2017-04-05 | 余必亚 | A kind of computer memory system of duplicate protection |
CN106570374A (en) * | 2016-10-31 | 2017-04-19 | 余必亚 | Computer storage system with network monitoring function |
CN107767514A (en) * | 2017-10-26 | 2018-03-06 | 界首市鸿志物联科技有限公司 | Key of safety encryption matrix contact type electronic lock |
CN109246087A (en) * | 2018-08-17 | 2019-01-18 | 苏州格目软件技术有限公司 | A kind of information storage system based on network security |
-
2016
- 2016-04-28 CN CN201620384405.4U patent/CN205594622U/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529348A (en) * | 2016-10-31 | 2017-03-22 | 余必亚 | Computer storage system with double storage modules |
CN106548056A (en) * | 2016-10-31 | 2017-03-29 | 余必亚 | A kind of computer memory system |
CN106557685A (en) * | 2016-10-31 | 2017-04-05 | 黄建文 | A kind of computer information safe guard system |
CN106557686A (en) * | 2016-10-31 | 2017-04-05 | 余必亚 | A kind of computer memory system of duplicate protection |
CN106570374A (en) * | 2016-10-31 | 2017-04-19 | 余必亚 | Computer storage system with network monitoring function |
CN107767514A (en) * | 2017-10-26 | 2018-03-06 | 界首市鸿志物联科技有限公司 | Key of safety encryption matrix contact type electronic lock |
CN107767514B (en) * | 2017-10-26 | 2020-11-17 | 界首市鸿志物联科技有限公司 | Key of safety encryption matrix contact type electronic lock |
CN109246087A (en) * | 2018-08-17 | 2019-01-18 | 苏州格目软件技术有限公司 | A kind of information storage system based on network security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN205594622U (en) | Computer storage system | |
CN103516518B (en) | Safe verification method and device | |
US9292680B2 (en) | Mobile terminal detection method and mobile terminal | |
CN103065102B (en) | Data encryption mobile storage management method based on virtual disk | |
CN103559435B (en) | The debugging port controlling method and apparatus of terminal device | |
BR102014003873A2 (en) | application protection method and device | |
TW201328395A (en) | Apparatus for deleting data of mobile phone | |
CN102883047A (en) | Method and system for realizing data security of intelligent mobile terminals | |
CN106022181A (en) | System and method for preventing unauthorized use of IC card | |
CN103870759A (en) | NFC encryption method, NFC encryption system and terminal | |
CN102480726A (en) | Password protection method, password protection system and mobile terminal with same | |
CN102902633B (en) | Remote encryption system and remote encryption method for solid-state disk | |
CN110474081A (en) | A kind of lithium ion battery and its encryption method | |
CN108270798A (en) | A kind of mobile terminal device safety management system | |
CN205809895U (en) | A kind of clone's IC-card identification device | |
CN106211163B (en) | The method and apparatus of safe networking | |
CN102158823A (en) | Method and system for tracking stolen mobile terminal as well as mobile terminal | |
CN211506487U (en) | Cross-platform security audit device | |
CN112306410B (en) | Data processing method and device for electric energy meter, storage medium and electric energy meter | |
CN108055380A (en) | Double screen unlocking method, mobile terminal and storage medium | |
CN114157754A (en) | Lost mobile phone retrieving method, system and storage medium based on eSIM card | |
CN105549914A (en) | Mounting method and system of external storage equipment | |
CN101674581B (en) | Safe private network wireless access method and wireless terminal | |
CN105159847A (en) | Disk change record method based on trusted chip | |
CN103778073B (en) | Data guard method, device for mobile communication and memorizer memory devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160921 Termination date: 20170428 |
|
CF01 | Termination of patent right due to non-payment of annual fee |