CN213550386U - Computer information safety arrangement - Google Patents

Computer information safety arrangement Download PDF

Info

Publication number
CN213550386U
CN213550386U CN202020716080.1U CN202020716080U CN213550386U CN 213550386 U CN213550386 U CN 213550386U CN 202020716080 U CN202020716080 U CN 202020716080U CN 213550386 U CN213550386 U CN 213550386U
Authority
CN
China
Prior art keywords
plate
notebook computer
fixedly connected
inserting column
computer information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202020716080.1U
Other languages
Chinese (zh)
Inventor
周艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liaoning Shenglin Technology Co ltd
Original Assignee
Eastern Liaoning University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastern Liaoning University filed Critical Eastern Liaoning University
Priority to CN202020716080.1U priority Critical patent/CN213550386U/en
Application granted granted Critical
Publication of CN213550386U publication Critical patent/CN213550386U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Casings For Electric Apparatus (AREA)

Abstract

The utility model discloses a computer information safety protection device in the technical field of computer information protection, which comprises a sinking groove, a first inserting column, a locking plate and the like, wherein a notebook computer is placed in the sinking groove, the danger of information theft caused by the exposure of a data interface can be effectively prevented, meanwhile, the notebook computer is convenient to use in office, a second lock body is locked in second limit holes at different positions on a second inserting column according to requirements, the locking plate can be limited at different positions to be in a locking or opening state, the notebook computer can not be randomly changed in a keyless state, the design ensures that the notebook computer has stronger safety protection measures when being used by no person, when the notebook computer is placed in the sinking groove for use, the position of the first inserting column is limited through a first lock body, the other person is prevented from randomly rotating a hand, when the notebook computer needs to be taken out, the hand can be rotated, the movable rod is driven to move upwards, and the movable plate pushes the notebook computer out of the sinking groove along with the movable rod, so that the use is convenient.

Description

Computer information safety arrangement
Technical Field
The utility model relates to a computer information protection technical field, specific field is a computer information safety arrangement.
Background
The computer is composed of a hardware system and a software system, is one of the most great inventions in the 20 th century, has extremely important influence on the production activity and social activity of human beings, and develops rapidly with strong vitality. The application field of the computer system is expanded from the initial military scientific research application to various fields of society, a huge-scale computer industry is formed, the technology progress in the global range is driven, the deep social revolution is caused, and the computer is spread in schools, companies and families and becomes an essential tool in the information society. The application of computers is more and more common in China, the number of computer users in China is continuously increased, the application level is continuously improved, and particularly, in order to be convenient for carrying existing office computers, which are mostly notebooks, and the possibility that internal information is stolen exists due to the fact that a data interface is exposed when the notebook computer is used, the desk type computer information safety protection device is provided.
SUMMERY OF THE UTILITY MODEL
An object of the utility model is to provide a computer information safety arrangement to solve the problem of mentioning in the background art.
In order to achieve the above object, the utility model provides a following technical scheme: a computer information safety protection device comprises a table plate, wherein a supporting plate is symmetrically and fixedly connected to the lower end face of the table plate, a sunken groove is formed in the upper end face of the table plate, a movable plate is arranged on the bottom wall of the sunken groove, one end of a movable rod is rotatably connected to the movable plate, the movable rod penetrates through the table plate and is in threaded connection with the table plate, the other end of the movable rod is fixedly connected with a rotating handle, a first limiting hole is formed in the movable rod, a first inserting column penetrates through the first limiting hole, one end of the first inserting column is fixedly connected with a first limiting plate, a lock hole is formed in the other end of the first inserting column, a first lock body is arranged in the lock hole, a hidden groove is formed in one side of the sunken groove on the table plate, a locking plate is slidably connected to the inside of the hidden groove, and a spring is fixedly connected between the locking plate and the side wall of the hidden groove, the hidden groove is internally provided with a second inserting column in a penetrating mode, the second inserting column is located at one end, outside the table plate, of the second fixedly connected with second limiting plate, the second inserting column is provided with two second limiting holes, and one of the second limiting holes is internally provided with a second lock body.
Preferably, the lock plate is provided with a hand hole.
Preferably, the number of the springs is 2.
Preferably, the two ends of the spring are fixedly connected with connecting plates, and the two connecting plates are respectively and fixedly connected with the locking plate and the side wall of the hidden groove.
Preferably, the second plunger is located between the two springs.
Preferably, the first lock body and the second lock body are both padlocks.
Compared with the prior art, the beneficial effects of the utility model are that: a computer information safety protection device can effectively prevent the danger of information theft caused by the exposure of a data interface by placing a notebook computer in a sink groove, is convenient to use in office, the second lock body is locked in the second limiting holes at different positions on the second inserting column according to requirements, the lock plate can be limited at different positions to be in a locking or unlocking state, and the lock plate can not be changed randomly in a keyless state, so that the notebook computer has stronger safety protection measures when being used by no people, when the notebook computer is used in the sink groove, the position of the first inserting column is limited by the first lock body, so that other people can be prevented from rotating the rotating hand at will, the movable rod can be driven to move upwards by rotating the rotating hand, and the movable plate pushes the notebook computer out of the sinking groove along with the movable rod, so that the notebook computer is convenient to use.
Drawings
FIG. 1 is a sectional view of the main structure of the present invention;
FIG. 2 is an enlarged schematic view of the present invention at A in FIG. 1;
FIG. 3 is a top sectional view of the notebook with the lock plate locked;
fig. 4 is a top sectional view of the lock plate of the present invention in an open state;
fig. 5 is a top view of the present invention;
fig. 6 is a side view of a second post of the present invention.
In the figure: 1-a table plate, 2-a supporting plate, 3-a sinking groove, 4-a moving plate, 5-a moving rod, 6-a turning hand, 7-a hand hole, 8-a first inserting column, 9-a first limiting plate, 10-a first lock body, 11-a hidden groove, 12-a locking plate, 13-a spring, 14-a second inserting column, 15-a second limiting plate, 16-a second limiting hole, 17-a second lock body and 18-a connecting plate.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. Based on the embodiments in the present invention, all other embodiments obtained by a person skilled in the art without creative work belong to the protection scope of the present invention.
The description of the directions (up, down, left, right, front, and back) is made with reference to the structure shown in fig. 1 of the drawings attached to the specification, but the practical direction of the present invention is not limited thereto.
Example (b):
referring to fig. 1-6, the present invention provides a technical solution: referring to fig. 1, a computer information safety protection device comprises a table board 1, wherein a supporting plate 2 is symmetrically and fixedly connected to the lower end surface of the table board 1, a sunken groove 3 is formed in the upper end surface of the table board 1, the sunken groove 3 is used for placing a notebook computer, a wire hole is formed in the table board 1 and used for allowing an adaptation wire of the notebook computer to pass through, the notebook computer is placed in the sunken groove 3, the danger of information theft caused by exposure of a data interface can be effectively prevented, meanwhile, the notebook computer is convenient to use in offices, please refer to fig. 2, a movable plate 4 is arranged on the bottom wall of the sunken groove 3, one end of a movable rod 5 is rotatably connected to the movable plate 4, the movable rod 5 penetrates through the table board 1 and is in threaded connection with the table board 1, a rotating handle 6 is fixedly connected to the other end of the movable rod 5, and when the notebook computer needs to be taken out, the rotating arm 6 can be rotated to drive the moving rod 5 to move upwards, the moving plate 4 pushes the notebook computer out of the sunken groove 3, the moving rod 5 is provided with a first limiting hole 7, a first inserting column 8 penetrates through the first limiting hole 7, one end of the first inserting column 8 is fixedly connected with a first limiting plate 9, the other end of the first inserting column 8 is provided with a lock hole, a first lock body 10 is arranged in the lock hole, when the notebook computer is positioned in the sunken groove for use, the position of the first inserting column 8 is limited by the first lock body 10 to prevent other people from rotating the rotating arm 6 at will, please refer to fig. 3-5, a hidden groove 11 is arranged on one side of the table plate 1, which is positioned in the sunken groove 3, a lock plate 12 is connected inside the hidden groove 11 in a sliding manner, and a spring 13 is fixedly connected between the lock plate 12 and the side wall of the hidden groove 11, a second inserting column 14 penetrates through the inner hidden groove 11, a second limiting plate 15 is fixedly connected to one end, located outside the table plate 1, of the second inserting column 14, please refer to fig. 6, two second limiting holes 16 are formed in the second inserting column 14, a second lock body 17 is arranged in one of the second limiting holes 16, under the elastic force of the spring 13, the lock plate 12 is in a locking state under a normal state, that is, the lock plate 12 is blocked at the upper side of the notebook computer, so that the notebook computer screen cannot be opened randomly in a key-free state in the locking state, and the second lock body 17 is locked in the second limiting holes 16 at different positions on the second inserting column 14 according to requirements, so that the lock plate 12 can be limited at different positions to be in a locking or unlocking state, and cannot be changed randomly in the key-free state.
Referring to fig. 3, in detail, the locking plate 12 is provided with a hand hole 7. The hand hole 7 is provided to facilitate the movement of the locking plate 12.
Referring to fig. 3, specifically, the number of the springs 13 is 2. Under the elastic force of the spring 13, the lock plate 12 is in a locked state in a normal state, that is, the lock plate 12 is blocked at the upper side of the notebook computer, so that the notebook computer screen cannot be randomly opened in a keyless state in the locked state.
Referring to fig. 3, specifically, two ends of the spring 13 are fixedly connected with connecting plates 18, and the two connecting plates 18 are respectively and fixedly connected with the locking plate 12 and the side wall of the blind groove 11. The connection of the spring 13 is facilitated by the provision of the connecting plate 18.
Referring to fig. 3, specifically, the second plug 14 is located between the two springs 13. By locking the second lock body 17 in the second position-limiting hole 16 at different positions on the second plug post 14, the lock plate 12 can be limited at different positions, so that the lock plate is in a locked or unlocked state and cannot be changed freely in a keyless state.
Referring to fig. 2, specifically, the first lock body 10 and the second lock body 17 are all padlocks.
The working principle is as follows: the sink groove 3 is used for placing a notebook computer, the table board 1 is provided with a line hole for the adaptive line of the notebook computer to pass through, the notebook computer is placed in the sink groove 3, can effectively prevent the danger of information theft caused by the exposure of the data interface, is convenient for office use, the second lock body 17 is locked in the second limiting hole 16 at different positions on the second plug post 14 according to requirements, the lock plate 12 can be limited to different positions to be in a locking or unlocking state, and can not be changed freely without a key, when the notebook computer is positioned in the sinking groove for use, the position of the first inserting column 8 is limited by the first lock body 10, so that other people are prevented from rotating the rotating hand 6 at will, when the notebook computer needs to be taken out, the moving rod 5 can be driven to move upwards by rotating the rotating hand 6, and the moving plate 4 pushes the notebook computer out of the sinking groove 3 along with the moving rod.
In the description of the present invention, unless expressly stated or limited otherwise, the terms "disposed," "mounted," "connected," and "fixed" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral part; can be mechanically or electrically connected; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The utility model discloses the standard parts that use all can purchase from the market, and dysmorphism piece all can be customized according to the record of description and attached drawing.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. The utility model provides a computer information safety arrangement, includes table (1), the lower terminal surface symmetry fixedly connected with backup pad (2) of table (1), its characterized in that: a sunken groove (3) is formed in the upper end face of the table plate (1), a movable plate (4) is arranged on the bottom wall of the sunken groove (3), one end of a movable rod (5) is connected to the movable plate (4) in a rotating manner, the movable rod (5) penetrates through the table plate (1) and is in threaded connection with the table plate (1), a rotating handle (6) is fixedly connected to the other end of the movable rod (5), a first limiting hole is formed in the movable rod (5), a first inserting column (8) is arranged in the first limiting hole in a penetrating manner, a first limiting plate (9) is fixedly connected to one end of the first inserting column (8), a locking hole is formed in the other end of the first inserting column (8), a first lock hole (10) is formed in the table plate (1), a hidden groove (11) is formed in one side, located on the sunken groove (3), and a lock plate (12) is connected to the inside of the hidden groove (11) in a sliding manner, the lock plate (12) with fixedly connected with spring (13) between the lateral wall of camera obscura (11), it inserts post (14) to run through to be provided with the second in camera obscura (11), post (14) are located are inserted to the second the outside one end fixedly connected with second limiting plate (15) of table (1), the second is inserted and is provided with two spacing holes of second (16) on post (14), one of them be provided with second lock body (17) in the spacing hole of second (16).
2. The computer information security protection apparatus of claim 1, wherein: the locking plate (12) is provided with a hand hole (7).
3. The computer information security protection apparatus of claim 1, wherein: the number of the springs (13) is 2.
4. A computer information security protection apparatus according to claim 3, wherein: the two ends of the spring (13) are fixedly connected with connecting plates (18), and the two connecting plates (18) are respectively fixedly connected with the locking plate (12) and the side wall of the hidden groove (11).
5. A computer information security protection apparatus according to claim 3, wherein: the second plug column (14) is located between the two springs (13).
6. The computer information security protection apparatus of claim 1, wherein: the first lock body (10) and the second lock body (17) are padlocks.
CN202020716080.1U 2020-05-06 2020-05-06 Computer information safety arrangement Active CN213550386U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202020716080.1U CN213550386U (en) 2020-05-06 2020-05-06 Computer information safety arrangement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202020716080.1U CN213550386U (en) 2020-05-06 2020-05-06 Computer information safety arrangement

Publications (1)

Publication Number Publication Date
CN213550386U true CN213550386U (en) 2021-06-29

Family

ID=76521176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202020716080.1U Active CN213550386U (en) 2020-05-06 2020-05-06 Computer information safety arrangement

Country Status (1)

Country Link
CN (1) CN213550386U (en)

Similar Documents

Publication Publication Date Title
US8274788B2 (en) Locking mechanism and portable computer utilizing the same
CN213550386U (en) Computer information safety arrangement
CN206238809U (en) A kind of file cabinet of business management politics of the firm
CN216053043U (en) Computer network information safety device
CN211573107U (en) Safe with liftable inner part
CN201401063Y (en) Dual unlock interface anti-theft device
CN212359472U (en) Safe case
CN211229993U (en) Special safe of financial accounting
CN208534237U (en) A kind of security anti-theft lock
CN204299326U (en) A kind of computer host safety locking device
CN207750706U (en) A kind of portable notebook computer stand with anti-theft feature
CN110939352A (en) Safe with liftable interior and using method thereof
CN215873727U (en) Intelligent anti-loss and anti-theft computer bag
CN213742792U (en) Anti-theft lock sleeve
CN212507901U (en) Safe with hidden lattice and double-insurance function
CN212484364U (en) Computer information security management device
CN205046997U (en) Notebook pickproof lock device
CN220569172U (en) Anti-theft lock structure of case
CN216885914U (en) Intelligent seal integrated with electronic seal
CN213487716U (en) Bookshelf for office
CN214035387U (en) Anti-theft door lock
JP3168275U (en) Computer lock
CN210828727U (en) U-shaped fingerprint lock
CN216561610U (en) Computer network system with data shielding function
CN213545268U (en) Mobile phone with fingerprint key anti-theft function

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240521

Address after: No. 9 Tawan Street, Huanggu District, Shenyang City, Liaoning Province 110000 (No. 9 Tawan Street), Building (F1), 23rd Floor (V109)

Patentee after: Liaoning Shenglin Technology Co.,Ltd.

Country or region after: China

Address before: 118300 No.325 Wenhua Road, Yuanbao District, Dandong City, Liaoning Province

Patentee before: EASTERN LIAONING University

Country or region before: China