CN210742940U - Computer information safety arrangement - Google Patents

Computer information safety arrangement Download PDF

Info

Publication number
CN210742940U
CN210742940U CN201922297659.9U CN201922297659U CN210742940U CN 210742940 U CN210742940 U CN 210742940U CN 201922297659 U CN201922297659 U CN 201922297659U CN 210742940 U CN210742940 U CN 210742940U
Authority
CN
China
Prior art keywords
host
host computer
protection
plate
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201922297659.9U
Other languages
Chinese (zh)
Inventor
李国安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INNER MONGOLIA ELECTRONIC INFORMATION VOCATIONAL TECHNICAL COLLEGE
Original Assignee
INNER MONGOLIA ELECTRONIC INFORMATION VOCATIONAL TECHNICAL COLLEGE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by INNER MONGOLIA ELECTRONIC INFORMATION VOCATIONAL TECHNICAL COLLEGE filed Critical INNER MONGOLIA ELECTRONIC INFORMATION VOCATIONAL TECHNICAL COLLEGE
Priority to CN201922297659.9U priority Critical patent/CN210742940U/en
Application granted granted Critical
Publication of CN210742940U publication Critical patent/CN210742940U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Casings For Electric Apparatus (AREA)

Abstract

The utility model discloses a computer information safety arrangement, include host computer, trick lock and set up the protection shield on the host computer, the place ahead downwarping of protection shield extends to host computer the place ahead, and the back of host computer is hugged closely at the protection shield rear, and the lower extreme of protection shield extends to the host computer lower extreme to hug closely the bottom surface of mainboard, the place ahead of protection shield is equipped with more than one bar mouth and round hole, and the crisscross setting of USB socket in bar mouth and host computer the place ahead, the round hole then with the crisscross setting of switch button in host computer the place ahead. The utility model discloses simple structure can effectually block USB socket and the switch button on the host computer through the protection shield for the inside file can't be stolen through USB socket to the outsider, can block the curb plate on the host computer simultaneously, has avoided the outsider to open the host computer, has increased the security, and this device is small simultaneously, does not influence the heat dissipation and the use of host computer.

Description

Computer information safety arrangement
Technical Field
The utility model relates to a computer technology field, concretely relates to computer information safety arrangement.
Background
The computer technology is very extensive, and can be roughly divided into several aspects of computer system technology, computer machine element technology, computer component technology and computer assembly technology. The computer technology comprises the following steps: the basic principle of the operation method, the design of an arithmetic unit, an instruction system, the design of a Central Processing Unit (CPU), the pipeline principle, the application of the basic principle in the CPU design, a storage system, a bus and input and output.
When the computer is used, encryption processing is needed to prevent data from being stolen, traditional multipurpose software of the computer is encrypted, a plurality of software encryption hackers can easily crack by software correspondingly, great inconvenience is brought to users, a host can only steal internal files through a USB (universal serial bus) socket generally, hardware encryption is to a great extent that software cannot crack, computer information encryption is convenient to achieve, and the existing equipment is inconvenient to protect and encrypt computer information.
Disclosure of Invention
The utility model aims to solve the technical problem that a computer information safety arrangement is provided to solve the problem of proposing among the above-mentioned background art.
The utility model discloses a realize through following technical scheme: a computer information safety protection device comprises a host, a coded lock and a protection plate arranged on the host, wherein the front part of the protection plate bends downwards and extends to the front part of the host, the rear part of the protection plate is tightly attached to the back surface of the host, the lower end of the protection plate extends to the lower end of the host and is tightly attached to the bottom surface of a mainboard, the lower end of the host is provided with a bottom plate with an L-shaped structure, the bottom surface of the protection plate is provided with more than one ball groove, balls are movably arranged in the ball grooves, one part of each ball extends to the outside along the opening of the ball groove and is abutted against the surface of the bottom plate, the front part of the protection plate is provided with more than one bar-shaped opening and round hole, the bar-shaped opening and the USB socket in front of the host are staggered, the round hole and the round hole are staggered with a switch key in front of the host, the lock hook of the coded lock penetrates through the two through holes to be locked and fixed.
As the preferred technical scheme, a protection frame with a U-shaped structure is arranged at one end of the protection plate facing the side plate of the host machine, and the protection frame is tightly attached to the outer wall surface of the host machine and blocks a gap between the host machine and the side plate.
As a preferred technical scheme, the rear part of the protection plate is provided with a notch opposite to the power supply port and the network cable port, the protection plate is provided with more than one air hole opposite to the heat dissipation port of the host, and the size of the air hole is smaller than that of the heat dissipation port.
As preferred technical scheme, be equipped with more than one spout along the square of width on the top surface of host computer, the protection shield is just all installed the slider to spout department, and the equal slidable mounting of slider one end is in the spout, and slider and spout all are the setting of dovetail structure.
The utility model has the advantages that: the utility model discloses simple structure can effectually block USB socket and the switch button on the host computer through the protection shield for the inside file can't be stolen through USB socket to the outsider, can block the curb plate on the host computer simultaneously, has avoided the outsider to open the host computer, has increased the security, and this device is small simultaneously, does not influence the heat dissipation and the use of host computer.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic view of the overall structure of the present invention;
fig. 2 is a left side view of the present invention;
fig. 3 is a right side view of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present invention, and should not be construed as limiting the present invention.
In the description of the present invention, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are merely for convenience of description and for simplicity of description, and do not indicate or imply that the device or element referred to must have a particular orientation, be constructed and operated in a particular orientation, and therefore, should not be construed as limiting the present invention.
In the description of the present invention, it should be noted that unless otherwise explicitly stated or limited, the terms "mounted," "connected" and "disposed" are to be construed broadly, and may for example be fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.
As shown in fig. 1, fig. 2 and fig. 3, the computer information safety protection device of the present invention comprises a host 1, a coded lock 7 and a protection plate 5 disposed on the host, wherein the front of the protection plate 5 bends downward to extend to the front of the host 1, the rear of the protection plate 5 is tightly attached to the back of the host 1, the lower end of the protection plate 5 extends to the lower end of the host 1 and is tightly attached to the bottom surface of the main board 1, the lower end of the host 1 is provided with a bottom board 9 having an "L" shaped structure, the bottom surface of the protection plate 5 is provided with more than one ball grooves, the ball grooves are movably provided with balls 10, a part of the balls 10 extend to the outside along the openings of the ball grooves and abut against the surface of the bottom board 9, the front of the protection plate 5 is provided with more than one bar-shaped opening 13 and a round hole 14, the bar-shaped opening 13 is disposed in a staggered manner, the rear of protection shield 5 and the one end of bottom plate 9 towards protection shield 5 rear all outwards bulge and form a fixed part 8, all are equipped with a through-hole on the fixed part 8, and the latch hook of trick lock 7 passes two through-holes locking fixed, and interference connection between latch hook and the through-hole.
In this embodiment, one end of the protection plate 5 facing the side plate of the host is provided with a protection frame 6 having a U-shaped structure, and the protection frame 6 is tightly attached to the outer wall surface of the host 1, and blocks a gap between the host 1 and the side plate 2, thereby avoiding opening the side plate.
In this embodiment, a gap 11 is formed at the rear of the protection board 5 opposite to the power supply port and the network cable port, more than one air hole 12 is formed at the heat dissipation port of the protection board 5 opposite to the host 1, the size of the air hole 12 is smaller than that of the heat dissipation port, and no other USB socket is arranged in the gap.
In this embodiment, be equipped with the spout more than along the square of width on the top surface of host computer 1, protection shield 5 just all installs slider 4 to spout department, and the equal slidable mounting of 4 one ends of slider has all been arranged in the spout, and slider 4 and spout all are the setting of dovetail structure, have avoided the slider to follow the spout roll-off, have increased the location to the protection shield, and the length of spout is greater than the length of slider for the slider can remove along the spout.
When the user does not use, as shown in fig. 1, the fixing portion is fixed through the coded lock, the strip-shaped port and the USB socket in front of the host are arranged in a staggered mode, the round hole and the switch key in front of the host are arranged in a staggered mode, so that the external person can not steal internal files through the USB socket, the computer is prevented from being started, meanwhile, the side plate can be effectively blocked through the blocking frame, and the side plate is prevented from being opened outside.
When using, take off the trick lock to promote the protection shield along the spout, until making the bar mouth set up with the USB socket in host computer the place ahead relatively, the round hole then sets up with the switch button in host computer the place ahead relatively, make mouse, keyboard, USB flash disk etc. can insert USB socket along the bar mouth in, also can press computer shift knob along the round hole, make the computer start, wherein, because power mouth and net twine mouth on the computer set up in the breach, make the protection shield can not influence the connection of power cord and net twine when removing.
Wherein, the heat inside the computer can be dissipated along the vent through the vent holes, and the operation of the host is not influenced.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that are not thought of through the creative work should be covered within the scope of the present invention. Therefore, the protection scope of the present invention should be subject to the protection scope defined by the claims.

Claims (4)

1. A computer information security protection device is characterized in that: comprises a host, a coded lock and a protective plate arranged on the host, wherein the front part of the protective plate bends downwards and extends to the front part of the host, the rear part of the protective plate is tightly attached to the back surface of the host, the lower end of the protective plate extends to the lower end of the host, and clings to the bottom surface of the main board, the lower end of the main machine is provided with a bottom plate with an L-shaped structure, the bottom surface of the protective plate is provided with more than one ball groove, balls are movably arranged in the ball grooves, one part of the ball extends to the outside along the opening of the ball groove, and offset with the surface of bottom plate, the place ahead of protection shield is equipped with more than one bar mouth and round hole, and the bar mouth sets up with the USB socket in host computer the place ahead is crisscross, and the round hole then sets up with the switch button in host computer the place ahead is crisscross, and the rear of protection shield and the one of bottom plate towards protection shield rear serve all outwards the protrusion form a fixed part, all are equipped with a through-hole on the fixed part, and the latch hook of trick lock passes two through-holes locking and fixes.
2. The computer information security protection apparatus of claim 1, wherein: one end of the protection plate facing the side plate of the host machine is provided with a protection frame with a U-shaped structure, the protection frame is tightly attached to the outer wall surface of the host machine, and a gap between the host machine and the side plate is blocked.
3. The computer information security protection apparatus of claim 1, wherein: the rear part of the protection plate is provided with a notch corresponding to the power supply port and the network cable port, the protection plate is provided with more than one air hole corresponding to the heat dissipation port of the host, and the size of the air hole is smaller than that of the heat dissipation port.
4. The computer information security protection apparatus of claim 1, wherein: the top surface of the main machine is provided with more than one sliding groove along the width square, the protective plate is provided with a sliding block at the position corresponding to the sliding groove, one end of the sliding block is slidably arranged in the sliding groove, and the sliding block and the sliding groove are both arranged in a dovetail structure.
CN201922297659.9U 2019-12-19 2019-12-19 Computer information safety arrangement Active CN210742940U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201922297659.9U CN210742940U (en) 2019-12-19 2019-12-19 Computer information safety arrangement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201922297659.9U CN210742940U (en) 2019-12-19 2019-12-19 Computer information safety arrangement

Publications (1)

Publication Number Publication Date
CN210742940U true CN210742940U (en) 2020-06-12

Family

ID=71005729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201922297659.9U Active CN210742940U (en) 2019-12-19 2019-12-19 Computer information safety arrangement

Country Status (1)

Country Link
CN (1) CN210742940U (en)

Similar Documents

Publication Publication Date Title
CN102138131B (en) The hardware firewall adapter of USB (universal serial bus)
US9391403B2 (en) USB port locking device
KR101391975B1 (en) An apparatus for locking usb port
KR101961922B1 (en) A cover module for locking network port and apparatus having the same
CN104581008A (en) Information security protection system and method for video monitoring system
US20210049310A1 (en) Method and apparatus for a modular digital chassis lock assembly in an information handling system
KR101883661B1 (en) An apparatus for locking usb port
CN210742940U (en) Computer information safety arrangement
CN103714272A (en) Encryption lock box
CN103745143B (en) Computer protection method
CN210955080U (en) Computer encryption device
CN101706855A (en) Usb key device
CN108874076A (en) A kind of computer cooling cabinet
CN210519299U (en) Heat dissipation formula optic fibre is server rack for engineering of registering one's residence
KR101554625B1 (en) Usb security system and security method
CN207427371U (en) One kind can be placed in fire wall within the walls
CN206212041U (en) A kind of network protection device by power supply for exchange
CN208722182U (en) A kind of computer information safe protective device
CN217655512U (en) Dustproof computer case
CN214413223U (en) Computer network safety control device
CN104360719A (en) Case cable locking device
CN215108095U (en) Novel intelligent lock structure
CN217936305U (en) Network security isolation device with protection mechanism
CN215006644U (en) All-in-one machine with protection function
CN220208262U (en) Storage device capable of guaranteeing data security

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant