CN215932547U - Encryption computer - Google Patents

Encryption computer Download PDF

Info

Publication number
CN215932547U
CN215932547U CN202122401785.1U CN202122401785U CN215932547U CN 215932547 U CN215932547 U CN 215932547U CN 202122401785 U CN202122401785 U CN 202122401785U CN 215932547 U CN215932547 U CN 215932547U
Authority
CN
China
Prior art keywords
circuit
power supply
computer
wireless
relay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202122401785.1U
Other languages
Chinese (zh)
Inventor
马磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202122401785.1U priority Critical patent/CN215932547U/en
Application granted granted Critical
Publication of CN215932547U publication Critical patent/CN215932547U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Power Sources (AREA)

Abstract

An encryption computer comprises a computer body, a voltage-stabilized power supply, a password mechanism, a wireless receiving mechanism, a wireless control mechanism and a prompt circuit; the password mechanism comprises a plurality of power switches and a trigger sub-circuit, and the password mechanism, the wireless receiving mechanism and the prompt circuit are installed in the case of the computer body and are electrically connected with the main power input end of the computer body. The user of the utility model can conveniently and dynamically set the starting-up password in a wireless non-contact way, prevent other people from knowing that the starting-up with the fixed password cannot play a role of confidentiality, and can also push a short message to the owner when someone illegally starts up, so that the owner can timely master the field situation and take measures, thereby overcoming the limitation of the existing computer structure, preventing other people from illegally tampering or stealing related data and information only from the aspect of software, and being incapable of preventing the computer mainboard and the power supply module from being electrified, and having the defect that other people destroy the computer probability through a reinstallation system or a formatted hard disk. Based on the above, this is novel has good application prospect.

Description

Encryption computer
Technical Field
The utility model relates to the technical field of computer equipment, in particular to an encryption computer.
Background
Computers are an extremely widely used device. When the computer is applied to a specific place (such as an office area, a security department and the like), in order to prevent other people from illegally starting to know information in the computer or falsify stored documents, data and the like, a starting password is generally set on a software layer (correct password numbers are input on a display interface after starting, and then the system is started, a user can normally use the computer, and illegal starting personnel cannot normally use the computer because the starting password is not known), although the computer prevents unauthorized personnel from opening system application to a certain extent and plays a certain security effect, the computer power supply module, a mainboard and the like cannot be prevented from being electrified to work, namely, the software system cannot be damaged after other people illegally start; for example, after the computer is powered on, other personnel use an optical drive or other means to reinstall the operating system and format the hard disk, which results in the loss of computer data and irreparable loss to the owner. In summary, it is necessary to provide a computer that can prevent unauthorized persons from turning on power supplies such as a power supply module and a motherboard of the computer and has a better security effect.
SUMMERY OF THE UTILITY MODEL
In order to overcome the defects that the prior computer can only prevent other people from illegally tampering or stealing related data and information from the aspect of software due to the structural limitation, and can not prevent the power-on of a computer mainboard, a power supply module and the like, and the probability that other people damage the computer through a reinstallation system or a formatted hard disk exists, the utility model provides a computer, under the combined action of a related mechanism and a circuit, a computer owner can conveniently and dynamically set a power-on password in a non-contact wireless mode, in practical application, when the computer owner presses a corresponding key, the power supply input end of the computer body can be normally powered on, further the computer owner can be normally powered on for use, other people do not know the power-on password, the computer body cannot be normally started, when any non-corresponding key is pressed, the computer body cannot be subsequently started, and a prompt circuit can automatically push a short message for other people to illegally use the computer body for a mobile phone of the computer owner, the host can master the site situation in time and take corresponding measures.
The technical scheme adopted by the utility model for solving the technical problems is as follows:
an encryption computer comprises a computer body and a stabilized voltage power supply, and is characterized by also comprising a password mechanism, a wireless receiving mechanism, a wireless control mechanism and a prompting circuit; the password mechanism comprises a plurality of power switches and a trigger sub-circuit, the password mechanism, the wireless receiving mechanism and the prompting circuit are installed in a case of the computer body, and a power output end of the stabilized voltage power supply is electrically connected with power input ends of the password mechanism, the wireless receiving mechanism and the prompting circuit; the signal output end of the password mechanism is electrically connected with the signal input end of the wireless receiving mechanism, the two control signal output ends of the wireless receiving mechanism are respectively electrically connected with the two signal input ends of the trigger sub-circuit, and the trigger signal output end of the trigger sub-circuit is electrically connected with the signal input end of the prompt circuit; and the control power supply output end of the trigger sub-circuit is electrically connected with the main power supply input end of the computer body.
Further, the trigger sub-circuit of the cipher mechanism comprises a thyristor, a resistor and a relay which are electrically connected, and is electrically connected with a plurality of power switches, one ends of the power switches are connected with the anode of the thyristor, the cathode of the thyristor is connected with the anode power input end of the first relay, the control electrode of the thyristor is connected with one end of the resistor, the cathode power input end of the first relay is connected with the cathode power input end of the second relay, and two normally closed contact ends of the first relay and two input ends of the control power of the second relay are respectively connected.
Furthermore, the wireless receiving mechanism comprises a wireless receiving circuit module, resistors, NPN triodes and relays which are electrically connected, positive power supply input ends of the two sets of wireless receiving circuit modules are connected with positive power supply input ends of the eight relays, four power supply output ends of the two sets of wireless receiving circuit modules are respectively connected with one ends of the eight resistors, the other ends of the eight resistors are respectively connected with bases of the eight NPN triodes, and collectors of the eight NPN triodes are respectively connected with negative power supply input ends of the eight relays.
Furthermore, the wireless control mechanism comprises two sets of wireless transmitting circuit modules, and two ends of the power supply input of the two sets of wireless transmitting circuit modules are respectively connected together.
Furthermore, the prompting circuit comprises a resistor, an NPN triode, a relay and a short message module which are electrically connected, wherein one end of the resistor is connected with the base electrode of the NPN triode, the collector electrode of the NPN triode is connected with one signal input end of the short message module, and the negative power supply input end of the short message module is connected with the emitting electrode of the NPN triode.
The utility model has the beneficial effects that: when the computer is used, a user can conveniently set a starting password in a wireless non-contact mode according to needs, and the situation that other people cannot keep secret when the computer is started by knowing a fixed password is prevented. In the utility model, if other irrelevant personnel press any power switch except the power switch because the power-on password is unknown, the trigger sub-circuit is caused to cut off the input power supply, so that the computer body can not be started, and the prompting circuit can push a short message with illegal power-on of other people to the mobile phone of the owner in real time, so that the owner can timely master the field condition and take corresponding measures (such as timely arriving at the field or informing nearby operators on duty to view the condition on the field). The utility model prevents the defects that the prior computer can only prevent other people from illegally tampering or stealing related data and information from the aspect of software due to the structural limitation, can not prevent the power-on of a computer mainboard, a power supply module and the like, and has the probability that other people damage the computer by reinstalling a system or formatting a hard disk. Based on the above, the utility model has good application prospect.
Drawings
The utility model is further illustrated with reference to the following figures and examples.
FIG. 1 is a schematic diagram of the present invention.
Fig. 2 is a circuit diagram of the present invention.
Detailed Description
As shown in fig. 1 and 2, an encryption computer comprises a computer body 1, a regulated power supply U1, a password mechanism, a wireless receiving mechanism 2, a wireless control mechanism and a prompting circuit 3; the cipher mechanism comprises eight normally-open power switches S1, S2, S3, S4, S5, S6, S7, S8 and a trigger sub circuit 4, the cipher mechanism, the wireless receiving mechanism 2 and the prompting circuit 3 are installed on a circuit board in a power box 5, the element box 5 is installed at the front upper end in a case of the computer body 1, and the buttons of the eight power switches S1, S2, S3, S4, S5, S6, S7 and S8 are transversely located at the front outer portion of the upper end of the case respectively.
As shown in fig. 1 and 2, the regulated power supply U1 is a 220V/12V ac to 12V dc switching power supply module, and outputs 50W of power.
The trigger sub-circuit of the cipher mechanism comprises a silicon controlled rectifier VS, a resistor R1, relays K and K9 which are connected through circuit board wiring, and is connected with eight power switches S1, S2, S3, S4, S5, S6, S7 and S8 through circuit board wiring, one ends of the eight power switches S1, S2, S3, S4, S5, S6, S7 and S8 are connected with a silicon controlled rectifier VS anode, a silicon controlled rectifier VS control electrode is connected with one end of a resistor R1, a silicon controlled rectifier VS cathode is connected with a positive power input end of a first relay K, a negative power input end of the first relay K is connected with a negative power input end of a second relay K9, and two normally closed contact ends of the first relay K are respectively connected with two control power input ends of the second relay K9. The wireless receiving mechanism comprises wireless receiving circuit modules U2 and U3 connected with a model TX315B1 through circuit board wiring, resistors R2, NPN triodes Q2, relay K2, coding circuits are arranged in the wireless receiving circuit modules U2 and U2, wireless receiving signals of the same model can be prevented from interfering with each other through coding circuits, two sets of wireless receiving circuit modules U2, U2 power supply input ends 1 pin and eight relays K2, R365 and R365, R2, R366, R2, R366, R2, R72, R2, K366 and K2, R72, R366, R2, R72, R2, R72, R2, R72, R2, K366, R72, K2, R72, K2, R72, K2, R72, K2, R72, K2, R72, K2, R72, K2, R72, K2, R72, One end of R9 is respectively connected, the other ends of eight resistors R2, R3, R4, R5, R6, R7, R8 and R9 are respectively connected with bases of eight NPN triodes Q1, Q2, Q3, Q4, Q5, Q6, Q7 and Q8, collectors of eight NPN triodes Q1, Q2, Q3, Q4, Q5, Q6, Q7 and Q8 are respectively connected with negative power input ends of eight relays K1, K2, K3, K4, K5, K6, K7 and K8, and codes of coding circuits in the two sets of wireless receiving circuit modules U2 and U3 are inconsistent.
As shown in fig. 1 and 2, the wireless control mechanism is two sets of wireless transmitting circuit modules U5 and U6 of model TX315B1, each set of wireless transmitting circuit module has four wireless signal transmitting keys D1, D2, D3 and D4, and can respectively transmit four different wireless signals when being pressed down, the wireless transmitting circuit modules U5 and U6 have coding circuits inside, and can prevent the wireless transmitting circuit modules of the same model from transmitting wireless signals to interfere with each other through coding of the coding circuits, the coding circuit codes of the two sets of wireless transmitting circuit modules U5 and U6 are respectively consistent with the coding circuit codes of the two sets of wireless receiving circuit modules U2 and U3, the two sets of wireless transmitting circuit modules U5 and U6 are installed in a housing, the eight transmitting keys of the two sets of wireless transmitting circuit modules are located outside eight openings at the upper end of the housing, the power input ends of the two sets of wireless transmitting circuit modules U5 and U6 are respectively connected with the two poles of a special-purpose battery for 12V wireless transmitting circuit installed in the housing through wires, the wireless control mechanism is carried by a person or placed in a confidential area. The prompting circuit comprises a resistor R10, an NPN triode Q9 and a short message module U4 which are connected through circuit board wiring, one end of the resistor R10 is connected with the base electrode of the NPN triode Q9, the collector electrode of the NPN triode Q9 is connected with the pin 3 of one signal input end of the short message module U4, and the pin 2 of the negative power supply input end of the short message module U4 is connected with the emitter electrode of the NPN triode Q9.
As shown in fig. 1 and 2, pins 1 and 2 of the power input terminal of the regulated power supply U1, the relay K control power input terminal of the trigger sub circuit, and two poles (where the leads connected to the main board and the power module in the case are disconnected) of the 220V power socket in the case are respectively connected by leads, pins 3 and 4 of the power output terminal of the regulated power supply U1, the silicon controlled rectifier VS anode of the power input terminal of the cipher mechanism, the power input terminal of the relay K1, the positive power input terminal of the wireless receiving mechanism, the emitter of the NPN triode Q1, and pins 1 and 2 of the power input terminal short message module U4 of the prompt circuit are respectively connected by leads. The other ends of the signal output end power switches S1, S2, S3, S4, S5, S6, S7 and S8 of the cipher mechanism are respectively connected with the control power input ends of the signal input end relays K1, K2, K3, K4, K5, K6, K7 and K8 of the wireless receiving mechanism through leads. Normally open contact ends of relays K1, K2, K3, K4, K5, K6, K7 and K8 of the wireless receiving mechanism are connected with a power supply input end of the positive electrode of the relay K9, and normally closed contact ends of relays K1, K2, K3, K4, K5, K6, K7 and K8 are connected with the other end of a resistor R1. The trigger signal output end of the cipher mechanism is connected with the silicon controlled rectifier VS cathode and the other end of the signal input end resistor R10 of the prompting circuit through a lead; two normally open contact ends of a control power supply output end relay K9 of the trigger sub circuit are connected with a main power supply input end CZ of the computer body through a lead.
As shown in fig. 1 and 2, other using methods, processes, and functions of the computer body of the present invention are completely consistent with those of the existing computer, and are not described in detail in this embodiment. After the 220V alternating current power supply enters the power supply input end of the stabilized power supply U1, the stabilized power supply U1 outputs stable direct current 12V power supply under the action of an internal circuit of the stabilized power supply U1, the stable direct current 12V power supply enters the power supply input ends of the password mechanism, the wireless receiving mechanism and the prompting circuit, and the circuits and the mechanisms are in a power-on working state. In the utility model, the relay K9 is in a power-off state in an initial state, the control power supply input end and the normally open contact end are in open circuit, so that the main power supply input end of the computer body is powered off, other irrelevant personnel press the power-on key of the computer body, and the computer body cannot be started because the computer body is not powered on, namely, a reinstallation system is not installed or a hard disk is damaged in a formatting mode. Before the wireless remote control device is used, a machine owner can set a starting password in a dynamic wireless non-contact mode through the wireless remote control boards U5 and U6 (for example, one starting password is set every other week), after the machine owner presses a first wireless signal transmission key D1 of the wireless remote control board U5 or U6 (or a second wireless signal transmission key D2, a third wireless signal transmission key D3 and a fourth wireless signal transmission key D4 of the wireless remote control board U5 or U6) respectively (or one transmission key is pressed once in password setting), the wireless remote control board U5 or U6 can transmit a first path of wireless closing signals (or a second path, a third path and a fourth path of wireless closing signals). After the wireless receiving circuit module U2 or U3 receives the first path of wireless closing signal (or the second path, the third path, and the fourth path of wireless closing signal), the 4-pin (or the 5, 6, and 7-pins) of the wireless receiving circuit module U2 or U3 outputs a high level, and the high level is subjected to voltage reduction and current limitation by the resistor R2 (or the R3, the R4, the R5, the R6, the R7, the R8, and the R9) to enter the base of the NPN triode Q9 (or the Q9, and the Q9), so that the NPN triode Q9 (or the Q9, the K9, the negative pole of the power supply, the normally-closed or open-switch-contact, the power supply control terminal, the normally-closed control terminal, the power-open-switch terminal, the power-switch terminal and the power-switch control terminal 9. When the computer host presses the first wireless signal emitting key D1 of the wireless remote control board U5 or U6 again (or the second wireless signal emitting key D2, the third wireless signal emitting key D3, and the fourth wireless signal emitting key D4 of the wireless remote control board U5 or U6), the wireless remote control board U5 or U6 emits the first wireless open circuit signal (or the second wireless open circuit signal, the third wireless open circuit signal, and the fourth wireless open circuit signal). After the wireless receiving circuit module U2 or U3 receives the first path of wireless open-circuit signal (or the second path, the third path, and the fourth path of wireless open-circuit signal), the pin 4 (or pins 5, 6, and 7) of the wireless receiving circuit module U2 or U3 stops outputting high level through the resistor R2 (or pins R3, R4, R5, R6, R7, R8, and R9) to the base of the NPN transistor Q1 (or the transistor Q2, Q3, Q4, Q5, Q6, Q7, and Q8), so that the NPN transistor Q1 (or the transistor Q2, Q3, Q4, Q5, Q6, Q7, and Q8) is turned off, and further the K1 (or the input terminals K2, K3, K4, K5, K6, K7, and K8) is no longer powered on, and the normally-open-closed input terminals and the normally-open-closed contacts are controlled.
As shown in the figures 1 and 2, when a user controls a relay K (or K, K) to be powered on through a wireless remote control panel U and U, if the relay K (or K, K) is powered on and attracted, the owner knows a password formed by the relay K (or K, K) and needs to open a computer body to start up, presses down a first power switch S (or S, S) and enters the input end of a control power supply and the normally open contact end of the relay K (or K, K) at the moment, the positive pole of a 12V power supply enters the input end of the positive power supply of the relay K through the input end of the control power supply and the normally open contact end of the relay K (or K, K) at the moment, then the relay K9 gets the electricity to attract the control power input end and the normally open contact end to be closed, thus the 220V power can enter the power input end CZ of the computer body through the relay K9 control power input end and the normally open contact end, the main power input end CZ of the computer body gets the electricity, after the computer owner presses the power-on key of the computer body, the computer body 1 can be started, and the follow-up computer owner can normally use the computer body. In practical situations, when the owner of the computer is powered by the wireless remote control panel U5, U6 to control the relay K1 (or K2, K3, K4, K5, K6, K7, K8) to form a password, other non-permitted persons press any other power switch except the first power switch S1 (or S2, S3, S4, S5, S6, S7, S8) without knowing the password, which will cause the positive pole of the 12V power supply to control the power input end and the normally closed contact end through the relay K1 (or K2, K3, K4, K5, K6, K7, K8), trigger the conduction through the resistor R1, electrically pull the control power input end and the normally closed contact end of the relay K, so that the 220V power supply enters the K9 control power supply relay, that is not to enter the K9 control the power supply input end, that is not pressed, that is, even if the non-permitted persons press any other power switches (S72, S9) or any other current limiting switch S9, after the relay K1 (or K2, K3, K4, K5, K6, K7 and K8) is electrified to attract the control power supply input end and the normally open contact end of the relay K1 to be closed, because the 220V alternating current power supply does not enter the control power supply input end of the relay K9 at the moment, the main power supply input end of the computer body cannot be electrified, other non-permitted personnel cannot start the computer body by pressing a switch key of the computer body, and the good confidentiality purpose is achieved. Through the above, the user can conveniently set the starting password at intervals in a wireless non-contact mode dynamically according to needs, and the situation that the starting cannot play a secret role when other people know the fixed password is avoided (the password switch is set at intervals to prevent the user from always using one password, and other people can open the computer body 1 after knowing the password switch). In the utility model, if any power switch except the power switch (such as power switches S1 or S2, S3, S4, S5, S6, S7 and S8) is pressed down because other unrelated persons do not know the power-on password, the trigger sub-circuit can be triggered to disconnect the input 220V power supply, and the computer body can not be powered on.
As shown in fig. 1 and 2, after the power supply of the prompting circuit works, as long as other non-permitted persons press the power switch by mistake, after the thyristor VS is turned on (when the power switch is pressed correctly, the thyristor VS cannot be turned on), the high level can be reduced by the resistor R10 to limit the current and enter the base of the NPN triode Q9, the NPN triode Q9 turns on the collector to output the low level and enter the first trigger signal input end 3 of the short message module U4, so that the short message module U4 sends out a pre-stored short message under the action of its internal circuit, and after receiving the short message, the mobile phone of the owner connected with the short message module can know that someone is not permitted to start up at the first time, and the owner can timely master the field condition and take corresponding measures (for example, timely arrive at the field or inform the nearby person on duty to view the situation). The utility model prevents the defects that the prior computer can only prevent other people from illegally tampering or stealing related data and information from the aspect of software due to the structural limitation, can not prevent the power-on of a computer mainboard, a power supply module and the like, and has the probability that other people damage the computer by reinstalling a system or formatting a hard disk. It should be noted that the number of sets of wireless transmitting circuit modules adopted in the present invention is not two fixed sets, the number of wireless receiving circuit modules is not two fixed sets, the number of resistors, NPN triodes, and relays of the wireless receiving mechanism is also not eight fixed sets, more sets of wireless transmitting circuits and wireless receiving circuits are adopted, and more sets of resistors, NPN triodes, and relays are adopted to form more cipher numbers (for example, four sets of wireless transmitting circuit modules and wireless receiving circuit modules are adopted, and sixteen resistors, NPN triodes, and relays are respectively adopted to form 16 ciphers, so as to achieve better confidentiality effect). In the circuit, the resistances of the resistors R1, R2, R3, R4, R5, R6, R7, R8, R9 and R10 are 1K; the model of the NPN triode Q1, Q2, Q3, Q4, Q5, Q6, Q7, Q8 and Q9 is 9013; relays K1, K2, K3, K4, K5, K6, K7, K8, K9, the K model is DC 12V; the power switches S1, S2, S3, S4, S5, S6, S7 and S8 are normally open contact self-locking power switches; the VS model of the controlled silicon is MCR 100-1; the short message module U4 is a short message alarm module of type GSM 800, the finished short message alarm module U4 has two power input terminals 1 and 2, and signal input ports 3-8, and after each signal input port inputs a low level signal, the finished short message alarm module U4 sends a short message through the wireless mobile network, and the short message alarm module U4 stores a short message (in this embodiment, an orientation prompt short message is edited, such as "someone powers on illegally"), and after the low level signal is input to the signal input port 3 of the short message alarm module U4, the short message alarm module U4 can send a short message.
While there have been shown and described what are at present considered to be the essential features of the utility model and advantages thereof, it will be apparent to those skilled in the art that the utility model is not limited to the details of the foregoing illustrative embodiments, but is capable of other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the utility model being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that while the specification has been described in terms of exemplary embodiments, it is not intended that the embodiments include only a single embodiment, but rather that the utility model be construed as broadly as possible in the specification for clarity and having the understanding that the present disclosure will be directed to those skilled in the art having the benefit of the teachings herein and, more particularly, will be readily apparent to those skilled in the art from the foregoing description as a whole that the principles and broad features of the utility model are illustrated and described in the examples and that the utility model may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the utility model being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims (5)

1. An encryption computer comprises a computer body and a stabilized voltage power supply, and is characterized by also comprising a password mechanism, a wireless receiving mechanism, a wireless control mechanism and a prompting circuit; the password mechanism comprises a plurality of power switches and a trigger sub-circuit, the password mechanism, the wireless receiving mechanism and the prompting circuit are installed in a case of the computer body, and a power output end of the stabilized voltage power supply is electrically connected with power input ends of the password mechanism, the wireless receiving mechanism and the prompting circuit; the signal output end of the password mechanism is electrically connected with the signal input end of the wireless receiving mechanism, the two control signal output ends of the wireless receiving mechanism are respectively electrically connected with the two signal input ends of the trigger sub-circuit, and the trigger signal output end of the trigger sub-circuit is electrically connected with the signal input end of the prompt circuit; and the control power supply output end of the trigger sub-circuit is electrically connected with the main power supply input end of the computer body.
2. The encryption computer of claim 1, wherein the trigger sub-circuit of the cryptographic mechanism comprises a thyristor, a resistor and a relay electrically connected to a plurality of power switches, wherein one end of each power switch is connected to an anode of the thyristor, a cathode of the thyristor is connected to a positive power input of the first relay, a control electrode of the thyristor is connected to one end of the resistor, a negative power input of the first relay is connected to a negative power input of the second relay, and two normally closed contacts of the first relay are connected to two control power inputs of the second relay, respectively.
3. The encryption computer according to claim 1, wherein the wireless receiving mechanism comprises a wireless receiving circuit module, a resistor, an NPN triode and a relay which are electrically connected, positive power supply input ends of two sets of wireless receiving circuit modules are connected with positive power supply input ends of eight relays, four power supply output ends and one ends of eight resistors of the two sets of wireless receiving circuit modules are respectively connected, the other ends of the eight resistors are respectively connected with bases of the eight NPN triodes, and collectors of the eight NPN triodes are respectively connected with negative power supply input ends of the eight relays.
4. The encryption computer of claim 1, wherein the wireless control mechanism comprises two sets of wireless transmission circuit modules, and the two ends of the power input of the two sets of wireless transmission circuit modules are respectively connected together.
5. The encryption computer of claim 1, wherein the prompting circuit comprises a resistor, an NPN triode, a relay and a short message module which are electrically connected, one end of the resistor is connected with a base electrode of the NPN triode, a collector electrode of the NPN triode is connected with one signal input end of the short message module, and a negative power supply input end of the short message module is connected with an emitter electrode of the NPN triode.
CN202122401785.1U 2021-10-07 2021-10-07 Encryption computer Expired - Fee Related CN215932547U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202122401785.1U CN215932547U (en) 2021-10-07 2021-10-07 Encryption computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202122401785.1U CN215932547U (en) 2021-10-07 2021-10-07 Encryption computer

Publications (1)

Publication Number Publication Date
CN215932547U true CN215932547U (en) 2022-03-01

Family

ID=80407284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202122401785.1U Expired - Fee Related CN215932547U (en) 2021-10-07 2021-10-07 Encryption computer

Country Status (1)

Country Link
CN (1) CN215932547U (en)

Similar Documents

Publication Publication Date Title
CN104806085A (en) Intelligent door lock system and intelligent reminding method
WO2017206301A1 (en) Information notification method and device
CN113778202A (en) Encryption computer
CN102155120A (en) Door lock control system based on NFC and method thereof
CN215932547U (en) Encryption computer
CN101775942B (en) Network intelligent wireless control system-based safe
CN216848738U (en) Computer encryption equipment
CN205445181U (en) Remote control intelligence lock
CN109346389B (en) Electronic circuit breaker capable of customizing protection parameters and protection parameter customizing system
CN104377515B (en) It is provided with the smart jack of working condition sensor and wireless identity marking mechanism
CN201730455U (en) Safe based on intelligent wireless network control system
CN101144349A (en) Household intelligent door lock system
CN116859827B (en) Digital authorization control method for safe fire of welding machine and Bluetooth control module thereof
CN207473710U (en) A kind of remote monitoring intelligent Fingerprint Lock System
CN210983551U (en) Intelligent access control installs equipment additional
CN210428579U (en) Passive electric coding lock
CN208073156U (en) A kind of intelligent lock control device
CN108320408A (en) A kind of Multifunction door bell device
CN216053033U (en) Destructible safety encryption device
CN111556409A (en) Microphone control circuit and electronic equipment
CN111856975A (en) Intelligent campus system beneficial to campus management
CN217982364U (en) Secret key destroying circuit for anti-dismantling hard disk
CN210444062U (en) Power supply system of electronic lock
CN108683031A (en) Intelligent plug and its control method, the wiring board with intelligent plug
CN206546575U (en) Computer host box safety device with code entry function

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220301