CN213585840U - Enterprise information security management system - Google Patents
Enterprise information security management system Download PDFInfo
- Publication number
- CN213585840U CN213585840U CN202023178920.2U CN202023178920U CN213585840U CN 213585840 U CN213585840 U CN 213585840U CN 202023178920 U CN202023178920 U CN 202023178920U CN 213585840 U CN213585840 U CN 213585840U
- Authority
- CN
- China
- Prior art keywords
- socket
- host
- transmitter
- plug
- electrically connected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000012790 confirmation Methods 0.000 abstract description 3
- 230000005611 electricity Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Images
Landscapes
- Burglar Alarm Systems (AREA)
Abstract
The utility model discloses an information security management system of enterprise. The transmitter and the storage machine are connected with a host local area network, an outer network interface and a first socket are arranged on the transmitter, the outer network interface and the first socket are electrically connected with the transmitter, a first plug is arranged on the first socket and detachably connected with the first socket, the first plug is matched with the first socket, a first key is arranged on the host, the outer network interface is electrically connected with the host through the first key, a power plug is arranged on the host, and the host is electrically connected with the power plug. The utility model has the advantages that: the information can be sent out through the transmitter; the storage machine can realize the purpose of constantly viewing the stored content; the purpose that only a single matching piece can send information can be achieved through the socket I and the plug I; the information can be received through the singlechip and the loudspeaker; and the confirmation of information transmission on the host can be completed through the plug II and the socket II.
Description
Technical Field
The utility model relates to an information management equipment technical field of enterprise especially indicates an information security management system of enterprise.
Background
With the development of society and science and technology, people pay more and more attention to the timeliness of information exchange and communication. The coming of the network era constructs a bridge for information exchange of enterprises. By utilizing network information transmission, information reception, remote cooperation and communication, convenience is brought to operation and development of enterprises, meanwhile, a certain degree of hidden danger is caused to enterprise management, information leakage caused by endless network viruses and personnel flow is caused, and threats are always formed to internal information resources of the enterprises. Therefore, in the information storage and exchange process of the enterprise at present, in addition to the timely installation of anti-virus software, the storage of the information security management system is also indispensable, but the current enterprise information security management system only performs self-protection on one device electrically connected with an external network, so that the information of external hackers or local personnel is very likely to invade, the enterprise information is taken away, or unnecessary signal intrusion is caused to the enterprise information, and the enterprise information is very dangerous.
SUMMERY OF THE UTILITY MODEL
The utility model relates to an overcome and only do the not enough of oneself's protection on an equipment that links to each other with external network electricity among the prior art, provide an enterprise information security management system that only individual matching piece could send information.
In order to achieve the above purpose, the utility model adopts the following technical scheme:
the utility model provides an enterprise information security management system, includes host computer, sender and storage machine all be connected with the host computer LAN, the sender on be equipped with extranet interface and socket one, extranet interface and socket one all be connected with sender electricity, socket one on be equipped with plug one, plug one can dismantle with socket one and be connected, plug one and socket one phase-match, the host computer on be equipped with button one, extranet interface pass through button one and be connected with the host computer electricity, the host computer on be equipped with power plug, host computer and power plug electricity be connected.
The host can send out information through the transmitter connected with the local area network, the storage machine connected with the host local area network can record the information to be sent and the material condition to be sent in time, the external network interface electrically connected with the transmitter can be electrically connected with an external network so as to send the information out, the socket on the transmitter can be matched with the plug matched with the socket to confirm the information to be sent, the last step of sending can be completed through the key electrically connected with the host, and therefore the purpose that the information can be sent only through a single matching piece can be achieved.
Preferably, the transmitter is provided with a control signal, and the control signal is electrically connected with the transmitter. The design can control the signal of the transmitter at any time through the control signal electrically connected with the transmitter on the transmitter, and if an external signal is input, the signal of the generator can also react in time.
Preferably, the transmitter is provided with a first single chip microcomputer and a loudspeaker, the loudspeaker is electrically connected with the host through the first single chip microcomputer, and the first single chip microcomputer is electrically connected with the control signal. The design is through the singlechip of sender in time with the received information transmission of sender for loudspeaker and let loudspeaker send the prompt tone like this, and when the external signal that comes through the motor signal transmission invaded information, loudspeaker also can send the prompt tone at any time.
Preferably, the host is provided with a second socket, the second socket is electrically connected with the host, the second socket is provided with a second plug, the second plug is detachably connected with the second socket, and the second plug is matched with the second socket. Therefore, whether information is required to be sent is determined by matching the socket II electrically connected with the host with the plug II matched with the socket II, and the detachable connection of the plug II and the socket II is selected to be determined and denied.
Preferably, the storage machine is provided with a second key and a second single chip microcomputer, and the second key and the second single chip microcomputer are electrically connected with the storage machine. The design can timely record the sent information and the condition through the singlechip II on the storage machine, and can check the content stored by the storage machine at any time through the key II electrically connected with the storage machine.
Preferably, the host, the transmitter and the storage machine are all provided with a display, and the host, the transmitter and the storage machine are all electrically connected with the display. The display electrically connected with the host computer, the transmitter and the storage machine is designed to be capable of watching the operation contents on the host computer, the transmitter and the storage machine at any time.
The utility model has the advantages that: the information can be sent out through the transmitter; the storage machine can realize the purpose of constantly viewing the stored content; the purpose that only a single matching piece can send information can be achieved through the socket I and the plug I; the information can be received through the singlechip and the loudspeaker; and the confirmation of information transmission on the host can be completed through the plug II and the socket II.
Drawings
Fig. 1 is a schematic structural view of the present invention;
fig. 2 is a schematic structural diagram of the display of the present invention.
In the figure: 1. the system comprises a host, 2, a transmitter, 3, a storage machine, 4, an external network interface, 5, a first socket, 6, a first plug, 7, a first key, 8, a second socket, 9, a second plug, 10, a power plug, 11, a first single chip microcomputer, 12, a loudspeaker, 13, a second key, 14, a second single chip microcomputer, 15, a display, 16 and a control signal.
Detailed Description
The following description of the present invention will be made with reference to the accompanying drawings.
In the embodiment shown in fig. 1, an enterprise information security management system includes a host 1, a transmitter 2 and a storage machine 3, the transmitter 2 and the storage machine 3 are both connected to a host 1 lan, the transmitter 2 is provided with an extranet interface 4 and a socket 5, the extranet interface 4 and the socket 5 are both electrically connected to the transmitter 2, the socket 5 is provided with a plug 6, the plug 6 is detachably connected to the socket 5, the plug 6 is matched with the socket 5, the host 1 is provided with a key 7, the extranet interface 4 is electrically connected to the host 1 through the key 7, the host 1 is provided with a power plug 10, and the host 1 is electrically connected to the power plug 10. The transmitter 2 is provided with a control signal 16, and the control signal 16 is electrically connected with the transmitter 2. The transmitter 2 is provided with a first singlechip 11 and a loudspeaker 12, the loudspeaker 12 is electrically connected with the host 1 through the first singlechip 11, and the first singlechip 11 is electrically connected with a control signal 16. The host 1 is provided with a second socket 8, the second socket 8 is electrically connected with the host 1, the second socket 8 is provided with a second plug 9, the second plug 9 is detachably connected with the second socket 8, and the second plug 9 is matched with the second socket 8. And a second key 13 and a second singlechip 14 are arranged on the storage machine 3, and the second key 13 and the second singlechip 14 are both electrically connected with the storage machine 3. The storage machine 3 is provided with a second key 13, and the second key 13 is electrically connected with the storage machine 3. As shown in fig. 2, the host 1, the transmitter 2, and the storage device 3 are each provided with a display 15, and the host 1, the transmitter 2, and the storage device 3 are each electrically connected to the display 15.
Firstly, a host 1, a transmitter 2 and a storage machine 3 are well connected by a local area network, an external network interface 4 on the transmitter 2 is well electrically connected with an external network, then a control signal 16 is well electrically connected with the transmitter 2, then a power plug 10 on the host 1 is manually well electrically connected with an external power supply, so that the host 1, the transmitter 2 and the storage machine 3 can be basically operated and controlled, then information to be transmitted is operated to a key I7 electrically connected with the host to be started to the transmitter 2, so that the transmitter 2 can transmit a signal of the received information to a loudspeaker 12 through a single chip microcomputer I11 arranged on the transmitter, the loudspeaker 12 can give out a sound to prompt that the information is received, meanwhile, the storage machine 3 connected with the host 1 by the local area network can timely store the transmitted information and conditions in the storage machine 3 through the single chip microcomputer II 14, and the control signal 16 arranged on the transmitter 2 constantly controls the output and input of an electric signal, if there is interference or input of external signal, the single chip microcomputer 11 electrically connected with the control signal 16 will immediately transmit information to the loudspeaker 12, and sound to warn.
The accuracy of the information to be sent and the safety of sending are confirmed, the first plug 6 is manually inserted into the first socket 5 which is installed on the sender 2 and matched with the first plug, after further confirmation, the second plug 9 is inserted into the second socket 8 which is installed on the host 1 and matched with the second plug, then the first key 7 on the host 1 is clicked to send the information out in time, and therefore the purpose that only a single matching piece can send the information is achieved, in the sending process, the second single chip 14 on the storage machine 3 records the sending time and specific information, in the whole sending work, the specific conditions of the work can be checked at any time through the host 1, the sender 2 and the display 15 installed on the storage machine 3, and the work is convenient and practical.
Claims (6)
1. An enterprise information security management system is characterized by comprising a host (1), a transmitter (2) and a storage machine (3), the transmitter (2) and the storage machine (3) are connected with the local area network of the host (1), the transmitter (2) is provided with an external network interface (4) and a socket I (5), the external network interface (4) and the socket I (5) are both electrically connected with the transmitter (2), a first plug (6) is arranged on the first socket (5), the first plug (6) is detachably connected with the first socket (5), the plug I (6) is matched with the socket I (5), the main machine (1) is provided with a key I (7), the external network interface (4) is electrically connected with the host (1) through a first key (7), the power plug (10) is arranged on the host (1), and the host (1) is electrically connected with the power plug (10).
2. An enterprise information security management system according to claim 1, wherein the transmitter (2) is provided with a control signal (16), and the control signal (16) is electrically connected with the transmitter (2).
3. An enterprise information security management system according to claim 2, wherein the transmitter (2) is provided with a first singlechip (11) and a loudspeaker (12), the loudspeaker (12) is electrically connected with the host (1) through the first singlechip (11), and the first singlechip (11) is electrically connected with the control signal (16).
4. An enterprise information security management system according to claim 1, wherein a second socket (8) is arranged on the host (1), the second socket (8) is electrically connected with the host (1), a second plug (9) is arranged on the second socket (8), the second plug (9) is detachably connected with the second socket (8), and the second plug (9) is matched with the second socket (8).
5. An enterprise information security management system according to claim 1, wherein a second button (13) and a second singlechip (14) are arranged on the storage machine (3), and both the second button (13) and the second singlechip (14) are electrically connected with the storage machine (3).
6. An enterprise information security management system according to claim 3, 4 or 5, wherein the host (1), the transmitter (2) and the storage device (3) are all provided with a display (15), and the host (1), the transmitter (2) and the storage device (3) are all electrically connected with the display (15).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202023178920.2U CN213585840U (en) | 2020-12-25 | 2020-12-25 | Enterprise information security management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202023178920.2U CN213585840U (en) | 2020-12-25 | 2020-12-25 | Enterprise information security management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN213585840U true CN213585840U (en) | 2021-06-29 |
Family
ID=76550120
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202023178920.2U Expired - Fee Related CN213585840U (en) | 2020-12-25 | 2020-12-25 | Enterprise information security management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN213585840U (en) |
-
2020
- 2020-12-25 CN CN202023178920.2U patent/CN213585840U/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN205068378U (en) | Multi -functional wireless serial ports device | |
CN205901798U (en) | Very high frequency VHF radio station workstation | |
CN213585840U (en) | Enterprise information security management system | |
CN212677280U (en) | Portable movable monitoring device for operation in limited space | |
CN204733268U (en) | Based on the all-digital visible talkback system of cloud service | |
CN203840376U (en) | Device for call positioning of community | |
CN106657023A (en) | Information communication device based on cloud host | |
CN203120048U (en) | Building cable-sharing visible dialogue system | |
CN106506575A (en) | Communication means and device | |
CN202305625U (en) | Electricity anti-stealing system based on mobile phone short message verification | |
CN109041056A (en) | A kind of wireless data communication system for remotely controlling | |
CN111953373B (en) | A 433MHz-based broadcast message communication device | |
US20040204072A1 (en) | Apparatus and method for quick control of portable phone infrared transmission | |
CN211630190U (en) | Terminal equipment safety encryption and decryption system based on safety chip | |
CN209417920U (en) | A kind of wireless remote communication device | |
CN112702320A (en) | Monitoring data transmission screening system and using method thereof | |
CN201830459U (en) | Data terminal system based on data transmission security | |
CN222089803U (en) | An intelligent voice three-color light system based on the Internet of Things | |
CN102624445B (en) | Infrared-based unidirectional data transmission equipment | |
CN204925664U (en) | Intelligence home automation ammeter reading system based on 3G network | |
CN215581196U (en) | Computer internet information security control device | |
CN104700503A (en) | Power source selling device and method | |
CN212969710U (en) | Data exchange transmission module based on internet of things technology | |
CN110912578A (en) | Communication method of portable communication equipment | |
CN104717621A (en) | Long-distance interactive multi-user intelligent LED screen equipment based on GPRS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210629 Termination date: 20211225 |