[go: up one dir, main page]

CN213585840U - Enterprise information security management system - Google Patents

Enterprise information security management system Download PDF

Info

Publication number
CN213585840U
CN213585840U CN202023178920.2U CN202023178920U CN213585840U CN 213585840 U CN213585840 U CN 213585840U CN 202023178920 U CN202023178920 U CN 202023178920U CN 213585840 U CN213585840 U CN 213585840U
Authority
CN
China
Prior art keywords
socket
host
transmitter
plug
electrically connected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202023178920.2U
Other languages
Chinese (zh)
Inventor
包晓萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Lejin Trading Co ltd
Original Assignee
Hangzhou Lejin Trading Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Lejin Trading Co ltd filed Critical Hangzhou Lejin Trading Co ltd
Priority to CN202023178920.2U priority Critical patent/CN213585840U/en
Application granted granted Critical
Publication of CN213585840U publication Critical patent/CN213585840U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Burglar Alarm Systems (AREA)

Abstract

The utility model discloses an information security management system of enterprise. The transmitter and the storage machine are connected with a host local area network, an outer network interface and a first socket are arranged on the transmitter, the outer network interface and the first socket are electrically connected with the transmitter, a first plug is arranged on the first socket and detachably connected with the first socket, the first plug is matched with the first socket, a first key is arranged on the host, the outer network interface is electrically connected with the host through the first key, a power plug is arranged on the host, and the host is electrically connected with the power plug. The utility model has the advantages that: the information can be sent out through the transmitter; the storage machine can realize the purpose of constantly viewing the stored content; the purpose that only a single matching piece can send information can be achieved through the socket I and the plug I; the information can be received through the singlechip and the loudspeaker; and the confirmation of information transmission on the host can be completed through the plug II and the socket II.

Description

Enterprise information security management system
Technical Field
The utility model relates to an information management equipment technical field of enterprise especially indicates an information security management system of enterprise.
Background
With the development of society and science and technology, people pay more and more attention to the timeliness of information exchange and communication. The coming of the network era constructs a bridge for information exchange of enterprises. By utilizing network information transmission, information reception, remote cooperation and communication, convenience is brought to operation and development of enterprises, meanwhile, a certain degree of hidden danger is caused to enterprise management, information leakage caused by endless network viruses and personnel flow is caused, and threats are always formed to internal information resources of the enterprises. Therefore, in the information storage and exchange process of the enterprise at present, in addition to the timely installation of anti-virus software, the storage of the information security management system is also indispensable, but the current enterprise information security management system only performs self-protection on one device electrically connected with an external network, so that the information of external hackers or local personnel is very likely to invade, the enterprise information is taken away, or unnecessary signal intrusion is caused to the enterprise information, and the enterprise information is very dangerous.
SUMMERY OF THE UTILITY MODEL
The utility model relates to an overcome and only do the not enough of oneself's protection on an equipment that links to each other with external network electricity among the prior art, provide an enterprise information security management system that only individual matching piece could send information.
In order to achieve the above purpose, the utility model adopts the following technical scheme:
the utility model provides an enterprise information security management system, includes host computer, sender and storage machine all be connected with the host computer LAN, the sender on be equipped with extranet interface and socket one, extranet interface and socket one all be connected with sender electricity, socket one on be equipped with plug one, plug one can dismantle with socket one and be connected, plug one and socket one phase-match, the host computer on be equipped with button one, extranet interface pass through button one and be connected with the host computer electricity, the host computer on be equipped with power plug, host computer and power plug electricity be connected.
The host can send out information through the transmitter connected with the local area network, the storage machine connected with the host local area network can record the information to be sent and the material condition to be sent in time, the external network interface electrically connected with the transmitter can be electrically connected with an external network so as to send the information out, the socket on the transmitter can be matched with the plug matched with the socket to confirm the information to be sent, the last step of sending can be completed through the key electrically connected with the host, and therefore the purpose that the information can be sent only through a single matching piece can be achieved.
Preferably, the transmitter is provided with a control signal, and the control signal is electrically connected with the transmitter. The design can control the signal of the transmitter at any time through the control signal electrically connected with the transmitter on the transmitter, and if an external signal is input, the signal of the generator can also react in time.
Preferably, the transmitter is provided with a first single chip microcomputer and a loudspeaker, the loudspeaker is electrically connected with the host through the first single chip microcomputer, and the first single chip microcomputer is electrically connected with the control signal. The design is through the singlechip of sender in time with the received information transmission of sender for loudspeaker and let loudspeaker send the prompt tone like this, and when the external signal that comes through the motor signal transmission invaded information, loudspeaker also can send the prompt tone at any time.
Preferably, the host is provided with a second socket, the second socket is electrically connected with the host, the second socket is provided with a second plug, the second plug is detachably connected with the second socket, and the second plug is matched with the second socket. Therefore, whether information is required to be sent is determined by matching the socket II electrically connected with the host with the plug II matched with the socket II, and the detachable connection of the plug II and the socket II is selected to be determined and denied.
Preferably, the storage machine is provided with a second key and a second single chip microcomputer, and the second key and the second single chip microcomputer are electrically connected with the storage machine. The design can timely record the sent information and the condition through the singlechip II on the storage machine, and can check the content stored by the storage machine at any time through the key II electrically connected with the storage machine.
Preferably, the host, the transmitter and the storage machine are all provided with a display, and the host, the transmitter and the storage machine are all electrically connected with the display. The display electrically connected with the host computer, the transmitter and the storage machine is designed to be capable of watching the operation contents on the host computer, the transmitter and the storage machine at any time.
The utility model has the advantages that: the information can be sent out through the transmitter; the storage machine can realize the purpose of constantly viewing the stored content; the purpose that only a single matching piece can send information can be achieved through the socket I and the plug I; the information can be received through the singlechip and the loudspeaker; and the confirmation of information transmission on the host can be completed through the plug II and the socket II.
Drawings
Fig. 1 is a schematic structural view of the present invention;
fig. 2 is a schematic structural diagram of the display of the present invention.
In the figure: 1. the system comprises a host, 2, a transmitter, 3, a storage machine, 4, an external network interface, 5, a first socket, 6, a first plug, 7, a first key, 8, a second socket, 9, a second plug, 10, a power plug, 11, a first single chip microcomputer, 12, a loudspeaker, 13, a second key, 14, a second single chip microcomputer, 15, a display, 16 and a control signal.
Detailed Description
The following description of the present invention will be made with reference to the accompanying drawings.
In the embodiment shown in fig. 1, an enterprise information security management system includes a host 1, a transmitter 2 and a storage machine 3, the transmitter 2 and the storage machine 3 are both connected to a host 1 lan, the transmitter 2 is provided with an extranet interface 4 and a socket 5, the extranet interface 4 and the socket 5 are both electrically connected to the transmitter 2, the socket 5 is provided with a plug 6, the plug 6 is detachably connected to the socket 5, the plug 6 is matched with the socket 5, the host 1 is provided with a key 7, the extranet interface 4 is electrically connected to the host 1 through the key 7, the host 1 is provided with a power plug 10, and the host 1 is electrically connected to the power plug 10. The transmitter 2 is provided with a control signal 16, and the control signal 16 is electrically connected with the transmitter 2. The transmitter 2 is provided with a first singlechip 11 and a loudspeaker 12, the loudspeaker 12 is electrically connected with the host 1 through the first singlechip 11, and the first singlechip 11 is electrically connected with a control signal 16. The host 1 is provided with a second socket 8, the second socket 8 is electrically connected with the host 1, the second socket 8 is provided with a second plug 9, the second plug 9 is detachably connected with the second socket 8, and the second plug 9 is matched with the second socket 8. And a second key 13 and a second singlechip 14 are arranged on the storage machine 3, and the second key 13 and the second singlechip 14 are both electrically connected with the storage machine 3. The storage machine 3 is provided with a second key 13, and the second key 13 is electrically connected with the storage machine 3. As shown in fig. 2, the host 1, the transmitter 2, and the storage device 3 are each provided with a display 15, and the host 1, the transmitter 2, and the storage device 3 are each electrically connected to the display 15.
Firstly, a host 1, a transmitter 2 and a storage machine 3 are well connected by a local area network, an external network interface 4 on the transmitter 2 is well electrically connected with an external network, then a control signal 16 is well electrically connected with the transmitter 2, then a power plug 10 on the host 1 is manually well electrically connected with an external power supply, so that the host 1, the transmitter 2 and the storage machine 3 can be basically operated and controlled, then information to be transmitted is operated to a key I7 electrically connected with the host to be started to the transmitter 2, so that the transmitter 2 can transmit a signal of the received information to a loudspeaker 12 through a single chip microcomputer I11 arranged on the transmitter, the loudspeaker 12 can give out a sound to prompt that the information is received, meanwhile, the storage machine 3 connected with the host 1 by the local area network can timely store the transmitted information and conditions in the storage machine 3 through the single chip microcomputer II 14, and the control signal 16 arranged on the transmitter 2 constantly controls the output and input of an electric signal, if there is interference or input of external signal, the single chip microcomputer 11 electrically connected with the control signal 16 will immediately transmit information to the loudspeaker 12, and sound to warn.
The accuracy of the information to be sent and the safety of sending are confirmed, the first plug 6 is manually inserted into the first socket 5 which is installed on the sender 2 and matched with the first plug, after further confirmation, the second plug 9 is inserted into the second socket 8 which is installed on the host 1 and matched with the second plug, then the first key 7 on the host 1 is clicked to send the information out in time, and therefore the purpose that only a single matching piece can send the information is achieved, in the sending process, the second single chip 14 on the storage machine 3 records the sending time and specific information, in the whole sending work, the specific conditions of the work can be checked at any time through the host 1, the sender 2 and the display 15 installed on the storage machine 3, and the work is convenient and practical.

Claims (6)

1. An enterprise information security management system is characterized by comprising a host (1), a transmitter (2) and a storage machine (3), the transmitter (2) and the storage machine (3) are connected with the local area network of the host (1), the transmitter (2) is provided with an external network interface (4) and a socket I (5), the external network interface (4) and the socket I (5) are both electrically connected with the transmitter (2), a first plug (6) is arranged on the first socket (5), the first plug (6) is detachably connected with the first socket (5), the plug I (6) is matched with the socket I (5), the main machine (1) is provided with a key I (7), the external network interface (4) is electrically connected with the host (1) through a first key (7), the power plug (10) is arranged on the host (1), and the host (1) is electrically connected with the power plug (10).
2. An enterprise information security management system according to claim 1, wherein the transmitter (2) is provided with a control signal (16), and the control signal (16) is electrically connected with the transmitter (2).
3. An enterprise information security management system according to claim 2, wherein the transmitter (2) is provided with a first singlechip (11) and a loudspeaker (12), the loudspeaker (12) is electrically connected with the host (1) through the first singlechip (11), and the first singlechip (11) is electrically connected with the control signal (16).
4. An enterprise information security management system according to claim 1, wherein a second socket (8) is arranged on the host (1), the second socket (8) is electrically connected with the host (1), a second plug (9) is arranged on the second socket (8), the second plug (9) is detachably connected with the second socket (8), and the second plug (9) is matched with the second socket (8).
5. An enterprise information security management system according to claim 1, wherein a second button (13) and a second singlechip (14) are arranged on the storage machine (3), and both the second button (13) and the second singlechip (14) are electrically connected with the storage machine (3).
6. An enterprise information security management system according to claim 3, 4 or 5, wherein the host (1), the transmitter (2) and the storage device (3) are all provided with a display (15), and the host (1), the transmitter (2) and the storage device (3) are all electrically connected with the display (15).
CN202023178920.2U 2020-12-25 2020-12-25 Enterprise information security management system Expired - Fee Related CN213585840U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202023178920.2U CN213585840U (en) 2020-12-25 2020-12-25 Enterprise information security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202023178920.2U CN213585840U (en) 2020-12-25 2020-12-25 Enterprise information security management system

Publications (1)

Publication Number Publication Date
CN213585840U true CN213585840U (en) 2021-06-29

Family

ID=76550120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202023178920.2U Expired - Fee Related CN213585840U (en) 2020-12-25 2020-12-25 Enterprise information security management system

Country Status (1)

Country Link
CN (1) CN213585840U (en)

Similar Documents

Publication Publication Date Title
CN205068378U (en) Multi -functional wireless serial ports device
CN205901798U (en) Very high frequency VHF radio station workstation
CN213585840U (en) Enterprise information security management system
CN212677280U (en) Portable movable monitoring device for operation in limited space
CN204733268U (en) Based on the all-digital visible talkback system of cloud service
CN203840376U (en) Device for call positioning of community
CN106657023A (en) Information communication device based on cloud host
CN203120048U (en) Building cable-sharing visible dialogue system
CN106506575A (en) Communication means and device
CN202305625U (en) Electricity anti-stealing system based on mobile phone short message verification
CN109041056A (en) A kind of wireless data communication system for remotely controlling
CN111953373B (en) A 433MHz-based broadcast message communication device
US20040204072A1 (en) Apparatus and method for quick control of portable phone infrared transmission
CN211630190U (en) Terminal equipment safety encryption and decryption system based on safety chip
CN209417920U (en) A kind of wireless remote communication device
CN112702320A (en) Monitoring data transmission screening system and using method thereof
CN201830459U (en) Data terminal system based on data transmission security
CN222089803U (en) An intelligent voice three-color light system based on the Internet of Things
CN102624445B (en) Infrared-based unidirectional data transmission equipment
CN204925664U (en) Intelligence home automation ammeter reading system based on 3G network
CN215581196U (en) Computer internet information security control device
CN104700503A (en) Power source selling device and method
CN212969710U (en) Data exchange transmission module based on internet of things technology
CN110912578A (en) Communication method of portable communication equipment
CN104717621A (en) Long-distance interactive multi-user intelligent LED screen equipment based on GPRS

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210629

Termination date: 20211225