CN201274049Y - Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft - Google Patents
Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft Download PDFInfo
- Publication number
- CN201274049Y CN201274049Y CNU2008201193891U CN200820119389U CN201274049Y CN 201274049 Y CN201274049 Y CN 201274049Y CN U2008201193891 U CNU2008201193891 U CN U2008201193891U CN 200820119389 U CN200820119389 U CN 200820119389U CN 201274049 Y CN201274049 Y CN 201274049Y
- Authority
- CN
- China
- Prior art keywords
- computer
- network
- antitheft
- isolation transformer
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Landscapes
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
Abstract
The utility model relates to the technical field of the computer burglary prevention, in particular to a computer burglary preventing device which utilizes the characteristic of a network isolation transformer in the computer to prevent burglary. The utility model aims to provide a fire-new, and reliable computer burglary preventing device with high cost performance. The computer burglary preventing device mainly utilizes the characteristic that the inside of the network isolation transformer comprises a resistance network to realize the burglary prevention. The burglary preventing device comprises a burglary prevention detecting module, a network line isolating module, a central control unit, a warning module, a power supply module and parallel network lines, wherein, the burglary prevention detecting module comprises an A/D sample circuit and a channel selecting circuit. When the burglary prevention detecting module only detects the resistance network connected with pins 4, 5, 7, 8 of the network lines and arranged in the network isolation transformer, pins 1, 2, 3, 6 of the network lines isolated from the network line isolating module can be used for normal network communication.
Description
Technical field
The utility model relates to the computer antitheft technical field, relates in particular to a kind of feature of network isolation transformer in the computer of utilizing and comes antitheft computer antitheft device.
Background technology
Network isolation transformer is widely used in the mainboard or network interface card of notebook computer (in the network interface of mainboard with network isolation transformer), desktop computer.All contain network isolation transformer in the network interface of every computer, network isolation transformer inside comprises resistor network.The computer main board synoptic diagram of band network isolation transformer as shown in Figure 1.
The method of computer antitheft is a lot of at present.As: notebook computer antitheft has following several common methods at present: it is antitheft 1, to add mechanical lock.2, install additional built-in move and the Vibration induction unit antitheft.3, it is antitheft to install external photodetector system additional.4, it is antitheft to install the mechanical lock of built-in warning wire additional.And for example: desktop computer is antitheft following several common methods: it is antitheft 1, to install chain lock additional.2, it is antitheft to install wireless theft-proof device additional.
Now describe some defective and the application limitation of above theft preventing method respectively: 1, to install mechanical lock additional antitheft for notebook computer, and shortcoming: wire rope is thinner, and available violent means is cut off.2, notebook computer install additional built-in move and the Vibration induction unit antitheft, shortcoming: the one user can not random mobile notebook computer, be not suitable for notebook computer in counter display, the shutdown of can not cutting off the power supply of its two notebook computer, if outage, not working in then mobile and Vibration induction unit, can not be antitheft.3, it is antitheft that notebook computer installs external photodetector system additional, shortcoming: the user can not random mobile notebook computer, is not suitable for notebook computer in counter display.4, it is antitheft that notebook computer installs the mechanical lock of built-in warning wire additional, shortcoming: available plain conductor short-circuit alarming lead, mask warning system, or the means method of cutting off mechanical lock is stolen computer by force.5, to install chain lock additional antitheft for desktop computer, and shortcoming: chain lock can be cut off with violent means.6, to install wireless theft-proof device additional antitheft for desktop computer, shortcoming: be subject to disturb rate of false alarm height, cost height.
Summary of the invention
In order to remedy some defective and the application limit of existing computer antitheft method, the utility model proposes a kind of feature of network isolation transformer in the computer of utilizing and come antitheft computer antitheft device.The computer that has installed this anti-theft device additional has following advantage: no matter 1, the computer work of whether switching on, all be subjected to the computer antitheft unit protection.2, computer can arbitrarily move in the scope of appointment, can not trigger warning, and this advantage is particularly suitable for notebook computer in counter display.3, antitheft reliability height, because network isolation transformer is welded in the computer main board, have only network isolation transformer taken out from computer main board and could fundamentally avoid trigger reporting to the police, and this method will be destroyed computer, theft is not worth, so antitheft reliability height.4, powerful tamper-proof function, with parallel netting twine with computer with after the computer antitheft device is connected, adopt at parallel netting twine place and to open circuit, short circuit, bypass, string and connecting resistance, to go here and there and connect means such as inductance and all can not shield warning.5, under programme controlled AD HOC, computer also can pass through parallel netting twine connected network communication simultaneously shielded.6, easy for installation, stable performance.
The technical scheme that its technical matters that solves the utility model adopts is:
A kind of feature of network isolation transformer in the computer of utilizing is come antitheft computer antitheft device, as shown in Figure 2, comprises antitheft detection module, grid line separation module, central control unit, alarm module, power module and parallel netting twine.Described antitheft detection module as shown in Figure 3, comprises A/D sample circuit, channel selection circuit.Wherein the A/D sample circuit is used for detecting the resistor network of network isolation transformer, and the feature of resistor network is that the form by magnitude of voltage adopts circuit to read by A/D.Wherein channel selection circuit is used to select the test point of resistor network to be detected.Antitheft detection module reads the characteristic (magnitude of voltage of resistor network) of network isolation transformer in the computer in real time by parallel netting twine, and the characteristic of network isolation transformer is sent to central control unit.As shown in Figure 6, described grid line separation module is used for separating 1 in the netting twine, 2,3,6 pin, and having only 1,2,3,6 pin in Ethernet is to be used for effective pin of transceive data, and 4,5,7,8 pin are sky pin.When the resistor network in the network isolation transformer that antitheft detection module only detects with 4,5,7,8 pin in the netting twine link to each other, 1,2,3,6 pin of the netting twine of separating from the grid line separation module just can be used for normal connected network communication.As shown in Figure 6, be computer shielded simultaneously also can be by the synoptic diagram of parallel netting twine connected network communication, the user with parallel netting twine with the grid line separation module with after switch is connected, computer just can carry out normal connected network communication.Described central control unit is to be made of Single Chip Microcomputer (SCM) system, it controls the sampling action of antitheft detection module, read the data that antitheft detection module is sent here in real time, and the data of each collection are analyzed, if any unusually then alerting signal being delivered to alarm module.The difference of the level of security that central control unit is provided with according to program is controlled the data sampling way of antitheft detection module, selectively certain or certain several test points of resistor network in the collection network isolating transformer.Described alarm module, the warning message of reception central control unit if any warning, is opened alarm buzzer, and the alarm lamp flicker can provide warning message to other devices simultaneously.Described power module is used for powering to the computer antitheft device.Described parallel netting twine is meant the netting twine that two all makes by 568A standard or 568B standard, and its end connects the shielded computer network interface other end and connects the computer antitheft device.
The beneficial effects of the utility model are: the reliability height that (1) is antitheft, because network isolation transformer is welded in the computer main board, have only network isolation transformer taken out from computer main board and could fundamentally avoid trigger reporting to the police, and this method will be destroyed computer, theft is not worth, so antitheft reliability height.(2) work no matter whether computer switches on; all be subjected to the computer antitheft unit protection; the computer antitheft device because whether the characteristic of network isolation transformer can not switch on because of computer do not change, so no matter whether computer switches on, can both accurately read the characteristic of network isolation transformer.(3) because this computer antitheft device is not antitheft by methods such as " moving or Vibration induction ",, in the scope of appointment, can move arbitrarily, can not trigger warning, be particularly suitable for notebook computer in counter display so the mobility of protected computer is good.(4) powerful tamper-proof function, with parallel netting twine with computer with after the computer antitheft device is connected, adopt at parallel netting twine place and to open circuit, short circuit, bypass, string and connecting resistance, to go here and there and connect means such as inductance and all can not shield warning.(5) under programme controlled AD HOC, computer also can pass through parallel netting twine connected network communication simultaneously shielded.(6) easy for installation, stable performance.
Description of drawings
Fig. 1 is the computer main board synoptic diagram of band network isolation transformer;
Fig. 2 is a computer antitheft device inner structure synoptic diagram;
Fig. 3 is antitheft detection module synoptic diagram;
Fig. 4 is the cut-away view of the network interface of band network isolation transformer;
Fig. 5 is the connection diagram of the network interface of A/D sample circuit, channel selection circuit and band network isolation transformer;
Fig. 6 is that computer is at the shielded synoptic diagram that also can pass through parallel netting twine connected network communication simultaneously.
Embodiment
Below in conjunction with accompanying drawing embodiment of the present utility model is described.
At first introduce network isolation transformer, network isolation transformer is network transformer again, it is the magnet assembly between a kind of contact Ethernet chip (10/100/1000) and the terminal network interface (RJ45), and it mainly acts on has been effects such as signal transmission, impedance matching, waveform reparation, clutter inhibition and high voltage isolation.The inner parameter of the network isolation transformer that different company produces is different, and is externally characterizing also different (network isolation transformer that has and network interface are two elements independently, are with network isolation transformer in the network interface that has, and are the elements of one).No matter how different the inner parameter of network isolation transformer and external sign be, but they all have individual general character, be exactly inside comprises resistor network.As shown in Figure 4, be the cut-away view of the network interface of present modal band network isolation transformer.It comprises resistor network and the several telefault of being made up of 4 75 Europe resistance.
As shown in Figure 2, the computer antitheft device is made up of antitheft detection module, grid line separation module, central control unit, alarm module, power module and parallel netting twine.
As shown in Figure 3, antitheft detection module comprises A/D sample circuit, channel selection circuit.Wherein the A/D sample circuit mainly is made up of the A/D conversion chip, is used for detecting the resistor network of network isolation transformer, and the feature of resistor network is that the form by magnitude of voltage adopts circuit to read by A/D.Present alternative A/D adopts circuit to have nearly hundred kinds, can select the high A/D sample circuit of a cost performance to get final product according to actual conditions.Channel selection circuit mainly is made up of the analog switch chip, is used to select the test point of resistor network to be detected.The chip that some company provides comprises A/D sample circuit and channel selection circuit simultaneously, and for example: the ADC0809 chip of Nationalsemiconductor company, it comprises one 8 A/D sample circuit and one 8 and selects 1 channel selection circuit.
The voltage data that the A/D sample circuit is gathered in the resistor network can be realized (one of preferable implementation method) with the following method: as shown in Figure 5, resistor network in resistor network R1-R8 and the network isolation transformer constitutes a resistor voltage divider circuit, the constant voltage (as 3.3V voltage) of any one pin (as the J3 pin) input in 8 pin (J1-J8) of network interface, then, on 8 pin in network interface different magnitudes of voltage will be arranged by electric resistance partial pressure.The A/D sample circuit is selectively gathered the voltage data of 8 pin in the network interface by channel selection circuit, and these data are sent to central control unit.
Grid line separation module principle of work, as shown in Figure 6, the grid line separation module is used for separating 1 in the netting twine, 2,3,6 pin, and having only 1,2,3,6 pin in Ethernet is to be used for effective pin of transceive data, and 4,5,7,8 pin are sky pin.When the resistor network in the network isolation transformer that antitheft detection module only detects with 4,5,7,8 pin in the netting twine link to each other, 1,2,3,6 pin of the netting twine of separating from the grid line separation module just can be used for normal connected network communication.Shown in Figure 6, be that computer is at the shielded synoptic diagram that also can pass through parallel netting twine connected network communication simultaneously.The user with parallel netting twine with the grid line separation module with after switch is connected, computer just can carry out normal connected network communication.
The principle of work of central control unit: central control unit is made of Single Chip Microcomputer (SCM) system, it controls the sampling action of antitheft detection module, read the data that antitheft detection module is sent here in real time, and the data of each sampling are analyzed, if any unusually then alerting signal being delivered to alarm module.The work main flow: with parallel netting twine with shielded computer network interface with after the computer antitheft device is connected; central control unit reads the characteristic (magnitude of voltage of resistor network) of network isolation transformer first; and these raw data are preserved, in order to relatively using.Central control unit read in real time data that antitheft detection module sends here and with the raw data comparative analysis, then alerting signal is delivered to alarm module as finding data exception.Central control unit is according to the difference of the level of security of program setting, control the data sampling way of antitheft detection module, level of security is high more, need the way of sampling just many more, for example, when level of security is 1 (level of security is the highest), the magnitude of voltage of 8 pin (as the J1 among Fig. 4, J2, J3, J6, J4, J5, J7, J8) in the network interface of then sampling; When level of security is 2, the magnitude of voltage (as the J2 among Fig. 4, J3, J6, J4, J5, J7, J8) of 7 pin in the network interface of then only sampling; When level of security is 3, the magnitude of voltage (as the J3 among Fig. 4, J6, J4, J5, J7, J8) of 6 pin in the network interface of then only sampling; When level of security is 4, the magnitude of voltage (as the J3 among Fig. 4, J6, J4, J5, J7, J8) of 5 pin in the network interface of then only sampling; When level of security is reduced to antitheft detection module when only detecting as the J4 among Fig. 4, J5, J7, J8 pin, remaining 4 pin (J1, J2, J3, J6) just can be used for the connected network communication of protected computer.
Central control unit can be made up of 8 or 16 or 32 single-chip microcomputers, and selectable chip kind is a lot, for example: AT89C55 etc.Some singlechip is also integrated A/D sample circuit and channel selection circuit, cost performance is very high, for example: C8051F221 etc.
The alarm module principle of work: receive the warning message of central control unit, if any warning, alarm buzzer is opened, the alarm lamp flicker provides warning message to other devices simultaneously.
Power module is used for powering to the computer antitheft device.
Parallel netting twine is meant the netting twine that two all makes by 568A standard or 568B standard, and it is connected the network interface of protected computer with the computer antitheft device.
The above; it only is one of preferable embodiment of the utility model; but protection domain of the present utility model is not limited thereto; anyly be familiar with the people of this technology in the disclosed technical scope of the utility model; the variation that can expect easily or replacement all should be encompassed within the protection domain of the present utility model.
Claims (2)
1. one kind is utilized the feature of network isolation transformer in the computer to come antitheft computer antitheft device, this device comprises: antitheft detection module, central control unit, alarm module, power module, parallel netting twine, it is characterized in that, described central control unit respectively with antitheft detection module, alarm module, power module is connected, one of antitheft detection module and parallel netting twine is connected, the other end of parallel netting twine is connected with the network interface of wanting antitheft computer, antitheft detection module, central control unit, alarm module, being to be connected by printed circuit board between the power module, is to be connected by the network interface socket between one of antitheft detection module and parallel netting twine.
2. a kind of feature of network isolation transformer in the computer of utilizing as claimed in claim 1 is come antitheft computer antitheft device, it is characterized in that, A/D sample circuit and network interface socket are arranged in the described antitheft detection module, the sampled point of A/D sample circuit is connected with the network interface socket, the magnitude of voltage of resistor network in the network isolation transformer is used for sampling in the computer of wanting antitheft, between A/D sample circuit and the network interface socket is to be connected by printed circuit board, and one of network interface socket and parallel netting twine is connected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2008201193891U CN201274049Y (en) | 2008-07-04 | 2008-07-04 | Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2008201193891U CN201274049Y (en) | 2008-07-04 | 2008-07-04 | Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201274049Y true CN201274049Y (en) | 2009-07-15 |
Family
ID=40884392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNU2008201193891U Expired - Lifetime CN201274049Y (en) | 2008-07-04 | 2008-07-04 | Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201274049Y (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016038459A1 (en) * | 2014-09-12 | 2016-03-17 | Meir Avganim | Pcb mounted security slot |
-
2008
- 2008-07-04 CN CNU2008201193891U patent/CN201274049Y/en not_active Expired - Lifetime
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016038459A1 (en) * | 2014-09-12 | 2016-03-17 | Meir Avganim | Pcb mounted security slot |
US10398045B2 (en) | 2014-09-12 | 2019-08-27 | Meir Avganim | PCB mounted security slot |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1838191A (en) | Anti-theft alarm for electric power cable | |
CN101609587A (en) | Wireless relay network power line anti-theft alarming system and method thereof | |
CN201274049Y (en) | Computer anti-theft apparatus using characteristic of network isolation transformer in computer for anti-theft | |
CN2864834Y (en) | Cable anti-theft and alarming device | |
CN101854042A (en) | Intelligent terminal box of GPRS (General Packet Radio Service) network list | |
CN107490748A (en) | A kind of overhead transmission line lightning monitoring device based on snap ring power taking technology | |
CN207302262U (en) | A kind of anti-theft device for transformer | |
CN2577293Y (en) | Electronic ilegal-use-proofing long-distance alarm watt-hour meter | |
CN101286836B (en) | Anti-theft method and device using characteristic of transformer insolated from network | |
CN202167109U (en) | Electrical fire hazard monitoring system | |
CN101504430A (en) | Electric power facilities theft monitoring method and monitor thereof | |
CN201570089U (en) | Intelligent protection system for self-service bank and automatic teller machine (ATM) | |
CN201191437Y (en) | Circuit anti-theft alarm device | |
CN201374109Y (en) | Anti-theft device for network device | |
CN103854453A (en) | Family remote security and protection monitoring alarm system based on WCDMA network | |
CN207007992U (en) | Fault arc detection device | |
CN111707853A (en) | Electric energy meter capable of preventing electricity theft | |
CN101246625A (en) | Common occasion full-time remote theft-proof system | |
CN202471883U (en) | Novel detector for preventing open circuits and short circuits | |
CN201576335U (en) | No-false alarm power transformer anti-theft alarming device | |
CN2932521Y (en) | Fault audio alarm circuit system | |
CN103414119A (en) | Ground wire mistaken installation preventing device of transformer substation | |
CN214473694U (en) | Breakdown indicator for line insulation device | |
CN202534089U (en) | Broken line antitheft early warning sensor with detection switch | |
CN201075239Y (en) | Integral anti-theft monitoring instrument |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term |
Granted publication date: 20090715 |