CN202815852U - Portable computer terminal with safety and secrecy - Google Patents

Portable computer terminal with safety and secrecy Download PDF

Info

Publication number
CN202815852U
CN202815852U CN201220419884.0U CN201220419884U CN202815852U CN 202815852 U CN202815852 U CN 202815852U CN 201220419884 U CN201220419884 U CN 201220419884U CN 202815852 U CN202815852 U CN 202815852U
Authority
CN
China
Prior art keywords
module
computer terminal
processing unit
digital processing
portable computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN201220419884.0U
Other languages
Chinese (zh)
Inventor
李予温
王无敌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGSHENG GUOJI TECHNOLOGY Co Ltd
Original Assignee
ZHONGSHENG GUOJI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGSHENG GUOJI TECHNOLOGY Co Ltd filed Critical ZHONGSHENG GUOJI TECHNOLOGY Co Ltd
Priority to CN201220419884.0U priority Critical patent/CN202815852U/en
Application granted granted Critical
Publication of CN202815852U publication Critical patent/CN202815852U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model provides a portable computer terminal with safety and secrecy. The portable computer terminal with the safety and the secrecy comprises an embedded protection control board and a remote control center, wherein the remote control center is connected with the embedded protection control board in a wireless mode, and the embedded protection control board comprises a digital signal processor (DSP) and a positioning module. The positioning module sends collected positioning information of the portable computer terminal at regular time to the DSP. The DSP sends the positioning information to the remote control center through a wireless link, and the remote control center starts operation control according to the positioning information, and can confirm the detailed position information of the portable computer terminal through positioning so that safety of a personal computer is improved.

Description

A kind of have an anti-portable computer terminal of giving away secrets of safety
Technical field
The utility model relates to a kind of electronic product field, and particularly a kind of have an anti-portable computer terminal of giving away secrets of safety.
Background technology
Along with the fast development of infotech, the electronic equipment of the information processing take computing machine as core is widely used in the important departments such as party, political affairs, army, enterprise.Information security has not only become the key factor that concerns national security, war win and defeat, also is directly involved in the leakage of safety and the individual citizens privacy of enterprise's business information simultaneously.On the one hand, the characteristics such as computing machine is large with its information storage, information processing rate is fast have been plugged the wing of rapid development for governability, scientific and technological research and development, army building and enterprise development.On the other hand, develop rapidly along with the internet, computer network is divulged a secret day by day serious, the situations such as the losing of relating computer and concerning security matters carrier, unauthorized use, the use of non-security district cause gives away secrets, the leakage of a state or party secret, has become the difficult problem that Party and government offices, army, Defence business, scientific research institution and other private data public administration, service organization and Commercial Secrets of Enterprise and individual citizens privacy are had a headache very much.
Show according to interrelated data, in present security work, computer network and this class of electronic devices of portable computer lose the leakage of a state or party secret that causes, accounted for more than 70% of sum of divulging a secret, and be the trend of increase year after year.Computer information safe has risen becomes the major issue that is related to national security, economy and social safety, in the urgent need to new safety technique, guarantees the safety of electronic device information.
The information security of portable computer terminal is a system problem, relates to the core security problems such as identification and authentication, concerning security matters carrier monitoring, the self-destruction of concerning security matters carrier.The computer information safe series products is more at present, and every series products has all been realized a part of information security technology.But the solution for the safe neither one integral body of end message.
So how to provide a kind of and can effectively solve the existing above-mentioned potential safety hazard of present portable computer terminal, improve individual citizens with security and the privacy of machine, become the technical matters that needs to be resolved hurrily.
The utility model content
The technical problems to be solved in the utility model is how a kind of portable computer terminal is provided, and can effectively solve the problem of the existing potential safety hazard of portable computer terminal, and then improves security and the privacy of personal machine.
For solving the problems of the technologies described above, the utility model provides a kind of anti-portable computer terminal of giving away secrets of safety that has, and comprising: embedded defense controls plate and with the remote control center of described embedded defense controls plate wireless connections; Described embedded defense controls plate comprises: digital processing unit DSP and locating module; Described locating module, regularly will collect the portable computer terminal location information sends to described digital processing unit DSP, described digital processing unit DSP sends to described remote control center with described locating information by Radio Link, and described remote control center is controlled according to described locating information start-up operation.
Preferably, described locating module is two standing posture locating modules, comprises GPS locating module and/or GPRS locating module; Described GPS locating module is used for the portable computer terminal is carried out the global navigation satellite location; Described GPRS locating module is used for the wireless base station and positions.
Preferably, also comprise: authentication module; Described embedded defense controls plate also comprises: memory module and storage encryption module; Described authentication module, be used for judging according to the authentication information of user's input whether this user is authorized user, if, start the operating system and described authentication information is sent to described digital processing unit DSP, if not, described digital processing unit DSP judges whether the authentication information of input surpasses pre-determined number or time, if so, and then shutdown; If not, then again authentication; Described digital processing unit DSP is used for receiving the described authentication information that described authentication module sends, and starts described storage encryption module according to this authentication information; Described memory module is used for storing user's secret file; Described storage encryption module is used for according to described authentication information described secret file encryption.
Preferably, fingerprint identification module is used for judging according to the finger print information of user's input whether this user is authorized user.
Preferably, described authentication module also comprises face recognition module, be used for judged result at described fingerprint identification module for after being, when the user carries out login system, judge whether people's face information of pre-stored people's face information and described face recognition module collection mates; If coupling, the user enters operating system desktop and described face recognition module sends to described digital processing unit DSP with described match information, so that described digital processing unit DSP starts described storage encryption module according to this match information; If do not mate, computer terminal automatic shutdown then.
Preferably, described face recognition module also comprises the in good time comparing unit of people's face;
The in good time comparing unit of described people's face, being used for prestore people's face information of authorized user of people's face information of the in good time comparing unit of described people's face being collected after user's login and described computer compares, and comparison result is sent to described digital processing unit DSP, described digital processing unit DSP judges according to this comparison result, if so, computer normal operation; If not, described digital processing unit DSP judges whether comparison number of times or time surpass predefined value, and if so, then described people's face in good time comparing unit locking terminal screen and surpass Preset Time when lock-screen is then closed the computer terminal; If not, then normal operation.
Preferably, also comprise: the self-destruction hard disc module; Described self-destruction hard disc module is connected with computer main board; Described self-destruction hard disc module is used for the operation steering order according to described remote control center transmission, starts described self-destruction hard disc module, in order to destroy hard disc data or the interior data of described memory module on the described mainboard.
Preferably, described embedded defense controls plate also comprises: the plug detection module; Whether disconnect with computer main board for detection of described embedded defense controls plate, and testing result sent to described digital processing unit DSP, described digital processing unit DSP plugs judgement, if unauthorized extracting, described digital processing unit DSP, then send unauthorized orcible entry information to described remote control center, described remote control center sends described operation steering order, and described self-destruction hard disc module is destroyed data.
Preferably, described embedded defense controls plate also comprises: the port translation module is used for movable storage device and is connected with embedded defense controls plate.
Preferably, described embedded defense controls plate also comprises: Power Monitoring Unit and reserve battery module; Described Power Monitoring Unit is used for the power supply status of monitoring portable computer terminal, and monitored results sent to described digital processing unit DSP, described digital processing unit DSP carries out the power supply situation and judges, if power supply status is disconnection then starts described reserve battery module, provide electric power by described reserve battery module for described embedded-type security defense controls plate, otherwise then described digital processing unit DSP closes described reserve battery module, is the standby power supply charging by the reserve battery module.
With preferably, prior art is compared, characteristics of the present utility model are: the utility model can be so that the safety of portable computer terminal device realizes the strong protection of six aspects: the one, advance and do not come, the disabled user can't open pcs terminal equipment; The 2nd, can't see, the disabled user forbids reading the secret file in the computer terminal; The 3rd, do not ruin, the disabled user forbids deleting, revises, copies, copies the secret file; The 4th, can locate, when being lost, the portable computer terminal device can locate fast the loss orientation, give for change rapidly; The 5th, traceable, the portable computer terminal is in case stolen, and the rapid stolen escape route of location tracking is for public security organ provides clue to solve the case; The 6th, can destroy, when the portable computer terminal device is in high-risk or during uncontrollable environment, can utilizes mobile device to send the operation steering order by remote control center, destroy rapidly the data of storing in the hard disk in the computer terminal.
Therefore, the utility model has improved the security of portable computer terminal and the privacy that the user uses this portable computer terminal, has effectively prevented entering of disabled user.
Description of drawings
In order to be illustrated more clearly in the utility model embodiment and technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment and the description of the Prior Art, apparently, accompanying drawing in the following describes only is embodiment more of the present utility model, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is a kind of anti-portable computer terminal structure schematic diagram of giving away secrets of safety that has of the present utility model.
Fig. 2 is a kind of anti-portable computer terminal structure synoptic diagram of giving away secrets of safety that has of the present utility model;
Fig. 3 is a kind of process flow diagram with authentication identification of the anti-portable computer terminal of giving away secrets of safety of the present utility model.
Embodiment
The below will engage the accompanying drawing among the utility model embodiment, and the technical scheme among the utility model embodiment is clearly and completely described, and obviously, described embodiment only is the utility model part embodiment, rather than whole embodiment.Based on the embodiment in the utility model, those of ordinary skills are not making the every other embodiment that obtains under the creative work prerequisite, all belong to the scope of the utility model protection.
Please refer to shown in Figure 1ly, Fig. 1 is a kind of anti-portable computer terminal structure schematic diagram of giving away secrets of safety that has of the present utility model.
The utility model provides a kind ofly has an anti-portable computer terminal of giving away secrets of safety, comprising: embedded defense controls plate 1 and with the remote control center 2 of described embedded defense controls plate 1 wireless connections; Described embedded defense controls plate 1 comprises: digital processing unit DSP11 and locating module 12; Described locating module 12, regularly will collect the portable computer terminal location information sends to described digital processing unit DSP11, and described digital processing unit DSP11 sends to described remote control center 2 remote control centers 2 digital processing unit DSP11 with described locating information by Radio Link.
Described remote control center 2 is deployed on the remote computer or other mobile devices of a connecting Internet, realizes telemonitoring and security control to the anti-portable computer terminal of giving away secrets of all safety.For example: described remote control center 2 has one based on the interface of electronic chart, the place, position that can show in real time the anti-portable computer terminal of giving away secrets of safety, so, when being lost, the anti-portable computer terminal of giving away secrets of tool safety can locate fast the loss orientation, give for change rapidly, and in the stolen situation of computer, also can pass through rapidly the stolen escape route of location tracking, for public security organ provides clue to solve the case.
Above-mentioned remote control center 2 has one based on the interface of electronic chart, only be a kind of mode in order to realize that the anti-portable computer terminal sites position of giving away secrets of safety is realized, be not used for limiting the concrete structure of remote control center 2, embody as long as can realize particular location, all belong to the application's scope.
Described locating module 12 comprises GPS locating module and/or GPRS locating module; Described GPS locating module is used for the portable computer terminal is carried out the global navigation satellite location; Described GPRS locating module is used for the wireless base station and positions.
Described locating module 12 can be the bistatic location module of GPS/GPRS (WCDMA), realizes gps satellite location, GPRS (WCDMA) architecture, supports the transparent data transmission with remote control center 2.The GPS bearing accuracy: 10 meters, GPRS (WCDMA) architecture precision: 50 meters (final index with joined module index be as the criterion).
As shown in Figure 2, Fig. 2 is a kind of anti-portable computer terminal structure synoptic diagram of giving away secrets of safety that has of the present utility model.
Of the present utility model have an anti-portable computer terminal of giving away secrets of safety, also comprises: authentication module 3; Described embedded defense controls plate 1 also comprises: memory module 14 and storage encryption module 13; Described authentication module 3, be used for judging according to the authentication information of user's input whether this user is authorized user, if, start the operating system and described authentication information is sent to described digital processing unit DSP11, if not, described digital processing unit DSP11 judges whether the authentication information of input surpasses pre-determined number or time, if so, and then shutdown; If not, then again authentication;
Described digital processing unit DSP11 is used for receiving the described authentication information that described authentication module 3 sends, and starts described storage encryption module 13 according to this authentication information; Described memory module 14 is used for storing user's secret file; Described storage encryption module 13 is used for according to described authentication information described secret file encryption.
Described authentication module comprises: fingerprint identification module 31 is used for judging according to the finger print information of user's input whether this user is authorized user.
When the user need to use the anti-portable computer terminal of giving away secrets of this safety, behind the power switch of unlatching computer terminal, at first carry out fingerprint recognition, judge according to the finger print information of user's input whether this user is authorized user; If fingerprint recognition failure (that is: the user of input fingerprint is the machine unauthorized user), then shutdown.If fingerprint recognition success, then start the operating system and described finger print information is sent to described digital processing unit DSP11, described digital processing unit DSP11 starts described storage encryption module 13 according to this finger print information, described storage encryption module 13 realizes the secret file read-write with the password of this finger print information as secret file in the described memory module 14.That is to say, when the user opens described memory module 14 interior secret file, at first need to open this secret file by fingerprint recognition that in other words, this fingerprint recognition is as the password of opening the secret file.
The utility model provides a kind ofly has an anti-portable computer terminal of giving away secrets of safety, at first needs can start the operating system by authenticating party; Afterwards, user's secret file can be stored in described embedded defense controls plate 1, and with the password of described authentication information as the secret file, therefore, reached the purpose that the disabled user can't open pcs terminal equipment by the storage encryption module 13 in the described embedded defense controls plate 1; In addition, also so that the disabled user forbids reading the secret file in the computer terminal; Further the disabled user also can't delete, revise, copy, copy the secret file.So the utility model provides a kind ofly has that the anti-portable computer terminal of giving away secrets of safety is more effective to be protected the portable computer terminal.
Based on above-mentioned, cooperate shown in Figure 3ly in conjunction with Fig. 2, Fig. 3 is a kind of process flow diagram with authentication identification of the anti-portable computer terminal of giving away secrets of safety of the present utility model.
The utility model provides a kind ofly has an anti-portable computer terminal of giving away secrets of safety, and for after being, the user enters before the operating system desktop in described fingerprint identification module 31 judged results, need to carry out the login authentication based on recognition of face.By face recognition module 32, further strengthen the protection to the portable computer terminal.Judge whether people's face information that pre-stored people's face information and described face recognition module 32 gather mates; If coupling then normally enters operating system desktop; If do not mate, then it fails to match (that is, the disabled user can't login and enter desktop) in prompting.Face recognition module 32 sends to described digital processing unit DSP11 with described comparison information (no matter whether comparing successfully), and carries out log recording.If authorized user starts described storage encryption module 13, the data that adopt authorized user authentication information (biological attribute data information) to write to described memory module 14 are encrypted; Adopt the authorized user biological attribute data that the data of reading from described memory module 14 are decrypted.The security of computer terminal has further been strengthened in literal input when the utility model has been replaced existing login system with face recognition module 32.
The utility model provides a kind ofly has an anti-portable computer terminal of giving away secrets of safety, and described authentication module 3 face recognition module 32 also comprise the in good time comparing unit 321 of people's face; The in good time comparing unit 321 of described people's face, compare for the people's face information that after user's login the in good time comparing unit 321 of described people's face is collected and people's face information of described computer pre-stored, and comparison result is sent to described digital processing unit DSP11, described digital processing unit DSP11 judges according to this comparison result, if so, computer normal operation; If not, described digital processing unit DSP11 starts shutdown programm.Like this, although be authorized user when entering the computer terminal, if when the follow-up disabled user of having operates the computer terminal, compare by people's face in good time, further prevent the use of disabled user in the application process of computer terminal, and then improved the security of this computer terminal.
In addition, fingerprint identification module of the present utility model can be set the number of times of fingerprint recognition operation, if recognition failures (the machine unauthorized user), then the anti-portable computer terminal of giving away secrets of safety records the frequency of failure, and prompting is re-entered.Do not pass through such as N time, then shut down.If identification is passed through, the anti-portable computer terminal normal power-up of giving away secrets of safety starts, and starts the operating system.
And, described face recognition module 32, can set the precision and the time that gather people's face information, if the video monitoring N continuous minute does not collect legal authorized user people face information, terminal device will enter the blank screen holding state automatically, surpass M minute and still do not collect legal donor's face information, then computer terminal automatic shutdown.
Cooperate in conjunction with Fig. 1 shown in Figure 2, the utility model provides a kind of have the anti-portable computer of giving away secrets of safety eventually described in embedded defense controls plate 1 also comprise: also comprise: self-destruction hard disc module 4;
Described self-destruction hard disc module 4 is connected with computer main board 5; Described self-destruction hard disc module 4 is used for the operation steering order according to described remote control center 2 transmissions, starts described self-destruction hard disc module 4, in order to destroy hard disc data or described memory module 14 interior data on the described mainboard 5.(but self-destruction hard disc module 4 is the SSD solid state hard discs that possess soft self-destruction and hard self-destruction ability) is as long as receive the active data operation steering order that remote control center 2 sends, terminal device all will start self-destruction hard disc module 4 immediately, to the operation that the data in the memory module on the embedded defense controls plate 1 14 are removed, namely soft destruction.In addition, according to this operation steering order, control panel also will start the self-destruction program of SSD solid state hard disc, destroy rapidly physical hard disk.
The utility model provides a kind ofly has the described embedded defense controls plate 1 of the anti-portable computer of giving away secrets of safety in eventually and also comprises: plug detection module 15; Whether disconnect with computer main board 5 for detection of described embedded defense controls plate 1, and testing result sent to described digital processing unit DSP11, described digital processing unit DSP11 plugs judgement, and judged result sent to described remote control center 2, described remote control center 2 sends described destruction steering order, and described self-destruction hard disc module 4 is destroyed data.
Described digital processing unit DSP11 plugs judgement, if unauthorized extracting, described digital processing unit DSP11 then sends unauthorized orcible entry information to described remote control center 2, described remote control center 2 sends described operation steering order, and described self-destruction hard disc module 4 is destroyed data.If embedded defense controls plate 1 under management mode, has been closed embedded defense controls plate 1, can allow to pull up this defense controls plate, belong to this moment to authorize and extract; Extract if under normal operation mode, pull up embedded defense controls plate 1 then belong to unauthorized.
Described embedded defense controls plate 1 of the present utility model also comprises: port translation module 16 is used for movable storage device and is connected with embedded defense controls plate 1.Realize electric board USB Disk Mapping, be mounted in the Windows operating system as mobile memory medium, support that the user stores individual secret, confidential data.
In addition, described embedded defense controls plate 1 also comprises: Power Monitoring Unit 17 and reserve battery module 18; Described Power Monitoring Unit 17 is used for the power supply status of monitoring portable computer terminal, and monitored results sent to described digital processing unit DSP11, described digital processing unit DSP11 carries out the power supply situation and judges, if power supply status is disconnection then starts described reserve battery module 18, provide electric power by described reserve battery module 18 for described embedded-type security defense controls plate, otherwise, then described digital processing unit DSP11 closes described reserve battery module 18, is the standby power supply charging by reserve battery module 18.
Described Power Monitoring Unit 17, the power management of realization embedded-type security defense controls plate, and battery charging and discharging management.
Described reserve battery module 18 can be large capacity plate battery, is responsible for when externally power supply is without electricity embedded-type security defense controls plate is powered.
In addition, the memory module 14 in the utility model embedded-type security defense controls plate can be electric board on the FLASH(plate), the large capacity memory chips based on single-chip package is not less than 32GB, is used for stored encrypted data.Electric board drives realizes electric board read-write and data erase function, supports the controlled destruction of electric board data.
Described embedded-type security defense controls plate in the utility model can pass through SATA(USB) port controls with fingerprint identification module, face recognition module 32, the self-destruction hard disc module 4 of main board for notebook computer 5 and communicates by letter.
Digital processing unit DSP11 in the described embedded-type security defense controls plate in the utility model is based on the built-in Linux operating system platform, realize whole security protection control panel security protection, plug detection, monitoring position, communicate by letter with notebook mainboard 5.Support the steering order transfer function, user's steering order is transferred to remote control center 2.
Need to prove, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby not only comprise those key elements so that comprise process, method, article or the equipment of a series of key elements, but also comprise other key elements of clearly not listing, or also be included as the intrinsic key element of this process, method, article or equipment.
A kind of preferred implementation with the anti-portable computer terminal of giving away secrets of safety that the above only provides for the utility model does not consist of the restriction to the utility model protection domain.Number of components among this embodiment is not limited to the mode that adopts among the embodiment; any any modification of within spirit of the present utility model and principle, doing, be equal to and replace and improvement etc., all should be included within the claim protection domain of the present utility model.

Claims (10)

1. one kind has the anti-portable computer terminal of giving away secrets of safety, it is characterized in that, comprising: embedded defense controls plate and with the remote control center of described embedded defense controls plate wireless connections;
Described embedded defense controls plate comprises: digital processing unit DSP and locating module; Described locating module, regularly will collect the portable computer terminal location information sends to described digital processing unit DSP, described digital processing unit DSP sends to described remote control center with described locating information by Radio Link, and described remote control center is controlled according to described locating information start-up operation.
2. according to claims 1 described portable computer terminal, it is characterized in that described locating module is two standing posture locating modules, comprises GPS locating module and/or GPRS locating module; Described GPS locating module is used for the portable computer terminal is carried out the global navigation satellite location; Described GPRS locating module is used for the wireless base station and positions.
3. according to claims 1 described portable computer terminal, it is characterized in that, also comprise: authentication module; Described embedded defense controls plate also comprises: memory module and storage encryption module;
Described authentication module, be used for judging according to the authentication information of user's input whether this user is authorized user, if, start the operating system and described authentication information is sent to described digital processing unit DSP, if not, described digital processing unit DSP judges whether the authentication information of input surpasses pre-determined number or time, if so, and then shutdown; If not, then again authentication;
Described digital processing unit DSP is used for receiving the described authentication information that described authentication module sends, and starts described storage encryption module according to this authentication information;
Described memory module is used for storing user's secret file;
Described storage encryption module is used for according to described authentication information described secret file encryption.
4. described according to claim 3 have an anti-portable computer terminal of giving away secrets of safety, and it is characterized in that described authentication module comprises: fingerprint identification module is used for judging according to the finger print information of user's input whether this user is authorized user.
5. described according to claim 4 have an anti-portable computer terminal of giving away secrets of safety, it is characterized in that, described authentication module also comprises face recognition module, be used for judged result at described fingerprint identification module for after being, when the user carries out login system, judge whether people's face information of pre-stored people's face information and described face recognition module collection mates; If coupling, the user enters operating system desktop and described face recognition module sends to described digital processing unit DSP with described match information, so that described digital processing unit DSP starts described storage encryption module according to this match information; If do not mate, computer terminal automatic shutdown then.
6. described according to claim 5 have an anti-portable computer terminal of giving away secrets of safety, it is characterized in that described face recognition module also comprises the in good time comparing unit of people's face;
The in good time comparing unit of described people's face, being used for prestore people's face information of authorized user of people's face information of the in good time comparing unit of described people's face being collected after user's login and described computer compares, and comparison result is sent to described digital processing unit DSP, described digital processing unit DSP judges according to this comparison result, if so, computer normal operation; If not, described digital processing unit DSP judges whether comparison number of times or time surpass predefined value, and if so, then described people's face in good time comparing unit locking terminal screen and surpass Preset Time when lock-screen is then closed the computer terminal; If not, then normal operation.
7. described according to claim 1 have an anti-portable computer terminal of giving away secrets of safety, it is characterized in that, also comprises: the self-destruction hard disc module;
Described self-destruction hard disc module is connected with computer main board; Described self-destruction hard disc module is used for the operation steering order according to described remote control center transmission, starts described self-destruction hard disc module, in order to destroy hard disc data or the interior data of described memory module on the described mainboard.
8. described according to claim 7 have an anti-portable computer terminal of giving away secrets of safety, it is characterized in that described embedded defense controls plate also comprises: the plug detection module; Whether disconnect with computer main board for detection of described embedded defense controls plate, and testing result sent to described digital processing unit DSP, described digital processing unit DSP plugs judgement, if unauthorized extracting, described digital processing unit DSP, then send unauthorized orcible entry information to described remote control center, described remote control center sends described operation steering order, and described self-destruction hard disc module is destroyed data.
9. described according to claim 1 have an anti-portable computer terminal of giving away secrets of safety, and it is characterized in that described embedded defense controls plate also comprises: the port translation module is used for movable storage device and is connected with embedded defense controls plate.
10. described according to claim 1 have an anti-portable computer terminal of giving away secrets of safety, it is characterized in that described embedded defense controls plate also comprises: Power Monitoring Unit and reserve battery module; Described Power Monitoring Unit is used for the power supply status of monitoring portable computer terminal, and monitored results sent to described digital processing unit DSP, described digital processing unit DSP carries out the power supply situation and judges, if power supply status is disconnection then starts described reserve battery module, provide electric power by described reserve battery module for described embedded-type security defense controls plate, otherwise then described digital processing unit DSP closes described reserve battery module, is the standby power supply charging by the reserve battery module.
CN201220419884.0U 2012-08-22 2012-08-22 Portable computer terminal with safety and secrecy Expired - Lifetime CN202815852U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201220419884.0U CN202815852U (en) 2012-08-22 2012-08-22 Portable computer terminal with safety and secrecy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201220419884.0U CN202815852U (en) 2012-08-22 2012-08-22 Portable computer terminal with safety and secrecy

Publications (1)

Publication Number Publication Date
CN202815852U true CN202815852U (en) 2013-03-20

Family

ID=47874700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201220419884.0U Expired - Lifetime CN202815852U (en) 2012-08-22 2012-08-22 Portable computer terminal with safety and secrecy

Country Status (1)

Country Link
CN (1) CN202815852U (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855451A (en) * 2012-08-22 2013-01-02 中晟国计科技有限公司 Portable computer terminal with safe anti-secret-disclosing function
CN103247226A (en) * 2013-04-23 2013-08-14 北京小米科技有限责任公司 Method and device for determining electronic map
CN104934054A (en) * 2015-06-15 2015-09-23 南京理工大学 Localizable face recognition access control mobile storage device and implement method
CN105278652A (en) * 2014-07-25 2016-01-27 微动公司 Transmitter device and method for illuminating display of transmitter device
CN106355064A (en) * 2015-07-17 2017-01-25 联想(上海)信息技术有限公司 Security management method and device and electronic device
CN109583243A (en) * 2018-12-10 2019-04-05 中国运载火箭技术研究院 A kind of data safety guard system based on instruction

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855451A (en) * 2012-08-22 2013-01-02 中晟国计科技有限公司 Portable computer terminal with safe anti-secret-disclosing function
CN103247226A (en) * 2013-04-23 2013-08-14 北京小米科技有限责任公司 Method and device for determining electronic map
CN103247226B (en) * 2013-04-23 2015-10-14 小米科技有限责任公司 A kind of determination method and apparatus of electronic chart
CN105278652A (en) * 2014-07-25 2016-01-27 微动公司 Transmitter device and method for illuminating display of transmitter device
CN104934054A (en) * 2015-06-15 2015-09-23 南京理工大学 Localizable face recognition access control mobile storage device and implement method
CN106355064A (en) * 2015-07-17 2017-01-25 联想(上海)信息技术有限公司 Security management method and device and electronic device
CN109583243A (en) * 2018-12-10 2019-04-05 中国运载火箭技术研究院 A kind of data safety guard system based on instruction
CN109583243B (en) * 2018-12-10 2020-07-14 中国运载火箭技术研究院 Data safety protection system based on instruction

Similar Documents

Publication Publication Date Title
CN102855451A (en) Portable computer terminal with safe anti-secret-disclosing function
CN202815852U (en) Portable computer terminal with safety and secrecy
US8869308B2 (en) Computer motherboard having peripheral security functions
CA2893030C (en) Data security device
CN105787383A (en) Mitigations For Potentially Compromised Electronic Devices
CN101604367A (en) Dead on demand disk technology
CN102567235B (en) Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN102289623A (en) Anti-leakage laptop
CN102279814B (en) Encryption anti-copy system and anti-copy method thereof
CN2917099Y (en) 'Three-tolerant' digital black box for mission-critical computer system
CN101714123A (en) Document mobile memory device capable of ensuring information security and implementing method thereof
CN102594827B (en) Double-host security computer based on satellite system
CN101237353A (en) A method and system for monitoring mobile storage device based on USBKEY
CN104268469A (en) Mobile terminal and information security protection method and device thereof
CN106327652A (en) System and method for protecting electronic intelligent door locks and fingerprint locks
CN108388810A (en) A kind of mobile encrypted hard disk and encryption method of having electronic fence function
CN102434061B (en) Capacitive touch sensitive electronic safety box
CN102646177A (en) Single-host security computer based on satellite system
CN114239015A (en) Data security management method and device, data cloud platform and storage medium
CN104217177A (en) One-computer double-network physical isolation double-display computer with switching circuit
CN201993771U (en) Portable confidential computer
CN103473512A (en) Mobile storage medium management method and mobile storage medium management device
GB2481043A (en) Storage device adapted to physically destroy itself in response to an unauthorised access attempt
US9262619B2 (en) Computer system and method for protecting data from external threats

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20130320

CX01 Expiry of patent term