CN2658846Y - Radio distinguishing lock - Google Patents

Radio distinguishing lock Download PDF

Info

Publication number
CN2658846Y
CN2658846Y CN03276634.3U CN03276634U CN2658846Y CN 2658846 Y CN2658846 Y CN 2658846Y CN 03276634 U CN03276634 U CN 03276634U CN 2658846 Y CN2658846 Y CN 2658846Y
Authority
CN
China
Prior art keywords
receiver
computer
transmitter
lock
utility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN03276634.3U
Other languages
Chinese (zh)
Inventor
黄鋕铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quanmao Science & Technology Co Ltd
Original Assignee
Quanmao Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quanmao Science & Technology Co Ltd filed Critical Quanmao Science & Technology Co Ltd
Priority to CN03276634.3U priority Critical patent/CN2658846Y/en
Application granted granted Critical
Publication of CN2658846Y publication Critical patent/CN2658846Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model relates to a wireless identification lock, which is characterized in comprising: a portable emitter which is used to emit a confirming signal having an identification code; a receiver which is arranged at the computer and is connected with the computer by the USB interface of the computer to receive the confirming signal, the identification code in the confirming signal can be judged, the computer can be signed in according to the judge result, moreover whether the locking program of the computer is activated or not can determined by the confirming signal.

Description

Wireless identification lock
Technical field
The utility model relates to a kind of wireless identification lock, the computer run of particularly a kind of utilization electronic circuit control, the wireless communication technique that is aided with transmitter and receiver cooperates the security software of being researched and developed at wireless identification lock fully again, realizes the wireless identification lock of confidentiality of computer data.
Background technology
Ask for an interview Fig. 1, the secrecy provision of the IBM Campatible computing machine of commonly using has two; One is under the DOS environment, has no the secrecy provision of any " user leaves away temporarily "; Another is under the MICROSOFT WINDOWS environment; be to be the simple screen protection program simple password protection of a dullness, password combination; subject to crack; and most users are the software had the knack of of a use itself all; for the complicated setting under the Windows; because of not haveing the knack of of itself; and all fail effectively to utilize; and this password is deposited in the system file of window; can be and have the knack of computing machine skill person and utilize the anti-group of technology of translating of ASCII character to be cracked; fail effectively to reach highly confidential, and be easy to steal the confidential data of computer-internal.
Summary of the invention
The purpose of this utility model provides a kind of wireless identification lock, utilize electronic circuit control computer run, the wireless communication technique that is aided with transmitter and receiver cooperates the security software of being researched and developed at wireless identification lock fully again, must usurp to avoid computer data.
Above-mentioned purpose of the present utility model is achieved in that a kind of wireless identification lock, it is characterized in that comprising:
One portable type transmitter, emission one has the affirmation signal of identification code;
One receiver is arranged on the computing machine place, and connects computing machine by USB interface of computer, be used to receive described confirmation signal, identification code in the confirmation signal is differentiated, according to differentiating log into thr computer as a result, and according to the lock program that activates computing machine that has or not of confirmation signal.
The utility model is elaborated with instantiation below in conjunction with accompanying drawing.
Description of drawings
Fig. 1 is a synoptic diagram of commonly using computing machine;
Fig. 2 shows one of the utility model situation, the synoptic diagram that the user goes out;
Fig. 3 shows one of the utility model situation, the synoptic diagram that the user returns;
Fig. 4 shows two of the utility model situation, the synoptic diagram that the user goes out;
Fig. 5 shows two of the utility model situation, the synoptic diagram that the user goes out;
Fig. 6 is the block scheme that shows the utility model receiver architecture;
Fig. 7 is the block scheme that shows the utility model emitter structures;
Fig. 8 has shown a kind of embodiment of the utility model receiver solid appearance;
Fig. 9 has shown a kind of embodiment that the entity of the utility model transmitter decomposes.
Description of reference numerals: 1 receiver; 2 transmitters; 3 USB slots; Outside the 4 expression certain distances; 5 users; 6 stealers; 7 receiving antennas; 8 bandpass filter; 9 low noises amplify; 10 mixers; 11 intermediate-frequency filters; 12 logarithmic amplifiers; 13 data leach device; 141 bit comparison analyzers; 15 phase-locked loops; 151 oscillators; 152 phase frequencies detect; 153 1/64; 154 voltage-controlled oscillatings; 155 charge circuits; 16 scramblers that receive; 17 confirm identification code; 18 arithmetic processors; 19 USB interface; 20 data transmission; 21 5V voltages continue; 22 emitting antennas; 23 amplitude modulation transmitter modules; 24 launching code devices; The arithmetic processor of 25 emissions; 26 identification numbers are set; 27 timers; The shell of 28 receivers; The loam cake of 291 transmitters; The lower cover of 292 transmitters; 293 flexible glue circles; 294 Locking screws; 30 circuit boards; A project hurdle; B project hurdle; C project hurdle; D project hurdle; E project hurdle; G locks picture; The H window picture; A input password hurdle; B input password hurdle; C input password hurdle; D input password hurdle; E input password hurdle.
Embodiment
As shown in Figure 1, when the carelessness of the computing machine of commonly using because of the user, and computing machine is not when having secrecy system, as easy as rolling off a log in the short time, capsule information are stolen, and also or secrecy provision imperfect, the stealer can translate and obtains password easily via the anti-group of intrasystem ASCII character.
As shown in Figure 2, the utility model by a receiver 1, a transmitter 2, and software form; Wherein this receiver 1 with USB interface 3 as and the computing machine bridge of linking up, when user 5 when in Windows following times, installed the dedicated secret software of this wireless identification lock, installation procedure can be fit into driver under the Windows in the lump, makes receiver 1 to link up and to control the activation of security software and close via USB interface and secure routine.
Situation one, as shown in Figure 2, receiver 1 and transmitter 2 all the time, receiver 1 and transmitter 2 are the mode with electronic circuit, rely on identical frequency, and launch a confirmation signal with a set time, this confirmation signal can make receiver 1 and transmitter 2 carry out wireless telecommunications by the user from ordering, and is sent by transmitter 2, receiver 1 receives, when if receiver 1 surpasses certain distance with transmitter 2, when then this moment, receiver 1 can't receive the signal of transmitter 2, receiver 1 just activated security software by USB interface immediately, and the function mode of this computer-chronograph can switch to locking mode by Windows originally, this moment, the computer-internal data was promptly protected, be difficult for stealing, as shown in Figure 3, when the user returns computing machine, when receiver 1 receives the signal that comes from transmitter 2, then, automatically switch to window picture H and lock picture G, when the user returns by the locking of receiver 1 via USB interface releasing security software, can be directly computed, to reach the confidential data safeguard function.
Situation two, as Fig. 3, shown in Figure 4, because of user's carelessness or because of other factors, cause receiver 1 of the present utility model wherein to have one not exist with transmitter 2, or both all not the time, do not influence the running of its exclusive secure routine this moment, but because of receiver 1 and transmitter 2 not cause, the user in temporary from the time need the last lock icon of window picture H lower right corner working line, can activate security software, this computer-chronograph presents locking picture G, as shown in Figure 5, in temporarily from after come back to computing machine after, also need input password and remove, after the releasing, computing machine then comes back to window picture H by locking picture G, the user can continue normally to use a computer, and also reaches the function of confidential data protection in the process.
As shown in Figure 2, the locking picture that security software presents is shown in G, F is the warning message hurdle, this is criminal offence to inform the stealer, literary composition can be by the user from ordering in the message, and A, B, C, D, E is the project hurdle, scroll bar all can be pulled out in each project hurdle, have the option more than six kinds in the scroll bar, as: " address; age; password; telephone number; wife's name; blank " etc., this six option names only is the convenient usefulness that explains orally, actual option names can be needed according to self and ordered certainly by the user, and all correspond to A under each project hurdle, B, C, D, the password hurdle of E, input password for the user, but be not that each project hurdle and password hurdle all need setting code, can be by user's demand itself, project hurdle and the password hurdle selected are wherein set, be not that five project hurdles and password all need be set, increase user's elasticity, also reduce its inconvenience greatly, and the stealer is when desiring to steal, at first must in project hurdle five options, select correct option, be input into correct password hurdle with correct password again, state can unlock, so cooperate six kinds of options with five project hurdles, cooperate with password again, it is very little to crack opportunity of success, make that to steal the data opportunity of success through this security software very little, more impossible in the user temporarily from a few minutes in crack success, so just can reach the purpose of confidential data protection.
Particularly, the utility model is a wireless identification lock, its embodiment provides the receiver 1 of computing machine use and the transmitter 2 that the person of being used carries, and be aided with software, to reach the purpose of confidential data protection, below at the action of this receiver 1, transmitter 2 internal circuits, describe with block scheme:
As shown in Figure 6, behind receiving antenna 7 reception signals, leach the signal of basic midband earlier through bandpass filter 8, and amplify 9 amplification signals via a low noise and send into mixer 10 and intermediate-frequency filter 11, but the noise that filtering is unnecessary, and after sending into logarithmic amplifier 12 and data and leaching device 13, can learn this correct signal, send into code translator 16 via 1 bit comparison analyzer 14 again and can correctly solve signal, again from the signal that solves, acquisition wherein identification code and to confirm that identification code 17 is confirmed, if this identification code mistake, then the signal of expression reception is external signal, so do not continued to handle with this signal, if identification code is correct, then send into arithmetic processor 18 and do bidirectional data transfers with usb 19, and carry out data transmission 20 with USB slot 3, wherein 5V operating voltage 21 is required operating voltage of USB work, when signal amplifies by low noise amplifier 9, for avoiding its frequency jitter, cause the malfunction of this circuit, so with an oscillator 151, phase frequency detects 152,1/64 ratio dwindles 153, voltage-controlled oscillating 154, and charge circuit 155 is as a phase-locked loop 15, can effectively pin this frequency of operation and unlikely beating, because this technology is the communicating circuit technology that those skilled in the art are easy to realize, so do not given unnecessary details at this.
As shown in Figure 7, this transmitter 2 at first needs to set 26 by an identification number and is set the identification number, and send into arithmetic processor 25 computings in addition, this arithmetic processor also needs a timer 27 to be assisted, this timer 27 is the indispensable supplementary module of an arithmetical unit, computing finish after just send into scrambler 24 and encoded, just can launch via antenna 22 by amplitude modulation transmitter module 23 after the end-of-encode, antenna 7 with receiver receives again, and as above treatment step in addition, as mechanics of communication of the present utility model.
Fig. 8 and Fig. 9 are the solid appearance of the utility model receiver 1 and transmitter 2, but its receiver outward appearance 28 and transmitter outward appearance 291,292 thereof are a kind of embodiment wherein, with screw 294 sealed these loam cakes 291 and lower cover 292 to form transmitter 2, but the utility model is non-limiting in the receiver 1 and transmitter 2 of outward appearance like this, allly hold circuit board of the present utility model and the person of being easy to carry all can be used as outward appearance of the present utility model, do not limited for the style of outward appearance.
Below the utility model and conventional art are compared:
Conventional art
1, manual locking.
2, manual unlocking.
3, do not leave away for the user temporarily and design.
4, crack easily.
5, it is easy to steal data.
The utility model
1, automatically locks.
2, automatic unlocking.
3, the design of temporarily leaving away at the user specially.
4, crack difficult.
5, steal the data difficulty.
6, provide the user multiple cryptoguard, crack more time-consuming and difficult.

Claims (1)

1, a kind of wireless identification lock is characterized in that comprising:
One portable type transmitter, emission one has the affirmation signal of identification code;
One receiver is arranged on the computing machine place, and connects computing machine by USB interface of computer, be used to receive described confirmation signal, identification code in the confirmation signal is differentiated, according to differentiating control computer operation as a result, and according to the lock program that activates computing machine that has or not of confirmation signal.
CN03276634.3U 2003-08-21 2003-08-21 Radio distinguishing lock Expired - Fee Related CN2658846Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN03276634.3U CN2658846Y (en) 2003-08-21 2003-08-21 Radio distinguishing lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN03276634.3U CN2658846Y (en) 2003-08-21 2003-08-21 Radio distinguishing lock

Publications (1)

Publication Number Publication Date
CN2658846Y true CN2658846Y (en) 2004-11-24

Family

ID=34331656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN03276634.3U Expired - Fee Related CN2658846Y (en) 2003-08-21 2003-08-21 Radio distinguishing lock

Country Status (1)

Country Link
CN (1) CN2658846Y (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100375114C (en) * 2005-09-12 2008-03-12 全观友 Apparatus with electronic label and monitoring method thereof
CN100375103C (en) * 2005-09-12 2008-03-12 全观友 Monitoring method of device having electronic label
CN104238988A (en) * 2014-09-28 2014-12-24 联想(北京)有限公司 Information processing method and electronic equipment
CN104579555A (en) * 2014-12-02 2015-04-29 中国电子科技集团公司第五十四研究所 Scatter communication link control device based on level detection
CN106663428A (en) * 2014-07-16 2017-05-10 索尼公司 Apparatus, method, non-transitory computer-readable medium and system
GB2595381B (en) * 2019-01-10 2023-05-03 Ibm Method and system for privacy preserving biometric authentication

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100375114C (en) * 2005-09-12 2008-03-12 全观友 Apparatus with electronic label and monitoring method thereof
CN100375103C (en) * 2005-09-12 2008-03-12 全观友 Monitoring method of device having electronic label
CN106663428A (en) * 2014-07-16 2017-05-10 索尼公司 Apparatus, method, non-transitory computer-readable medium and system
CN104238988A (en) * 2014-09-28 2014-12-24 联想(北京)有限公司 Information processing method and electronic equipment
CN104238988B (en) * 2014-09-28 2017-08-29 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN107506160A (en) * 2014-09-28 2017-12-22 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN104579555A (en) * 2014-12-02 2015-04-29 中国电子科技集团公司第五十四研究所 Scatter communication link control device based on level detection
CN104579555B (en) * 2014-12-02 2017-11-14 中国电子科技集团公司第五十四研究所 Scatter communication link data unit based on level detection
GB2595381B (en) * 2019-01-10 2023-05-03 Ibm Method and system for privacy preserving biometric authentication

Similar Documents

Publication Publication Date Title
US6804699B1 (en) Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server
US6275933B1 (en) Security system for a computerized apparatus
US7512806B2 (en) Security technique for controlling access to a network by a wireless device
US20060107073A1 (en) System and method for equipment security cable lock interface
DE60125141T2 (en) Security system to prevent theft and use of a personal computer by unauthorized users
US20030095690A1 (en) Wireless fingerprint identity apparatus and method
US20030087601A1 (en) Method and system for functionally connecting a personal device to a host computer
US20080147268A1 (en) Method and apparatus for alternative performance of automobile features
CN2658846Y (en) Radio distinguishing lock
CN1991661A (en) Method for controlling computer input apparatus
JP2007172413A (en) Electronic system and lock device
US20080244730A1 (en) Security capability with an input device
JPH06146674A (en) Data input device of ic key lock system
JP4565291B2 (en) Information processing apparatus, information processing method, and program storage medium
EP1950679A1 (en) Method for locking computer and device for the same
CN108369618A (en) A kind of fingerprint identification method and terminal device
US9400896B2 (en) Portable computer and security operating method thereof
EP3719688B1 (en) Operation authentication relay device, method, and program
EP1848157A1 (en) Technique for providing management of a motor vehicle information system
CN110032251B (en) Host system and electronic lock unlocking method thereof
US7540023B2 (en) Information processing apparatus and authentication program storage medium
CN105809233A (en) Intelligent module card and using method thereof
WO2019047048A1 (en) Fingerprint event processing device and method
CN112087498A (en) System and method for remotely restoring factory settings of offline door lock
US20040128560A1 (en) Security system preventing computer access upon removal from a controlled area

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee