CN2658846Y - Radio distinguishing lock - Google Patents
Radio distinguishing lock Download PDFInfo
- Publication number
- CN2658846Y CN2658846Y CN03276634.3U CN03276634U CN2658846Y CN 2658846 Y CN2658846 Y CN 2658846Y CN 03276634 U CN03276634 U CN 03276634U CN 2658846 Y CN2658846 Y CN 2658846Y
- Authority
- CN
- China
- Prior art keywords
- receiver
- computer
- transmitter
- lock
- utility
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The utility model relates to a wireless identification lock, which is characterized in comprising: a portable emitter which is used to emit a confirming signal having an identification code; a receiver which is arranged at the computer and is connected with the computer by the USB interface of the computer to receive the confirming signal, the identification code in the confirming signal can be judged, the computer can be signed in according to the judge result, moreover whether the locking program of the computer is activated or not can determined by the confirming signal.
Description
Technical field
The utility model relates to a kind of wireless identification lock, the computer run of particularly a kind of utilization electronic circuit control, the wireless communication technique that is aided with transmitter and receiver cooperates the security software of being researched and developed at wireless identification lock fully again, realizes the wireless identification lock of confidentiality of computer data.
Background technology
Ask for an interview Fig. 1, the secrecy provision of the IBM Campatible computing machine of commonly using has two; One is under the DOS environment, has no the secrecy provision of any " user leaves away temporarily "; Another is under the MICROSOFT WINDOWS environment; be to be the simple screen protection program simple password protection of a dullness, password combination; subject to crack; and most users are the software had the knack of of a use itself all; for the complicated setting under the Windows; because of not haveing the knack of of itself; and all fail effectively to utilize; and this password is deposited in the system file of window; can be and have the knack of computing machine skill person and utilize the anti-group of technology of translating of ASCII character to be cracked; fail effectively to reach highly confidential, and be easy to steal the confidential data of computer-internal.
Summary of the invention
The purpose of this utility model provides a kind of wireless identification lock, utilize electronic circuit control computer run, the wireless communication technique that is aided with transmitter and receiver cooperates the security software of being researched and developed at wireless identification lock fully again, must usurp to avoid computer data.
Above-mentioned purpose of the present utility model is achieved in that a kind of wireless identification lock, it is characterized in that comprising:
One portable type transmitter, emission one has the affirmation signal of identification code;
One receiver is arranged on the computing machine place, and connects computing machine by USB interface of computer, be used to receive described confirmation signal, identification code in the confirmation signal is differentiated, according to differentiating log into thr computer as a result, and according to the lock program that activates computing machine that has or not of confirmation signal.
The utility model is elaborated with instantiation below in conjunction with accompanying drawing.
Description of drawings
Fig. 1 is a synoptic diagram of commonly using computing machine;
Fig. 2 shows one of the utility model situation, the synoptic diagram that the user goes out;
Fig. 3 shows one of the utility model situation, the synoptic diagram that the user returns;
Fig. 4 shows two of the utility model situation, the synoptic diagram that the user goes out;
Fig. 5 shows two of the utility model situation, the synoptic diagram that the user goes out;
Fig. 6 is the block scheme that shows the utility model receiver architecture;
Fig. 7 is the block scheme that shows the utility model emitter structures;
Fig. 8 has shown a kind of embodiment of the utility model receiver solid appearance;
Fig. 9 has shown a kind of embodiment that the entity of the utility model transmitter decomposes.
Description of reference numerals: 1 receiver; 2 transmitters; 3 USB slots; Outside the 4 expression certain distances; 5 users; 6 stealers; 7 receiving antennas; 8 bandpass filter; 9 low noises amplify; 10 mixers; 11 intermediate-frequency filters; 12 logarithmic amplifiers; 13 data leach device; 141 bit comparison analyzers; 15 phase-locked loops; 151 oscillators; 152 phase frequencies detect; 153 1/64; 154 voltage-controlled oscillatings; 155 charge circuits; 16 scramblers that receive; 17 confirm identification code; 18 arithmetic processors; 19 USB interface; 20 data transmission; 21 5V voltages continue; 22 emitting antennas; 23 amplitude modulation transmitter modules; 24 launching code devices; The arithmetic processor of 25 emissions; 26 identification numbers are set; 27 timers; The shell of 28 receivers; The loam cake of 291 transmitters; The lower cover of 292 transmitters; 293 flexible glue circles; 294 Locking screws; 30 circuit boards; A project hurdle; B project hurdle; C project hurdle; D project hurdle; E project hurdle; G locks picture; The H window picture; A input password hurdle; B input password hurdle; C input password hurdle; D input password hurdle; E input password hurdle.
Embodiment
As shown in Figure 1, when the carelessness of the computing machine of commonly using because of the user, and computing machine is not when having secrecy system, as easy as rolling off a log in the short time, capsule information are stolen, and also or secrecy provision imperfect, the stealer can translate and obtains password easily via the anti-group of intrasystem ASCII character.
As shown in Figure 2, the utility model by a receiver 1, a transmitter 2, and software form; Wherein this receiver 1 with USB interface 3 as and the computing machine bridge of linking up, when user 5 when in Windows following times, installed the dedicated secret software of this wireless identification lock, installation procedure can be fit into driver under the Windows in the lump, makes receiver 1 to link up and to control the activation of security software and close via USB interface and secure routine.
Situation one, as shown in Figure 2, receiver 1 and transmitter 2 all the time, receiver 1 and transmitter 2 are the mode with electronic circuit, rely on identical frequency, and launch a confirmation signal with a set time, this confirmation signal can make receiver 1 and transmitter 2 carry out wireless telecommunications by the user from ordering, and is sent by transmitter 2, receiver 1 receives, when if receiver 1 surpasses certain distance with transmitter 2, when then this moment, receiver 1 can't receive the signal of transmitter 2, receiver 1 just activated security software by USB interface immediately, and the function mode of this computer-chronograph can switch to locking mode by Windows originally, this moment, the computer-internal data was promptly protected, be difficult for stealing, as shown in Figure 3, when the user returns computing machine, when receiver 1 receives the signal that comes from transmitter 2, then, automatically switch to window picture H and lock picture G, when the user returns by the locking of receiver 1 via USB interface releasing security software, can be directly computed, to reach the confidential data safeguard function.
Situation two, as Fig. 3, shown in Figure 4, because of user's carelessness or because of other factors, cause receiver 1 of the present utility model wherein to have one not exist with transmitter 2, or both all not the time, do not influence the running of its exclusive secure routine this moment, but because of receiver 1 and transmitter 2 not cause, the user in temporary from the time need the last lock icon of window picture H lower right corner working line, can activate security software, this computer-chronograph presents locking picture G, as shown in Figure 5, in temporarily from after come back to computing machine after, also need input password and remove, after the releasing, computing machine then comes back to window picture H by locking picture G, the user can continue normally to use a computer, and also reaches the function of confidential data protection in the process.
As shown in Figure 2, the locking picture that security software presents is shown in G, F is the warning message hurdle, this is criminal offence to inform the stealer, literary composition can be by the user from ordering in the message, and A, B, C, D, E is the project hurdle, scroll bar all can be pulled out in each project hurdle, have the option more than six kinds in the scroll bar, as: " address; age; password; telephone number; wife's name; blank " etc., this six option names only is the convenient usefulness that explains orally, actual option names can be needed according to self and ordered certainly by the user, and all correspond to A under each project hurdle, B, C, D, the password hurdle of E, input password for the user, but be not that each project hurdle and password hurdle all need setting code, can be by user's demand itself, project hurdle and the password hurdle selected are wherein set, be not that five project hurdles and password all need be set, increase user's elasticity, also reduce its inconvenience greatly, and the stealer is when desiring to steal, at first must in project hurdle five options, select correct option, be input into correct password hurdle with correct password again, state can unlock, so cooperate six kinds of options with five project hurdles, cooperate with password again, it is very little to crack opportunity of success, make that to steal the data opportunity of success through this security software very little, more impossible in the user temporarily from a few minutes in crack success, so just can reach the purpose of confidential data protection.
Particularly, the utility model is a wireless identification lock, its embodiment provides the receiver 1 of computing machine use and the transmitter 2 that the person of being used carries, and be aided with software, to reach the purpose of confidential data protection, below at the action of this receiver 1, transmitter 2 internal circuits, describe with block scheme:
As shown in Figure 6, behind receiving antenna 7 reception signals, leach the signal of basic midband earlier through bandpass filter 8, and amplify 9 amplification signals via a low noise and send into mixer 10 and intermediate-frequency filter 11, but the noise that filtering is unnecessary, and after sending into logarithmic amplifier 12 and data and leaching device 13, can learn this correct signal, send into code translator 16 via 1 bit comparison analyzer 14 again and can correctly solve signal, again from the signal that solves, acquisition wherein identification code and to confirm that identification code 17 is confirmed, if this identification code mistake, then the signal of expression reception is external signal, so do not continued to handle with this signal, if identification code is correct, then send into arithmetic processor 18 and do bidirectional data transfers with usb 19, and carry out data transmission 20 with USB slot 3, wherein 5V operating voltage 21 is required operating voltage of USB work, when signal amplifies by low noise amplifier 9, for avoiding its frequency jitter, cause the malfunction of this circuit, so with an oscillator 151, phase frequency detects 152,1/64 ratio dwindles 153, voltage-controlled oscillating 154, and charge circuit 155 is as a phase-locked loop 15, can effectively pin this frequency of operation and unlikely beating, because this technology is the communicating circuit technology that those skilled in the art are easy to realize, so do not given unnecessary details at this.
As shown in Figure 7, this transmitter 2 at first needs to set 26 by an identification number and is set the identification number, and send into arithmetic processor 25 computings in addition, this arithmetic processor also needs a timer 27 to be assisted, this timer 27 is the indispensable supplementary module of an arithmetical unit, computing finish after just send into scrambler 24 and encoded, just can launch via antenna 22 by amplitude modulation transmitter module 23 after the end-of-encode, antenna 7 with receiver receives again, and as above treatment step in addition, as mechanics of communication of the present utility model.
Fig. 8 and Fig. 9 are the solid appearance of the utility model receiver 1 and transmitter 2, but its receiver outward appearance 28 and transmitter outward appearance 291,292 thereof are a kind of embodiment wherein, with screw 294 sealed these loam cakes 291 and lower cover 292 to form transmitter 2, but the utility model is non-limiting in the receiver 1 and transmitter 2 of outward appearance like this, allly hold circuit board of the present utility model and the person of being easy to carry all can be used as outward appearance of the present utility model, do not limited for the style of outward appearance.
Below the utility model and conventional art are compared:
Conventional art
1, manual locking.
2, manual unlocking.
3, do not leave away for the user temporarily and design.
4, crack easily.
5, it is easy to steal data.
The utility model
1, automatically locks.
2, automatic unlocking.
3, the design of temporarily leaving away at the user specially.
4, crack difficult.
5, steal the data difficulty.
6, provide the user multiple cryptoguard, crack more time-consuming and difficult.
Claims (1)
1, a kind of wireless identification lock is characterized in that comprising:
One portable type transmitter, emission one has the affirmation signal of identification code;
One receiver is arranged on the computing machine place, and connects computing machine by USB interface of computer, be used to receive described confirmation signal, identification code in the confirmation signal is differentiated, according to differentiating control computer operation as a result, and according to the lock program that activates computing machine that has or not of confirmation signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN03276634.3U CN2658846Y (en) | 2003-08-21 | 2003-08-21 | Radio distinguishing lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN03276634.3U CN2658846Y (en) | 2003-08-21 | 2003-08-21 | Radio distinguishing lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2658846Y true CN2658846Y (en) | 2004-11-24 |
Family
ID=34331656
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN03276634.3U Expired - Fee Related CN2658846Y (en) | 2003-08-21 | 2003-08-21 | Radio distinguishing lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2658846Y (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100375114C (en) * | 2005-09-12 | 2008-03-12 | 全观友 | Apparatus with electronic label and monitoring method thereof |
CN100375103C (en) * | 2005-09-12 | 2008-03-12 | 全观友 | Monitoring method of device having electronic label |
CN104238988A (en) * | 2014-09-28 | 2014-12-24 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104579555A (en) * | 2014-12-02 | 2015-04-29 | 中国电子科技集团公司第五十四研究所 | Scatter communication link control device based on level detection |
CN106663428A (en) * | 2014-07-16 | 2017-05-10 | 索尼公司 | Apparatus, method, non-transitory computer-readable medium and system |
GB2595381B (en) * | 2019-01-10 | 2023-05-03 | Ibm | Method and system for privacy preserving biometric authentication |
-
2003
- 2003-08-21 CN CN03276634.3U patent/CN2658846Y/en not_active Expired - Fee Related
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100375114C (en) * | 2005-09-12 | 2008-03-12 | 全观友 | Apparatus with electronic label and monitoring method thereof |
CN100375103C (en) * | 2005-09-12 | 2008-03-12 | 全观友 | Monitoring method of device having electronic label |
CN106663428A (en) * | 2014-07-16 | 2017-05-10 | 索尼公司 | Apparatus, method, non-transitory computer-readable medium and system |
CN104238988A (en) * | 2014-09-28 | 2014-12-24 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104238988B (en) * | 2014-09-28 | 2017-08-29 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN107506160A (en) * | 2014-09-28 | 2017-12-22 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN104579555A (en) * | 2014-12-02 | 2015-04-29 | 中国电子科技集团公司第五十四研究所 | Scatter communication link control device based on level detection |
CN104579555B (en) * | 2014-12-02 | 2017-11-14 | 中国电子科技集团公司第五十四研究所 | Scatter communication link data unit based on level detection |
GB2595381B (en) * | 2019-01-10 | 2023-05-03 | Ibm | Method and system for privacy preserving biometric authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6804699B1 (en) | Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server | |
US6275933B1 (en) | Security system for a computerized apparatus | |
US7512806B2 (en) | Security technique for controlling access to a network by a wireless device | |
US20060107073A1 (en) | System and method for equipment security cable lock interface | |
DE60125141T2 (en) | Security system to prevent theft and use of a personal computer by unauthorized users | |
US20030095690A1 (en) | Wireless fingerprint identity apparatus and method | |
US20030087601A1 (en) | Method and system for functionally connecting a personal device to a host computer | |
US20080147268A1 (en) | Method and apparatus for alternative performance of automobile features | |
CN2658846Y (en) | Radio distinguishing lock | |
CN1991661A (en) | Method for controlling computer input apparatus | |
JP2007172413A (en) | Electronic system and lock device | |
US20080244730A1 (en) | Security capability with an input device | |
JPH06146674A (en) | Data input device of ic key lock system | |
JP4565291B2 (en) | Information processing apparatus, information processing method, and program storage medium | |
EP1950679A1 (en) | Method for locking computer and device for the same | |
CN108369618A (en) | A kind of fingerprint identification method and terminal device | |
US9400896B2 (en) | Portable computer and security operating method thereof | |
EP3719688B1 (en) | Operation authentication relay device, method, and program | |
EP1848157A1 (en) | Technique for providing management of a motor vehicle information system | |
CN110032251B (en) | Host system and electronic lock unlocking method thereof | |
US7540023B2 (en) | Information processing apparatus and authentication program storage medium | |
CN105809233A (en) | Intelligent module card and using method thereof | |
WO2019047048A1 (en) | Fingerprint event processing device and method | |
CN112087498A (en) | System and method for remotely restoring factory settings of offline door lock | |
US20040128560A1 (en) | Security system preventing computer access upon removal from a controlled area |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |