CN109886049A - A kind of device and method that computer violence dismantling detection prevents data to be stolen - Google Patents
A kind of device and method that computer violence dismantling detection prevents data to be stolen Download PDFInfo
- Publication number
- CN109886049A CN109886049A CN201910048971.6A CN201910048971A CN109886049A CN 109886049 A CN109886049 A CN 109886049A CN 201910048971 A CN201910048971 A CN 201910048971A CN 109886049 A CN109886049 A CN 109886049A
- Authority
- CN
- China
- Prior art keywords
- hard disk
- module
- destroy
- control module
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 title claims abstract description 15
- 230000006698 induction Effects 0.000 claims abstract description 34
- 230000006378 damage Effects 0.000 claims abstract description 27
- 230000005540 biological transmission Effects 0.000 claims description 7
- 230000008447 perception Effects 0.000 claims 1
- 230000005611 electricity Effects 0.000 description 7
- 230000000295 complement effect Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000000465 moulding Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of device and method that computer violence dismantling detection prevents data to be stolen, and device includes destroying control module, and destruction control module, which is connected with, destroys switch module, power module, can destroy hard disk and apart from induction module;Power module also with can destroy hard disk and connect;Control module is destroyed, for receiving the distance change signal apart from induction module, and when the signal of destroying switch module is enabled, will can destroy the destruction flag bit set of hard disk;Hard disk being destroyed, when for receiving the set signal for destroying control module, flag bit set will be destroyed;It is automatic to carry out hard disc data destruction when being also used to receive the power on signal of power module, and destroying flag bit and be set;Power module is powered for giving to destroy control module and can destroy hard disk;Apart from induction module, when for detecting that the distance change of hard disk and mainboard is more than given threshold, issuing distance change signal and giving destruction control module.
Description
Technical field
The invention belongs to the computer of variform and data protection fields, and in particular to a kind of computer violence dismantling inspection
Survey the device and method for preventing data to be stolen.
Background technique
With the speed-raising of informatization, the variation of society in the information age is aggravating.It is 2 years especially nearest, state
Border information security situation is more and more severeer, while information security is also increasingly paid attention in countries in the world, and has been raised to country
The important component of security strategy.
Office realm is wanted in safe machine, data safety is even more extremely urgent thing, if computer is accidentally lost or is stolen,
Perhaps, system password can play certain protective action, but if computer disintegrated, data storage medium to be articulated to
Data equally can be stolen out by criminal on other computer, not can guarantee data safety.
This is the deficiencies in the prior art, therefore in view of the above-mentioned drawbacks in the prior art, provides a kind of computer violence and tears open
The device and method that solution detection prevents data to be stolen, is necessary.
Summary of the invention
For the above-mentioned deficiency of the prior art, the present invention, which provides a kind of computer violence dismantling detection, prevents data to be stolen
Device and method, to solve the above technical problems.
In a first aspect, the present invention provides a kind of device that computer violence dismantling detection prevents data to be stolen, including pin
Control module is ruined, control module is destroyed and is connected with destruction switch module, power module, hard disk can be destroyed and apart from induction module;
Power module also with can destroy hard disk and connect;
Control module is destroyed, for receiving the distance change signal apart from induction module, and the signal for destroying switch module makes
When energy, the destruction flag bit set of hard disk will can be destroyed;
Hard disk being destroyed, when for receiving the set signal for destroying control module, flag bit set will be destroyed;It is also used to receive
It is automatic to carry out hard disc data destruction to the power on signal of power module, and when destroying flag bit and being set, and mark can be destroyed
Position is reset;
Power module is powered for giving to destroy control module and can destroy hard disk;
Apart from induction module, when for detecting that the distance change of hard disk and mainboard is more than given threshold, distance change letter is issued
Number to destroy control module.The present apparatus can be opened or closed by destroying switch module, when device is opened, be detected apart from induction module
When stealing hard disc data by violent means to criminal, hard disk flag bit set can be destroyed by destroying control module, can be sold
It ruins and carries out data destroying when hard disk powers on again;And when device closing, staff can carry out hard disk dismantling.Detect violence
Dismantling will can only destroy the destruction flag bit set of hard disk, greatly save electricity consumption, and extend battery uses the time, realize simultaneously
Data protection to various forms computer and server.
Further, power module includes main power source, battery and power supply switch unit;
Main power source is connect with power supply switch unit with battery, power supply switch unit also with destroy control module and can destroy hard disk
Connection;
Power supply switch unit, for carrying out main power source and battery powered switching;
In booting computer, main power source is supplied to destroy control module and hard disk can be destroyed and is powered;It, will be electric in computer shutdown
Pond is supplied to destroy control module and can destroy hard disk and power.Power supply switch unit realizes main power source and cuts with battery powered
It changes, the two is complementary to one another the safety of effective protection hard disc data, while using electricity wisely again.
Further, destroying switch module includes mechanical switch unit and soft switching cell.It both can be by the present apparatus
It opens or closes, the mechanical switch of mechanical switch unit is arranged in casing internal, when needing to change mechanical switch state, needs elder generation
Casing is dismantled, mechanical switch state is changed using mechanical switch movement equipment, while control can destroy hard disk at a distance from mainboard
It does not change, that is, guaranteeing will not be to destruction control module transmission range variable signal apart from induction module.
Further, soft switching cell includes system software tool and system software driving.The system of soft switching cell is soft
Part tool only has system manager that could use, i.e., only system manager just has the right to open or close the present apparatus, system administration
Member is by the movement of system software tool to the switching signal for destroying the control module transmission present apparatus after system software drives.
It further, include Hall sensor and magnet apart from induction module;
A setting in Hall sensor and magnet can destroy on hard disk, another setting can destroy the mainboard where hard disk
On.Hall sensor and magnet are an entirety, initial low and high level signal between magnet and Hall sensor, in the two
It when distance changes, can change simultaneously, at this point, Hall sensor, which issues distance change signal, gives destruction control module.
Second aspect, the present invention provide a kind of computer violence method that dismantling detection prevents data to be stolen and walk as follows
It is rapid:
When S1. destroying distance change signal of the control module reception apart from induction module, judge that the signal for destroying switch module is
It is no enabled;
S2. if so, the destruction flag bit set of hard disk will can be destroyed by destroying control module;
When S3. can destroy hard disk and receiving the power on signal of power module, judge to destroy flag bit whether set;
S4. if so, can destroy hard disk carries out hard disc data destruction automatically, and flag bit clearing can be destroyed.Apart from induction module
Detect that criminal steals hard disc data by violent means, and destroy switch module it is enabled when, destroying control module can
The set of hard disk flag bit is destroyed, can destroy when hard disk powers on again and carry out data destroying;Detect that violence dismantling can only be sold
The destruction flag bit set for ruining hard disk, greatlys save electricity consumption, extends the time that uses of battery, meanwhile, it realizes to various forms
The data protection of computer and server.
Further, in step S2, if the signal for destroying switch module is not enabled on, control module is destroyed not to can destroy
Hard disk is operated.The present apparatus can be opened or closed by destroying switch module, and when device is closed, staff can carry out hard disk
Dismantling.
Further, in step S4, if destroying the non-set of flag bit, hard disk can be destroyed without operation.Each computer
When booting, can destroy hard disk will carry out once destroying flag bit detection, be set if destroying flag bit, illustrate this hard disk by into
It has gone violence dismantling, has needed auto-destruct data, if destroying the non-set of flag bit, illustrated that hard disk Environmental security can be destroyed, have
Effect guarantees data security.
Further, further include following steps before step S1:
S1A. judge whether hard disk is more than given threshold at a distance from mainboard apart from induction module;
S2A. if so, entering step S1 apart from induction module to control module transmission range variable signal is destroyed;
If it is not, then apart from induction module without operation.By being effectively detected whether computer carries out cruelly apart from induction module
Power is disassembled and obtains hard disk.
It further, further include following steps before step S1;
S1B. judge computer on/off state;
S2B. when computer booting, power supply switch unit provide main power source to can destroy hard disk and destroy control module power supply;
Enter step S1;
When the computer is turned off, power supply switch unit provide battery to can destroy hard disk and destroy control module power supply;Into step
Rapid S1.Power supply switch unit realizes main power source and battery powered switching, and the two is complementary to one another effective protection hard disc data
Safety, while using electricity wisely again.
The beneficial effects of the present invention are,
The present invention can be opened or closed the present apparatus by destroying switch module, when device is opened, be detected apart from induction module
When criminal steals hard disc data by violent means, hard disk flag bit set can be destroyed by destroying control module, can be destroyed
Data destroying is carried out when hard disk powers on again;And when device closing, staff can carry out hard disk dismantling.Detect that violence is torn open
Solution will can only destroy the destruction flag bit set of hard disk, greatly save electricity consumption, and extend battery uses the time, realize simultaneously
Data protection to various forms computer and server.
In addition, design principle of the present invention is reliable, structure is simple, has very extensive application prospect.
It can be seen that compared with prior art, the present invention implementing with substantive distinguishing features outstanding and significant progress
Beneficial effect be also obvious.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic diagram of the device of one embodiment of the invention.
Fig. 2 is the method flow diagram of one embodiment of the invention.
In figure, 1- destroys control module;2- destroys switch module;2.1- mechanical switch unit;2.2- soft switching cell;3-
Power module;3.1- main power source;3.2- battery;3.3- battery switch unit;4- can destroy hard disk;5- is apart from induction module;
5.1- Hall sensor;5.2- magnet.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, below in conjunction with of the invention real
The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation
Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without making creative work, all should belong to protection of the present invention
Range.
Embodiment 1:
As shown in Figure 1, the present invention provides a kind of device that computer violence dismantling detection prevents data to be stolen, including destroy control
Molding block 1 destroys control module 1 and is connected with destruction switch module 2, power module 3, can destroy hard disk 4 and apart from induction module
5;
Power module 3 also with can destroy hard disk 4 and connect;
Destroying switch module 2 includes mechanical switch unit 2.1 and soft switching cell 2.2;Soft switching cell 2.2 includes system software
Tool and system software driving;Mechanical switch unit 2.1 and soft switching cell 2.2 can open or close the present apparatus, machine
The mechanical switch of tool switch unit 2.1 is arranged in casing internal, when needing to change mechanical switch state, needs first to dismantle casing,
Mechanical switch state is changed using mechanical switch movement equipment, while control can destroy hard disk 4 and not become at a distance from mainboard
Change, that is, guaranteeing will not be to destruction 1 transmission range variable signal of control module apart from induction module 5;The system of soft switching cell 2.2
Software tool only has system manager that could use, i.e., only system manager just has the right to open or close the present apparatus, system pipes
Reason person is believed after system software drives to the switch for destroying the transmission present apparatus of control module 1 by the movement of system software tool
Number;
Control module 1 is destroyed, for receiving the distance change signal apart from induction module 5, and destroys the signal of switch module 2
When enabled, the destruction flag bit set of hard disk 4 will can be destroyed;
Hard disk 4 being destroyed, when for receiving the set signal for destroying control module 4, flag bit set will be destroyed;It is also used to connect
It is automatic to carry out hard disc data destruction when receiving the power on signal of power module 3, and destroying flag bit and be set, and marked destroying
Will position is reset;
Power module 3 is powered for giving to destroy control module 1 and can destroy hard disk 4;Power module 3 include main power source 3.1,
Battery 3.2 and power supply switch unit 3.3;
Main power source 3.1 is connect with power supply switch unit 3.3 with battery 3.2, power supply switch unit 3.3 also with destroy control module
1 and can destroy hard disk 4 connection;
Power supply switch unit 3.3, the switching powered for carrying out main power source 3.1 and battery 3.2;
In booting computer, main power source 3.1 is supplied to destroy control module 1 and hard disk 4 can be destroyed and is powered;It shuts down in computer
When, battery 3.2 is supplied to destroy control module 1 and hard disk 4 can be destroyed and is powered;Power supply switch unit 3.3 realizes main power source
3.1 switchings powered with battery 3.2, the two is complementary to one another the safety of effective protection hard disc data, while using electricity wisely again;
Apart from induction module 5, when for detecting that the distance change of hard disk and mainboard is more than given threshold, distance change letter is issued
Number to destroy control module 1;It include Hall sensor 5.1 and magnet 5.2 apart from induction module 5;Hall sensor 5.1 and magnet
One in 5.2 is arranged on it can destroy hard disk 4, another setting can destroy on the mainboard at 4 place of hard disk;Hall sensor
5.1 and magnet 5.2 be an entirety, initial low and high level signal between magnet 5.2 and Hall sensor 5.1, in the two
It when distance changes, can change simultaneously, at this point, Hall sensor 5.1, which issues distance change signal, gives destruction control mould
Block 1.
Embodiment 2:
As shown in Fig. 2, the present invention provides a kind of method that computer violence dismantling detection prevents data to be stolen, including walk as follows
It is rapid:
S1B. judge computer on/off state;
S2B. when computer booting, power supply switch unit provide main power source to can destroy hard disk and destroy control module power supply;
Enter step S1A;
When the computer is turned off, power supply switch unit provide battery to can destroy hard disk and destroy control module power supply;Into step
Rapid S1A;Power supply switch unit realizes main power source and battery powered switching, and the two is complementary to one another effective protection hard disc data
Safety, while using electricity wisely again;
S1A. judge whether hard disk is more than given threshold at a distance from mainboard apart from induction module;
S2A. if so, entering step S1 apart from induction module to control module transmission range variable signal is destroyed;Pass through distance
Induction module is effectively detected whether computer carries out violence dismantling and obtains hard disk;
If it is not, then apart from induction module without operation;
When S1. destroying distance change signal of the control module reception apart from induction module, judge that the signal for destroying switch module is
It is no enabled;
S2. if so, the destruction flag bit set of hard disk will can be destroyed by destroying control module;
It is not operated to hard disk can be destroyed if it is not, then destroying control module;Destroying switch module can open the present apparatus or close
It closes, when device is closed, staff can carry out hard disk dismantling;
When S3. can destroy hard disk and receiving the power on signal of power module, judge to destroy flag bit whether set;
S4. if so, can destroy hard disk carries out hard disc data destruction automatically, and flag bit clearing can be destroyed;
If it is not, can then destroy hard disk without operation;
When each booting computer, can destroy hard disk will carry out once destroying flag bit detection, be set, say if destroying flag bit
This bright hard disk has been carried out violence dismantling, needs auto-destruct data, if destroying the non-set of flag bit, illustrates that hard disk can be destroyed
Data safety is effectively ensured in Environmental security.
Although by reference to attached drawing and combining the mode of preferred embodiment to the present invention have been described in detail, the present invention
It is not limited to this.Without departing from the spirit and substance of the premise in the present invention, those of ordinary skill in the art can be to the present invention
Embodiment carry out various equivalent modifications or substitutions, and these modifications or substitutions all should in covering scope of the invention/appoint
What those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, answer
It is included within the scope of the present invention.Therefore, protection scope of the present invention is answered described is with scope of protection of the claims
It is quasi-.
Claims (10)
1. a kind of device that computer violence dismantling detection prevents data to be stolen, which is characterized in that including destroying control module
(1), it destroys control module (1) and is connected with and destroy switch module (2), power module (3), hard disk (4) can be destroyed and distance perception is answered
Module (5);
Power module (3) also with can destroy hard disk (4) and connect;
It destroys control module (1), for receiving the distance change signal apart from induction module (5), and destroys switch module (2)
Signal it is enabled when, the destruction flag bit set of hard disk (4) can be destroyed;
Hard disk (4) being destroyed, when for receiving the set signal for destroying control module (4), flag bit set will be destroyed;Also use
It is automatic to carry out hard disc data destruction in the power on signal for receiving power module (3), and when destroying flag bit and being set, and will
Flag bit is destroyed to reset;
Power module (3) is powered for giving to destroy control module (1) and can destroy hard disk (4);
Distance change is issued when for detecting that the distance change of hard disk and mainboard is more than given threshold apart from induction module (5)
Signal is to destruction control module (1).
2. the device that a kind of computer violence dismantling detection as described in claim 1 prevents data to be stolen, which is characterized in that
Power module (3) includes main power source (3.1), battery (3.2) and power supply switch unit (3.3);
Main power source (3.1) is connect with power supply switch unit (3.3) with battery (3.2), power supply switch unit (3.3) also with destruction
Control module (1) and can destroy hard disk (4) connection;
Power supply switch unit (3.3), for carrying out the switching of main power source (3.1) and battery (3.2) power supply;
In booting computer, main power source (3.1) is supplied to destroy control module (1) and hard disk (4) can be destroyed and is powered;In computer
When shutdown, battery (3.2) is supplied to destroy control module (1) and hard disk (4) can be destroyed and is powered.
3. the device that a kind of computer violence dismantling detection as described in claim 1 prevents data to be stolen, which is characterized in that
Destroying switch module (2) includes mechanical switch unit (2.1) and soft switching cell (2.2).
4. the device that a kind of computer violence dismantling detection as claimed in claim 3 prevents data to be stolen, which is characterized in that
Soft switching cell (2.2) includes system software tool and system software driving.
5. the device that a kind of computer violence dismantling detection as described in claim 1 prevents data to be stolen, which is characterized in that
It include Hall sensor (5.1) and magnet (5.2) apart from induction module (5);
One in Hall sensor (5.1) and magnet (5.2) is arranged on it can destroy hard disk (4), another setting can destroy
On mainboard where hard disk (4).
6. a kind of method that computer violence dismantling detection prevents data to be stolen, which comprises the steps of:
When S1. destroying distance change signal of the control module reception apart from induction module, judge that the signal for destroying switch module is
It is no enabled;
S2. if so, the destruction flag bit set of hard disk will can be destroyed by destroying control module;
When S3. can destroy hard disk and receiving the power on signal of power module, judge to destroy flag bit whether set;
S4. if so, can destroy hard disk carries out hard disc data destruction automatically, and flag bit clearing can be destroyed.
7. the method that a kind of computer violence dismantling detection as claimed in claim 6 prevents data to be stolen, which is characterized in that
In step S2, if the signal for destroying switch module is not enabled on, destroys control module and do not operate to hard disk can be destroyed.
8. the method that a kind of computer violence dismantling detection as claimed in claim 6 prevents data to be stolen, which is characterized in that
In step S4, if destroying the non-set of flag bit, hard disk can be destroyed without operation.
9. the method that a kind of computer violence dismantling detection as claimed in claim 6 prevents data to be stolen, feature exist
In,
Further include following steps before step S1:
S1A. judge whether hard disk is more than given threshold at a distance from mainboard apart from induction module;
S2A. if so, entering step S1 apart from induction module to control module transmission range variable signal is destroyed;
If it is not, then apart from induction module without operation.
10. the method that a kind of computer violence dismantling detection as claimed in claim 6 prevents data to be stolen, feature exist
In,
It further include following steps before step S1;
S1B. judge computer on/off state;
S2B. when computer booting, power supply switch unit provide main power source to can destroy hard disk and destroy control module power supply;
Enter step S1;
When the computer is turned off, power supply switch unit provide battery to can destroy hard disk and destroy control module power supply;Into step
Rapid S1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910048971.6A CN109886049A (en) | 2019-01-18 | 2019-01-18 | A kind of device and method that computer violence dismantling detection prevents data to be stolen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910048971.6A CN109886049A (en) | 2019-01-18 | 2019-01-18 | A kind of device and method that computer violence dismantling detection prevents data to be stolen |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109886049A true CN109886049A (en) | 2019-06-14 |
Family
ID=66926270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910048971.6A Pending CN109886049A (en) | 2019-01-18 | 2019-01-18 | A kind of device and method that computer violence dismantling detection prevents data to be stolen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109886049A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111090895A (en) * | 2020-02-19 | 2020-05-01 | 烟台北方星空自控科技有限公司 | Logic destruction system and method for EMMC (embedded multi-media card) memory |
CN113556782A (en) * | 2020-04-01 | 2021-10-26 | 中移物联网有限公司 | Data transmission unit and data protection method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204440401U (en) * | 2015-03-26 | 2015-07-01 | 山东超越数控电子有限公司 | A kind of anti-violence disassembles computing machine |
CN105426784A (en) * | 2015-11-05 | 2016-03-23 | 天津津航计算技术研究所 | Solid state disk data destruction system |
CN105787394A (en) * | 2016-01-04 | 2016-07-20 | 山东超越数控电子有限公司 | Hard disk data destruction system and method |
CN107241328A (en) * | 2017-06-07 | 2017-10-10 | 黄俊生 | Electronic equipment method for opening and closing and system |
-
2019
- 2019-01-18 CN CN201910048971.6A patent/CN109886049A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204440401U (en) * | 2015-03-26 | 2015-07-01 | 山东超越数控电子有限公司 | A kind of anti-violence disassembles computing machine |
CN105426784A (en) * | 2015-11-05 | 2016-03-23 | 天津津航计算技术研究所 | Solid state disk data destruction system |
CN105787394A (en) * | 2016-01-04 | 2016-07-20 | 山东超越数控电子有限公司 | Hard disk data destruction system and method |
CN107241328A (en) * | 2017-06-07 | 2017-10-10 | 黄俊生 | Electronic equipment method for opening and closing and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111090895A (en) * | 2020-02-19 | 2020-05-01 | 烟台北方星空自控科技有限公司 | Logic destruction system and method for EMMC (embedded multi-media card) memory |
CN113556782A (en) * | 2020-04-01 | 2021-10-26 | 中移物联网有限公司 | Data transmission unit and data protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN204440401U (en) | A kind of anti-violence disassembles computing machine | |
CN206271075U (en) | A kind of antitheft gate control system in laboratory based on RFID | |
CN109886049A (en) | A kind of device and method that computer violence dismantling detection prevents data to be stolen | |
CN102289623A (en) | Anti-leakage laptop | |
CN102434061B (en) | Capacitive touch sensitive electronic safety box | |
CN109598833A (en) | Smart lock control system based on optical cable joining cabinet | |
CN206400424U (en) | Can fast dust-removing computer-internal environmental monitoring cabinet | |
CN209231997U (en) | A kind of Internet of Things smart lock | |
CN204680020U (en) | A kind of computer safety system | |
CN103163343A (en) | Box opening carrier wave alarm reporting device of electric meter box | |
CN104616370A (en) | Time switch WIFI intelligent lockset and soft controlling system | |
CN206193868U (en) | Prevent vehicle -mounted electronic label of cheating | |
CN209343325U (en) | A kind of plug-in and pull-off device monitoring storage hard disk in real time | |
CN107728510A (en) | A kind of anti-disassembling mechanism suitable for portable set | |
CN205722188U (en) | Intelligent anti-theft gas meter based on Hall element and small-sized magnet steel | |
CN205920525U (en) | Electronic lock system | |
CN203366413U (en) | Intelligent lock | |
CN206789025U (en) | Gas safe control system | |
CN206495236U (en) | Intelligent well cover | |
CN202159381U (en) | Anti-theft alarming door access controller | |
CN201126613Y (en) | Anti-theft electricity alarm | |
CN202456874U (en) | Fingerprint identification suitcase | |
CN208505367U (en) | The emergent alarm guide device of the embedded power supply of solar energy | |
CN106204831A (en) | A kind of electronic door lock system | |
CN202189368U (en) | Secret loss preventing notebook computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190614 |
|
RJ01 | Rejection of invention patent application after publication |