CN110119631A - The data transmission set of encryption protection - Google Patents
The data transmission set of encryption protection Download PDFInfo
- Publication number
- CN110119631A CN110119631A CN201910415610.0A CN201910415610A CN110119631A CN 110119631 A CN110119631 A CN 110119631A CN 201910415610 A CN201910415610 A CN 201910415610A CN 110119631 A CN110119631 A CN 110119631A
- Authority
- CN
- China
- Prior art keywords
- encryption
- slide core
- hole
- core
- reservoir
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 73
- 230000007246 mechanism Effects 0.000 claims abstract description 139
- 238000007789 sealing Methods 0.000 claims abstract description 50
- 238000009434 installation Methods 0.000 claims abstract description 40
- 238000003780 insertion Methods 0.000 claims abstract description 6
- 230000037431 insertion Effects 0.000 claims abstract description 6
- 239000000696 magnetic material Substances 0.000 claims description 6
- 230000005389 magnetism Effects 0.000 claims description 6
- 230000008094 contradictory effect Effects 0.000 claims description 4
- 239000004744 fabric Substances 0.000 claims description 3
- 238000009413 insulation Methods 0.000 claims description 3
- 239000007787 solid Substances 0.000 claims description 2
- 238000000547 structure data Methods 0.000 claims description 2
- 230000032258 transport Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 15
- 230000008859 change Effects 0.000 description 11
- 238000000034 method Methods 0.000 description 11
- 230000006872 improvement Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 230000013011 mating Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The present invention provides the data transmission sets of encryption protection, including the encryption plug assembly being installed in server interface, the grafting transmitting device being connect with reservoir, the encryption plug assembly includes installation shell, Sealing mechanism, server bindiny mechanism, installation shell is installed in server interface, server connection structure with server for connecting and passing data to Sealing mechanism, Sealing mechanism is corresponding with grafting transmitting device and using sending data to grafting transmitting device after five re-encryption inserting modes and the grafting of grafting transmitting device, the grafting transmitting device includes reservoir bindiny mechanism, reservoir bindiny mechanism matches with Sealing mechanism and is inserted into Sealing mechanism, and the rotation for unlocking Sealing mechanism in reservoir bindiny mechanism insertion Sealing mechanism rotates forward, reservoir bindiny mechanism is also and for storing up The reservoir of deposit data connects and can receive the data of Sealing mechanism transmission and transmits it in reservoir.
Description
Technical field
The present invention relates to field of data transmission, and in particular to a kind of transmission device using mechanical cipher mode.
Background technique
It increases rapidly and popularizes with information-based, digitized, computer has become the personal processing work things of assistance
Essential tool thereby results in a large amount of core technology, patent, Very Important Person information, financial data, military secret, political affairs
Mansion secret and individual privacy all exist with electrical file form, and are situated between as data exchange and the massive store of data backup
Extensive use has been obtained in matter, mobile hard disk, and people are more and more carried out significant data and private information by hard disk
Transmitting, backup, but repeated with the leakage of a state or party secret, for how to have protected the safety of significant data and electronic document
Through bringing into schedule, so the storage for how protecting significant data is most important safely, therefore the present inventor designs a kind of use
The data transmission port of mechanical cipher mode, if being connected and inserted into the plug assembly to server not with reservoir is and setting
Mating in the Sealing mechanism in server, then data transmission channel can not be established, the significant data in effective protection server
It is not leaked.
Summary of the invention
To solve the deficiencies in the prior art, the object of the present invention is to provide a kind of transmission using mechanical cipher mode to set
Standby, using five re-encryptions based on magnetic cipher mode, any in five re-encryption modes heavy fails to be stored device company Sealing mechanism
Connection mechanism decryption, then data transmission channel can not be established, and data can not be stored in the reservoirs such as mobile hard disk, thus significantly
Reduce the risk that significant data is leaked.
To realize the above-mentioned technical purpose, the technical solution adopted in the present invention is as follows.
The data transmission set of encryption protection, including the encryption plug assembly being installed in server interface and reservoir
The grafting transmitting device of connection, data in server through can encrypted plug assembly, grafting transmitting device be transmitted to reservoir
It is interior;
The encryption plug assembly includes installation shell, Sealing mechanism, server bindiny mechanism, and installation shell is installed on service
In device interface, server connection structure with server for connecting and passing data to Sealing mechanism, Sealing mechanism and grafting
Transmitting device is corresponding and is transmitted using grafting is sent data to after five re-encryption inserting modes and the grafting of grafting transmitting device
Device;
The grafting transmitting device includes reservoir bindiny mechanism, and reservoir bindiny mechanism matches with Sealing mechanism and can insert
Enter to Sealing mechanism, and the rotation for unlocking Sealing mechanism in reservoir bindiny mechanism insertion Sealing mechanism rotates forward, storage
Storage bindiny mechanism also connect and be can receive with the reservoir for storing data the data of Sealing mechanism transmission and transmitted
To reservoir;
The installation shell is fixed in server interface, and the circular cylinder body in both ends open is provided in mounting shell body
The fixed core of structure, slide core one, slide core two, fixed core are coaxially fixed in mounting shell body, slide core one and slide core two
It is coaxially arranged and be both movably installed in fixed core and can be around itself axial rotation, and slide core one is outside server
Close to server internal, slide core two has fixed end cap towards the open end of server internal also Matching installation for portion, slide core two;
The fixed core, slide core one are additionally provided between two three of slide core and to keep coaxially arranged coaxial for three
Part, the same shaft member is the circular tube structure being made of the coaxial sleeve of two groups of semicircular in shape tube structures, coaxial with shaft member
It is fixedly installed in fixed core and is set between slide core one and slide core two with shaft member, one/slide core of slide core two and same
It is flexibly connected between shaft member, and the rotation between slide core one and slide core two is non-interference;
The Sealing mechanism includes the first re-encryption component, the second re-encryption component, third time security components, the 4th re-encryption
Component, the 5th re-encryption component, for the transmission contact b with server connection structure data connection.
Further improvement as the technical program.
The first re-encryption component includes the encryption part one being set between fixed core and slide core one, encrypts part one
Including ejector pin one, banking pin one, limited spring one;
It is offered in the fixed core through the encryption hole one of its radial thickness, encrypts hole one at the aperture of slide core one
Matching installation has caging bolt, offers on slide core one through its radial thickness and coaxially arranged and connection with encryption hole one
Hole two is encrypted, encryption hole two is provided with built-in step one at the aperture of fixed core;
The ejector pin one is wholy set in encryption hole two, and ejector pin one is provided with unlock protrusion away from the end of fixed core,
It unlocks the built-in step inner headed face that raised free end is disposed through at encryption two aperture of hole and is located in slide core one;
The banking pin one is set in encryption hole one, and banking pin one is located in encryption hole two towards one end of slide core one
And it is contacted with ejector pin one;
One end of the limited spring one is fixedly connected with caging bolt, the other end is fixedly connected with banking pin one, and is limited
The elastic force of spring one makes banking pin one do the movement close to slide core one and contacts with ejector pin one;
The encryption part one is provided with several groups along the axial array of fixed core one, and the first re-encryption component is along fixed
The circumferencial direction array of core one is provided with several groups.
Further improvement as the technical program.
The second re-encryption component is set to slide core one towards the end outside server, the second re-encryption component
Including inserted link, it is set to traction grooved of the fixed core towards the open end outside server;
The traction grooved, which rotates forward to turn to along reservoir bindiny mechanism, can be divided into two sections and respectively lock segments, rotational segment,
The distance between lock segments and one center of circle of slide core, which rotate forward to turn to along reservoir bindiny mechanism, to successively decrease, and rotational segment is together with slide core
Axis arrangement;
The periphery of the slide core one offers avoid holes and avoid holes through its radial thickness outside server,
One end of the inserted link is located in avoid holes, the other end is right against traction grooved and end matching is provided with free end and is located at traction
In slot gearing protrusion, slide core one do with reservoir bindiny mechanism rotate forward turn to consistent rotation when, by interlock protrusion with
The lock segments cooperation of traction grooved makes inserted link do the movement close to one longitudinal center line of slide core, and leads when interlocking raised just go to
When in the rotational segment of approaching channel, inserted link stops doing the movement close to one longitudinal center line of slide core;
The second re-encryption component is provided with several groups along the circumferencial direction array of fixed core.
Further improvement as the technical program.
The third re-encryption component includes the slide protrusion for being set to two inner headed face of slide core, the extension of slide protrusion
It is oriented parallel to the axial direction of slide core two, and slide protrusion is provided with several groups along two circumferencial direction array of slide core;
The quadruple security components include the positioning protrusion for being coaxially disposed the end face in fixed end cap towards slide core one.
Further improvement as the technical program.
The 5th re-encryption component includes the encryption part two being set between fixed core and slide core two and encryption part
Three;
It is offered in the fixed core through the encryption hole three/tetra- of its radial thickness, encrypts hole three/tetra- away from slide core two
Matching installation has fastening bolt at aperture, offered on slide core two through its radial thickness and with encryption the coaxial cloth in hole three/tetra-
The encryption hole five/six set and connected, encryption hole five/six are provided with built-in step two at the aperture of fixed core;
The encryption part two includes limited spring two, banking pin two made of magnetic material, and banking pin two is set to encryption
In hole five and it is located in encryption hole three towards the end of fixed core and the end is provided with limited step, limited step and encryption
Slide-and-guide cooperation is constituted between hole three/five, the limited spring two is sheathed on the outside of banking pin two, limited spring two
One end be fixedly connected with limited step, the other end be set to encryption hole five in built-in step two be fixedly connected, and limit
The elastic force of spring two makes banking pin two do the movement far from two longitudinal center line of slide core;
The encryption part three includes limited spring three, banking pin three, ejector pin two made of magnetic material, the ejector pin two
Be set to encryption hole six in, the banking pin three be set to encryption Kong Si in and its towards the end of slide core two be located at encryption
It is contacted in hole six and with ejector pin two, one end of the limited spring three and the fixed company of the fastening bolt being set in encryption Kong Si
Connect, the other end is fixedly connected with banking pin three, and the elastic force of limited spring three does banking pin three in two axial direction of slide core
The movement of heart line;
The encryption part two/tri- is provided with several groups along the axially spaced-apart of fixed core, and the 5th re-encryption component is along solid
The circumferencial direction array for determining core is provided with several groups;
The mounting hole through its radial thickness is also provided on the slide core two, the transmission contact b is set to installation
In hole, and transmits contact b and is located on same disc with the inside/outside disc of slide core two respectively along the radial both ends of slide core two,
It transmits contact b and the circumferencial direction array of slide core two is provided with four groups.
Further improvement as the technical program.
The service area bindiny mechanism includes junction pole for connecting with server, for junction pole and transmission contact
The connecting elements of data connection between b;
The end face of the fixed core towards server is provided with escape groove, is also provided in fixed core through its radial thickness simultaneously
The connecting hole connected with escape groove, the interior restricted step of setting of connecting hole;
One end of the junction pole is connect with server, the other end passes through escape groove and is located in connecting hole and the end is provided with
Sleeve is provided with fastener and is fixedly connected between the two by fastener between connecting rod and escape groove;
The connecting elements includes feeler lever, contradicts spring, and one end of feeler lever is movably set in sleeve, the other end passes through limitation
Inner headed face, connecting hole aperture and the outer circle face contact with slide core two of step, feeler lever are located between sleeve and limitation step
Portion of external be additionally provided with external step;
The conflict spring pocket is set to outside feeler lever, contradicts one end of spring and sleeve contradicts, the other end is supported with external step
Touching, and the elastic force for contradicting spring makes feeler lever do the movement close to slide core two;
When the reservoir bindiny mechanism unlocks Sealing mechanism completely, connecting elements is located at transmission contact b and connects along reservoir
Mechanism rotates forward the front turned to;
The server bindiny mechanism is provided with four groups along the circumferencial direction array of fixed core.
Further improvement as the technical program.
The reservoir bindiny mechanism include can with the data conveying member of reservoir data connection, be used for and the first weight
The first decryption component, the second re-encryption for matching with the second/tri-/tetra-/five re-encryption components that security components match
Component;
The data conveying member includes conveying casing, fixed -piping, transmission contact a, data line, conveying casing one
End opening, closed at one end and open end Matching installation have the circular cylinder body of transmission end cap, and the closed end of conveying casing coaxially opens up
Have and stretch out hole one, transmission end cap, which coaxially offers, stretches out hole two;
The first decryption component includes in the parent of the circular tube structure of both ends open, and it is outer that parent is coaxially fixed on transmission
The closed end of shell, and the periphery of parent is additionally provided with the decryption sawtooth to match with the first re-encryption component, and decrypts sawtooth
It is correspondingly arranged on several groups.
Further improvement as the technical program.
The locating part that the second decryption component includes daughter, pop-up spring, matches with the second re-encryption component, son
Body is circular cylinder body open at one end, closed at one end, and daughter coaxial arrangement is in parent and its open end towards conveying casing;
One end of the fixed -piping is located in conveying casing, the other end passes through and stretches out hole one, parent open end, daughter opening
Hold and be fixed in daughter, the transmission contact a be fixed in daughter and transmit contact a along the both ends of daughter radial direction respectively with
The inside/outside disc of daughter is located on same disc, and reservoir bindiny mechanism be inserted into and all unlock Sealing mechanism when, transmit
Contact a is contacted with transmission contact b, and transmission contact a is correspondingly arranged on four groups, one end and transmission contact of the data line
A connection, the other end pass through fixed -piping, are set to stretching hole two that transmission end covers and be located at outside conveying casing and the end
Matching is provided with the socket being inserted into reservoir, and data line is correspondingly arranged on four groups, and data line, which is located at, to be fixed
The portion of external of pipeline external is provided with insulation protection skin;
Conflict step is additionally provided in the daughter, the pop-up spring pocket is set to outside fixed -piping, pops up spring
One end and conflict step contradict, the other end and conveying casing closed end contradict, and the elastic force for popping up spring makes daughter by parent
Pop-up;
The periphery of the daughter is provided with limiting slot, and the periphery of parent offers coaxially arranged with limiting slot and connection
Limit hole, the locating part include limited block, limit spring, and limited block is set in limiting slot and its part is located at limit hole
Interior, one end of limit spring is fixedly connected with limited block, the other end is fixedly connected with limiting slot slot bottom, and the elastic force of limit spring
Limited block is set to do the movement far from limiting slot slot bottom;
The sliding slot to match with slide protrusion is additionally provided in the daughter, and reservoir bindiny mechanism unlocks the second re-encryption
When component, slide protrusion is located at sliding slot and rotates forward the front turned to along reservoir bindiny mechanism;
The closed end of the daughter is also coaxially arranged with the locating slot to match with positioning protrusion;
The periphery of the daughter is additionally provided with the magnetic patch to match with the 5th re-encryption component, and magnetic patch is divided into magnetic attracting
Mode makes to encrypt the magnetic patch one that part two unlocks, the magnetic patch two for unlocking encryption part three in such a way that magnetism is repelled each other.
Further improvement as the technical program.
The installation shell has installation end cap towards the open end Matching installation outside server, and installs end cap direction
Corresponding index line when unlocking and establish again data transmission channel with five is provided on end face outside server.
The beneficial effect of the present invention compared with prior art is, Sealing mechanism using five based on magnetic cipher mode again plus
It is close, in five re-encryption modes it is any it is heavy fail to be stored the decryption of device bindiny mechanism, then data transmission channel can not be established, data
It can not be stored in the reservoirs such as mobile hard disk, thus greatly reduce the risk that significant data is leaked, while five add again
The permutation and combination method of close mode is more, and user can be by changing the permutation and combination side of any one in five re-encryption modes
Formula can the failure of Shi Yuan reservoir bindiny mechanism, and replace that permutation and combination method is relatively simple, and user can be according to itself need
It asks and carries out encryption modification, in addition to this, the magnetic of two/ejector pin of banking pin two in the 5th separate re-encryption component is encrypted as with magnetic
Property, which cannot observe by the naked eye, to be obtained, to greatly strengthen the difficulty that this cipher mode is decrypted, anti-data-leakage effect is more
It is good.
Detailed description of the invention
Fig. 1 is complete machine structure schematic diagram of the invention.
Fig. 2 is complete machine structure schematic diagram of the invention.
Fig. 3 is schematic diagram of internal structure of the invention.
Fig. 4 is schematic diagram of internal structure of the invention.
Fig. 5 is the structural schematic diagram of reservoir bindiny mechanism of the invention.
Fig. 6 is the structural schematic diagram of reservoir bindiny mechanism of the invention.
Fig. 7 is the cooperation figure of data conveying member of the invention and the first decryption component.
Fig. 8 is the cooperation figure of data conveying member of the invention and the first decryption component.
Fig. 9 is the cross-sectional view of data conveying member of the invention.
Figure 10 is the cooperation figure of the second decryption component and data conveying member of the invention.
Figure 11 is the cross-sectional view of the second decryption component of the invention.
Figure 12 is the structural schematic diagram of locating part of the invention.
Figure 13 is the structural schematic diagram of encryption plug assembly of the invention.
Figure 14 is the structural schematic diagram of encryption plug assembly of the invention.
Figure 15 is the schematic diagram of internal structure of encryption plug assembly of the invention.
Figure 16 is the schematic diagram of internal structure of encryption plug assembly of the invention.
Figure 17 is the structural schematic diagram of installation shell of the invention.
Figure 18 is the cross-sectional view of installation shell of the invention.
Figure 19 is the cooperation figure of the second re-encryption component of the invention, fixed core, slide core one.
Figure 20 is the cooperation figure of the first re-encryption component of the invention, fixed core, slide core one.
Figure 21 is the structural schematic diagram of the first re-encryption component of the invention.
Figure 22 is the cooperation figure of the 5th re-encryption component of the invention, fixed core, slide core two.
Figure 23 is the structural schematic diagram of the 5th re-encryption component of the invention.
Figure 24 be server bindiny mechanism of the invention, fixed core, slide core two cooperation figure.
Figure 25 is the structural schematic diagram of server bindiny mechanism of the invention.
Specific embodiment
The present invention is advantageous in that using mechanical cipher mode, Sealing mechanism using five based on magnetic cipher mode again plus
It is close, in five re-encryption modes it is any it is heavy fail to be stored the decryption of device bindiny mechanism, then data transmission channel can not be established, data
It can not be stored in the reservoirs such as mobile hard disk, thus greatly reduce the risk that significant data is leaked, while five add again
The permutation and combination method of close mode is more, and user can be by changing the permutation and combination side of any one in five re-encryption modes
Formula can the failure of Shi Yuan reservoir bindiny mechanism, and replace that permutation and combination method is relatively simple, and user can be according to itself need
It asks and carries out encryption modification, in addition to this, the magnetic of two/ejector pin of banking pin two in the 5th separate re-encryption component is encrypted as with magnetic
Property, which cannot observe by the naked eye, to be obtained, to greatly strengthen the difficulty that this cipher mode is decrypted, anti-data-leakage effect is more
It is good.
The data transmission set of encryption protection, including the encryption plug assembly being installed in server interface and reservoir
The grafting transmitting device of connection, data in server through can encrypted plug assembly, grafting transmitting device be transmitted to reservoir
It is interior.
The encryption plug assembly includes installation shell 200, Sealing mechanism 300, server bindiny mechanism 400, installation
Shell 200 is installed in server interface, and server connection structure 400 with server for connecting and passing data to encryption
Mechanism 300, Sealing mechanism 300 is corresponding with grafting transmitting device and is inserted using five re-encryption inserting modes and grafting transmitting device
Grafting transmitting device is sent data to after connecing.
The grafting transmitting device includes reservoir bindiny mechanism 100, reservoir bindiny mechanism 100 and Sealing mechanism
300 match and are inserted into Sealing mechanism 300, and make to encrypt in the insertion Sealing mechanism 300 of reservoir bindiny mechanism 100
The rotation that mechanism 300 unlocks is to rotate forward, and reservoir bindiny mechanism 100 also connect and can receive with the reservoir for storing data
The data of the transmission of Sealing mechanism 300 simultaneously transmit it in reservoir.
In use, reservoir bindiny mechanism 100 is inserted into Sealing mechanism 300 by user, wherein Sealing mechanism 300 is adopted
Five re-encryptions can be all unlocked if reservoir bindiny mechanism 100 and Sealing mechanism 300 are mating with five re-encryption inserting modes
Mode, reservoir bindiny mechanism 100 are inserted into successfully, the data in server through server bindiny mechanism 400, Sealing mechanism 300,
Reservoir bindiny mechanism 100 is transmitted in reservoir;If reservoir bindiny mechanism 100 can not all unlock Sealing mechanism 300
Five re-encryption modes, then reservoir connection structure 100 is inserted into Sealing mechanism 300 and fails, and the data in server can not be transmitted to
Reservoir, to achieve the purpose that data encryption.
The installation shell 200 is fixed in server interface, and is installed and be provided in shell 200 in both ends open
The fixed core 210 of circular tube structure, slide core 1, slide core 2 230, fixed core 210 is coaxially fixed on installation shell
In 200, slide core 1 and slide core 2 230 are coaxially arranged and be both movably installed in fixed core 210 and can be around itself
Axial rotation, and slide core 1 is outside server, slide core 2 230 is close to server internal, slide core 2 230
There is fixed end cap 240 towards the open end of server internal also Matching installation.
Preferably, the fixed core 210, slide core 1, be additionally provided with for three between 2 230 three of slide core
Person keeps coaxially arranged same shaft member 250, and the same shaft member 250 is to be made of the coaxial sleeve of two groups of semicircular in shape tube structures
Circular tube structure, be coaxially fixedly installed in fixed core 210 with shaft member 250 and be set to slide core 1 with shaft member 250
Between slide core 2 230, it is flexibly connected between one 220/ slide core 2 230 of slide core and same shaft member 250, and slide core one
Rotation between 220 and slide core 2 230 is non-interference;By same shaft member 250 may make fixed core 210, slide core 1,
It remains coaxially arranged between 2 230 three of slide core, prevents from influencing to cause to occur between three due to extraneous unexpected factors
Coaxiality deviation simultaneously impacts the insertion of subsequent reservoir mechanism 100.
The Sealing mechanism 300 includes the first re-encryption component 310, the second re-encryption component 320, third time encryption structure
Part, quadruple security components, the 5th re-encryption component 330, for the transmission contact with 400 data connection of server connection structure
b340。
The first re-encryption component 310 includes the encryption part being set between fixed core 210 and slide core 1
One, encryption part one includes ejector pin 1, banking pin 1, limited spring 1.
It is offered in the fixed core 210 through the encryption hole one of its radial thickness, encrypts hole one and deviate from slide core one
Matching installation has caging bolt at 220 aperture, is offered on slide core 1 through its radial thickness and together with encryption hole
The encryption hole two that axis is arranged and connected, encryption hole two are provided with built-in step one at the aperture of fixed core 210.
The ejector pin 1 is wholy set in encryption hole two, and ejector pin 1 is set away from the end of fixed core 210
It is equipped with unlock protrusion, unlock the built-in step inner headed face that raised free end is disposed through at encryption two aperture of hole and is located at activity
In core 1.
The banking pin 1 is set in encryption hole one, and banking pin 1 is towards one end of slide core 1
It is contacted in encryption hole two and with ejector pin 1.
One end of the limited spring 1 is fixedly connected with caging bolt, the other end and banking pin 1 are fixed connects
It connects, and the elastic force of limited spring 1 makes banking pin 1 do the movement close to slide core 1 and connects with ejector pin 1
Touching.
The encryption part one is provided with several groups, the first re-encryption structure along the axial array of fixed core 1
Part 310 is provided with several groups along the circumferencial direction array of fixed core 1.
The unlocking process of first re-encryption component 310, specifically: reservoir bindiny mechanism 100 and it is set to ejector pin 1
On unlock projection contacts and push ejector pin 1 to do the movement close to fixed core 210, be finally integrally located at ejector pin 1
Encryption hole two is interior, banking pin 1 is integrally located in encryption hole one, and slide core 1 can axially be rotated around itself at this time, unlock
It finishes.
Can by change the first re-encryption component 310 along 210 circumferencial direction of fixed core array quantity, change one group first
Encryption one quantity of part and spacing, change banking pin 1 in re-encryption component 310 are located at the distance in encryption hole two, from
And change the cipher mode of the first re-encryption component 310.
The second re-encryption component 320 is set to slide core 1 and adds again towards the end outside server, second
Close component 320 includes inserted link 322, is set to traction grooved 321 of the fixed core 210 towards the open end outside server.
The traction grooved 321 rotates forward to turn to along reservoir bindiny mechanism 100 and can be divided into two sections and be respectively to lock
Section, rotational segment, the distance between lock segments and one 220 center of circle of slide core, which rotate forward to turn to along reservoir bindiny mechanism 100, to successively decrease, and turns
Dynamic section and slide core 1 are coaxially arranged.
The periphery of the slide core 1 offers avoid holes and avoid holes through its radial thickness close to service
Outside device, one end of the inserted link 322 is located in avoid holes, the other end is right against traction grooved 321 and end matching is provided with
Free end is located at the protrusion of the gearing in traction grooved 321, and slide core 1 does to rotate forward with reservoir bindiny mechanism 100 and turn to unanimously
Rotation when, do inserted link 322 in one 220 axial direction of slide core by interlocking protrusion and the cooperation of the lock segments of traction grooved 321
The movement of heart line, and when interlocking raised just going in the rotational segment of traction grooved 321, inserted link 322 is stopped doing close to slide core
The movement of one 220 longitudinal center lines.
The second re-encryption component 320 is provided with several groups along the circumferencial direction array of fixed core 210.
The unlocking process of second re-encryption component 320, specifically: slide core 1 axially does reservoir connection around itself
Mechanism 100, which rotates forward, turns to consistent rotation, and two groups of inserted links 322 is made to do movement close to each other, so that reservoir be made to connect
Mechanism 100 is locked, and the preparation for unlocking subsequent three re-encryption is done by reservoir bindiny mechanism 100, and unlock finishes.
It can be by changing the array quantity and installation site of the second re-encryption component 320, to change the second re-encryption
The cipher mode of component 320.
The third re-encryption component includes the slide protrusion 231 for being set to 2 230 inner headed face of slide core, slide protrusion
231 extending direction is parallel to the axial direction of slide core 2 230, and slide protrusion 231 is set along 2 230 circumferencial direction array of slide core
It is equipped with several groups.
The unlocking process of third re-encryption component, specifically: after the second re-encryption component 320 unlocks, reservoir connects
Connection mechanism 100 continues to rotate forward and makes partial turn corresponding with third re-encryption component to slide protrusion 231 is right against, and then stores up
The part corresponding with third/tetra-/five re-encryption components of storage bindiny mechanism 100 is inserted into slide core 2 230.
It can be by the array quantity of change slide protrusion 231, to change the cipher mode of third re-encryption component.
The quadruple security components include being coaxially disposed in fixed end cap 240 towards the end face of slide core 1
Positioning protrusion 241.
The unlocking process of quadruple security components, specifically: the unlock of third re-encryption component finishes and connects reservoir
When mechanism 100 is inserted into slide core 2 230 part corresponding with third/tetra-/five re-encryption components, positioning protrusion be can be inserted into
To the part corresponding with quadruple security components of reservoir bindiny mechanism 100, unlock is finished.
It can be by changing the development length of positioning protrusion 241, to change the cipher mode of quadruple security components.
The 5th re-encryption component 330 includes the encryption part two being set between fixed core 210 and slide core 2 230
With encryption part three.
It is offered in the fixed core 210 through the encryption hole three/tetra- of its radial thickness, encrypts hole three/tetra- away from work
Matching installation has fastening bolt at the aperture of dynamic core 2 230, offered on slide core 2 230 through its radial thickness and with encryption
Hole three/tetra- is coaxially arranged and the encryption hole five/six connected, and encryption hole five/six is provided with built-in at the aperture of fixed core 210
Step two.
The encryption part two includes limited spring 2 332, banking pin 2 331 made of magnetic material, banking pin two
331 be set to encryption hole five in and its towards the end of fixed core 210 be located at encryption hole three in and the end be provided with limiting stand
Rank, constitutes slide-and-guide cooperation between limited step and encryption hole three/five, the limited spring 2 332 is sheathed on limitation
The outside of pin 2 331, one end of limited spring 2 332 is fixedly connected with limited step, the other end and is set in encryption hole five
Built-in step two be fixedly connected, and to do banking pin 2 331 axial far from slide core 2 230 for the elastic force of limited spring 2 332
The movement of center line.
The encryption part three includes limited spring 3 335, banking pin 3 334, ejector pin two made of magnetic material
333, the ejector pin 2 333 is set in encryption hole six, and the banking pin 3 334 is set in encryption Kong Si and its direction
The end of slide core 2 230 is located in encryption hole six and contacts with ejector pin 2 333, one end of the limited spring 3 335 with
The fastening bolt being set in encryption Kong Si is fixedly connected, the other end is fixedly connected with banking pin 3 334, and limited spring three
335 elastic force makes banking pin 3 334 do the movement close to 2 230 longitudinal center line of slide core.
The encryption part two/tri- is provided with several groups, the 5th re-encryption structure along the axially spaced-apart of fixed core 210
Part 330 is provided with several groups along the circumferencial direction array of fixed core 210.
The unlocking process of 5th re-encryption component 330, specifically: reservoir bindiny mechanism 100 and the 5th re-encryption component
After in 330 corresponding partial insertions to slide core 2 230, reservoir bindiny mechanism 100 makes ejector pin 2 333 in such a way that magnetism is repelled each other
It is integrally located in encryption hole six, is integrally located at banking pin 3 334 in encryption Kong Si, make banking pin two in such a way that magnetism is attracting
331 are integrally located in encryption hole five, so that the unlock of the 5th re-encryption component 330 be made to finish.
It can be by changing the array quantity of the 5th re-encryption component 330, changing adding in one group of the 5th re-encryption component 330
The quantity and arrangement mode of confidential paper two/tri- change distance, change banking pin three that banking pin 2 331 is located in encryption hole three
334 are located at the distance in encryption hole six, to change the cipher mode of the 5th re-encryption component 330.
The mounting hole through its radial thickness, the transmission contact b340 are also provided on the slide core 2 230
It is set in mounting hole, and transmits contact b340 along the radial both ends of slide core 2 230 inside/outside with slide core 2 230 respectively
Disc is located on same disc, transmits contact b340 along the circumferencial direction array of slide core 2 230 and is provided with four groups.
The service area bindiny mechanism 400 includes junction pole 410 for connecting with server, for junction pole 410
The connecting elements 420 of data connection between transmission contact b340.
The end face of fixed core 210 towards the server is provided with escape groove, is also provided in fixed core 210 through it
Radial thickness and the connecting hole connected with escape groove, the interior restricted step of setting of connecting hole.
One end of the junction pole 410 is connect with server, the other end passes through escape groove and is located in connecting hole and is somebody's turn to do
End is provided with sleeve, and fastener is provided between connecting rod 410 and escape groove and company is fixed by fastener between the two
It connects.
The connecting elements 420 includes feeler lever 421, contradicts spring 422, and one end of feeler lever 421 is movably set in sleeve
The interior, other end passes through inner headed face, connecting hole aperture and the outer circle face contact with slide core 2 230 of limitation step, feeler lever 421
Portion of external between sleeve and limitation step is additionally provided with external step.
The conflict spring 422 is sheathed on outside feeler lever 421, contradicts one end and the sleeve conflict, the other end of spring 422
The elastic force for contradicting with external step, and contradicting spring 422 makes feeler lever 421 do the movement close to slide core 2 230.
When the reservoir bindiny mechanism 100 unlocks Sealing mechanism 300 completely, connecting elements 420 is located at transmission contact
B340 rotates forward the front turned to along reservoir bindiny mechanism 100.
The server bindiny mechanism 400 is provided with four groups along the circumferencial direction array of fixed core 210.
Reservoir bindiny mechanism 100 is inserted into installation shell 200 and by after Sealing mechanism 300 all unlock, continues just
Turn and draw the synchronous rotating forward of slide core 2 230, is contacted until transmitting contact b340 with feeler lever 421, at this time reservoir bindiny mechanism
100 establish data transmission channel with server connection structure 400, and the data in server can be through server connection structure 400, storage
Storage bindiny mechanism 100 is transmitted in reservoir.
The reservoir bindiny mechanism 100 include can with the data conveying member 110 of reservoir data connection, for
First re-encryption component 310 match first decryption component 120, for matching with the second/tri-/tetra-/five re-encryption components
The second re-encryption component 130.
The data conveying member 110 includes conveying casing 111, fixed -piping 112, transmission contact a113, data biography
Defeated line 114, conveying casing 111 are the circular cylinder body that open at one end, closed at one end and open end Matching installation has transmission end cap, are passed
The closed end of defeated shell 111, which coaxially offers, stretches out hole one, and transmission end cap, which coaxially offers, stretches out hole two.
The first decryption component 120 includes in the parent 121 of the circular tube structure of both ends open, and parent 121 is same
Axis is fixed on the closed end of conveying casing 111, and the periphery of parent 121 is additionally provided with and matches with the first re-encryption component 310
The decryption sawtooth 122 of set, and decrypt sawtooth 122 and be correspondingly arranged on several groups.
The second decryption component 130 includes that daughter 131, pop-up spring 132 and the second re-encryption component 320 match
The locating part of set, daughter 131 are circular cylinder body open at one end, closed at one end, the coaxial arrangement of daughter 131 in parent 121 and
Its open end is towards conveying casing 111.
One end of the fixed -piping 112 is located in conveying casing 111, the other end passes through stretching hole one, parent 121 is opened
Mouth end, 131 open end of daughter are simultaneously fixed in daughter 131, and the transmission contact a113 is fixed in daughter 131 and transmits touching
Point a113 is located on same disc with the inside/outside disc of daughter 131 respectively along the radial both ends of daughter 131, and reservoir connects
When connection mechanism 100 is inserted into and all unlocks Sealing mechanism 300, transmission contact a113 is contacted with transmission contact b340, transmits contact
A113 is correspondingly arranged on four groups, and one end of the data line 114 is connect with transmission contact a113, the other end is passed through and fixed
Pipeline 112 is set to stretching hole two that transmission end covers and is located at 111 outside of conveying casing and end matching is provided with and can insert
Enter the socket to reservoir, data line 114 is correspondingly arranged on four groups, it is preferred that data line 114 is located at fixing pipe
Portion of external outside road 112 is provided with insulation protection skin.
Conflict step is additionally provided in the daughter 131, the pop-up spring 132 is sheathed on outside fixed -piping 112
It pops up one end of spring 132 and contradicts step conflict, the other end and the conflict of 111 closed end of conveying casing, and pop up spring in portion
132 elastic force makes daughter 131 by popping up in parent 121.
The periphery of the daughter 131 is provided with limiting slot, and the periphery of parent 121 offers and the coaxial cloth of limiting slot
The limit hole set and connected, the locating part include limited block 133, limit spring 134, and limited block 133 is set to limiting slot
Interior and its part is located in limit hole, and one end of limit spring 134 is fixedly connected with limited block 133, the other end and limiting slot slot
Bottom is fixedly connected, and the elastic force of limit spring 134 makes limited block 133 do the movement far from limiting slot slot bottom.
The sliding slot 135 to match with slide protrusion 231, and reservoir bindiny mechanism are additionally provided in the daughter 131
When 100 the second re-encryption component 320 of unlock, slide protrusion 231 is located at sliding slot 135 and rotates forward steering along reservoir bindiny mechanism 100
Front.
The closed end of the daughter 131 is also coaxially arranged with the locating slot 137 to match with positioning protrusion 241.
The periphery of the daughter 131 is additionally provided with the magnetic patch 136 to match with the 5th re-encryption component 330, magnetic patch
136 points for by it is magnetic it is attracting in a manner of make to encrypt magnetic patch one that part two unlocks, make in such a way that magnetism is repelled each other to encrypt the magnetic that part three unlocks
Block two.
In actual work, after reservoir bindiny mechanism 100 is correctly inserted into installation shell 200 by user, decryption saw
The unlock projection contacts of tooth 122 and the first re-encryption component 310 simultaneously push ejector pin 1 to do the movement close to fixed core 210, most
It is integrally located at ejector pin 1 in encryption hole two, banking pin 1 is integrally located in encryption hole one, slide core 1 at this time
Can around itself axially rotate, first again unlock finish;
User rotates forward reservoir bindiny mechanism 100 and draws the synchronous rotating forward of slide core 1, and slide core 1, which rotates forward, simultaneously to be made
Two groups of inserted links 322 for obtaining the second re-encryption component 320 do movement close to each other, and inserted link 322 is disposed through on parent 121
Limit hole simultaneously contacts with limited block 133 and is integrally located at limited block 133 in the limiting slot being set in daughter 131, and second
Decryption component 130 can by parent 121 pop up but do not pop up also, second again unlock finish;
User continues to rotate forward reservoir bindiny mechanism 100, until when slide protrusion 231 and sliding slot 135 are located along the same line,
Second decryption component 130 can be by popping up in parent 121, and third is unlocked again and finished;
During second decryption component 130 in parent 121 by popping up and being located in slide core 2 230, positioning protrusion 241 is therewith
It is inserted into locating slot 137, quadruple unlock finishes;
After second decryption component 130 is by popping up and being integrally located in slide core 2 230 in parent 121, magnetic patch one is with magnetic attracting
Mode make banking pin 2 331 be integrally located at encryption hole five in, magnetic patch two make in such a way that magnetism is repelled each other ejector pin 2 333 be integrally located at plus
In close hole six, be integrally located at banking pin 3 334 in encryption Kong Si, the 5th again unlock finish, simultaneous transmission contact a113 and pass
Defeated contact b340 contact;
Then user continues to rotate forward reservoir bindiny mechanism 100 and draws the synchronous rotating forward of slide core 2 230, until transmission contact
B340 is contacted with feeler lever 421, and reservoir bindiny mechanism 100 and server connection structure 400 establish data transmission channel at this time, is taken
Data in business device can be transmitted in reservoir through server connection structure 400, reservoir bindiny mechanism 100.
Preferably, the installation shell 200 has installation end cap towards the open end Matching installation outside server, and pacifies
Dress end cap towards be provided on the end face outside server unlock and establish again data transmission channel with five when corresponding finger
Timberline;User can judge unlocking process according to index line and whether set up data transmission channel.
Claims (10)
1. the data transmission set of encryption protection, which is characterized in that it includes the encryption grafting dress being installed in server interface
The grafting transmitting device set, being connect with reservoir, data in server through can encrypted plug assembly, grafting transmitting device pass
It transports in reservoir;
The encryption plug assembly includes installation shell, Sealing mechanism, server bindiny mechanism, and installation shell is installed on service
In device interface, server connection structure with server for connecting and passing data to Sealing mechanism, Sealing mechanism and grafting
Transmitting device is corresponding and is transmitted using grafting is sent data to after five re-encryption inserting modes and the grafting of grafting transmitting device
Device;
The grafting transmitting device includes reservoir bindiny mechanism, and reservoir bindiny mechanism matches with Sealing mechanism and can insert
Enter to Sealing mechanism, and the rotation for unlocking Sealing mechanism in reservoir bindiny mechanism insertion Sealing mechanism rotates forward, storage
Storage bindiny mechanism also connect and be can receive with the reservoir for storing data the data of Sealing mechanism transmission and transmitted
To reservoir;
The installation shell is fixed in server interface, and the circular cylinder body in both ends open is provided in mounting shell body
The fixed core of structure, slide core one, slide core two, fixed core are coaxially fixed in mounting shell body, slide core one and slide core two
It is coaxially arranged and be both movably installed in fixed core and can be around itself axial rotation, and slide core one is outside server
Close to server internal, slide core two has fixed end cap towards the open end of server internal also Matching installation for portion, slide core two;
The fixed core, slide core one are additionally provided between two three of slide core and to keep coaxially arranged coaxial for three
Part, the same shaft member is the circular tube structure being made of the coaxial sleeve of two groups of semicircular in shape tube structures, coaxial with shaft member
It is fixedly installed in fixed core and is set between slide core one and slide core two with shaft member, one/slide core of slide core two and same
It is flexibly connected between shaft member, and the rotation between slide core one and slide core two is non-interference;
The Sealing mechanism includes the first re-encryption component, the second re-encryption component, third time security components, the 4th re-encryption
Component, the 5th re-encryption component, for the transmission contact b with server connection structure data connection.
2. the data transmission set of encryption protection according to claim 1, which is characterized in that the first re-encryption structure
Part includes the encryption part one being set between fixed core and slide core one, and encryption part one includes ejector pin one, banking pin one, limitation bullet
Spring one;
It is offered in the fixed core through the encryption hole one of its radial thickness, encrypts hole one at the aperture of slide core one
Matching installation has caging bolt, offers on slide core one through its radial thickness and coaxially arranged and connection with encryption hole one
Hole two is encrypted, encryption hole two is provided with built-in step one at the aperture of fixed core;
The ejector pin one is wholy set in encryption hole two, and ejector pin one is provided with unlock protrusion away from the end of fixed core,
It unlocks the built-in step inner headed face that raised free end is disposed through at encryption two aperture of hole and is located in slide core one;
The banking pin one is set in encryption hole one, and banking pin one is located in encryption hole two towards one end of slide core one
And it is contacted with ejector pin one;
One end of the limited spring one is fixedly connected with caging bolt, the other end is fixedly connected with banking pin one, and is limited
The elastic force of spring one makes banking pin one do the movement close to slide core one and contacts with ejector pin one;
The encryption part one is provided with several groups along the axial array of fixed core one, and the first re-encryption component is along fixed
The circumferencial direction array of core one is provided with several groups.
3. the data transmission set of encryption protection according to claim 1 or 2 again, which is characterized in that described second adds
Close component is set to slide core one towards the end outside server, and the second re-encryption component includes inserted link, is set to fixed core
Towards the traction grooved of the open end outside server;
The traction grooved, which rotates forward to turn to along reservoir bindiny mechanism, can be divided into two sections and respectively lock segments, rotational segment,
The distance between lock segments and one center of circle of slide core, which rotate forward to turn to along reservoir bindiny mechanism, to successively decrease, and rotational segment is together with slide core
Axis arrangement;
The periphery of the slide core one offers avoid holes and avoid holes through its radial thickness outside server,
One end of the inserted link is located in avoid holes, the other end is right against traction grooved and end matching is provided with free end and is located at traction
In slot gearing protrusion, slide core one do with reservoir bindiny mechanism rotate forward turn to consistent rotation when, by interlock protrusion with
The lock segments cooperation of traction grooved makes inserted link do the movement close to one longitudinal center line of slide core, and leads when interlocking raised just go to
When in the rotational segment of approaching channel, inserted link stops doing the movement close to one longitudinal center line of slide core;
The second re-encryption component is provided with several groups along the circumferencial direction array of fixed core.
4. the data transmission set of encryption protection according to claim 3, which is characterized in that the third re-encryption structure
Part includes the slide protrusion for being set to two inner headed face of slide core, and the extending direction of slide protrusion is parallel to the axial direction of slide core two,
And slide protrusion is provided with several groups along two circumferencial direction array of slide core;
The quadruple security components include the positioning protrusion for being coaxially disposed the end face in fixed end cap towards slide core one.
5. the data transmission set of encryption protection according to claim 4, which is characterized in that the 5th re-encryption structure
Part includes the encryption part two being set between fixed core and slide core two and encryption part three;
It is offered in the fixed core through the encryption hole three/tetra- of its radial thickness, encrypts hole three/tetra- away from slide core two
Matching installation has fastening bolt at aperture, offered on slide core two through its radial thickness and with encryption the coaxial cloth in hole three/tetra-
The encryption hole five/six set and connected, encryption hole five/six are provided with built-in step two at the aperture of fixed core;
The encryption part two includes limited spring two, banking pin two made of magnetic material, and banking pin two is set to encryption
In hole five and it is located in encryption hole three towards the end of fixed core and the end is provided with limited step, limited step and encryption
Slide-and-guide cooperation is constituted between hole three/five, the limited spring two is sheathed on the outside of banking pin two, limited spring two
One end be fixedly connected with limited step, the other end be set to encryption hole five in built-in step two be fixedly connected, and limit
The elastic force of spring two makes banking pin two do the movement far from two longitudinal center line of slide core;
The encryption part three includes limited spring three, banking pin three, ejector pin two made of magnetic material, the ejector pin two
Be set to encryption hole six in, the banking pin three be set to encryption Kong Si in and its towards the end of slide core two be located at encryption
It is contacted in hole six and with ejector pin two, one end of the limited spring three and the fixed company of the fastening bolt being set in encryption Kong Si
Connect, the other end is fixedly connected with banking pin three, and the elastic force of limited spring three does banking pin three in two axial direction of slide core
The movement of heart line;
The encryption part two/tri- is provided with several groups along the axially spaced-apart of fixed core, and the 5th re-encryption component is along solid
The circumferencial direction array for determining core is provided with several groups;
The mounting hole through its radial thickness is also provided on the slide core two, the transmission contact b is set to installation
In hole, and transmits contact b and is located on same disc with the inside/outside disc of slide core two respectively along the radial both ends of slide core two,
It transmits contact b and the circumferencial direction array of slide core two is provided with four groups.
6. the data transmission set of encryption protection according to claim 1 or 5, which is characterized in that the service area connects
Connection mechanism includes junction pole for connecting with server, for the connection structure of data connection between junction pole and transmission contact b
Part;
The end face of the fixed core towards server is provided with escape groove, is also provided in fixed core through its radial thickness simultaneously
The connecting hole connected with escape groove, the interior restricted step of setting of connecting hole;
One end of the junction pole is connect with server, the other end passes through escape groove and is located in connecting hole and the end is provided with
Sleeve is provided with fastener and is fixedly connected between the two by fastener between connecting rod and escape groove;
The connecting elements includes feeler lever, contradicts spring, and one end of feeler lever is movably set in sleeve, the other end passes through limitation
Inner headed face, connecting hole aperture and the outer circle face contact with slide core two of step, feeler lever are located between sleeve and limitation step
Portion of external be additionally provided with external step;
The conflict spring pocket is set to outside feeler lever, contradicts one end of spring and sleeve contradicts, the other end is supported with external step
Touching, and the elastic force for contradicting spring makes feeler lever do the movement close to slide core two;
When the reservoir bindiny mechanism unlocks Sealing mechanism completely, connecting elements is located at transmission contact b and connects along reservoir
Mechanism rotates forward the front turned to;
The server bindiny mechanism is provided with four groups along the circumferencial direction array of fixed core.
7. the data transmission set of encryption protection according to claim 6, which is characterized in that the reservoir connects machine
Structure include can with the data conveying member of reservoir data connection, for matching with the first re-encryption component first decryption structure
Part, the second re-encryption component for matching with the second/tri-/tetra-/five re-encryption components;
The data conveying member includes conveying casing, fixed -piping, transmission contact a, data line, conveying casing one
End opening, closed at one end and open end Matching installation have the circular cylinder body of transmission end cap, and the closed end of conveying casing coaxially opens up
Have and stretch out hole one, transmission end cap, which coaxially offers, stretches out hole two;
The first decryption component includes in the parent of the circular tube structure of both ends open, and it is outer that parent is coaxially fixed on transmission
The closed end of shell, and the periphery of parent is additionally provided with the decryption sawtooth to match with the first re-encryption component, and decrypts sawtooth
It is correspondingly arranged on several groups.
8. the data transmission set of encryption protection according to claim 7, which is characterized in that the second decryption component
Including daughter, locating part pop-up spring, matched with the second re-encryption component, daughter is circle open at one end, closed at one end
Shape cylinder, daughter coaxial arrangement is in parent and its open end towards conveying casing;
One end of the fixed -piping is located in conveying casing, the other end passes through and stretches out hole one, parent open end, daughter opening
Hold and be fixed in daughter, the transmission contact a be fixed in daughter and transmit contact a along the both ends of daughter radial direction respectively with
The inside/outside disc of daughter is located on same disc, and reservoir bindiny mechanism be inserted into and all unlock Sealing mechanism when, transmit
Contact a is contacted with transmission contact b, and transmission contact a is correspondingly arranged on four groups, one end and transmission contact of the data line
A connection, the other end pass through fixed -piping, are set to stretching hole two that transmission end covers and be located at outside conveying casing and the end
Matching is provided with the socket being inserted into reservoir, and data line is correspondingly arranged on four groups, and data line, which is located at, to be fixed
The portion of external of pipeline external is provided with insulation protection skin.
9. the data transmission set of encryption protection according to claim 8, which is characterized in that also set up in the daughter
There is conflict step, the pop-up spring pocket is set to outside fixed -piping, pops up one end of spring and conflict step contradicts, is another
End is contradicted with conveying casing closed end, and the elastic force for popping up spring makes daughter by popping up in parent;
The periphery of the daughter is provided with limiting slot, and the periphery of parent offers coaxially arranged with limiting slot and connection
Limit hole, the locating part include limited block, limit spring, and limited block is set in limiting slot and its part is located at limit hole
Interior, one end of limit spring is fixedly connected with limited block, the other end is fixedly connected with limiting slot slot bottom, and the elastic force of limit spring
Limited block is set to do the movement far from limiting slot slot bottom;
The sliding slot to match with slide protrusion is additionally provided in the daughter, and reservoir bindiny mechanism unlocks the second re-encryption
When component, slide protrusion is located at sliding slot and rotates forward the front turned to along reservoir bindiny mechanism;
The closed end of the daughter is also coaxially arranged with the locating slot to match with positioning protrusion;
The periphery of the daughter is additionally provided with the magnetic patch to match with the 5th re-encryption component, and magnetic patch is divided into magnetic attracting
Mode makes to encrypt the magnetic patch one that part two unlocks, the magnetic patch two for unlocking encryption part three in such a way that magnetism is repelled each other.
10. the data transmission set of encryption protection according to claim 9, which is characterized in that the installation shell court
There is an installation end cap to the open end Matching installation outside server, and end cap is installed towards being provided on the end face outside server
Corresponding index line when unlocking and establish again data transmission channel with five.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910415610.0A CN110119631A (en) | 2019-05-18 | 2019-05-18 | The data transmission set of encryption protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910415610.0A CN110119631A (en) | 2019-05-18 | 2019-05-18 | The data transmission set of encryption protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110119631A true CN110119631A (en) | 2019-08-13 |
Family
ID=67522922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910415610.0A Pending CN110119631A (en) | 2019-05-18 | 2019-05-18 | The data transmission set of encryption protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110119631A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101384042A (en) * | 2008-10-15 | 2009-03-11 | 东南大学 | Mobile phone ciphering method based on safe digital interface ciphering card |
CN105464480A (en) * | 2014-09-05 | 2016-04-06 | 上海圣享科技股份有限公司 | Electromagnetic lock, lock cylinder of electromagnetic lock and unlocking method for electromagnetic lock |
CN206829797U (en) * | 2017-06-15 | 2018-01-02 | 陈明松 | Casement window insures handle |
CN108073838A (en) * | 2017-12-18 | 2018-05-25 | 温州大学瓯江学院 | Information security big data management system based on credible cloud computing |
-
2019
- 2019-05-18 CN CN201910415610.0A patent/CN110119631A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101384042A (en) * | 2008-10-15 | 2009-03-11 | 东南大学 | Mobile phone ciphering method based on safe digital interface ciphering card |
CN105464480A (en) * | 2014-09-05 | 2016-04-06 | 上海圣享科技股份有限公司 | Electromagnetic lock, lock cylinder of electromagnetic lock and unlocking method for electromagnetic lock |
CN206829797U (en) * | 2017-06-15 | 2018-01-02 | 陈明松 | Casement window insures handle |
CN108073838A (en) * | 2017-12-18 | 2018-05-25 | 温州大学瓯江学院 | Information security big data management system based on credible cloud computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108055235B (en) | Control method of intelligent lock, related equipment and system | |
CN103179086B (en) | Remote storage processing method and the system of data | |
US10477402B2 (en) | One-way key fob and vehicle pairing | |
CN107507303A (en) | The method for unlocking of intelligent lock system and smart lock | |
TW200802139A (en) | Secure biometric processing system and method of use | |
CN105405185B (en) | Safe verification method and device | |
CN106357400A (en) | Method and system for establishing channel between TBOX terminal and TSP platform | |
HK1071492A1 (en) | Method for data broadcast between a local server and local peripherals | |
CN109450648B (en) | Key generation device, data processing apparatus, and data transfer system | |
CN106506149B (en) | Key generation method and system between a kind of TBOX terminal and TSP platform | |
CN105978907A (en) | Decrypting method, device and system | |
CN106452750B (en) | A kind of quantum encryption communication method for mobile device | |
WO2006091396A3 (en) | Payload layer security for file transfer | |
CN102647712B (en) | A kind of mobile phone data encryption method and decryption method | |
CN107679397A (en) | The weak passwurd detecting system and method for a kind of Linux system | |
CN104134141B (en) | E-wallet system payment method based on time synchronization | |
CN105631298B (en) | A kind of ciphering and deciphering device and method | |
CN110135205A (en) | The method for constructing encrypted data transmission channel | |
CN110119631A (en) | The data transmission set of encryption protection | |
CN105227299A (en) | A kind of data encrypting and deciphering management equipment and application process thereof | |
US8656179B2 (en) | Using hidden secrets and token devices to create secure volumes | |
CN106295368A (en) | The data security protection method of a kind of mobile terminal and system | |
CN100461199C (en) | Method and device for encrypting and de-encrypting digital content | |
CN106953917B (en) | Method of data synchronization and system | |
CN109961542A (en) | A kind of entrance guard device, verifying device, verifying system and its verification method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190813 |
|
RJ01 | Rejection of invention patent application after publication |