CN110138569B - Encrypted data transmission butt joint method - Google Patents

Encrypted data transmission butt joint method Download PDF

Info

Publication number
CN110138569B
CN110138569B CN201910415615.3A CN201910415615A CN110138569B CN 110138569 B CN110138569 B CN 110138569B CN 201910415615 A CN201910415615 A CN 201910415615A CN 110138569 B CN110138569 B CN 110138569B
Authority
CN
China
Prior art keywords
limiting
decryption
inner cylinder
column
cylinder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910415615.3A
Other languages
Chinese (zh)
Other versions
CN110138569A (en
Inventor
袁敏良
王惟
胡振云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SINXIN INFORMATION TECHNOLOGY Co.,Ltd.
Original Assignee
Shenzhen Sinxin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sinxin Information Technology Co ltd filed Critical Shenzhen Sinxin Information Technology Co ltd
Priority to CN201910415615.3A priority Critical patent/CN110138569B/en
Publication of CN110138569A publication Critical patent/CN110138569A/en
Application granted granted Critical
Publication of CN110138569B publication Critical patent/CN110138569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R43/00Apparatus or processes specially adapted for manufacturing, assembling, maintaining, or repairing of line connectors or current collectors or for joining electric conductors
    • H01R43/26Apparatus or processes specially adapted for manufacturing, assembling, maintaining, or repairing of line connectors or current collectors or for joining electric conductors for engaging or disengaging the two parts of a coupling device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/38Encryption being effected by mechanical apparatus, e.g. rotating cams, switches, keytape punchers

Landscapes

  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Pinball Game Machines (AREA)

Abstract

The invention provides an encrypted data transmission butt joint method, which comprises the following steps: firstly, a decryption cylinder in a decryption mechanism I is inserted into a first inner cylinder, an encryption mechanism identifies and matches the decryption mechanism I, and after matching is successful, the encryption mechanism releases the rotation constraint of the first inner cylinder; then, the decryption cylinder is rotated, the decryption cylinder drives the first inner cylinder to synchronously rotate, the trigger mechanism is triggered, the constraint mechanism releases the limitation on the decryption mechanism II, and the decryption mechanism II is popped out from the decryption mechanism I and is switched to an extended state; then, the extended decryption mechanism II is inserted into the second inner cylinder, the encryption mechanism II identifies and matches the decryption mechanism II, and after matching is successful, the rotation constraint of the encryption mechanism II on the second inner cylinder is released; and finally, rotating the decryption cylinder, wherein the decryption cylinder drives the second inner cylinder to rotate and switches the disconnected data output circuit to be conducted, the data input circuit is in butt joint with the data output circuit, and the data source equipment is in butt joint with the receiving equipment.

Description

Encrypted data transmission butt joint method
Technical Field
The invention relates to the technical field of mechanical encryption, in particular to an encrypted data transmission butt joint method.
Background
Data transmission is an important technology in the internet era, and in daily use, the connector and the port are usually connected through an output port connected with data source equipment and an input connector connected with receiving equipment, so as to establish a data transmission bridge and achieve the purpose of data transmission, in order to ensure the universality and the replaceability of the same type of data transmission ports and joints, the same type of data transmission ports and joints have the matching property of mutual butt joint, which greatly meets the daily use of people, however, the method has certain defects and disadvantages, when confidential data needs to be kept secret, the risk of data stealing is greatly increased, particularly for important files of companies, national confidential files, military technical data and the like, and therefore the inventor designs a mechanical encryption data transmission docking method which is ingenious in structure, simple in principle, convenient to use and dock and applied to the confidential files.
Disclosure of Invention
In order to solve the defects of the prior art, the invention aims to provide the mechanical encryption data transmission docking method which is ingenious in structure, simple in principle, convenient and fast to use and dock and is applied to confidential files.
In order to achieve the technical purpose, the technical scheme adopted by the invention is as follows.
An encrypted data transmission docking method, comprising the steps of:
a decryption stage of a decryption cylinder;
s1: a user firstly inserts a decryption cylinder in a first decryption mechanism into a first inner cylinder, the encryption mechanism identifies and matches the first decryption mechanism, and after the matching is successful, the encryption mechanism releases the rotation constraint of the first inner cylinder;
the inner circular surface of the outer cylinder is mutually attached to the outer circular surface of the first inner cylinder, the first encryption mechanism comprises a first limiting hole which is arranged on the outer cylinder and penetrates through the outer cylinder along the radial direction of the first limiting hole, and a second limiting hole which is arranged on the first inner cylinder and penetrates through the first inner cylinder along the radial direction of the first limiting hole, a first limiting column which can slide along the axial direction of the first limiting column is arranged in the first limiting hole, a second limiting column which can slide along the radial direction is arranged in the second limiting hole, the diameters of the first limiting hole and the second limiting hole are equal, the first limiting column and the second limiting column are mutually attached to each other by being close to one end surfaces and are both arranged to be arc surfaces matched with the outer circular surface of the first inner cylinder, the distance from the first limiting column to the second limiting hole in an initial state is A, the distance from the second limiting column to the first inner cylinder is A;
the opening of one end of the first limiting hole, which is far away from the first inner cylinder, is provided with a sealing plug screw which is in threaded connection and matching with the opening, a first abutting spring is arranged in the first limiting hole, one end of the first abutting spring abuts against the sealing plug screw, the other end of the first abutting spring abuts against the first limiting post, and the elastic force of the first abutting spring is always directed to the first limiting post by the sealing plug screw;
the first decryption mechanism comprises a handle which is arranged in a columnar hollow manner, a hollow sleeving column is coaxially and fixedly arranged at the front end of the handle in the axial direction, the handle is arranged along an opening at the tail end of the handle in the axial direction, a sealing cover is arranged at the opening, a decryption cylinder which is coaxially and fixedly connected with the front end of the handle is sleeved outside the sleeving column, the diameter of the decryption cylinder is matched with the inner diameter of the first inner cylinder, a first guide groove which is parallel to the axial direction of the decryption cylinder is formed in the outer circular surface of the decryption cylinder, and sawtooth bulges which are matched with the second limiting columns one by one are arranged in the first guide groove;
the inner circular surface of the first inner cylinder is provided with a guide lug matched with the first guide groove, and the guide lug is arranged along the axial direction parallel to the first inner cylinder and is aligned with the two limiting holes;
in the decryption process of the first encryption mechanism, the first decryption mechanism is inserted into the first inner cylinder, the sawtooth bulges push the second limiting post inserted into the first inner cylinder, the distance for the second limiting post to slide towards the outside along the second limiting hole is A, the second limiting post pushes the first limiting post to slide outwards along the first limiting hole synchronously, the first pushing spring is gradually compressed, the elastic potential energy is increased, at the moment, the first limiting post is completely arranged in the first limiting hole, the second limiting post is completely arranged in the second limiting hole, and the rotation constraint of the first limiting post and the second limiting post on the first inner cylinder is released;
(II) ejecting the decryption column;
s2: the decryption cylinder is rotated, the decryption cylinder drives the first inner cylinder to synchronously rotate, so that the trigger mechanism is automatically triggered, the constraint mechanism releases the limitation on the decryption mechanism II, and the decryption mechanism II is popped up from the decryption mechanism I and is switched from a retraction state to an extension state;
the decryption mechanism II comprises a decryption column which is positioned in the decryption cylinder and forms sliding guide fit along the axial direction of the decryption column, a sleeving groove is coaxially formed in the end face, close to one end face of the handle, of the decryption column, the sleeving groove is movably sleeved outside the sleeving column, the sleeving column and the sleeving groove form sliding guide fit along the axial direction of the sleeving column, a built-in step II is coaxially formed in the middle of the sleeving groove along the groove depth direction of the sleeving groove, the built-in step II extends to penetrate through the front end of the handle, the diameter of the built-in step II is larger than that of the sleeving groove, a firing spring is sleeved outside the sleeving column, one end of the firing spring is abutted against the front end of the handle, the other end of the firing spring is abutted against the built-in step II, the elasticity of the firing spring is always directed to the built-in step II from;
(III) decrypting the column;
s3: the extended decryption mechanism II is inserted into the second inner cylinder, the encryption mechanism II identifies and matches the decryption mechanism II, and after matching is successful, the rotation constraint of the encryption mechanism II on the second inner cylinder is released;
in the process of decrypting the two pairs of encryption mechanisms of the decryption mechanism, after the limiting mechanism releases the limiting on the decryption mechanism two, the decryption mechanism two cannot be switched to an extended state instantly, a user rotates the handle clockwise, when the guide raised bars are aligned with the guide grooves two, the decryption column slides towards the outside of the decryption cylinder and is inserted into the second inner cylinder, at the moment, the plurality of magnets I and the magnetic heads are matched one by one for identification, after the identification is successful, the repulsive force of the magnets I and the magnetic heads I drives the limiting column five to slide towards the outside of the limiting hole five by a distance equal to B, the limiting column five drives the limiting column three to move synchronously, so that the limiting column three is completely arranged in the limiting hole three, the limiting column five is completely arranged in the limiting hole five, meanwhile, the plurality of magnets II and the magnetic heads are matched one by one to one, after the identification is successful, the attractive force of the magnets II and the magnetic heads II drives the limiting column six to slide towards the inside of the limiting, the limiting column six drives the limiting column four to synchronously move, so that the limiting column four is completely arranged in the limiting hole four, the limiting column six is completely arranged in the limiting hole six, and at the moment, the rotation constraint of the decryption mechanism on the second inner cylinder is released;
(IV) data line docking stage;
s4: further rotating the decryption cylinder, the decryption cylinder drives the second inner cylinder to rotate and enables the disconnected data output line to be switched to be conducted, at the moment, the data input line and the data output line are in butt joint and are communicated, the data source equipment and the receiving equipment are mutually communicated, and the control system controls data transmission and interruption of the confidential files;
the data output circuit comprises output pins fixedly arranged outside the outer barrel, the outer circular surface of the outer barrel is arranged into a polygonal structure, the output pins are provided with a plurality of output pins which are arranged in an array mode along the circumferential direction where the outer barrel is located, data connection is established between one end of each output pin and data source equipment, a columnar output contact is arranged at the other end of each output pin, the output contacts and the end portions of the output pins form sliding guide fit along the radial direction of the outer barrel, mounting holes which are arranged along the radial direction of the outer barrel are formed in the outer surface of the outer barrel and penetrate through the outer barrel, the output contacts are located in the mounting holes, and the output contacts are abutted to the outer;
a limiting bulge is fixedly arranged on the outer circular surface of the output contact, a compression spring is movably sleeved outside the output contact, one end of the compression spring is abutted against the output pin, the other end of the compression spring is abutted against the limiting bulge, and the elastic force of the compression spring always pushes the output contact to be abutted against the outer circular surface of the second inner cylinder;
the data output circuit further comprises a plurality of offset contacts which are arranged in the second inner cylinder in a radial embedded mode, the offset contacts correspond to the output contacts one to one, one end of each offset contact is flush with the outer circular surface of the second inner cylinder, the other end of each offset contact is flush with the inner circular surface of the second inner cylinder, the output contacts and the offset contacts are offset in the circumferential direction of the outer cylinder in an initial state, the offset angle is H, the angle is 30 degrees < H <60 degrees, and the preferred angle is 45 degrees;
the data input circuit comprises a wire pipe movably arranged in the handle, one end of the wire pipe movably penetrates through the sleeving column and is fixedly connected with the bottom of the sleeving groove, the wire pipe and the inner circular surface of the sleeving column form sliding guide fit along the axial direction, the other end of the wire pipe extends into the handle, a data wire penetrates through the wire pipe, one end of the data wire extends out of the sealing cover and is connected with the receiving equipment, the other end of the data wire is connected with an input contact, the input contact is embedded in the decryption column and penetrates through the outer circular surface of the decryption column, the input contacts are provided with a plurality of offset contacts in one-to-one corresponding matching, the decryption column is inserted into the second inner cylinder, and the input contact is abutted and butted with the;
in the data transmission process, after the two pairs of decryption mechanisms II of the encryption mechanism are successfully identified, the decryption mechanism II drives the second inner cylinder to rotate by 45 degrees, the output contact is in butt joint with one end of the offset contact, the other end of the offset contact is in butt joint with the input contact synchronously inserted into the second inner cylinder along with the decryption mechanism II, the data output line is in butt joint with the data input line, and a user can control data transmission between the source equipment and the receiving equipment through the control system.
Compared with the prior art, the invention has the advantages of ingenious structure, simple principle and convenient use and butt joint, adopts the output device connected with the data source equipment and the input device connected with the receiving equipment, the output device comprises the encryption mechanism, the input device comprises the decryption mechanism, the decryption mechanism and the encryption mechanism can be mutually identified and matched, the data transmission line can be conducted for data transmission, and the risk of stealing confidential files is reduced.
Drawings
Fig. 1 is a schematic structural diagram of an output device.
Fig. 2 is a schematic structural diagram of the input device.
Fig. 3 is a schematic structural diagram of the input device.
Fig. 4 is a schematic diagram of the input device and the output device.
Fig. 5 is a schematic diagram of the input device and the output device.
Fig. 6 is a schematic diagram of the input device and the output device.
Fig. 7 is an exploded view of the output device.
Fig. 8 is a schematic structural diagram of a data output line.
Fig. 9 is a partial structure diagram of a data output line.
Fig. 10 is a partial structure diagram of a data output line.
Fig. 11 is a schematic structural diagram of a first encryption mechanism.
Fig. 12 is a partial structural diagram of a first encryption mechanism.
Fig. 13 is a partial structural diagram of a first encryption mechanism.
Fig. 14 is a partial structural view of the trigger mechanism.
Fig. 15 is a partial structural schematic view of the trigger mechanism.
Fig. 16 is a partial structural view of the trigger mechanism.
Fig. 17 is a schematic structural view of the operating state of the trigger mechanism.
Fig. 18 is a partial structural view of the trigger mechanism.
Fig. 19 is a partial structural view of the trigger mechanism.
Fig. 20 is a partial configuration diagram of the second encryption mechanism.
Fig. 21 is a partial configuration diagram of the second encryption mechanism.
Fig. 22 is a partial configuration diagram of the second encryption mechanism.
Fig. 23 is a partial configuration diagram of the second encryption mechanism.
FIG. 24 is a cross-sectional view of the second inner barrel.
Fig. 25 is a schematic diagram of the internal structure of the input device.
Fig. 26 is a schematic structural diagram of the first decryption mechanism.
Fig. 27 is a schematic diagram of the internal structure of the first decryption mechanism.
Fig. 28 is a schematic diagram of the internal structure of the second decryption mechanism.
Fig. 29 is a schematic structural diagram of the second decryption mechanism in an extended state.
Fig. 30 is a partial sectional view of the first decryption mechanism.
Fig. 31 is a schematic diagram of a data input line.
Fig. 32 is a partial structural view of the restraint mechanism.
Fig. 33 is a schematic structural diagram of the data output line and the data input line.
Detailed Description
An encrypted data transmission docking method, comprising the steps of:
a decryption stage of a decryption cylinder;
s1: a user firstly inserts the decryption cylinder 214 in the first decryption mechanism 210 into the first inner cylinder 120, the first encryption mechanism 150 identifies and matches the first decryption mechanism 210, and after the matching is successful, the first encryption mechanism 150 releases the rotation constraint of the first inner cylinder 120;
the inner circular surface of the outer cylinder 110 is mutually attached to the outer circular surface of the first inner cylinder 120, the first encryption mechanism 150 comprises a first limit hole 151 which is arranged on the outer cylinder 110 and penetrates through the outer cylinder 110 along the radial direction, a second limit hole 152 which is arranged on the first inner cylinder 120 and penetrates through the first inner cylinder 120 along the radial direction, a first limit column 154 which can slide along the axial direction of the first limit hole 151 is arranged in the first limit hole 151, a second limit column 153 which can slide along the radial direction is arranged in the second limit hole 152, the diameters of the first limit hole 151 and the second limit hole 152 are equal, the first limit column 154 and the second limit column 153 are mutually attached to one end surface which is close to each other and are respectively arranged into arc surfaces matched with the outer circular surface of the first inner cylinder 120, the distance from the first limit column 154 to the second limit hole, the distance between the second limiting column 153 and the first inner cylinder 120 is A, and one end of the second limiting column 153, which extends into the first inner cylinder 120, is provided with a round head 153 a;
in the decryption process of the first encryption mechanism 150, the first decryption mechanism 210 is inserted into the first inner cylinder 120, the sawtooth protrusions 216 push the second limit posts 153 inserted into the first inner cylinder 120 in a butting manner, so that the distance that the second limit posts 153 slide towards the outside along the second limit holes 152 is A, the second limit posts 153 push the first limit posts 154 to synchronously slide towards the outside along the first limit holes 151, the first butting springs 156 gradually compress and the elastic potential energy is increased, at the moment, the first limit posts 154 are completely arranged in the first limit holes 151, the second limit posts 153 are completely arranged in the second limit holes 152, and the first limit posts 154 and the second limit posts 153 relieve the rotation constraint of the first inner cylinder 120;
(II) ejecting the decryption column;
s2: the decryption cylinder 214 is rotated, the decryption cylinder 214 drives the first inner cylinder 120 to synchronously rotate, so that the triggering mechanism 170 automatically triggers and the constraint mechanism releases the limitation on the second decryption mechanism 220, and the second decryption mechanism 220 is ejected from the first decryption mechanism 210 and is switched from a retracted state to an extended state;
the second decryption mechanism 220 comprises a decryption column 221 which is located in the decryption barrel 214 and forms sliding guide fit along the axial direction of the decryption column, a sleeving groove 222 is coaxially formed in one end face, close to the handle 211, of the decryption column 221, the sleeving groove 222 is movably sleeved outside the sleeving column 212, and forms sliding guide fit along the axial direction of the sleeving column 212, a second built-in step is coaxially formed in the middle of the sleeving groove 222 along the groove depth direction, the second built-in step extends to penetrate through the front end of the handle 211, the diameter of the second built-in step is larger than that of the sleeving groove 222, a firing spring 223 is sleeved outside the sleeving column 212, one end of the firing spring 223 abuts against the front end of the handle 211, the other end of the firing spring abuts against the second built-in step, the elastic force of the firing spring 223 always points to the second built-in step from the front end of the handle 211, and in the initial state, the constraint mechanism;
(III) decrypting the column;
s3: the extended decryption mechanism II 220 is inserted into the second inner cylinder 130, the encryption mechanism II 160 identifies and matches the decryption mechanism II 220, and after matching is successful, the encryption mechanism II 160 releases the rotation constraint of the second inner cylinder 130;
the second encryption mechanism 160 comprises a third limiting hole 161a and a fourth limiting hole 161b which are arranged outside the outer cylinder 110 and penetrate through the outer cylinder 110, the third limiting hole 161a and the fourth limiting hole 161b are axially parallel to each other and are arranged along the radial direction of the outer cylinder 110, the second encryption mechanism 160 further comprises a fifth limiting hole 162a and a sixth limiting hole 162b which are arranged outside the second inner cylinder 130 and penetrate through the inner cylinder 130, the fifth limiting hole 162a and the sixth limiting hole 162b are axially parallel to each other and are arranged along the radial direction of the second inner cylinder 130, a third built-in step is arranged at an opening of the fifth limiting hole 162a and the sixth limiting hole 162b close to one end inside the second inner cylinder 130, the third limiting hole 161a and the fifth limiting hole 162a coaxially correspond to each other in an initial state, and the fourth limiting hole 161b and the sixth limiting hole 162b coaxially correspond to each other;
a third limit post 163a which can slide along the axial direction is arranged in the third limit hole 161a, a fifth limit post 163B which can slide along the axial direction is arranged in the fifth limit hole 162a, one end faces of the third limit post 163a and the fifth limit post 163B which are close to each other are mutually jointed and are both arranged into arc-shaped faces matched with the outer circular face of the second inner cylinder 130, the distance from the fifth limit post 163B to the second inner cylinder 130 is B in the initial state, the distance from the third limit post 163a to the fifth limit hole 162a is B, a sealing screw plug 155 which is in threaded connection and matching with the opening of the third limit hole 161a and the fourth limit hole 161B which is deviated from one end of the second inner cylinder 130 is also arranged at the opening of the third limit hole 161a and the fourth limit hole 161B, a second abutting spring 165 is arranged in the third limit hole 161a, one end of the second abutting spring 165 abuts against the sealing screw plug 155, the other end abuts against the third limit post 163a, and the elastic, the built-in step III in the limiting hole fifth 162a is used for limiting the limiting of the limiting column fifth 163B, one end, close to the interior of the second inner cylinder 130, of the limiting column fifth 163B is fixedly provided with a first cylindrical magnetic head 164, the outer circular surface of the decryption column 221 is embedded with a first magnet 224, the decryption column 221 is inserted into the second inner cylinder 130, one end surface, close to each other, of the first magnet 224 and the first magnetic head 164 is mutually repulsive, and the displacement of the limiting column fifth 163B, sliding towards the exterior of the limiting hole fifth 162, is driven to be equal to B by the magnitude of the repulsive force;
a limit post fourth 166a capable of sliding along the axial direction is arranged in the limit hole fourth 161b, a limit post sixth 166b capable of sliding along the axial direction is arranged in the limit hole sixth 162b, the limit post fourth 166a and the limit post sixth 166b are close to one end surface and are mutually jointed and are both arranged into arc surfaces matched with the outer circular surface of the second inner cylinder 130, the distance from the limit post sixth 166b to the limit hole fourth 161b is C in the initial state, a push-against spring third 167 is arranged in the limit hole sixth 162b, one end of the push-against spring third 167 is abutted against a built-in step third in the limit hole sixth 162, the other end of the push-against spring third 167 is abutted against the limit post sixth 166b, the elastic force of the push-against spring third 167 is always directed to the limit post sixth 166b from the built-in step third in the limit hole sixth 162, a magnetic head second 168 is arranged on one end surface of the limit post sixth 166b close to the inner part of the second inner cylinder 130, a magnet, the decryption column 221 is inserted into the second inner cylinder 130, the second magnet 225 and the second magnetic head 168 are close to one end face to attract each other, and the displacement of the second magnetic head driving the limiting column six 166b to slide towards the limiting hole six 162b is equal to C;
the inner circular surface of the second inner cylinder 130 is provided with a guide convex strip 169 parallel to the axial direction of the second inner cylinder, the outer circular surface of the decryption column 221 is provided with a second guide groove 226 parallel to the axial direction of the decryption column, and the guide convex strip 169 is matched with the second guide groove 226 and is matched with the second guide groove 226 for guiding the insertion of the decryption column 221;
in the process that the second decryption mechanism 220 decrypts the second encryption mechanism 160, after the restriction mechanism releases the restriction on the second decryption mechanism 220, the second decryption mechanism 220 cannot be immediately switched to the extended state, when the user rotates the handle 211 clockwise, when the guide convex strip 149 is aligned with the second guide groove 226, the decryption column 221 slides towards the outside of the decryption cylinder 214 and is inserted into the second inner cylinder 130, at this time, the plurality of first magnets 224 are matched with the first magnetic heads 164 one by one for identification, after the identification is successful, the repulsive force of the first magnets 224 and the first magnetic heads 164 drives the fifth limiting columns 163B to slide towards the outside of the fifth limiting holes 162a by a distance equal to B, the fifth limiting columns 163B drives the third limiting columns 163a to synchronously move, so that the third limiting columns 163a are completely arranged in the third limiting holes 161a, the fifth limiting columns 163B are completely arranged in the fifth limiting holes 162a, and meanwhile, the plurality of second magnets 225 are matched with the second magnetic heads 168 one by one, after successful identification, the attractive force of the second magnet 225 and the second magnetic head 148 drives the limit post six 166b to slide towards the inside of the limit hole six 162b for a distance equal to C, the limit post six 166b drives the limit post four 166a to move synchronously, so that the limit post four 166a is completely arranged in the limit hole four 161b, the limit post six 166b is completely arranged in the limit hole six 162b, and at the moment, the rotation constraint of the second inner cylinder 130 by the second decryption mechanism 220 is released;
(IV) data line docking stage;
s4: further rotating the decryption cylinder 214, the decryption cylinder 214 drives the second inner cylinder 130 to rotate and switches the disconnected data output line 140 to be on, at this time, the data input line 230 is in butt joint with the data output line 140, the data source device and the receiving device are mutually connected, and the control system controls the data transmission and the data interruption of the confidential document;
the data output line 140 includes an output pin 141 fixedly mounted outside the outer barrel 110, an outer circumferential surface of the outer barrel 141 is provided with a polygonal structure, the output pin 141 is provided with a plurality of output pins and is arranged in an array along a circumferential direction of the outer barrel 141, one end of each output pin 141 is connected with a data source device in a data connection mode, the other end of each output pin 141 is provided with a columnar output contact 142, the output contacts 142 and the end portions of the output pins 141 form a sliding guide fit along the radial direction of the outer barrel 141, the outer surface of the outer barrel 141 is provided with mounting holes 143 arranged along the radial direction of the outer barrel 141, the mounting holes 143 penetrate through the inner portion of the outer barrel 141, the output contacts 142 are located in the mounting holes 143, and the output;
a limiting protrusion 144 is fixedly arranged on the outer circular surface of the output contact 142, a pressing spring 145 is movably sleeved outside the output contact 142, one end of the pressing spring 145 is abutted against the output pin 141, the other end of the pressing spring 145 is abutted against the limiting protrusion 144, and the elastic force of the pressing spring 145 always pushes the output contact 142 to be abutted against the outer circular surface of the second inner cylinder 130;
the data output circuit 140 further includes offset contacts 146 radially embedded in the second inner cylinder 130, the offset contacts 146 are provided in plural and correspond to the output contacts 142 one by one, one end of each offset contact 146 is flush with the outer circumferential surface of the second inner cylinder 130, the other end of each offset contact 146 is flush with the inner circumferential surface of the second inner cylinder 130, the output contacts 142 and the offset contacts 146 are offset and offset in the circumferential direction of the outer cylinder 110 in an initial state, the offset angle is H, 30 ° < H <60 °, and preferably H is 45 °;
the data input line 230 comprises a line pipe 232 movably arranged in the handle 211, one end of the line pipe 232 movably penetrates through the sleeve column 212 and is fixedly connected with the groove bottom of the sleeve groove 222, the line pipe 232 and the inner circular surface of the sleeve column 212 form sliding guide fit along the axial direction, the other end of the line pipe 232 extends into the handle 211, the data line 232 penetrates through the line pipe 232, one end of the data line 232 extends out of the sealing cover 213 and is connected with a receiving device, the other end of the data line 232 is connected with an input contact 233, the input contact 233 is embedded in the decryption column 221 and penetrates through the outer circular surface of the decryption column, the input contacts 233 are provided with a plurality of offset contacts 146 and are matched with the offset contacts 146 in a one-to-one correspondence manner, the decryption column 221 is inserted into the second inner cylinder 130;
in the data transmission process, after the second decryption mechanism 220 is successfully identified by the second encryption mechanism 160, the second decryption mechanism 220 drives the second inner cylinder 130 to rotate by 45 degrees, the output contact 142 is in contact with one end of the offset contact 146, the other end of the offset contact 146 is in contact with the input contact 233 which is synchronously inserted into the second inner cylinder 130 along with the second decryption mechanism 220, the data output line 140 is in contact with the data input line 230, and a user can control data transmission between the source device and the receiving device through a control system.
A mechanical encrypted data transmission docking system comprises an output device 100 connected with a data source device and an input device 200 connected with a receiving device, wherein the output device 100 comprises an outer cylinder 110 with two open ends and fixedly arranged, a first inner cylinder 120 and a second inner cylinder 130 coaxially and rotatably sleeved in the outer cylinder 110, an encryption mechanism I150 used for restricting the rotation of the first inner cylinder 120 is arranged between the outer cylinder 110 and the first inner cylinder 120, an encryption mechanism II 160 used for restricting the rotation of the second inner cylinder 130 is arranged between the outer cylinder 120 and the second inner cylinder 130, a disconnected data output line 140 is arranged between the outer cylinder 110 and the second outer cylinder 130, the data output line 140 can be conducted through the rotation of the second inner cylinder 130, the input device 200 comprises a decryption mechanism I210, a decryption mechanism II 220 and a data input line 230 arranged on the decryption mechanism II 220, the decryption mechanism I210 is sleeved outside the decryption mechanism II 220, the second decryption mechanism 220 is set to be in a retracted state and an extended state which can be switched with each other, and the initial state is the retracted state, a constraint mechanism for limiting the second decryption mechanism 220 to be in the retracted state is arranged between the first decryption mechanism 210 and the second decryption mechanism 220, the first decryption mechanism 210 and the first encryption mechanism 150 cooperate to enable the first inner cylinder 120 to rotate so as to enable the constraint mechanism to release the constraint of the second decryption mechanism 220, and the second decryption mechanism 220 and the second encryption mechanism 160 cooperate to enable the second inner cylinder 130 to rotate so as to enable the data output line 140 to be switched from off to on.
When a user transmits confidential data, the user inserts the first decryption mechanism 210 into the first inner cylinder 120, the first encryption mechanism 150 identifies and matches the first decryption mechanism 210, after the matching is successful, the first decryption mechanism 210 rotates, the first decryption mechanism 210 drives the first inner cylinder 120 to rotate and enables the constraint mechanism to remove the limitation on the second decryption mechanism 220, the second decryption mechanism 220 is ejected from the first decryption mechanism 210 and switched from a retracted state to an extended state, the second decryption mechanism 220 in the extended state is inserted into the second inner cylinder 130, the second decryption mechanism 220 is identified and matched by the second encryption mechanism 160, after the matching is successful, the first decryption mechanism 210 is further rotated, the second decryption mechanism 220 drives the second inner cylinder 130 to rotate and enables the disconnected data output line 140 to be switched to be connected, at the moment, the data input line 230 and the data output line 140 are in butt joint connection, and the data source device and the receiving device are mutually connected, the control system controls the data transmission and interruption of the confidential document, if the first encryption mechanism 150 cannot identify the first decryption mechanism 210 or the second encryption mechanism 160 cannot identify the second decryption mechanism 220, the data output line 140 and the data input line 230 cannot be conducted and butted, and the data source device and the receiving device cannot perform data transmission, so that the purpose of protecting the confidential data is achieved.
Specifically, in order to protect the first encryption mechanism 150 and the second encryption mechanism 160 from being damaged by external force, the outer casing 111 fixed to the outer casing 110 is covered outside the outer casing 110, and the outer casing 111 is fixedly connected to the data source device.
The data output line 140 includes an output pin 141 fixedly installed outside the outer barrel 110, in order to facilitate installation of the output pin 141, an outer circumferential surface of the outer barrel 141 is provided with a polygonal structure, the output pin 141 is provided with a plurality of output pins 141 and is arranged in an array along a circumferential direction of the outer barrel 141, a data connection is established between one end of the output pin 141 and a data source device, the other end of the output pin 141 is provided with a columnar output contact 142, the output contact 142 and an end portion of the output pin 141 form a sliding guide fit along a radial direction of the outer barrel 141, an outer surface of the outer barrel 141 is provided with an installation hole 143 arranged along the radial direction of the outer barrel 141, the installation hole 143 penetrates through the inner portion of the outer barrel 141, the output contact 142 is located in the installation hole.
Specifically, in order to ensure the interference between the output contact 142 and the outer circumferential surface of the second inner cylinder 130, a limiting protrusion 144 is fixedly disposed on the outer circumferential surface of the output contact 142, a pressing spring 145 is movably sleeved outside the output contact 142, one end of the pressing spring 145 is in interference with the output pin 141, the other end of the pressing spring 145 is in interference with the limiting protrusion 144, and the elastic force of the pressing spring 145 always pushes the output contact 142 to be in interference with the outer circumferential surface of the second inner cylinder 130.
More specifically, the data output circuit 140 further includes a plurality of offset contacts 146 embedded in the second inner cylinder 130 along the radial direction, the offset contacts 146 are corresponding to the output contacts 142 one by one, one end of each offset contact 146 is flush with the outer circumferential surface of the second inner cylinder 130, the other end of each offset contact 146 is flush with the inner circumferential surface of the second inner cylinder 130, the output contacts 142 and the offset contacts 146 are offset and offset in the circumferential direction of the outer cylinder 110 in the initial state by an angle H, which is 30 ° < H <60 °, and preferably H is 45 °.
In the working process of the data output line 140, after the second decryption mechanism 220 is successfully identified by the second encryption mechanism 160, the second decryption mechanism 220 drives the second inner cylinder 130 to rotate by 45 degrees, the output contact 142 is in interference connection with one end of the offset contact 146, the other end of the offset contact 146 is in interference connection with the data input line 230 synchronously inserted into the second inner cylinder 130 along with the second decryption mechanism 220, and the data output line 140 is in butt connection with the data input line 230.
The inner circular surface of the outer cylinder 110 is mutually attached to the outer circular surface of the first inner cylinder 120, the first encryption mechanism 150 comprises a first limit hole 151 which is arranged on the outer cylinder 110 and penetrates through the outer cylinder 110 along the radial direction, a second limit hole 152 which is arranged on the first inner cylinder 120 and penetrates through the first inner cylinder 120 along the radial direction, a first limit column 154 which can slide along the axial direction of the first limit hole is arranged in the first limit hole 151, a second limit column 153 which can slide along the radial direction is arranged in the second limit hole 152, the diameters of the first limit hole 151 and the second limit hole 152 are equal, the first limit column 154 and the second limit column 153 are mutually attached to one end surface and are both arranged into arc surfaces matched with the outer circular surface of the first inner cylinder 120, the distance from the first limit column 154 to the second limit hole 152 in the initial state is A, the distance from the second limit column 153 to the first inner cylinder 120 in the initial state is A, and the first limit column 154 and the second limit column 153 and the first limit column 154 slide A, the second limit post 153 and the first limit post 154 release the rotational constraint of the first inner cylinder 120, and in order to avoid the pushing of the second limit post 153, one end of the second limit post 153 extending into the first inner cylinder 120 is set to be a round head 153 a.
Specifically, in order to avoid the second limiting post 153 from sliding into the second inner barrel 120, a first built-in step is arranged in the second limiting hole 152, a first external step adapted to the first built-in step is arranged on the outer circumferential surface of the second limiting post 154, and the first built-in step and the first external step are matched with each other to restrain the second limiting post 153.
More specifically, an opening of one end of the first limiting hole 151, which is away from the first inner cylinder 120, is provided with a sealing plug screw 155, which is in threaded connection and is matched with the opening, a first abutting spring 156 is arranged in the first limiting hole 151, one end of the first abutting spring 156 abuts against the sealing plug screw 155, the other end of the first abutting spring 156 abuts against the first limiting column 154, and the elastic force of the first abutting spring 156 is always directed to the first limiting column 154 by the sealing plug screw 155.
In order to increase the encoding complexity of the first encryption mechanism 150 and improve the mechanical encryption performance, the first limiting hole 151 is provided with a plurality of limiting holes in the axial direction parallel to the outer cylinder 110, the second limiting hole 152 is provided with a plurality of limiting holes in the axial direction parallel to the first inner cylinder 120, the second limiting hole 152 corresponds to the first limiting hole 151 in a one-to-one manner, preferably, the first limiting hole 151 and the second limiting hole 152 are provided with four limiting holes, the distance from each group of the first limiting columns 154 to the second limiting holes 152 and the distance A from the second limiting columns 153 to the first inner cylinder 120 can be synchronously and freely set, the first encryption mechanism 150 is provided with a plurality of groups and is arranged in an array manner along the circumferential direction of the outer cylinder 110, and preferably, the first encryption mechanism 150 is provided with two groups.
In the decryption process of the first encryption mechanism 150, the first decryption mechanism 210 is inserted into the first inner cylinder 120, the first decryption mechanism 210 pushes the second limit post 153 inserted into the first inner cylinder 120, so that the distance that the second limit post 153 slides towards the outside along the second limit hole 152 is a, the second limit post 153 pushes the first limit post 154 to synchronously slide towards the outside along the first limit hole 151, the first push spring 156 is gradually compressed and the elastic potential energy is increased, at this time, the first limit post 154 is completely arranged in the first limit hole 151, the second limit post 153 is completely arranged in the second limit hole 152, and the first limit post 154 and the second limit post 153 release the rotational constraint of the first inner cylinder 120.
In order to decrypt the first encryption mechanism 150, the first decryption mechanism 210 includes a handle 211 which is arranged in a columnar hollow manner, the handle 211 is coaxially and fixedly provided with a hollow socket column 212 along the front end in the axial direction, the handle 211 is arranged along the opening of the rear end in the axial direction and is provided with a sealing cover 213 at the opening, a decryption cylinder 214 which is coaxially and fixedly connected with the front end of the handle 211 is sleeved outside the socket column 212, the diameter of the decryption cylinder 214 is matched with the inner diameter of the first inner cylinder 120, in order to extrude the round head 153a and drive the second limit column 153 to move towards the outside, a displacement is provided, a first guide groove 215 which is parallel to the axial direction is provided on the outer circumferential surface of the decryption cylinder 214, sawtooth protrusions 216 which are matched with the second limit column 153 are provided in the first guide groove 215, the second limit column 153 is pushed by the sawtooth protrusions 216, and the displacement of the second limit column 153 is equal to the distance a of the second limit column extending into the first inner cylinder, thereby, the first limit post 154 and the second limit post 153 release the rotation of the first inner cylinder 120, and the decryption of the first encryption mechanism 150 is completed.
Specifically, in order to facilitate the alignment and matching of the sawtooth protrusions 216 and the second limit posts 153, the inner circular surface of the first inner cylinder 120 is provided with the guide protrusions 157 matched with the first guide grooves 215, and the guide protrusions 157 are arranged in parallel to the axial direction of the first inner cylinder 120 and aligned with the second limit holes 152.
The second decryption mechanism 220 comprises a decryption column 221 which is located in the decryption cylinder 214 and forms a sliding guide fit along the axial direction of the decryption column, a sleeving groove 222 is coaxially formed in one end face, close to the handle 211, of the decryption column 221, the sleeving groove 222 is movably sleeved outside the sleeving column 212, and forms a sliding guide fit along the axial direction of the sleeving column 212, in order to enable the decryption column 221 to slide towards the outside of the decryption cylinder 214, a second built-in step is coaxially formed in the middle position of the sleeving groove 222 along the depth direction of the groove, the second built-in step extends to the front end of the handle 211, the diameter of the second built-in step is larger than that of the sleeving groove 222, a firing spring 223 is sleeved outside the sleeving column 212, one end of the firing spring 223 abuts against the front end of the handle 211, the other end abuts against the second built-in step, the elastic force of the firing spring 223 always points to the second built-in step from the front end of the handle 211, and the decryption column 221 slides towards, the second decryption mechanism 220 is switched to the extended state.
In order to avoid the phenomenon that the decryption cylinder 221 falls off in the process of sliding towards the outside of the decryption cylinder 214, the inner circular surface of the decryption cylinder 214 is provided with the internal limiting groove 217, the outer circular surface of the decryption cylinder 221 is provided with the external limiting protrusion 228, the external limiting protrusion 228 is located at one end of the decryption cylinder 221 close to the handle 211, and the external limiting protrusion 228 is matched with the internal limiting groove 217 to restrict the stroke of the decryption cylinder 221 sliding towards the outside of the decryption cylinder 214, so that the falling off between the decryption cylinder 221 and the decryption cylinder 214 is avoided.
In the initial state, it is necessary to ensure that the second decryption mechanism 220 is in the retracted state, in order to overcome the elastic force of the trigger spring 223 and make the decryption cylinder 221 be located in the decryption cylinder 214, the constraint mechanism is arranged between the decryption cylinder 214 and the decryption column 221 and is close to the front end of the handle 211, the constraint mechanism comprises two installation grooves which are arranged on the outer circular surface of the decryption column 221 and are radially arranged along the decryption column, the installation grooves are symmetrically arranged along the axial direction of the decryption column 221, a constraint block 241 which can float along the radial direction of the decryption column 221 is arranged at the notch of each installation groove, a constraint spring is arranged in each installation groove, one end of each constraint spring is fixedly connected with the groove bottom of each installation groove, the other end of each constraint spring is fixedly connected with the constraint block 241, an annular groove 242 is coaxially formed in the outer circular surface of one end, close to the handle 211, of the decryption cylinder 214, a constraint port 243 which is communicated with the inside of the decryption cylinder 214 is formed in the groove bottom of the annular groove 242, the constraint port.
When the decryption mechanism one 210 is inserted into the first inner cylinder 120 and rotates, the restriction block 241 needs to overcome the elastic force of the restriction spring to move towards the bottom of the installation groove and separate from the restriction opening 243, for this reason, a trigger mechanism 170 for driving the restriction block 241 to slide towards the bottom of the installation groove is arranged between the outer cylinder 110 and the first inner cylinder 120, the trigger mechanism 170 comprises an annular boss 174 coaxially arranged at one end of the outer cylinder 110 away from the second inner cylinder 130, an inner sunken groove 175 is coaxially arranged at one end of the boss 174 away from the outer cylinder 110, a guide sliding groove 176 is arranged at the bottom of the inner sunken groove 175, the guide sliding groove 176 comprises a trigger section and a transition section which are connected end to end, the distance between the trigger section and the central axis of the outer cylinder 110 gradually decreases along the clockwise direction, the transition section is arranged into an arc-shaped structure coaxially arranged with the outer cylinder 110, and the head of the transition section is connected, the guide grooves 176 are provided in two and are formed to be symmetrical with respect to the center axis of the outer cylinder 110.
The triggering mechanism 170 further includes a sliding groove 171 provided at an end of the first inner cylinder 120 away from the second inner cylinder 140, the sliding groove 171 is arranged along a radial direction of the first inner cylinder 120, the sliding groove 171 is provided with two and symmetrically arranged along an axial direction of the first inner cylinder 120, a triggering block 172 is provided in the sliding groove 171 and forms a sliding guiding fit along a radial direction of the outer cylinder 110, a sliding protrusion 173 is fixedly provided on the triggering block 172, the sliding protrusion 173 extends into the guiding sliding groove 176 and forms a sliding guiding fit along a guiding direction of the guiding sliding groove 176, in an initial state, the sliding protrusion 173 is located at a head of a triggering section of the guiding sliding groove 176 and the triggering block 172 is flush with an inner circumferential surface of the first inner cylinder 120, when the decryption mechanism one 210 is combined with the first inner cylinder 120, the triggering block 172 is aligned with the constraining opening 243 and is used for pushing the constraining block 241, so as to avoid separation between the triggering block, the notches of the inner undercut 122 are provided with annular end caps 177 for sealing thereto.
The decryption mechanism I210 and the encryption mechanism I150 rotate in a recognition matching manner and enable the sub-key 230 to be switched to an extended state, which is specifically shown in the following steps that the decryption mechanism I210 is inserted into the first inner cylinder 120, the sawtooth protrusions 216 on the decryption cylinder 214 remove the rotation restriction of the first restriction posts 154 and the second restriction posts 153 on the outer cylinder 110 and the first inner cylinder 120, at the moment, the clockwise rotating handle 211 drives the first inner cylinder 120 to rotate synchronously, the first inner cylinder 120 drives the trigger block 172 to rotate synchronously, the trigger block 172 drives the sliding protrusion 173 to rotate synchronously, the sliding protrusion 173 slides along the trigger section of the guide sliding groove 176, the guide sliding groove 176 and the sliding protrusion 173 are matched to enable the two trigger blocks 172 to slide close to each other along the radial direction of the first inner cylinder 120, the trigger block 172 is inserted into the restriction opening 243 and pushes against the restriction block 241, and the restriction block 241 retracts into the installation groove against the elastic force of the, the constraint mechanism 240 releases the constraint on the key cylinder, at this time, the trigger spring 233 will push the decryption cylinder 221 to slide towards the outside of the decryption cylinder 214, and the second decryption mechanism 220 is switched to the extended state and inserted into the second inner cylinder 130.
In order to make the encryption mechanism two 160 restrain the rotation of the second inner cylinder 130 and make the encryption mechanism two 160 release the rotation restraint of the second inner cylinder 130 when the decryption column 221 matched with the encryption mechanism two 160 is inserted into the second inner cylinder 130, for this reason, the encryption mechanism two 160 comprises a limit hole three 161a and a limit hole four 161b which are opened at the outer part of the outer cylinder 110 and penetrate through the inner part of the outer cylinder, the axial directions of the limit hole three 161a and the limit hole four 161b are mutually parallel and are all arranged along the radial direction of the outer cylinder 110, the encryption mechanism two 160 further comprises a limit hole five 162a and a limit hole six 162b which are blocked at the outer part of the second inner cylinder 130 and penetrate through the inner part of the second inner cylinder, the axial directions of the limit hole five 162a and the limit hole six 162b are mutually parallel and are all arranged along the radial direction of the second inner cylinder 130, an inner three step is arranged at the opening part of one end of the limit hole five, in the initial state, the third limiting hole 161a coaxially corresponds to the fifth limiting hole 162a, and the fourth limiting hole 161b coaxially corresponds to the sixth limiting hole 162 b.
Specifically, in order to restrict the rotation of the second inner cylinder 130, a third limit post 163a slidable along the axial direction is arranged in the third limit hole 161a, a fifth limit post 163B slidable along the axial direction is arranged in the fifth limit hole 162a, the third limit post 163a and the fifth limit post 163B are close to one end surface and are mutually attached and are both arranged into arc surfaces matched with the outer circular surface of the second inner cylinder 130, in an initial state, the distance that the fifth limit post 163B extends into the second inner cylinder 130 is B, the distance that the third limit post 163a extends into the fifth limit hole 162a is B, a sealing plug screw 155 which is in threaded connection and matching with the third limit post is also arranged at an opening of one end of the third limit hole 161a and the fourth limit hole 161B, a second pushing spring 165 is arranged in the third limit hole 161a, one end of the second pushing spring 165 abuts against the sealing plug 155, the other end of the third limit post 163a, and the second pushing spring 165 always points to the third limit post 163a from the sealing plug 155 a, a third built-in step in the fifth limiting hole 162a is used for limiting the fifth limiting post 163B, a first cylindrical magnetic head 164 is fixedly arranged at one end of the fifth limiting post 163B close to the inside of the second inner cylinder 130, in order to enable the second inner cylinder 130 to rotate, the third limiting post 163a needs to be completely arranged in the third limiting hole 161a and the fifth limiting post 163B needs to be completely arranged in the fifth limiting hole 162a, for this reason, a first magnet 224 is embedded on the outer circumferential surface of the decryption post 221, the decryption post 221 is inserted into the second inner cylinder 130, the first magnet 224 and the first magnetic head 164 are mutually close to one end surface and mutually repel each other, and the displacement of the fifth limiting post 163B sliding towards the outside of the fifth limiting hole 162 is equal to B due to the magnitude of the repulsive force.
Specifically, in order to further restrict the rotation of the second inner cylinder 130, a fourth limiting post 166a capable of sliding along the axial direction is arranged in the fourth limiting hole 161b, a sixth limiting post 166b capable of sliding along the axial direction is arranged in the sixth limiting hole 162b, one end faces of the fourth limiting post 166a and the sixth limiting post 166b, which are close to each other, are mutually attached and are both arranged to be arc-shaped faces matched with the outer circular face of the second inner cylinder 130, in an initial state, the distance that the sixth limiting post 166b extends into the fourth limiting hole 161b is C, a third pushing spring 167 is arranged in the sixth limiting hole 162b, one end of the third pushing spring 167 is abutted against a third built-in step in the sixth limiting hole 162, the other end of the third pushing spring is abutted against the sixth limiting post 166b and the elastic force of the third pushing spring 167 is always directed to the sixth limiting post 166b by the third built-in step in the sixth limiting hole 162, and a second magnetic head 168 is arranged on one end face of the sixth limiting, in order to enable the second inner cylinder 130 to rotate, the four limit posts 166a are required to be completely arranged in the four limit holes 161b and the six limit posts 166b are required to be completely arranged in the six limit holes 162b, for this reason, the second magnet 225 is embedded on the outer circular surface of the decryption post 221, the decryption post 221 is inserted into the second inner cylinder 130, the second magnet 225 and the second magnetic head 168 are close to one end surface and attract each other, and the displacement of the attraction force drives the six limit posts 166b to slide towards the six limit holes 162b is equal to C.
In order to increase the encoding complexity of the second encryption mechanism 160 and improve the mechanical encryption performance, a plurality of limiting holes 161a and 161B are arranged in the axial direction parallel to the outer cylinder 110, a plurality of limiting holes five 162a and limiting holes six 162B are arranged in the axial direction parallel to the second inner cylinder 130, the distance from each group of limiting columns five 163B extending into the second inner cylinder 130 and the distance B from the limiting columns three 163a extending into the limiting holes five 162a can be synchronously and freely set, the distance C from the limiting columns six 166B extending into the limiting holes four 161B can be freely set, and the second encryption mechanism 160 is provided with a plurality of groups and is arranged in an array along the circumferential direction of the outer cylinder 110.
When the decryption cylinder 221 is inserted into the second inner cylinder 130, in order to avoid the first magnet 224 and the first magnetic head 164, and the second magnet 225 and the second magnetic head 168 facing each other, and at the same time, the decryption cylinder 221 can drive the second inner cylinder 130 to rotate so as to make the output contact 142 and the offset output 146 collide and abut against each other, for this reason, a guide protruding strip 169 parallel to the axial direction thereof is arranged on the inner circular surface of the second inner cylinder 130, a second guide groove 226 parallel to the axial direction thereof is arranged on the outer circular surface of the decryption cylinder 221, and the guide protruding strip 169 is matched with the second guide groove 226 and is matched with each other for guiding the insertion of the decryption cylinder 221.
In the process that the second decryption mechanism 220 decrypts the second encryption mechanism 160, after the restriction mechanism releases the restriction on the second decryption mechanism 220, the second decryption mechanism 220 cannot be immediately switched to the extended state, when the user rotates the handle 211 clockwise, when the guide convex strip 149 is aligned with the second guide groove 226, the decryption column 221 slides towards the outside of the decryption cylinder 214 and is inserted into the second inner cylinder 130, at this time, the plurality of first magnets 224 are matched with the first magnetic heads 164 one by one for identification, after the identification is successful, the repulsive force of the first magnets 224 and the first magnetic heads 164 drives the fifth limiting columns 163B to slide towards the outside of the fifth limiting holes 162a by a distance equal to B, the fifth limiting columns 163B drives the third limiting columns 163a to synchronously move, so that the third limiting columns 163a are completely arranged in the third limiting holes 161a, the fifth limiting columns 163B are completely arranged in the fifth limiting holes 162a, and meanwhile, the plurality of second magnets 225 are matched with the second magnetic heads 168 one by one, after successful identification, the attraction force of the second magnet 225 and the second magnetic head 148 drives the limit post six 166b to slide towards the inside of the limit hole six 162b by a distance equal to C, the limit post six 166b drives the limit post four 166a to move synchronously, so that the limit post four 166a is completely arranged in the limit hole four 161b, the limit post six 166b is completely arranged in the limit hole six 162b, at this time, the rotation constraint of the second inner cylinder 130 by the decryption mechanism two 220 is released, the handle 211 is further rotated, the decryption post 221 drives the second inner cylinder 130 to rotate synchronously, the output contact 142 is abutted against and abutted against the offset contact 146, the data output line 140 is conducted, and the data input line 230 is abutted against and communicated with the data output line 140.
The data input circuit 230 comprises a conduit 232 movably arranged in the handle 211, one end of the conduit 232 movably penetrates through the sleeve column 212 and is fixedly connected with the groove bottom of the sleeve groove 222, the inner circular surface of the conduit 232 and the sleeve column 212 form sliding guide fit along the axial direction, the other end of the conduit 232 extends into the handle 211, a data line 232 penetrates through the conduit 232, one end of the data line 232 extends out of the sealing cover 213 and is connected with a receiving device, the other end of the data line is connected with an input contact 233, the input contact 233 is embedded in the decryption column 221 and penetrates through the outer circular surface of the decryption column, the input contacts 233 are provided with a plurality of offset contacts 146 and are matched with the offset contacts in a one-to-one correspondence mode, the decryption column 221 is inserted into the second inner cylinder 130, and the input contacts are butted.
Specifically, when the decryption column 221 is inserted into the second inner cylinder 130, the spool 232 is driven to move synchronously, so that the data line 231 is coiled in the handle 211 and the coiled section can automatically stretch and retract in order to avoid the data line 231 from being torn off.
In the butt joint process of the data input line 230 and the data output line 140, the first decryption mechanism 210 is inserted into the first encryption mechanism 150, the first encryption mechanism 150 removes the rotation constraint on the first inner cylinder 120, the first decryption mechanism 210 rotates to drive the first inner cylinder 120 to rotate synchronously, the trigger mechanism 170 triggers and enables the constraint mechanism to remove the constraint on the decryption column 221, the decryption column 221 is inserted into the second inner cylinder 130, at this time, the input contact 233 is in butt joint with the offset contact 146, the second decryption mechanism 220 removes the rotation constraint on the second inner cylinder 130, the second decryption mechanism 220 drives the second inner cylinder 130 to rotate synchronously, the offset contact 146 is in butt joint with the output contact 142, at this time, the data input line 230 is in butt joint with the data output line 140, and a user can control data transmission between source equipment and receiving equipment through a control system.

Claims (10)

1. An encrypted data transmission docking method, comprising the steps of:
a decryption stage of a decryption cylinder;
s1: a user firstly inserts a decryption cylinder in a first decryption mechanism into a first inner cylinder, the encryption mechanism identifies and matches the first decryption mechanism, after the matching is successful, the encryption mechanism releases the rotation constraint of the first inner cylinder, and the first inner cylinder can rotate around the outer cylinder;
the outer cylinder is coaxially sleeved outside the first inner cylinder, the inner circular surface of the outer cylinder is attached to the outer circular surface of the first inner cylinder, the first encryption mechanism comprises a first limiting hole which is arranged on the outer cylinder and penetrates through the outer cylinder in the radial direction, and a second limiting hole which is arranged on the first inner cylinder and penetrates through the first inner cylinder in the radial direction, a first limiting column which can slide along the axial direction is arranged in the first limiting hole, a second limiting column which can slide along the radial direction is arranged in the second limiting hole, the diameters of the first limiting hole and the second limiting hole are equal, the first limiting column and the second limiting column are close to one end surfaces, the end surfaces are mutually attached and are arranged to be arc surfaces matched with the outer circular surface of the first inner cylinder, the distance from the first limiting column to the second limiting hole in the initial state is A, the distance from the second limiting column to the first inner cylinder is A, and one end, extending into the first inner cylinder, of the second limiting;
the opening of one end of the first limiting hole, which is far away from the first inner cylinder, is provided with a sealing plug screw which is in threaded connection and matching with the opening, a first abutting spring is arranged in the first limiting hole, one end of the first abutting spring abuts against the sealing plug screw, the other end of the first abutting spring abuts against the first limiting post, and the elastic force of the first abutting spring is always directed to the first limiting post by the sealing plug screw;
the first decryption mechanism comprises a handle which is arranged in a columnar hollow manner, a hollow sleeving column is coaxially and fixedly arranged at the front end of the handle in the axial direction, the handle is arranged along an opening at the tail end of the handle in the axial direction, a sealing cover is arranged at the opening, a decryption cylinder which is coaxially and fixedly connected with the front end of the handle is sleeved outside the sleeving column, the diameter of the decryption cylinder is matched with the inner diameter of the first inner cylinder, a first guide groove which is parallel to the axial direction of the decryption cylinder is formed in the outer circular surface of the decryption cylinder, and sawtooth bulges which are matched with the second limiting columns one by one are arranged in the first guide groove;
the inner circular surface of the first inner cylinder is provided with a guide lug matched with the first guide groove, and the guide lug is arranged along the axial direction parallel to the first inner cylinder and is aligned with the two limiting holes;
in the decryption process of the first encryption mechanism, the first decryption mechanism is inserted into the first inner cylinder, the sawtooth bulges push the second limiting post inserted into the first inner cylinder, the distance for the second limiting post to slide towards the outside along the second limiting hole is A, the second limiting post pushes the first limiting post to slide outwards along the first limiting hole synchronously, the first pushing spring is gradually compressed, the elastic potential energy is increased, at the moment, the first limiting post is completely arranged in the first limiting hole, the second limiting post is completely arranged in the second limiting hole, and the rotation constraint of the first limiting post and the second limiting post on the first inner cylinder is released;
(II) ejecting the decryption column;
s2: the decryption cylinder is rotated, the decryption cylinder drives the first inner cylinder to synchronously rotate, so that the trigger mechanism is automatically triggered, the constraint mechanism releases the limitation on the decryption mechanism II, and the decryption mechanism II is popped up from the decryption mechanism I and is switched from a retraction state to an extension state;
the decryption mechanism II comprises a decryption column which is positioned in the decryption cylinder and forms sliding guide fit along the axial direction of the decryption column, a sleeving groove is coaxially formed in the end face, close to one end face of the handle, of the decryption column, the sleeving groove is movably sleeved outside the sleeving column, the sleeving column and the sleeving groove form sliding guide fit along the axial direction of the sleeving column, a built-in step II is coaxially formed in the middle of the sleeving groove along the groove depth direction of the sleeving groove, the built-in step II extends to penetrate through the front end of the handle, the diameter of the built-in step II is larger than that of the sleeving groove, a firing spring is sleeved outside the sleeving column, one end of the firing spring is abutted against the front end of the handle, the other end of the firing spring is abutted against the built-in step II, the elasticity of the firing spring is always directed to the built-in step II from;
(III) decrypting the column;
s3: the extended decryption mechanism II is inserted into the second inner cylinder, the encryption mechanism II identifies and matches the decryption mechanism II, and after matching is successful, the rotation constraint of the encryption mechanism II on the second inner cylinder is released;
in the process of decrypting the two pairs of encryption mechanisms of the decryption mechanism, after the limiting mechanism releases the limiting on the decryption mechanism two, the decryption mechanism two cannot be switched to an extended state instantly, a user rotates the handle clockwise, when the guide raised bars are aligned with the guide grooves two, the decryption column slides towards the outside of the decryption cylinder and is inserted into the second inner cylinder, at the moment, the plurality of magnets I and the magnetic heads are matched one by one for identification, after the identification is successful, the repulsive force of the magnets I and the magnetic heads I drives the limiting column five to slide towards the outside of the limiting hole five by a distance equal to B, the limiting column five drives the limiting column three to move synchronously, so that the limiting column three is completely arranged in the limiting hole three, the limiting column five is completely arranged in the limiting hole five, meanwhile, the plurality of magnets II and the magnetic heads are matched one by one to one, after the identification is successful, the attractive force of the magnets II and the magnetic heads II drives the limiting column six to slide towards the inside of the limiting, the limiting column six drives the limiting column four to synchronously move, so that the limiting column four is completely arranged in the limiting hole four, the limiting column six is completely arranged in the limiting hole six, and at the moment, the rotation constraint of the decryption mechanism on the second inner cylinder is released;
(IV) data line docking stage;
s4: further rotating the decryption cylinder, the decryption cylinder drives the second inner cylinder to rotate and enables the disconnected data output line to be switched to be conducted, at the moment, the data input line and the data output line are in butt joint and are communicated, the data source equipment and the receiving equipment are mutually communicated, and the control system controls data transmission and interruption of the confidential files;
the data output circuit comprises output pins fixedly arranged outside the outer barrel, the outer circular surface of the outer barrel is set to be a polygonal structure, the output pins are provided with a plurality of output pins which are arranged in an array mode along the circumferential direction where the outer barrel is located, data connection is established between one end of each output pin and data source equipment, a columnar output contact is arranged at the other end of each output pin, the output contacts and the end portions of the output pins form sliding guide fit along the radial direction of the outer barrel, mounting holes which are arranged along the radial direction of the outer barrel are formed in the outer surface of the outer barrel and penetrate through the outer barrel, the output contacts are located in the mounting holes, and the output contacts are abutted to the;
a limiting bulge is fixedly arranged on the outer circular surface of the output contact, a compression spring is movably sleeved outside the output contact, one end of the compression spring is abutted against the output pin, the other end of the compression spring is abutted against the limiting bulge, and the elastic force of the compression spring always pushes the output contact to be abutted against the outer circular surface of the second inner cylinder;
the data output circuit also comprises a plurality of offset contacts which are arranged in the second inner cylinder in a radial embedded manner, the offset contacts correspond to the output contacts one by one, one end of each offset contact is flush with the outer circular surface of the second inner cylinder, the other end of each offset contact is flush with the inner circular surface of the second inner cylinder, the output contacts and the offset contacts are offset and offset in the circumferential direction of the outer cylinder in an initial state by an angle H, the angle H is more than 30 degrees and less than 60 degrees,
the data input circuit comprises a wire pipe movably arranged in the handle, one end of the wire pipe movably penetrates through the sleeving column and is fixedly connected with the bottom of the sleeving groove, the wire pipe and the inner circular surface of the sleeving column form sliding guide fit along the axial direction, the other end of the wire pipe extends into the handle, a data wire penetrates through the wire pipe, one end of the data wire extends out of the sealing cover and is connected with the receiving equipment, the other end of the data wire is connected with an input contact, the input contact is embedded in the decryption column and penetrates through the outer circular surface of the decryption column, the input contacts are provided with a plurality of offset contacts in one-to-one corresponding matching, the decryption column is inserted into the second inner cylinder, and the input contact is abutted and butted with the;
in the data transmission process, after the two pairs of decryption mechanisms II of the encryption mechanism are successfully identified, the decryption mechanism II drives the second inner cylinder to rotate by 45 degrees, the output contact is in butt joint with one end of the offset contact, the other end of the offset contact is in butt joint with the input contact synchronously inserted into the second inner cylinder along with the decryption mechanism II, the data output line is in butt joint with the data input line, and a user can control data transmission between the source equipment and the receiving equipment through the control system.
2. The transmission docking method for the encrypted data according to claim 1, wherein the encryption mechanism two includes a third limit hole and a fourth limit hole which are opened outside the outer cylinder and penetrate through the outer cylinder, the third limit hole and the fourth limit hole are axially parallel to each other and are arranged in the radial direction of the outer cylinder, the encryption mechanism two further includes a fifth limit hole and a sixth limit hole which are blocked outside the second inner cylinder and penetrate through the inner cylinder, the fifth limit hole and the sixth limit hole are axially parallel to each other and are arranged in the radial direction of the second inner cylinder, a third built-in step is arranged at an opening of the fifth limit hole and the sixth limit hole, which is close to one end of the inner cylinder, the third limit hole and the fifth limit hole coaxially correspond to each other in the initial state, and the fourth limit hole and the sixth limit hole coaxially correspond to each other.
3. The transmission and docking method for encrypted data according to claim 2, wherein a third limiting post slidable in the axial direction is disposed in the third limiting hole, a fifth limiting post slidable in the axial direction is disposed in the fifth limiting hole, the third limiting post and the fifth limiting post are close to one end face and are attached to each other and are both disposed as arc faces matched with the outer circumferential face of the second inner cylinder, in the initial state, the distance from the fifth limiting post to the second inner cylinder is B, the distance from the third limiting post to the fifth limiting hole is B, a sealing plug screw is disposed at the opening of the third limiting hole and the fourth limiting hole, which is far from the end of the second inner cylinder, and is in threaded connection with the opening of the third limiting hole and the fourth limiting hole, a second pushing spring is disposed in the third limiting hole, one end of the second pushing spring abuts against the sealing plug screw, the other end of the second pushing spring abuts against the third limiting post, and the elastic force of, the built-in step III in the limiting hole V is used for restraining and limiting the limiting column V, a first cylindrical magnetic head is fixedly arranged at one end, close to the inner part of the second inner cylinder, of the limiting column V, a first magnet is embedded on the outer circular surface of the decryption column, the decryption column is inserted into the second inner cylinder, the first magnet and the first magnetic head are mutually repelled close to one end surface, and the displacement of the limiting column V, sliding towards the outside of the limiting hole V, is driven to be equal to B by the repulsive force.
4. The transmission and docking method for encrypted data according to claim 3, wherein a fourth position-limiting post capable of sliding along the axial direction is provided in the fourth position-limiting hole, a sixth position-limiting post capable of sliding along the axial direction is provided in the sixth position-limiting hole, the fourth position-limiting post and the sixth position-limiting post are close to one end face and are both provided with arc faces matched with the outer circumferential face of the second inner cylinder, the distance from the sixth position-limiting post to the fourth position-limiting hole is C in the initial state, a third abutting spring is provided in the sixth position-limiting hole, one end of the third abutting spring abuts against the third built-in step in the sixth position-limiting hole, the other end of the third abutting spring abuts against the sixth position-limiting post, the elastic force of the third abutting spring is always directed to the sixth position-limiting post from the third built-in step in the sixth position-limiting hole, a second magnetic head is provided on one end face of the sixth position-limiting post close to the inside of the second inner cylinder, the second magnet and the second magnetic head are mutually attracted by one end face, and the displacement of the six limiting columns towards the six limiting holes in a sliding mode is equal to C due to the attraction force.
5. The encrypted data transmission and docking method according to claim 4, wherein the second inner cylinder is provided with a second guiding protrusion parallel to the axial direction thereof on the inner circumferential surface thereof, the decryption column is provided with a second guiding groove parallel to the axial direction thereof on the outer circumferential surface thereof, and the second guiding protrusion and the second guiding groove are matched and matched with each other for guiding the insertion of the decryption column.
6. The transmission and docking method for encrypted data according to claim 5, wherein the first limiting hole is provided with a plurality of limiting holes in the axial direction parallel to the outer cylinder, the second limiting hole is provided with a plurality of limiting holes in the axial direction parallel to the first inner cylinder, the second limiting hole corresponds to the first limiting hole one by one, the first limiting hole and the second limiting hole are provided with four limiting holes, the distance from the first limiting post to the second limiting hole and the distance from the second limiting post to the first inner cylinder can be freely set synchronously, and the first encryption mechanism is provided with a plurality of groups and is arranged in an array along the circumferential direction where the outer cylinder is located.
7. The transmission and docking method for the encrypted data according to claim 1, wherein a plurality of the third limiting holes of the third limiting hole are arranged in parallel with the axial direction of the outer cylinder, a plurality of the fifth limiting holes and the sixth limiting holes are arranged in parallel with the axial direction of the second inner cylinder, the distance from each group of the fifth limiting posts to the second inner cylinder and the distance from the third limiting posts to the fifth limiting holes can be synchronously and freely set, the distance from the sixth limiting posts to the fourth limiting holes can be freely set, and the second encryption mechanisms are arranged in a plurality of groups and are arrayed along the circumferential direction in which the outer cylinder is located.
8. The encrypted data transmission docking method according to claim 1, wherein the constraint mechanism is disposed between the decryption cylinder and the decryption column and disposed near the front end of the handle, the constraint mechanism includes two mounting grooves disposed on the outer circumferential surface of the decryption column and disposed along the radial direction thereof, the mounting grooves are disposed and symmetrically disposed along the axial direction of the decryption column, a constraint block capable of floating along the radial direction of the decryption column is disposed at a notch of the mounting groove, a constraint spring is disposed in the mounting groove, one end of the constraint spring is fixedly connected to the groove bottom of the mounting groove, the other end of the constraint spring is fixedly connected to the constraint block, an annular groove is coaxially disposed on the outer circumferential surface of the decryption cylinder near one end of the handle, a constraint port communicated with the inside of the decryption cylinder is disposed at the groove bottom of the annular groove, the constraint port is adapted to the constraint block.
9. The transmission and docking method for the encrypted data according to claim 8, wherein a triggering mechanism for driving the constraint block to slide towards the bottom of the mounting groove is arranged between the outer barrel and the first inner barrel, the triggering mechanism comprises an annular boss coaxially arranged at one end of the outer barrel, which is far away from the second inner barrel, an inner sunken groove is coaxially arranged at one end of the boss, which is far away from the outer barrel, a guide sliding groove is arranged at the bottom of the inner sunken groove, the guide sliding groove comprises a triggering section and a transition section which are communicated end to end, the distance between the triggering section and the central axis of the outer barrel is gradually reduced along the clockwise rotation, the transition section is arranged in an arc structure coaxially arranged with the outer barrel, the head of the transition section is communicated with the tail of the triggering section along the clockwise direction, and the guide sliding grooves.
10. The encrypted data transmission butt-joint method according to claim 9, wherein the triggering mechanism further comprises a sliding groove provided at an end of the first inner cylinder facing away from the second inner cylinder, the sliding groove is arranged along a radial direction of the first inner cylinder, the sliding groove is provided with two sliding grooves and is symmetrically arranged along an axial direction of the first inner cylinder, a triggering block is provided in the sliding groove and forms a sliding guide fit along a radial direction of the outer cylinder, the trigger block is fixedly provided with a sliding bulge which extends into the guide chute and forms sliding guide fit along the guide direction of the guide chute, and in an initial state, the sliding bulge is positioned at the head of the triggering section of the guide chute, the triggering block is flush with the inner circular surface of the first inner cylinder, when the decryption mechanism is combined with the first inner cylinder, the triggering block is aligned with the constraint port and used for pushing the constraint block, and the notch of the inner sinking groove is arranged on the annular end cover used for sealing the inner sinking groove.
CN201910415615.3A 2019-05-18 2019-05-18 Encrypted data transmission butt joint method Active CN110138569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910415615.3A CN110138569B (en) 2019-05-18 2019-05-18 Encrypted data transmission butt joint method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910415615.3A CN110138569B (en) 2019-05-18 2019-05-18 Encrypted data transmission butt joint method

Publications (2)

Publication Number Publication Date
CN110138569A CN110138569A (en) 2019-08-16
CN110138569B true CN110138569B (en) 2020-11-20

Family

ID=67571442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910415615.3A Active CN110138569B (en) 2019-05-18 2019-05-18 Encrypted data transmission butt joint method

Country Status (1)

Country Link
CN (1) CN110138569B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633237B (en) * 2019-09-27 2021-07-16 广州众诺电子技术有限公司 Chip reset recognition device
CN111666609B (en) * 2020-06-09 2021-09-24 国网甘肃省电力公司武威供电公司 Heat-sensitive encrypted data port for building encrypted data secure transmission channel
CN111585115B (en) * 2020-06-09 2021-04-27 广西电网有限责任公司电力科学研究院 Socket element for encrypting by angle coding and improving encrypted data safety transmission
CN111585114B (en) * 2020-06-09 2021-04-27 广西电网有限责任公司电力科学研究院 USB data transmission port applied to encrypted data secure transmission

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2649711Y (en) * 2003-09-09 2004-10-20 高中合 Dual-key lock head with protection device
US12118524B2 (en) * 2015-07-10 2024-10-15 Valid Systems, Llc Instant funds availability risk assessment and real-time loss alert system and method
CN107393101A (en) * 2017-08-28 2017-11-24 广州征安电子科技有限公司 Smart lock electronics standby key
CN107682141A (en) * 2017-10-26 2018-02-09 广州市雷军游乐设备有限公司 Data ciphering method and system for data transfer
CN108229193B (en) * 2018-01-17 2021-07-27 郭娴 Wearing device terminal information encryption method, encrypted data early warning device and wearing device terminal

Also Published As

Publication number Publication date
CN110138569A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN110138569B (en) Encrypted data transmission butt joint method
CN102142633B (en) Connector assembly capable of being unlocked automatically and connector socket thereof
CN101882727B (en) Connection-in-place identifiable anti-loose connector
CN101139886A (en) Coupling structure of spring (lamina) lock idle-run lock pin
CN110130730B (en) Unlocking method of magnetic coded master-slave lock
KR101574664B1 (en) Separation device using a shape memory alloy wire
CN110077257B (en) Electric automobile encryption type charging butt joint system
CN201859993U (en) Loose-proof connector capable of recognizing in-situ connection
CN109973819B (en) High-safety directional conveying method for chemical high-risk gas or liquid conveying pipeline
CN110077256B (en) Encrypted charging butt joint method for electric automobile
CN111666607A (en) Method for constructing special transmission channel for encrypted data
CN110135205B (en) Method for constructing encrypted data transmission channel
CN110145176B (en) Primary and secondary anti-theft lock unlocked by magnetic password
CN111666603A (en) Encrypted data port for constructing encrypted data special transmission channel
CN111666609B (en) Heat-sensitive encrypted data port for building encrypted data secure transmission channel
CN210598473U (en) Lock and key matched with same
CN211691873U (en) Lock core and lock
CN110091737B (en) Private special electric automobile password formula charging device
CN204204717U (en) Electric tool
CN115790266A (en) A flashlight plug device for telescopic baton
CN111682949A (en) Special socket component for improving data encryption level
CN111523157A (en) Component method for encrypted data secure transmission channel
CN221462072U (en) Huge lock of password
CN111585115B (en) Socket element for encrypting by angle coding and improving encrypted data safety transmission
CN111666606A (en) Thermosensitive encryption component applied to encrypted data directional secure transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Yuan Minliang

Inventor after: Wang Wei

Inventor after: Hu Zhenyun

Inventor before: Hu Zhenyun

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20201028

Address after: Floor 2, building 55, Dayun software Town, No. 8288, Longgang Avenue, Yuanshan street, Longgang District, Shenzhen City, Guangdong Province

Applicant after: SHENZHEN SINXIN INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 230031 Room B-703, Lotus Plaza, 1182 Lianhua Road, Shushan District, Hefei City, Anhui Province

Applicant before: Hu Zhenyun

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant