CN113806829A - Information security encryption equipment and system thereof - Google Patents

Information security encryption equipment and system thereof Download PDF

Info

Publication number
CN113806829A
CN113806829A CN202111114853.4A CN202111114853A CN113806829A CN 113806829 A CN113806829 A CN 113806829A CN 202111114853 A CN202111114853 A CN 202111114853A CN 113806829 A CN113806829 A CN 113806829A
Authority
CN
China
Prior art keywords
module
equipment
shell
information security
metal protective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111114853.4A
Other languages
Chinese (zh)
Inventor
王振辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Fanyi University
Original Assignee
Xian Fanyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Fanyi University filed Critical Xian Fanyi University
Priority to CN202111114853.4A priority Critical patent/CN113806829A/en
Publication of CN113806829A publication Critical patent/CN113806829A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/18Packaging or power distribution
    • G06F1/181Enclosures
    • G06F1/182Enclosures with special features, e.g. for use in industrial environments; grounding or shielding against radio frequency interference [RFI] or electromagnetical interference [EMI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Power Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses information security encryption equipment and a system thereof, and the information security encryption equipment comprises a rubber rod, wherein the rubber rod is arranged inside a clamping spring, the surface of a metal protective shell is provided with an electromagnet, both sides of the metal protective shell are provided with content grooves, and flexible connecting pieces are arranged inside the content grooves; the butt joint piece is fixed at one end of the metal protective shell, and the other end of the metal protective shell is provided with a butt joint clamping groove matched with the butt joint piece; and the port assembly is arranged on one side of the front end of the equipment shell, the output end of the memory unit is connected with an Ethernet port, and the output end of the Ethernet port is connected with a cloud platform. The information security encryption equipment and the system thereof can continuously count the connection times of the equipment of the connection terminal through the counting module, effectively avoid that an illegal user frequently inserts the illegal connection terminal for many times, and utilize the time difference to decipher the identification module and steal the encrypted data stream, thereby causing data loss.

Description

Information security encryption equipment and system thereof
Technical Field
The invention relates to the technical field of information security, in particular to information security encryption equipment and a system thereof.
Background
The information security is to protect hardware, software and data of a computer from being damaged and leaked due to accidental or malicious reasons, and a special encryption device is required to be used for encrypting a data stream when the information security is encrypted, so that the data stream is protected.
The existing information security encryption equipment is only externally provided with a thin protective shell at one side, so that the internal chip mainboard and the like cannot be well protected against collision, an encryption system only encrypts data, and when the data is subjected to destructive behaviors, the large-scale alarm work cannot be completed, so that malicious damage events are endless.
Disclosure of Invention
The invention aims to provide information security encryption equipment and a system thereof, and aims to solve the problems that the existing information security encryption equipment only has a thin protective shell at the outer part, so that the anti-collision protection of an internal chip mainboard and the like cannot be well realized, and an encryption system only encrypts data, so that the large-scale alarm work cannot be finished when the equipment is subjected to destructive behaviors, and malicious damage events are endless.
In order to achieve the purpose, the invention provides the following technical scheme: an information security encryption device comprises a device shell, wherein a metal protective shell is arranged outside the device shell, a clamping plate is arranged on one side, close to the device shell, of the metal protective shell, and a clamping spring is arranged at the connecting position of the clamping plate and the metal protective shell;
the rubber rod is arranged inside the clamping spring, the surface of the metal protective shell is provided with an electromagnet, both sides of the metal protective shell are provided with containing grooves, and flexible connecting pieces are arranged inside the containing grooves;
the butt joint piece is fixed at one end of the metal protective shell, and the other end of the metal protective shell is provided with a butt joint clamping groove matched with the butt joint piece;
the port assembly is arranged on one side of the front end of the equipment shell, the output end of the port assembly is connected with an identification module, and the output end of the identification module is respectively connected with a processor, a counting module and an information extraction module;
the alarm module is connected to the output end of the processor, the output end of the processor is also connected with a memory unit, the output end of the memory unit is connected with an Ethernet port, and the output end of the Ethernet port is connected with a cloud platform;
and the encryption module is connected to the output end of the information extraction module, and the output end of the encryption module is connected with a communication module.
Preferably, the port assembly is further provided with:
the display screen is installed on the left side of the port assembly, and an indicator lamp is correspondingly arranged above the port assembly.
Preferably, the metal protection shell is mutually clamped with a butt joint clamping groove in another group of metal protection shells through a butt joint piece, the upper end surface and the lower end surface of each metal protection shell are isosceles trapezoids, and the base angle of each metal protection shell is 45 degrees.
Preferably, the metal protective housings and the other group of metal protective housings form a rotating structure through flexible connecting pieces and the content grooves, and the four groups of metal protective housings form a frame-shaped structure.
Preferably, the clamping plate forms an elastic structure with the equipment shell through a clamping spring and a rubber rod, the electromagnet is perpendicular to the clamping plate, the electromagnet is of an L-shaped structure, and the top of the electromagnet is connected with the metal protective shell in a magnetic attraction mode.
Preferably, the device housing is further provided with:
the heat dissipation fan is arranged inside the equipment shell, a dust guard is fixed on the surface of the heat dissipation fan, and the dust guard is of a hollow net structure;
the mounting base is fixed at the rear end of the equipment shell, and through holes are formed in four corners of the mounting base.
Preferably, the identification module, the processor, the counting module, the information extraction module and the port component realize data transmission through an API port, and the processor and the counting module realize data transmission through the API port.
Preferably, the processor, the indicator light, the alarm module and the memory unit realize data transmission through an API port, and the memory unit, the ethernet port and the cloud platform realize data transmission through the API port in sequence.
Preferably, the information extraction module, the encryption module, the communication module and the memory unit sequentially realize data transmission through the API port.
Preferably, the information security encryption system includes the following steps:
s1: the port assemblies are respectively connected with the adaptive equipment;
s2: the identification module performs identification pairing on the connection equipment and detects whether the pairing is successful;
s3: extracting effective information through an information extraction module;
s4: the encryption module encrypts the extracted data information;
s5: the encrypted data is transmitted to the memory unit through the communication module;
s6: the Ethernet port can upload the data of the memory unit;
s7: judging whether the failure times of the connection equipment is more than three times through the processor;
s8: the security key is opened, and the user can continue to use the security key only by inputting the security key into the equipment;
s9: judging whether the key input is correct or not;
s10: starting an alarm module and automatically closing the processor at the same time;
s11: prompting the user equipment that the user equipment does not match and please reconnect, and adding one to the connection count through the counting module;
s12: and prompting the user to replace the connecting equipment.
Compared with the prior art, the invention provides information security encryption equipment, which has the following beneficial effects: the external part of the encryption equipment is provided with a detachable metal protective shell which can effectively protect the internal equipment shell, meanwhile, the clamping plate can rapidly clamp the equipment shell by utilizing the internal clamping spring, the installation efficiency of the equipment shell and the metal protective shell is greatly improved, in addition, the self elasticity of the clamping spring and the rubber rod can generate elastic acting force opposite to impact force when the metal protective shell is impacted, the external force received by the metal protective shell is mutually decomposed and offset, thereby effectively reducing the damage degree of the impact on the equipment shell, avoiding the problem that the encryption equipment cannot be normally used due to the mutual collision of a chip main board and the like in the equipment shell under the impact action, the electromagnet can lock the clamping plate, when the clamping plate is installed, the electromagnet can be powered off, and the clamping plate can be moved by pulling the electromagnet, when the electromagnet and the metal protective shell are mutually adsorbed, the moving range of the clamping plate is limited within the elastic deformation range of the clamping spring and the rubber rod;
the equipment connection times of the connection terminal can be continuously counted by the counting module in the encryption system, so that the situation that an illegal user frequently inserts the illegal connection terminal for many times is effectively avoided, the identification module is decoded by utilizing time difference to steal encrypted data stream, so that data loss is caused, user information can be screened by second key management, the terminal user with failed identification can unlock the encryption equipment by completing the key, the user who cannot correctly identify the equipment terminal and cannot input the correct key is identified as an illegal user by the system, the alarm work can be completed, the system is mutually connected with a security system in a building, the facial information collection of the illegal user is realized, meanwhile, the processor is automatically closed, the deterrence effect is realized on the illegal user, the police can be assisted to screen stolen information personnel, and the information theft phenomenon is avoided from the source, the information security environment is promoted to be built, equipment which is correctly identified can be encrypted through the encryption module, and the encrypted data stream can be uploaded to the cloud platform through the communication module smoothly to perform data storage work.
Drawings
FIG. 1 is a schematic front view of the present invention;
FIG. 2 is an enlarged view of a portion of FIG. 1A;
FIG. 3 is a schematic perspective view of the metal protective shell of the present invention;
FIG. 4 is a schematic flow chart of the present invention;
FIG. 5 is a flow chart of the encryption system of the present invention.
In the figure: 1. an equipment housing; 2. installing a base; 3. a metal protective shell; 4. a heat dissipation fan; 5. a dust-proof plate; 6. a clamping plate; 7. a clamping spring; 8. a display screen; 9. an indicator light; 10. a port assembly; 11. an electromagnet; 12. a rubber rod; 13. a flexible connector; 14. a docking member; 15. butting the clamping grooves; 16. a content slot; 17. an alarm module; 18. a processor; 19. an identification module; 20. a counting module; 21. a cloud platform; 22. an Ethernet port; 23. a memory cell; 24. an information extraction module; 25. a communication module; 26. and an encryption module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 to 3, an information security encryption apparatus includes: the device comprises a device shell 1, wherein a metal protective shell 3 and a heat dissipation fan 4 are arranged outside the device shell 1 and are installed inside the device shell 1, a dust guard 5 is fixed on the surface of the heat dissipation fan 4, and the dust guard 5 is of a hollow net structure; the mounting base 2 is fixed at the rear end of the equipment shell 1, through holes are formed in four corners of the mounting base 2, a clamping plate 6 is arranged on one side, close to the equipment shell 1, of the metal protective shell 3, and a clamping spring 7 is arranged at the connecting position of the clamping plate 6 and the metal protective shell 3; the rubber rod 12 is arranged inside the clamping spring 7, the electromagnet 11 is installed on the surface of the metal protective shell 3, the clamping plate 6 and the equipment shell 1 form an elastic structure through the clamping spring 7 and the rubber rod 12, the electromagnet 11 is perpendicular to the clamping plate 6, the electromagnet 11 is of an L-shaped structure, the top of the electromagnet 11 is connected with the metal protective shell 3 in a magnetic absorption mode, the two sides of the metal protective shell 3 are provided with accommodating grooves 16, the flexible connecting piece 13 is installed inside each accommodating groove 16, the metal protective shell 3 and the other group of metal protective shells 3 form a rotating structure through the flexible connecting piece 13 and the accommodating grooves 16, and the four groups of metal protective shells 3 form a frame structure; the butt joint piece 14 is fixed at one end of the metal protection shell 3, the other end of the metal protection shell 3 is provided with a butt joint clamping groove 15 matched with the butt joint piece 14, the metal protection shell 3 is mutually clamped with the butt joint clamping groove 15 on the other group of metal protection shells 3 through the butt joint piece 14, the upper end face and the lower end face of the metal protection shell 3 are isosceles trapezoids, the base angle of the metal protection shell 3 is 45 degrees, the detachable metal protection shell 3 is arranged outside the encryption equipment, the internal equipment shell 1 can be effectively protected, meanwhile, the clamping plate 6 can rapidly clamp the equipment shell 1 through the internal clamping spring 7, the installation efficiency of the equipment shell 1 and the metal protection shell 3 is greatly improved, the self elasticity of the clamping spring 7 and the rubber rod 12 can generate elastic acting force opposite to the impact force when the metal protection shell 3 is impacted, and the external force received by the metal protection shell 3 is mutually decomposed and offset, therefore, the damage degree of the equipment shell 1 caused by impact is effectively reduced, the situation that the encryption equipment cannot be normally used due to the fact that chip main boards and the like in the equipment shell 1 collide with each other under the action of the impact is avoided, the clamping plate 6 can be locked by the electromagnet 11, when the clamping plate 6 is installed, the electromagnet 11 can be powered off, the clamping plate 6 can be moved by pulling the electromagnet 11, and when the electromagnet 11 and the metal protective shell 3 are adsorbed to each other, the moving range of the clamping plate 6 is limited within the elastic deformation range of the clamping spring 7 and the rubber rod 12;
as shown in fig. 1 and 4, an information security encryption apparatus includes: the device comprises a port component 10, a display screen 8 and a display screen, wherein the port component 10 is arranged on one side of the front end of the device shell 1, the display screen 8 is arranged on the left side of the port component 10, an indicator lamp 9 is correspondingly arranged above the port component 10, the output end of the port component 10 is connected with an identification module 19, the output end of the identification module 19 is respectively connected with a processor 18, a counting module 20 and an information extraction module 24, the identification module 19, the processor 18, the counting module 20, the information extraction module 24 and the port component 10 realize data transmission through API ports, and the processor 18 and the counting module 20 realize data transmission through the API ports; the alarm module 17 is connected to the output end of the processor 18, the output end of the processor 18 is also connected with the memory unit 23, the output end of the memory unit 23 is connected with the Ethernet port 22, the output end of the Ethernet port 22 is connected with the cloud platform 21, the processor 18, the indicator lamp 9, the alarm module 17 and the memory unit 23 realize data transmission through API ports, and the memory unit 23, the Ethernet port 22 and the cloud platform 21 realize data transmission through the API ports in sequence; the encryption module 26 is connected with the output end of the information extraction module 24, the output end of the encryption module 26 is connected with the communication module 25, the information extraction module 24, the encryption module 26, the communication module 25 and the memory unit 23 realize data transmission through an API port in sequence, the number of device connection times of a connection terminal can be continuously counted through the counting module 20 in the encryption system, the situation that an illegal user frequently inserts an illegal connection terminal for many times is effectively avoided, the identification module 19 is decoded by using time difference, encrypted data flow is stolen, data loss is caused, user information can be screened through second key management, a terminal user who fails in identification can unlock the encryption device through completing the key, a user who cannot correctly identify the device terminal and input a correct key can be identified as an illegal user by the system, and alarm work can be completed, the system is mutually connected with a security system in a building, facial information acquisition is realized for illegal users, meanwhile, the processor 18 is automatically closed, the effect of deterring the illegal users is achieved, police can be assisted to screen stolen information personnel, the phenomenon of information theft is avoided from the source, the information security environment is promoted to be created, equipment which is correctly identified can be encrypted through the encryption module 26, encrypted data flow can be smoothly uploaded to the cloud platform 21 through the communication module 25, and data storage work is carried out.
As shown in fig. 5, an information security encryption system includes:
s1: are respectively connected with the adaptive equipment through the port component 10;
s2: the identification module 19 performs identification pairing on the connection equipment and detects whether the pairing is successful;
s3: extracting effective information through an information extraction module 24;
s4: the encryption module 26 encrypts the extracted data information;
s5: the encrypted data is transmitted to the memory unit 23 through the communication module 25;
s6: the ethernet port 22 can upload data to the memory unit 23;
s7: determining, by the processor 18, whether the number of connection device failures is greater than three;
s8: the security key is opened, and the user can continue to use the security key only by inputting the security key into the equipment;
s9: judging whether the key input is correct or not;
s10: activating the alarm module 17 and automatically shutting down the processor 18;
s11: prompting the user equipment to mismatch and please reconnect, and adding one to the connection count through the counting module 20;
s12: and prompting the user to replace the connecting equipment.
The working principle of the information security encryption equipment and the system thereof is as follows: firstly, an installation base 2 is fixed on a wall surface or in an information cabinet body by using expansion screws, when the metal protection shells 3 are installed, any group of metal protection shells 3 can be clamped outside corresponding edges of an equipment shell 1, meanwhile, an electromagnet 11 is powered off, the electromagnet 11 is pulled, and the distance between a clamping plate 6 and the metal protection shells 3 is adjusted; secondly, the clamping plate 6 is tightly attached to the surface of the equipment shell 1 to complete the installation work of the first group of metal protection shells 3, the butt joint piece 14 of the first group of metal protection shells 3 is inserted into the butt joint clamping groove 15 of the second group of metal protection shells 3, the connection angle between the two groups of metal protection shells 3 can be changed through the flexible connecting piece 13, at the moment, the two groups of metal protection shells 3 are mutually clamped to form an L-shaped structure, and the clamping plate 6 in the second group of metal protection shells 3 is sequentially tightly attached to the surface of the equipment shell 1; secondly, the whole four groups of metal protection shells 3 are installed, the electromagnets 11 are electrified, the electromagnets 11 and the metal protection shells 3 are mutually adsorbed, and the electromagnets 11 and the rubber rods 12 are inwards extruded at the moment, so that the clamping plate 6 is completely attached to the equipment shell 1; then, because the height of the metal protective shell 3 is greater than that of the device shell 1, and the heat dissipation fans 4 on the upper and lower sides of the device shell 1 are all provided with certain gaps, free circulation of air can be realized, and the problem that the air is not circulated after multiple groups of devices are stacked to cause abnormal heat dissipation of the device shell 1 is avoided, when the device shell 1 is used, a connector of a device terminal is inserted into the port assembly 10, and the corresponding indicator lamp 9 emits light at the same time, the identification module 19 inside identifies and pairs the identifier of the device terminal inserted into the port assembly 10, and the processor 18 judges whether the pairing is successful or not, if the pairing is successful, the effective information is extracted through the information extraction module 24, the extracted data information is subsequently encrypted through the encryption module 26, the encrypted data is transmitted to the memory unit 23 through the communication module 25, and the ethernet port 22 can upload the data to the memory unit 23, if the pairing is failed, whether the failure frequency of the same connection device is greater than three times or not is judged at the same time, if the failure frequency of the same connection device is less than three times, the user device is prompted to be unmatched and please to reconnect, the connection count is increased by one through the counting module 20, and in the process, the initial frequency of the same device is 0; and finally, when the failure times of the same connecting device are more than three times, the security key is started, the user can continue to use the device only by inputting the key into the device, whether the key is correctly input is judged through the processor 18, if the key is correctly input, the user is prompted to replace the new connecting device for reconnection, if the key is incorrectly input, the alarm module 17 is started, the processor 18 is automatically closed, the alarm module 17 synchronously performs data transmission with a security system in a building, the facial information acquisition of an illegal user is realized, and therefore the police is assisted to screen stolen information personnel.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. An information security encryption device, comprising:
the device comprises an equipment shell (1), wherein a metal protective shell (3) is arranged outside the equipment shell (1), a clamping plate (6) is arranged on one side, close to the equipment shell (1), of the metal protective shell (3), and a clamping spring (7) is arranged at the joint of the clamping plate (6) and the metal protective shell (3);
the rubber rod (12) is arranged inside the clamping spring (7), the surface of the metal protective shell (3) is provided with an electromagnet (11), two sides of the metal protective shell (3) are provided with containing grooves (16), and a flexible connecting piece (13) is arranged inside each containing groove (16);
the butt joint piece (14) is fixed at one end of the metal protective shell (3), and a butt joint clamping groove (15) matched with the butt joint piece (14) is formed in the other end of the metal protective shell (3);
the port assembly (10) is installed on one side of the front end of the equipment shell (1), the output end of the port assembly (10) is connected with an identification module (19), and the output end of the identification module (19) is respectively connected with a processor (18), a counting module (20) and an information extraction module (24);
the alarm module (17) is connected to the output end of the processor (18), the output end of the processor (18) is also connected with a memory unit (23), the output end of the memory unit (23) is connected with an Ethernet port (22), and the output end of the Ethernet port (22) is connected with a cloud platform (21);
and the encryption module (26) is connected to the output end of the information extraction module (24), and the output end of the encryption module (26) is connected with a communication module (25).
2. An information security encryption device according to claim 1, characterized in that: the port assembly (10) is further provided with:
and the display screen (8) is arranged on the left side of the port assembly (10), and an indicator lamp (9) is correspondingly arranged above the port assembly (10).
3. An information security encryption device according to claim 1, characterized in that: the metal protection shell (3) is mutually clamped with a butt joint clamping groove (15) in the other group of metal protection shells (3) through a butt joint piece (14), the upper end face and the lower end face of each metal protection shell (3) are isosceles trapezoids, and the base angle of each metal protection shell (3) is 45 degrees.
4. An information security encryption device according to claim 1, characterized in that: the metal protection shells (3) form a rotating structure with another group of metal protection shells (3) through flexible connecting pieces (13) and content slots (16), and the four groups of metal protection shells (3) form a frame type structure.
5. An information security encryption device according to claim 1, characterized in that: grip block (6) constitute elastic construction through centre gripping spring (7), rubber pole (12) and equipment casing (1), and electro-magnet (11) and grip block (6) mutually perpendicular to electro-magnet (11) are L style of calligraphy structure, and the top and the metal protective housing (3) magnetism of electro-magnet (11) are inhaled simultaneously and are connected.
6. An information security encryption device according to claim 1, characterized in that: the device housing (1) is further provided with:
the heat dissipation fan (4) is installed inside the equipment shell (1), a dust guard (5) is fixed on the surface of the heat dissipation fan (4), and the dust guard (5) is of a hollow net structure;
the mounting base (2) is fixed at the rear end of the equipment shell (1), and through holes are formed in four corners of the mounting base (2).
7. An information security encryption device according to claim 1, characterized in that: the identification module (19) and the processor (18), the counting module (20), the information extraction module (24) and the port component (10) realize data transmission through an API port, and the processor (18) and the counting module (20) realize data transmission through the API port.
8. An information security encryption device according to claim 1, characterized in that: the processor (18), the indicator lamp (9), the alarm module (17) and the memory unit (23) realize data transmission through API ports, and the memory unit (23), the Ethernet port (22) and the cloud platform (21) realize data transmission through the API ports in sequence.
9. An information security encryption device according to claim 1, characterized in that: the information extraction module (24), the encryption module (26), the communication module (25) and the memory unit (23) sequentially realize data transmission through the API port.
10. An information security encryption system, comprising the steps of:
s1: are respectively connected with the adaptive equipment through the port assembly (10);
s2: the identification module (19) performs identification pairing on the connection equipment and detects whether the pairing is successful;
s3: extracting effective information through an information extraction module (24);
s4: the encryption module (26) encrypts the extracted data information;
s5: the encrypted data is transmitted to the memory unit (23) through the communication module (25);
s6: the Ethernet port (22) can upload the data of the memory unit (23);
s7: judging whether the connection equipment failure times are more than three times through a processor (18);
s8: the security key is opened, and the user can continue to use the security key only by inputting the security key into the equipment;
s9: judging whether the key input is correct or not;
s10: activating an alarm module (17) and automatically shutting down a processor (18);
s11: prompting the user equipment to mismatch and please reconnect, and adding one to the connection count through a counting module (20);
s12: and prompting the user to replace the connecting equipment.
CN202111114853.4A 2021-09-23 2021-09-23 Information security encryption equipment and system thereof Withdrawn CN113806829A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111114853.4A CN113806829A (en) 2021-09-23 2021-09-23 Information security encryption equipment and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111114853.4A CN113806829A (en) 2021-09-23 2021-09-23 Information security encryption equipment and system thereof

Publications (1)

Publication Number Publication Date
CN113806829A true CN113806829A (en) 2021-12-17

Family

ID=78940301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111114853.4A Withdrawn CN113806829A (en) 2021-09-23 2021-09-23 Information security encryption equipment and system thereof

Country Status (1)

Country Link
CN (1) CN113806829A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114357488A (en) * 2022-01-04 2022-04-15 深圳市智百威科技发展有限公司 Data encryption system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114357488A (en) * 2022-01-04 2022-04-15 深圳市智百威科技发展有限公司 Data encryption system and method

Similar Documents

Publication Publication Date Title
US10057065B2 (en) System and method for securely storing and utilizing password validation data
WO2020087781A1 (en) External connection type terminal protection device and protection system
US8065523B2 (en) External storage apparatus and method of preventing information leakage
CN103795735B (en) Safety means, server and server info safety implementation method
CN109543435A (en) A kind of FPGA encryption protecting method, system and server
CN105162757A (en) External network log-in method for multi-authentication government virtual office platform
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN113806829A (en) Information security encryption equipment and system thereof
CN105162756A (en) Method for implementing government virtual office platform
US7409563B2 (en) Method and apparatus for preventing un-authorized attachment of computer peripherals
WO2018097521A1 (en) Method for duplexing database
CN111597520B (en) Computer USB interface information security prevention and control method and system
US11800693B1 (en) Reversible server system
CN106710049A (en) Holographic door control system and control method
CN112865965A (en) Train service data processing method and system based on quantum key
CN110175458A (en) A kind of Computer Data Security management system
US11018861B2 (en) System and method for storage and management of confidential information
CN215073543U (en) Intelligent network safety detection device
CN101706855A (en) Usb key device
CN111885179B (en) External terminal protection device and protection system based on file monitoring service
CN114021143A (en) Trusted operation and maintenance module, computer and data chaining method
CN207266461U (en) A kind of Network Security Device with physics tamper-resistant function
CN111898105A (en) External terminal protection equipment with user tracing function and protection system
JPH09237183A (en) Information protecting system
CN111597544A (en) Intermediary physical isolation method and system applied to USB interface

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20211217

WW01 Invention patent application withdrawn after publication