CN205265775U - Portable smart mobile phone safety investigation case - Google Patents
Portable smart mobile phone safety investigation case Download PDFInfo
- Publication number
- CN205265775U CN205265775U CN201521085584.3U CN201521085584U CN205265775U CN 205265775 U CN205265775 U CN 205265775U CN 201521085584 U CN201521085584 U CN 201521085584U CN 205265775 U CN205265775 U CN 205265775U
- Authority
- CN
- China
- Prior art keywords
- standing groove
- depression bar
- mobile phone
- checked
- shell fragment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Telephone Set Structure (AREA)
Abstract
The utility model provides a portable smart mobile phone safety investigation case, fixed mounting has and to carry out the computer of killing virus to communications facilities in the box, and the computer link has power slot, switch and USB slot, and the display screen of power slot, switch, USB slot and computer distributes surperficially at the last lateral wall of box, the last lateral wall of box surface undercut form be used for placing the cell -phone wait look into the equipment standing groove, correspond the fixedly connected with spring around waiting to look into on the lateral wall of equipment standing groove, the spring stretches to the other end fixedly connected with depression bar of the opposite side of waiting to look into the equipment standing groove, spring. The horizontal projection of depression bar is " V " type, and inside two free ends of depression bar stretched to and wait to look into the equipment standing groove, the centre of depression bar was outwards outstanding. Wait to look into on the lateral wall of equipment standing groove still to correspond around the fixedly connected with setting up curved shell fragment, the relative setting about shell fragment and depression bar, the distance that can insert people's finger is left to the inside uplift of waiting to look into the equipment standing groove in the middle part of shell fragment between the adjacent shell fragment.
Description
Technical field
The utility model relates to a kind of mobile phone and entirely reconnoitres device, relates in particular to a kind of portable intelligent mobile phone and reconnoitres safelyCase.
Background technology
Current, " information-intensive society " gone all out to make in the whole nation, the prevention and control of beating taking " large data ", " cloud platform " as representativeForward intelligent network, the fast development of Mobile Transmission direction, government's leaders and department have generally been used mobile intelligent netNetwork terminal device and dedicated system equipment have been realized information sharing and Internet Transmission, dispose and commander's debugging work in major eventIn carry out in real time the work such as system login, data query, acoustic image transmission, instruction issuing, greatly improved the practicality of workWith ageing.
In live and work, taking smart mobile phone, panel computer as the communication terminal of representative has entered into masses, be peopleWork and life provide convenience,
But above-mentioned network-termination device and dedicated system equipment and society are upper taking smart mobile phone, panel computer as generationTable communication terminal but paid close attention to, spy upon by local and overseas hostile force, the machine of waiing upon utilize various channel wide-scale distribution wooden horses andVirus, steals leaders of the Party and the government's individual privacy, tackle, distort with Mi Qu government bodies vital strategic secrets information, carries out variety of wayDestroy, these network intrusions behaviors have formed serious threat to national security security work and popular life.
In order to ensure the normal operation of mobile phone, panel computer, mobile intelligent network terminal device and dedicated system equipment, needWant, on corresponding machine, antivirus software is installed, still, the smart mobile phone antivirus software of at present domestic and international main flow, all needs to be installed to orderIn marking device, just can detect, but this method can be brought more potential safety hazard and query to user. As everyone knows,The antivirus softwares such as 360 mobile phone security guards on smart mobile phone, Kingsoft, this base of kappa, even comprise QQ, micro-letter, fast beating, tickThe MSN such as call a taxi that ticks, all can carry out privacy information collection and upload user, and the installation of antivirus software can make equallyThere is potential danger in communication apparatus.
Utility model content
The utility model, for deficiency, provides a kind of security performance portable intelligent mobile phone high, easy to use to survey safelyLook into case.
The technical scheme that the utility model solves the problems of the technologies described above is as follows:
A kind of portable intelligent mobile phone is reconnoitred safely case, comprises the casing and the case lid that are hinged and connected, it is characterized in that casingFor hollow, in casing, be installed with the computer that can kill virus to communication apparatus, computer is connected with power supply slot, switchWith USB slot, power supply slot, switch, USB slot and computer screen are distributed in the upper side wall surface of casing; CasingUpper side wall surface is recessed to form the equipment standing groove to be checked for holding mobile telephone, the left side wall of equipment standing groove to be checked or the right side downwardsBefore and after on sidewall, correspondence is fixedly connected with spring, and spring stretches to the opposite side of equipment standing groove to be checked, and the other end of spring is fixedBe connected with depression bar.
Reconnoitre safely case according to described portable intelligent mobile phone, it is characterized in that, the floor projection of described depression bar is " V "Type, two free ends of depression bar stretch to described equipment standing groove to be checked inside, and the centre of depression bar is outwards outstanding.
Reconnoitre safely case according to described portable intelligent mobile phone, it is characterized in that, two free ends of described depression bar are equalBe fixedly connected with respectively ball.
Reconnoitre safely case according to described portable intelligent mobile phone, it is characterized in that, the side of described equipment standing groove to be checkedThe corresponding shell fragment that arc is set before and after being also fixedly connected with on wall, shell fragment and described depression bar left and right are oppositely arranged, the middle part of shell fragmentTo the inner hump of equipment standing groove to be checked, between adjacent shell fragment, leave the distance that can insert finger.
Reconnoitre safely case according to described portable intelligent mobile phone, it is characterized in that, the end of described equipment standing groove to be checkedThe downward-sloping setting in wall rear end, the diapire front end of equipment standing groove to be checked and the upper side wall flush of described casing.
Reconnoitre safely case according to described portable intelligent mobile phone, it is characterized in that, be positioned at the described ball of rear sideDiameter is greater than the diameter of the ball of its front side, and the height that is positioned at the described shell fragment of rear side is greater than the height of the shell fragment of its front side,All ball and shell fragment all do not exceed the upper side wall surface of described casing.
The utility model incorporates computer in casing, be in fact equivalent to one special antivirus software has been installed canRemovable computer, is connected computer by usb data line with the mobile communication equipment such as mobile phone, panel computer, just can be by meterCalculation machine is killed virus and is reconnoitred mobile phone, and plug and play is convenient to use. On the one hand, can be to moving by special antivirus softwareMoving communication apparatus is thoroughly killed virus, and on the other hand, need to antivirus software be installed on mobile communication equipment, therefore more carriesThe high security performance of the mobile communication equipment such as mobile phone, panel computer.
Brief description of the drawings
Fig. 1 is structural representation of the present utility model;
Fig. 2 is the A-A sectional structure schematic diagram of Fig. 1;
Fig. 3 is the B-B sectional structure schematic diagram of Fig. 1.
In accompanying drawing:
1, USB slot; 2, equipment standing groove to be checked; 3, mobile phone; 4, shell fragment; 5, casing; 6, ball; 7, depression bar; 8,Hand; 9, lock; 10, case lid; 11, hinge; 12, power supply slot; 13, switch; 14, computer; 15, thermovent; 16, spring.
Detailed description of the invention
Below in conjunction with accompanying drawing, principle of the present utility model and feature are described, example is only for explaining this practicalityNovel, be not intended to limit scope of the present utility model.
As shown in Figure 1, Figure 2 and Figure 3, a kind of portable intelligent mobile phone is reconnoitred safely case, comprises casing 5 Hes that are hinged and connectedCase lid 10, casing 5 is hollow, is installed with the computer 14 that can kill virus to communication apparatus in casing 5, computer 14 connectsBe connected to power supply slot 12, switch 13 and USB slot 1, the display screen of power supply slot 12, switch 13, USB slot 1 and computer 14Be distributed in the upper side wall surface of casing 5; The upper side wall surface of casing 5 is recessed to form the equipment to be checked for holding mobile telephone 3 downwardsStanding groove 2, on the left side wall of equipment standing groove 2 to be checked or right side wall, front and back correspondence is fixedly connected with spring 16, and spring 16 stretches toThe opposite side of equipment standing groove 2 to be checked, the other end of spring 16 is fixedly connected with depression bar 7. By depression bar 7, mobile phone is limited in and is treatedLook in equipment standing groove 2, prevent that this from reconnoitring case and breaking mobile phone because of unexpected rocking. In the present embodiment, the level of described depression bar 7Be projected as " V " type, two free ends of depression bar 7 stretch to described equipment standing groove to be checked 2 inside, and the centre of depression bar 7 is outwards outstanding.After mobile phone is placed, between mobile phone and depression bar 7, leave space, be convenient to take away mobile phone, same, be " V " just because of depression bar 7Type, is with space between its two sections of parts, is also convenient to holding mobile telephone. Two free ends of described depression bar 7 are fixing respectivelyBe connected with ball 6. Ball 6 has spring, also has good friction effect, therefore can more effectively prevent mobile phoneShake. The corresponding shell fragment 4 that arc is set before and after being also fixedly connected with on the sidewall of described equipment standing groove 2 to be checked, shell fragment 4Be oppositely arranged with described depression bar 7 left and right, the middle part of shell fragment 4 is to the inner hump of equipment standing groove 2 to be checked, adjacent shell fragment 4 itBetween leave the distance that can insert finger so that pick and place mobile phone.
Further, the downward-sloping setting in diapire rear end of described equipment standing groove 2 to be checked, equipment standing groove 2 to be checkedThe upper side wall flush of diapire front end and described casing 5. If mobile phone profile is excessive, can make wherein one end of mobile phone to protractingGo out. In order to adapt to the heeling condition of equipment standing groove 2 diapires to be checked, the diameter that is positioned at the described ball 6 of rear side is greater than before itThe diameter of the ball 6 of side, the height that is positioned at the described shell fragment 4 of rear side is greater than the height of the shell fragment 4 of its front side, all rubberBall 6 and shell fragment 4 all do not exceed the upper side wall surface of described casing 5, so that case lid and casing fasten. Described equipment standing groove to be checked2 are positioned at display screen one side of described computer 14, the display screen corresponding setting in left and right of equipment standing groove 2 to be checked and computer 14,Facilitate staff to operate. The upper side wall surface of described casing 5 offers thermovent 15, and described case lid 10 passes through hinge with casing 5Chain 11 is connected, and the front end face of casing 5 is connected with handle 8, and case lid 10 locks 9 with corresponding being connected with of front end face of casing 5.
The built-in high-performance computer of the utility model, configuration specification is as follows:
The performance characteristics of this product is as follows:
Scanning system program, application program, storing card data comprehensively.
Easy and simple to handle understandable, humanization designing, to conduction operation, multi-faceted prompting.
Without any software is installed on intelligent mobile phone terminal, inserts and look into.
Do not take cell phone system resources, checking process is convenient and swift.
Separate hardware and linux system platform, avoid the destruction that self is infected by the virus.
Shockproof water proof and dust proof portable case type design, is convenient for carrying, sturdy and durable, adapts to severe site environment.
After system scan, can not record and retain any user data.
This product adopts the mobile phone safety inspection mode without installation, noresidue first: the seamless detection mode of external, avoidSecondary harm.
The hardware performance of this product is as follows:
The needs of site disposal are considered in the design of device hardware, have adopted and have " waterproof, protection against the tide, dustproof " three anti-caseesThe special portable machine that protective housing is made. Adopt through environmental protection certification waterproof, protection against the tide, dustproof three anti-equipment special casees, toolThere is high strength, high impact-resistant, positive confinement. It is firm: casing adopts the macromolecule polymeric material integrated injection molding of high impact-resistant,Tough and tensile resistance to compression. Sealing: adopt flat type flexible foaming sealing rubber strip, guarantee waterproofing and airtight, adopt Novel balance air valve, tandem-driving bogieInner and outer air pressure. Durable: all hinges adopt stainless steel material, anticorrosion durable. Normal range of operation is-40 DEG C to+80 DEG C, adoptsEasily open with Novel box buckle, there is locking function, overcome in the time of harsh climate, the shortcoming that box fastener difficulty is opened, locking device ensuresSafety and reliability in the time of transport or portable.
The design parameter of this project malicious code killing engine is as follows:
1. the security threat type of supporting
Virus(infects formula virus)
Worm(worm)
Trojan(wooden horse)
Tool(tool-class)
G-Ware(rogue software)
Adware(advertisement part)
Rishware(risk part)
2. operating system, the file format supported
3. the each platform sample size having comprised in feature database
Note: native system is supported heuristic detection to unknown malicious code, can find novel unknown sample according to malicious actThis.
4. feature database update mode and frequency
5. feature database and renewal bag size
At present complete characterization storehouse size is about 1.4MB, and each feature database transaction file size is not at a few KB to tens KB etc.
6. malicious code recall rate and rate of false alarm
Project | Data |
Recall rate | >99.8% |
Rate of false alarm | 0 |
Note: data from all previous evaluation result of the international third party AVTest of authoritative institution.
This product is studied and judged through the compatible technology of software and hardware, and selected python(sends gloomy) development language, operating system platformAdopt linux platform, built-in domestic state-of-the-art intelligent terminal checking and killing virus engine, the security threat type of support has: Virus(infection formula virus), Worm(worm), Trojan(wooden horse), Tool(tool-class), G-Ware(rogue software), Adware(is wideAccuse part), Rishware(risk part). According to the up-to-date test and appraisal data of the internal authority test and appraisal AVTest of mechanism, the evil of native system engineMeaning code recall rate is greater than 99.8%, and rate of false alarm is 0, in world-leading level. Unknown malicious code is supported to heuristic inspectionSurvey, can find novel unknown virus sample according to malicious act.
This product adopts separate hardware design, without any software is installed on mobile intelligent terminal, directly by USB numberCarry out safety inspection according to line linking objective terminal; Scanning system program, application program, storing card data comprehensively; Employing meetsThe testing process of electronic data Analyses of forensic expertise mode, the namely seamless detection mode of external, without taking intelligent terminalAny system resource, more can avoid virus infections destroy system itself, system can not record and retain any privacy of user numberAccording to; Easy and simple to handle understandable, humanization designing, to conduction operation, multi-faceted prompting; Shockproof water proof and dust proof portable case type design, sidePortable belt, sturdy and durable, adapt to severe site environment.
This product treatment device is Intel2.6G double-core, and operating system is LinuxUbuntu12.04, chipsetBIOS is that IntelH61 (SandyBrigge platform) BIOS supports ACPI function, and internal memory (RAM) is 4GBDDR3,2 outsidesUSB2.0 port, 32GB1.8 inch SATA interface solid hard disk, monitor resolution is 1024X768,9.7 cun of condenser typesTouch-screen, external 220V power supply, power consumption 120W, is of a size of 432x323x116mm, heavy 3.5kg.
Claims (5)
1. portable intelligent mobile phone is reconnoitred safely a case, comprises the casing (5) and the case lid (10) that are hinged and connected, and its feature existsIn, casing (5) is hollow, is installed with the computer (14) that can kill virus to communication apparatus, computer in casing (5)(14) be connected with power supply slot (12), switch (13) and USB slot (1), power supply slot (12), switch (13), USB slot (1)And the display screen of computer (14) is distributed in the upper side wall surface of casing (5); The upper side wall surface of casing (5) is recessed to form downwardsEquipment standing groove to be checked (2), on the left side wall of equipment standing groove to be checked (2) or right side wall, front and back correspondence is fixedly connected with spring(16), spring (16) stretches to the opposite side of equipment standing groove to be checked (2), and the other end of spring (16) is fixedly connected with depression bar (7).
2. portable intelligent mobile phone according to claim 1 is reconnoitred safely case, it is characterized in that the water of described depression bar (7)Put down and be projected as " V " type, two free ends of depression bar (7) stretch to described equipment standing groove to be checked (2) inside, the centre of depression bar (7)Outwards outstanding.
3. portable intelligent mobile phone according to claim 2 is reconnoitred safely case, it is characterized in that two of described depression bar (7)Individual free end is fixedly connected with ball (6) respectively.
4. portable intelligent mobile phone according to claim 3 is reconnoitred safely case, it is characterized in that, described equipment to be checked is placedThe corresponding shell fragment (4) that arc is set before and after being also fixedly connected with on the sidewall of groove (2), shell fragment (4) and described depression bar (7) left and right phaseTo arranging, the middle part of shell fragment (4), to the inner hump of equipment standing groove to be checked (2), is left and can be inserted between adjacent shell fragment (4)Enter the distance of finger.
5. portable intelligent mobile phone according to claim 4 is reconnoitred safely case, it is characterized in that, described equipment to be checked is placedThe downward-sloping setting in diapire rear end of groove (2), the upper side wall of the diapire front end of equipment standing groove to be checked (2) and described casing (5)Flush.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201521085584.3U CN205265775U (en) | 2015-12-24 | 2015-12-24 | Portable smart mobile phone safety investigation case |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201521085584.3U CN205265775U (en) | 2015-12-24 | 2015-12-24 | Portable smart mobile phone safety investigation case |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205265775U true CN205265775U (en) | 2016-05-25 |
Family
ID=56007277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201521085584.3U Expired - Fee Related CN205265775U (en) | 2015-12-24 | 2015-12-24 | Portable smart mobile phone safety investigation case |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205265775U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530350A (en) * | 2015-12-24 | 2016-04-27 | 王其春 | Portable intelligent mobile phone security checking box |
WO2019126201A1 (en) * | 2017-12-21 | 2019-06-27 | Mcafee, Llc | Methods and apparatus for securing a mobile device |
-
2015
- 2015-12-24 CN CN201521085584.3U patent/CN205265775U/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530350A (en) * | 2015-12-24 | 2016-04-27 | 王其春 | Portable intelligent mobile phone security checking box |
CN105530350B (en) * | 2015-12-24 | 2018-06-29 | 广州市苏纳米实业有限公司 | Portable intelligent mobile phone safe reconnoitres case |
WO2019126201A1 (en) * | 2017-12-21 | 2019-06-27 | Mcafee, Llc | Methods and apparatus for securing a mobile device |
US10496822B2 (en) | 2017-12-21 | 2019-12-03 | Mcafee, Llc | Methods and apparatus for securing a mobile device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210058416A1 (en) | Adaptive internet of things edge device security | |
CN106557697B (en) | System and method for generating a set of disinfection records | |
US20140143538A1 (en) | Data Security and Integrity by Remote Attestation | |
US8640233B2 (en) | Environmental imaging | |
CN107567699A (en) | Real-time mobile security situation | |
CN107408176A (en) | The execution of malicious objects dissects detection | |
CN104951680A (en) | Biological characteristic information processing method, storage method and device | |
US20210256126A1 (en) | Privacy-preserving content classification | |
CN108293044A (en) | System and method for detecting malware infection via domain name service flow analysis | |
CN205265775U (en) | Portable smart mobile phone safety investigation case | |
CN107506646A (en) | Detection method, device and the computer-readable recording medium of malicious application | |
CN103268449A (en) | Method and system for detecting mobile phone malicious codes at high speed | |
CN101102192A (en) | Authentication device, method and system | |
CN108830714A (en) | Block chain foretells machine | |
CN105468975B (en) | Method for tracing, the apparatus and system of malicious code wrong report | |
US10795999B1 (en) | Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP) | |
CN117134993B (en) | Search ciphertext detectable method and equipment based on accumulated promise verification | |
El Attar et al. | A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications | |
CN105530350B (en) | Portable intelligent mobile phone safe reconnoitres case | |
Shwartz et al. | Inner conflict: How smart device components can cause harm | |
CN104517070A (en) | Double-system computer and application method thereof | |
CN106982418B (en) | A kind of processing method that mobile terminal is anti-lost and mobile terminal | |
US20190318095A1 (en) | Anti-virus device for industrial control systems | |
CN110069924A (en) | Computer user's behavior monitoring method and computer readable storage medium | |
Ge et al. | An APT trojans detection method for cloud computing based on memory analysis and FCM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160525 Termination date: 20211224 |