CN207637155U - Data safety storage device - Google Patents
Data safety storage device Download PDFInfo
- Publication number
- CN207637155U CN207637155U CN201820052740.3U CN201820052740U CN207637155U CN 207637155 U CN207637155 U CN 207637155U CN 201820052740 U CN201820052740 U CN 201820052740U CN 207637155 U CN207637155 U CN 207637155U
- Authority
- CN
- China
- Prior art keywords
- module
- embedded processor
- storage device
- main control
- control circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The application discloses a data security storage device, which comprises a shell, wherein a PCB circuit board is arranged in the shell, the PCB circuit board comprises a main control circuit and a power circuit, the power circuit is connected with the main control circuit and supplies power to the main control circuit, the main control circuit comprises an embedded processor, the embedded processor is electrically connected with a memory, an encryption and decryption module, a communication module, a secret key generation module, a fingerprint identification module and a display screen, a GPRS module and a GPS positioning module are integrated on the embedded processor, and the fingerprint identification module is arranged on the outer surface of the shell; and an I/O interface is arranged on the embedded processor. This application adopts the mode of discerning legal user, discerns through fingerprint identification module and display screen dual mode, has reached the purpose that control was opened to realized carrying out the technological effect of protection to the safety of writing in data, and then solved the technical problem of guaranteeing that data is falsified.
Description
Technical Field
The application relates to the technical field of intelligent equipment, in particular to a data security storage device.
Background
The data storage device in the related art is not very confidential and can be read or written by anyone, so that the data stored therein is easily tampered or read or copied by an authorized user.
SUMMERY OF THE UTILITY MODEL
The main objective of the present application is to provide a data security storage device to solve the technical problem that data is easy to be read or tampered.
In order to achieve the above object, according to one aspect of the present application, a data security storage device is provided, which includes a housing, a PCB circuit board is disposed in the housing, the PCB circuit board includes a main control circuit and a power circuit, the power circuit is connected to the main control circuit and supplies power to the main control circuit, the main control circuit includes an embedded processor, the embedded processor is electrically connected to a memory, an encryption and decryption module, a communication module, a key generation module, a fingerprint identification module and a display screen, and a GPRS module and a GPS positioning module are integrated on the embedded processor, and the fingerprint identification module is disposed on an outer surface of the housing; and an I/O interface is arranged on the embedded processor.
Further, the I/O interface is a USB interface.
Further, the communication module is at least one of a WiFi module, a ZigBee module, a lora module and an NFC module.
Further, the embedded processor is electrically connected with the positioning data storage module.
Further, an indicator light is installed on the outer surface of the shell and electrically connected with the embedded processor.
In the embodiment of the application, a method for identifying legal users is adopted, and identification is performed through a fingerprint identification module and a display screen, so that the purpose of controlling opening is achieved, the technical effect of protecting the safety of written data is realized, and the technical problem of guaranteeing data tampering is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic external diagram of a data security storage device according to an embodiment of the present application; and
fig. 2 is a schematic internal structural diagram of an embodiment of a data security storage device according to the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of this application and the above-described drawings, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the invention and its embodiments, and are not intended to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used in other meanings besides orientation or positional relationship, for example, the term "upper" may also be used in some cases to indicate a certain attaching or connecting relationship. The specific meaning of these terms in the present invention can be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present invention can be understood according to specific situations by those of ordinary skill in the art.
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
As shown in fig. 1-2, the present application provides a data security storage device, including a housing 101, a PCB circuit board is disposed in the housing, the PCB circuit board includes a main control circuit 1 and a power supply circuit 2, the power supply circuit 2 is in circuit connection with the main control circuit 1 and supplies power to the main control circuit 1, the main control circuit 1 includes an embedded processor 3, the embedded processor 3 is electrically connected with a memory 4, an encryption and decryption module 5, a communication module 6, a secret key generation module 7, and a fingerprint identification module 8 display screen 9, and a GPRS module and a GPS positioning module are integrated on the embedded processor, and the fingerprint identification module is disposed on an outer surface of the housing; and an I/O interface is arranged on the embedded processor.
In this embodiment, the I/O interface is set as a USB interface.
Before use, the data security storage device establishes communication with a mobile terminal (such as a mobile phone, a pad, a notebook, and the like) by using a communication module, binds the mobile terminal, and binds the mobile terminal, so that the embedded processor sends the key generated by the key generation module to the mobile terminal. And simultaneously, the mobile equipment can be used for inputting the fingerprint of the user into the data security storage device. When the data security storage device is used, the USB interface is connected with a PC, at the moment, the data security storage device can not be used, a user inputs a fingerprint through the fingerprint identification module, the fingerprint identifier judges whether the input fingerprint is a preset legal user, if so, a control instruction is sent to the embedded processor, the embedded processor is started to use, and the user can use the data security storage device to read and write data. After the embedded processor controls the encryption and decryption module to encrypt the written data, the key generation module is controlled to generate a key, and the key is sent to the mobile equipment by using the communication module, so that a user can input the key through a display screen, and the data security storage device is realized. The embedded microcontroller has the biggest characteristic of being single-chip, and the volume is greatly reduced, so that the power consumption and the cost are reduced, and the reliability is improved. Meanwhile, the embedded processor is integrated with a GPRS module and a GPS positioning module; the GPS positioning module is used for detecting the geographic position of the data safety storage device, and the embedded processor can utilize the GPRS module to send the geographic position detected by the GPS positioning module to the mobile equipment, so that a user can monitor the position of the data safety storage device in time, and the data safety storage device can be found out after the data safety storage device is lost.
In this embodiment, the communication module is set as a WIFI module, so that a user can remotely access the data security storage device through a mobile device; in specific implementation, the communication module may be at least one of a ZigBee module, a lora module, and an NFC module. The ZigBee module, the lora module and the NFC module are arranged to adopt low-power-consumption communication, so that the power consumption of the data safety storage device is reduced, and the standby time of the data safety storage device is prolonged.
In some embodiments, the embedded processor is electrically connected to a positioning data storage module for storing the GPS positioning module detection data location data.
In some embodiments, an indicator light is installed on the outer surface of the shell, the indicator light is electrically connected with the embedded processor, the indicator light is not turned on when the fingerprint identification module identifies a legal user, and the indicator light is controlled to be turned on when the fingerprint identification module identifies an illegal user.
From the above description, it can be seen that the utility model discloses a following technological effect has been realized: two access modes, key and fingerprint, are provided. When the input secret key is identified to be matched with the fingerprint, the user is identified to be authorized to access, and the embedded processor is started so that the user can access the embedded processor. Meanwhile, the encryption and decryption module is used for encrypting the written data or decrypting the written data during reading.
In the above embodiments, the power management circuit optionally includes an AC/DC conversion circuit, a protection circuit, and a battery pack, which are connected to each other. The AC/DC conversion circuit is used for realizing the conversion of alternating current and direct current. The protection circuit is preset with a voltage threshold, whether the voltage of the battery pack is lower than the preset voltage threshold is judged in real time, if yes, a prompt is given to a user, power supply is cut off, and therefore the battery is protected, and the service life of the battery is prolonged. Further, the battery pack may be optionally configured as a lithium battery, wherein the number of lithium batteries is at least 1. The standby time of the data safety storage device is prolonged by the arrangement of at least one lithium battery. In specific implementation, the battery pack may also be configured as an alkali manganese battery, a zinc-manganese battery, a zinc-air battery, a zinc-mercury battery, a hydrogen-oxygen battery, a magnesium-manganese battery, or the like, and the type of the battery pack is not limited herein.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above can be implemented by a general purpose computing device, centralized on a single computing device or distributed over a network of multiple computing devices, or alternatively implemented by program code executable by a computing device, such that the modules or steps may be stored in a memory device and executed by a computing device, fabricated separately as integrated circuit modules, or fabricated as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (6)
1. A data security storage device is characterized by comprising a shell, wherein a PCB circuit board is arranged in the shell and comprises a main control circuit and a power circuit, the power circuit is connected with the main control circuit and supplies power to the main control circuit, the main control circuit comprises an embedded processor, the embedded processor is electrically connected with a memory, an encryption and decryption module, a communication module, a key generation module and a fingerprint identification module, a GPRS module and a GPS positioning module are integrated on the embedded processor, and the fingerprint identification module is arranged on the outer surface of the shell; and an I/O interface is arranged on the embedded processor.
2. The data security storage device of claim 1, wherein the I/O interface is a USB interface.
3. The data security storage device of claim 1, wherein the communication module is at least one of a WiFi module, a ZigBee module, a lora module, and an NFC module.
4. The data security storage device of claim 1, wherein the embedded processor is electrically connected to a location data storage module.
5. The secure data storage device of claim 1, wherein an indicator light is mounted on an outer surface of the housing, the indicator light being electrically coupled to the embedded processor.
6. The data security storage device of claim 1, wherein the embedded processor is electrically connected to a display screen.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820052740.3U CN207637155U (en) | 2018-01-12 | 2018-01-12 | Data safety storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820052740.3U CN207637155U (en) | 2018-01-12 | 2018-01-12 | Data safety storage device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN207637155U true CN207637155U (en) | 2018-07-20 |
Family
ID=62851879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201820052740.3U Expired - Fee Related CN207637155U (en) | 2018-01-12 | 2018-01-12 | Data safety storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN207637155U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113414136A (en) * | 2021-08-25 | 2021-09-21 | 阿里云计算有限公司 | Storage medium destroying method, device and system and storage medium |
-
2018
- 2018-01-12 CN CN201820052740.3U patent/CN207637155U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113414136A (en) * | 2021-08-25 | 2021-09-21 | 阿里云计算有限公司 | Storage medium destroying method, device and system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107093285B (en) | Portable power source system of rening and portable power source cabinet of rening | |
WO2013016548A4 (en) | Apparatus, method and article for authentication, security and control of power storage devices, such as batteries | |
CN110188564B (en) | Mobile data storage terminal based on quantum key encryption | |
CN205427859U (en) | Portable storage device | |
CN103840525B (en) | Mobile storage power supply | |
CN103488920B (en) | A kind of wireless messages safety equipment realize method and system | |
CN205078045U (en) | A intelligence lock for ammeter case | |
CN106875520A (en) | A kind of smart lock, electron key and intelligent lock system | |
CN207637155U (en) | Data safety storage device | |
WO2022166305A1 (en) | Traction battery compatible with new energy vehicles and electric bicycles, and battery swap apparatus compatible with new energy vehicles and electric bicycles | |
CN208014112U (en) | A kind of anti-theft device | |
CN105155944A (en) | Intelligent door lock with various door unlocking modes | |
JP2003124923A (en) | Method of storing cipher key in battery | |
CN105631298A (en) | Encryption/decryption device and method | |
CN205545301U (en) | Key protective film piece | |
CN106300510A (en) | A kind of battery management method, system and device | |
CN105743640A (en) | Key protection module | |
CN110310104B (en) | Self-destruction type hardware wallet | |
CN104882155A (en) | Low-power anti-loss safety U-disk | |
CN207884646U (en) | Data Security Monitoring System | |
CN108009450A (en) | The method, apparatus and terminal of terminal anti-theft | |
CN202406118U (en) | Intelligent cipher key and electronic transaction system | |
CN202788285U (en) | Sliding cover display type electronic coded lock | |
CN210924704U (en) | Electronic vehicle key and electric vehicle | |
CN204990547U (en) | A device is opened to invoice for taxation control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180720 Termination date: 20200112 |
|
CF01 | Termination of patent right due to non-payment of annual fee |