CN208255884U - Laptop - Google Patents
Laptop Download PDFInfo
- Publication number
- CN208255884U CN208255884U CN201820030676.9U CN201820030676U CN208255884U CN 208255884 U CN208255884 U CN 208255884U CN 201820030676 U CN201820030676 U CN 201820030676U CN 208255884 U CN208255884 U CN 208255884U
- Authority
- CN
- China
- Prior art keywords
- laptop
- microprocessor
- module
- information
- wireless communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The utility model provides a kind of laptop.The laptop includes: microprocessor, GPS positioning module, verifying identification module, wireless communication module and physical destroying key;The GPS positioning module, verifying identification module, wireless communication module are electrically connected with the microprocessor, and the physical destroying key is installed on the microprocessor;It can judge whether laptop is lost by verifying identification module, and pass through wireless communication module when laptop is lost to external equipment alert, and the data and the remotely booting of control laptop or shutdown destroyed in laptop are remotely controlled by external equipment, when laptop is by physical damage, it can also be by physical destroying by data in key control microprocessor auto-destruct laptop, the anti-theft function of laptop can be effectively promoted, ensures the data safety in laptop.
Description
Technical field
The utility model relates to computer field more particularly to a kind of laptops.
Background technique
With the continuous development of electronic technology, laptop (Notebook Computer) is small and exquisite portable by its
Feature is liked by people, is widely used among daily life.
Laptop is as traditional desktop computer by hardware such as display, keyboard/mouse, CPU, memory and hard disks
Composition, but in the case where forming identical situation, laptop has the characteristics that small in size, light-weight, easy to carry.Generally
Come, portability is notebook relative to the maximum advantage of desktop computer, and the weight of general laptop only has 2 kilograms of left sides
The right side, either outgoing work is still traveled, can be carried, very convenient.
Existing laptop generally includes: bottom case is leaned on the upper cover of bottom case rotation connection, set on the bottom case
Keyboard and touch tablet on one side surface of the nearly upper cover and set on the upper cover on a side surface of the bottom case
The components such as display screen, this laptop do not have anti-theft function, and laptop is often difficult to give for change after losing.
Meanwhile laptop currently on the market, also without auto-alarm function, equipment can not give warning in advance when stolen
Prompt.Equipment usually can fix a safety line lock constraint in equipment end, cause user to exist in this way when exhibition room or sales field are shown
The freedom degree used is limited in experience functions of the equipments, limits the experience effect of user.
Further, laptop currently on the market, which does not have, prevents data to be stolen, destroys the ability of data, pen
Remember that there are the risks that significant data is stolen by rival after this computer loss, the enhancing with user to information security awareness,
There is the demand of security assurance information function also increasingly to increase laptop, existing laptop is no longer satisfied
User demand.
Utility model content
The purpose of this utility model is to provide a kind of laptops, are able to ascend the anti-theft function of laptop,
Ensure the data safety in laptop.
To achieve the above object, the utility model provides a kind of laptop, comprising: microprocessor, GPS positioning
Module, verifying identification module, wireless communication module and physical destroying key;
The GPS positioning module, verifying identification module, wireless communication module are electrically connected with the microprocessor, institute
Physical destroying key is stated to be installed on the microprocessor;
Security software is preset in the laptop, the security software is used for the safe identification information of typing, and will
The safe identification information is supplied to verifying identification module;
The GPS positioning module, for positioning the current location of the laptop;
The verifying identification module, for acquiring verification information, and by the verification information and the safe identification information
It is compared, and when the verification information and safe identification information are inconsistent, determines that the laptop is in and lose shape
State determines that the laptop is in normal condition when the verification information is consistent with safe identification information;
The microprocessor, the operational order for being issued according to the external equipment, is destroyed in the laptop
Data, the control laptop booting control the laptop shutdown and are in loss shape in laptop
State generates warning message and is supplied to wireless communication module.
The wireless communication module, for sending warning message to external equipment and receiving operational order from external equipment
And it is transferred to microprocessor;
The physical destroying key, for when the laptop is by physical damage, control microprocessor to be automatic
Destroy data in laptop.
The laptop further include: switching on and shutting down key, the switching on and shutting down key and the microprocessor are electrically connected,
For controlling the booting and shutdown of the laptop.
The laptop further include: main power source and auxiliary power;
The main power source respectively with the microprocessor, GPS positioning module, verifying identification module, wireless communication module and
Auxiliary power is electrically connected, and the auxiliary power is electrically connected with microprocessor, physical destroying key and wireless communication module respectively;
The main power source is used in laptop booting, is the microprocessor, GPS positioning module, verifying identification
Module, wireless communication module and auxiliary power power supply;
The auxiliary power is used in laptop shutdown, is the microprocessor, physical destroying key and channel radio
Interrogate module for power supply.
The safe identification information of typing includes: biological information of human body, character password, in the address IP in the security software
One or more combinations.
The verifying identification module includes: biological information of human body recognition unit, character password recognition unit, the knowledge of the address IP
The combination of one or more of other unit.
The biological information of human body includes: voice information, finger print information, iris information and facial information.
The security software is also used to the safe coordinate range of typing, and the GPS positioning module is also used to judge the notes
The current location of this computer is in safe coordinate in the current location of the laptop whether in safe coordinate range
When outside range, determine that the laptop is in lost condition, is in safety in the current location of the laptop and sits
When marking in range, determine that the laptop is in normal condition.
The microprocessor is also used to run the operating system of the laptop.
The wireless communication module includes: 4G communication unit and WiFi communication unit.
The external equipment is mobile phone or tablet computer.
The utility model has the beneficial effects that the utility model provides a kind of laptop, comprising: microprocessor, GPS are fixed
Position module, verifying identification module, wireless communication module and physical destroying key;The GPS locating module, verifying identification mould
Block, wireless communication module are electrically connected with the microprocessor, and the physical destroying key is installed on the microprocessor;
Can by verify identification module judge whether laptop is lost, and laptop lose pass through wireless communication module to
External equipment alert, and pass through the data and control notebook in peripheral equipment control remote destroying laptop
Booting computer or shutdown, when laptop is by physical damage, moreover it is possible to which key control microprocessor is pressed certainly by physical destroying
It is dynamic to destroy data in laptop, the anti-theft function of laptop can be effectively promoted, ensures the number in laptop
According to safety.
Detailed description of the invention
In order to be further understood that the feature and technology contents of the utility model, please refer to practical new below in connection with this
The detailed description and accompanying drawings of type, however, the drawings only provide reference and explanation, is not used to limit the utility model.
In attached drawing,
Fig. 1 is the structure chart of the laptop of the utility model.
Specific embodiment
Further to illustrate technological means and its effect that the utility model is taken, below in conjunction with the utility model
Preferred embodiment and its attached drawing are described in detail.
Referring to Fig. 1, the utility model provides a kind of laptop, comprising: microprocessor 10, GPS locating module
20, identification module 30, wireless communication module 40 and physical destroying key 50 are verified;
The GPS positioning module 20, verifying identification module 30, wireless communication module 40 are electrical with the microprocessor 10
Connection, the physical destroying key 50 are installed on the microprocessor 10.
Specifically, security software is preset in the laptop of the utility model, the security software is pacified for typing
Full identification information, and the safe identification information is supplied to verifying identification module 30, the safe identification information includes human body
The combination of one or more of biological information, character password and IP address, wherein biological information of human body includes voice information, refers to
The combination of one or more of line information, iris information and facial information.Above-mentioned safe identification information is used per family can basis
It needs to carry out customized setting.
Specifically, the verifying identification module 30, for acquiring verification information, and by the verification information and the safety
Identification information is compared, and when the verification information and safe identification information are inconsistent, is determined at the laptop
In lost condition, when the verification information is consistent with safe identification information, determine that the laptop is in normal condition.
Further, corresponding with the safe identification information, when in safe identification information including biological information of human body, institute
Stating verifying identification module 30 also can accordingly include biological information of human body recognition unit, when in the safe identification information including character
When password, the verifying identification module 30 also can accordingly include character password recognition unit, when in safe identification information include IP
When address, the verifying identification module 30 also can accordingly include IP Address Recognition unit.
It is noted that when safe identification information include it is multiple in biological information of human body, character password and IP address,
User can according to the needs of security level, selective enabling it is therein part or all.
Specifically, the GPS positioning module 20, for positioning the current location of the laptop.
Specifically, the microprocessor 10, the operational order for being issued according to the external equipment, destroys the notes
Data, the control laptop are switched on or control the laptop shutdown and at laptop in this computer
Warning message is generated in lost condition and is supplied to wireless communication module 40.
Specifically, the wireless communication module 40, for sending warning message to external equipment and being connect from external equipment
It receives operational order and is transferred to microprocessor 10;
Specifically, the physical destroying key 50, for controlling micro- place when the laptop is by physical damage
Manage data in 10 auto-destruct laptop of device.
In addition, the laptop further include: switching on and shutting down key 60, the switching on and shutting down key 60 and the microprocessor
10 are electrically connected, for controlling the booting and shutdown of the laptop.
Further, in some embodiments of the utility model, the laptop further include: main power source 70 and pair
Power supply 80;The main power source 70 respectively with the microprocessor 10, GPS positioning module 20, verifying identification module 30, wireless telecommunications
Module 40 and auxiliary power 80 are electrically connected, the auxiliary power 80 respectively with microprocessor 10, physical destroying key 50 and channel radio
Module 40 is interrogated to be electrically connected;The main power source 70 is used in laptop booting, is the microprocessor 10, GPS positioning
Module 20, verifying identification module 30, wireless communication module 40 and auxiliary power 80 are powered;The auxiliary power 80 is used in notebook electricity
It is that the microprocessor 10, physical destroying key 50 and wireless communication module 40 are powered when brain shuts down.
Further, the microprocessor 10 is also used to run the operating system of the laptop namely described micro-
Processor 10 is the central processing unit (Central Processing Unit, CPU) in general laptop.
Further, the wireless communication module 40 includes: 4G communication unit and Wireless Fidelity (WIreless-
Fidelity, WiFi) communication unit, wherein the 4G communication unit can also be substituted with 2G communication unit or 3G communication unit, it is logical
Cross while the 4G communication unit and WiFi communication unit that are arranged can guarantee when the laptop is lost, in time with outside
Equipment is got in touch, and is issued the user with alarm and is deleted the data in laptop in time according to the needs of users.
Preferably, the external equipment is mobile phone or tablet computer, and usual user can first pass through in advance security software and be held
The external equipment for having laptop to hold with it is associated, in order to obtain alarm in time when laptop is lost
Information.
It should be noted that the working with notebook computer process of the utility model includes: to press switch key 60 to open pen
Remember this computer, to laptop validation information (such as character password and biological information of human body), verification information is by testing
After the verifying for demonstrate,proving identification module 30, the operating right of laptop is obtained, normal use laptop, after use,
It presses switch key 60 and closes laptop, again to laptop validation information, verification information is known by verifying
After the verifying of other module 30, laptop close, that is to say, that be required in the laptop startup and shutdown to
Laptop provides correct verification information, could complete startup and shutdown, this set can prevent by non-owner or
Unauthorized person opens laptop operating system, deletes and steal the data in laptop hard disk, while preventing from taking down notes
When this computer is lost, operator is directly shut down laptop by switch key 60, prevent laptop is from automatic
Alarm causes user that cannot know immediately that laptop is lost.
And when verification information can not be by the verifying of verifying identification module 30, then laptop is determined to lose shape
State, microprocessor 10 generate warning message, and wireless communication module 40 sends warning message to the external equipment of user-association, prompt
Laptop is in lost condition, inquires whether the user needs to delete the data in laptop, user is according to practical feelings
Condition sends corresponding operation instruction to microprocessor 10 via wireless communication module 40, and microprocessor 10 is determined according to operational order
Whether data in laptop are deleted.
Further, when operator passes through the conduct verification information of sound, fingerprint, facial information, iris and character password,
By verifying identification module 30 verifying identification when, when input verification information when the error occurs, will trigger laptop from
Dynamic alarm, at this point, in order to avoid false alarm caused by the maloperation as user, user can also in laptop, if
The errors number for allowing occur, such as mistake 5 times are set, just start to alarm.And when laptop is believed using IP address as verifying
When breath, verifying identification module can judge whether the IP address of the laptop becomes when laptop is opened every time
Change, once IP address, which generates variation, will trigger alarm, the deterministic process of IP address is that system is automatically performed, and maloperation is not present
The problem of, therefore also do not need generally that the errors number for allowing occur is arranged.
Further, in some embodiments of the utility model, the security software is also used to the safe coordinate model of typing
Enclose, the GPS positioning module 20, be also used to judge the current location of the laptop whether in safe coordinate range,
And when the current location of the laptop is in outside safe coordinate range, determines that the laptop is in and lose shape
State determines that the laptop is in normal when the current location of the laptop is in safe coordinate range
State, in this case, once safe coordinate range of the laptop beyond setting, will trigger alarm, such as setting pen
Remember the region that this computer is in where certain sales field, at this time when laptop is not in sales field, alarm will be triggered.Work as pen
Remember that this computer is triggered when alarming, GPS positioning module 20 can start positioning function automatically and record position at this time, notebook electricity
The microprocessor 10 of brain can to 40 alert of wireless communication module, by wireless communication module 40 with mobile network or
Wireless network sends location information on terminal electronic device and carries out early warning to user, prevents laptop quilt
It steals.
Specifically, when the utility model is additionally arranged at laptop and is switched on or shuts down each time, it is required to acquisition verifying
Information is verified, and could be switched on or be shut down after being verified, and laptop can be prevented by non-owner or unauthorized person
Laptop operating system is opened, the data in laptop hard disk are deleted and steal;When laptop is lost, prevent
Only operator is directly shut down laptop by switch key 60, prevent laptop from automatic alarm, causes to use
Family cannot know immediately that laptop is lost.
Specifically, when laptop is lost, if laptop is in open state, user can pass through outside
Equipment remotely controls laptop and destroys the data in laptop, prevents data to be stolen, if at laptop
In off-mode, then laptop booting can be remotely controlled by external equipment, and remote by external equipment after powering
Process control laptop simultaneously destroys the data in laptop, and data is prevented to be stolen, meanwhile, if other people attempt by sudden and violent
The physical destroying key 50 that power tears machine open when obtaining data, to be mounted on microprocessor 10 can be triggered, and be pressed by physical destroying
Circuit is destroyed in the triggering of key 50, and 10 auto-destruct laptop data of microprocessor prevent data stolen, it is preferable that above-mentioned pen
Remember that the data in this computer are the data being stored in the hard disk of laptop.
In conclusion the utility model provides a kind of laptop, comprising: microprocessor, GPS positioning module, verifying
Identification module, wireless communication module and physical destroying key;The GPS positioning module, verifying identification module, wireless telecommunications mould
Block is electrically connected with the microprocessor, and the physical destroying key is installed on the microprocessor;It can be known by verifying
Other module judges whether laptop is lost, and loses in laptop and issued by wireless communication module to external equipment
Warning message, and by the data and the booting of control laptop in peripheral equipment control remote destroying laptop or close
Machine, when laptop is by physical damage, moreover it is possible to which key control microprocessor auto-destruct notebook is pressed by physical destroying
Data in computer can effectively promote the anti-theft function of laptop, ensure the data safety in laptop.
The above, for those of ordinary skill in the art, can with technical solution according to the present utility model and
Technical concept makes other various corresponding changes and modifications, and all these change and modification all should belong to the utility model power
The protection scope that benefit requires.
Claims (7)
1. a kind of laptop characterized by comprising microprocessor (10), GPS positioning module (20), verifying identification mould
Block (30), wireless communication module (40) and physical destroying key (50);The GPS positioning module (20), verifying identification module
(30), wireless communication module (40) is electrically connected with the microprocessor (10), and the physical destroying key (50) is installed on
On the microprocessor (10);Security software is preset in the laptop.
2. laptop as described in claim 1, which is characterized in that further include: switching on and shutting down key (60), the switching on and shutting down
Key (60) and the microprocessor (10) are electrically connected.
3. laptop as described in claim 1, which is characterized in that further include: main power source (70) and auxiliary power (80);
The main power source (70) respectively with the microprocessor (10), GPS positioning module (20), verifying identification module (30), nothing
Line communication module (40) and auxiliary power (80) are electrically connected, the auxiliary power (80) respectively with microprocessor (10), physical destroying
Key (50) and wireless communication module (40) are electrically connected.
4. laptop as described in claim 1, which is characterized in that typing has safety identification letter in the security software
Breath, the safe identification information includes: the combination of one or more of biological information of human body, character password, IP address.
5. laptop as claimed in claim 4, which is characterized in that the verifying identification module (30) includes: that human body is raw
The combination of one or more of object information identificating unit, character password recognition unit, IP address recognition unit.
6. laptop as claimed in claim 4, which is characterized in that the biological information of human body includes: voice information, refers to
Line information, iris information and facial information.
7. laptop as described in claim 1, which is characterized in that the wireless communication module (40) includes: 4G communication
Unit and WiFi communication unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820030676.9U CN208255884U (en) | 2018-01-08 | 2018-01-08 | Laptop |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820030676.9U CN208255884U (en) | 2018-01-08 | 2018-01-08 | Laptop |
Publications (1)
Publication Number | Publication Date |
---|---|
CN208255884U true CN208255884U (en) | 2018-12-18 |
Family
ID=64619888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201820030676.9U Active CN208255884U (en) | 2018-01-08 | 2018-01-08 | Laptop |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN208255884U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113434916A (en) * | 2021-07-07 | 2021-09-24 | 浙江广厦建设职业技术大学 | Protection system for computer security |
-
2018
- 2018-01-08 CN CN201820030676.9U patent/CN208255884U/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113434916A (en) * | 2021-07-07 | 2021-09-24 | 浙江广厦建设职业技术大学 | Protection system for computer security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6108785A (en) | Method and apparatus for preventing unauthorized usage of a computer system | |
US9513790B2 (en) | Electronic device and method for unlocking screen of electronic device | |
US9529408B2 (en) | Touch screen terminal and alarm method thereof | |
CN105848134A (en) | Virtual SIM (Subscriber Identity Module) card management device, communication terminal, access control method and management method | |
CN105243346B (en) | A kind of mobile terminal and its theft preventing method with anti-theft feature | |
CN104916010A (en) | Control system of mobile device and wearable control equipment | |
WO2019101096A1 (en) | Method and device for security verification and mobile terminal | |
JP2007299236A (en) | Information processor and authentication method | |
CN101359354B (en) | Method and system for implementing power-on protection | |
WO2016072833A1 (en) | System and method to disable factory reset | |
CN108038365A (en) | Laptop | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
CN208255884U (en) | Laptop | |
CN202771533U (en) | Encryption keyboard and self-service device utilizing the same | |
TW201822043A (en) | Login mechanism for operating system capable of improving the convenience and security of logging into a computer operating system | |
KR20070076317A (en) | Computer power-on and use authentication device and authentication method | |
JP2012190096A (en) | Information processor and control method thereof | |
CN106874795B (en) | Mobile terminal and machine disassembly prevention method and device thereof | |
JPH10240368A (en) | Computer system | |
CN103488959A (en) | Privacy protection device and privacy protection method for computer | |
CN102831360B (en) | Personal electronic document safety management system and management method thereof | |
CN105260678A (en) | Mobile equipment and equipment operating method | |
KR101745390B1 (en) | Data leakage prevention apparatus and method thereof | |
JP2002099347A (en) | Theft preventing mechanism for notebook-sized personal computer | |
CN103853972B (en) | The method and electronic equipment of information processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201111 Address after: In the industrial park of Yunhai Road, No.176, Yuner Road, Hefei Economic and Technological Development Zone, 230000 Anhui Province Patentee after: Hefei Zhuoyi Hengtong Information Security Co.,Ltd. Address before: 518000 C1109, 11 floor, Thunis science and Technology Park, 13 Langshan Road, North Nanshan District high tech Zone, Shenzhen, Guangdong Patentee before: SHENZHEN ZHUOYI HENGTONG COMPUTER TECHNOLOGY Co.,Ltd. |