CN208255884U - Laptop - Google Patents

Laptop Download PDF

Info

Publication number
CN208255884U
CN208255884U CN201820030676.9U CN201820030676U CN208255884U CN 208255884 U CN208255884 U CN 208255884U CN 201820030676 U CN201820030676 U CN 201820030676U CN 208255884 U CN208255884 U CN 208255884U
Authority
CN
China
Prior art keywords
laptop
microprocessor
module
information
wireless communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201820030676.9U
Other languages
Chinese (zh)
Inventor
熊进良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Zhuoyi Hengtong Information Security Co Ltd
Original Assignee
SHENZHEN EXCELSIOR COMPUTER TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN EXCELSIOR COMPUTER TECHNOLOGY CO LTD filed Critical SHENZHEN EXCELSIOR COMPUTER TECHNOLOGY CO LTD
Priority to CN201820030676.9U priority Critical patent/CN208255884U/en
Application granted granted Critical
Publication of CN208255884U publication Critical patent/CN208255884U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model provides a kind of laptop.The laptop includes: microprocessor, GPS positioning module, verifying identification module, wireless communication module and physical destroying key;The GPS positioning module, verifying identification module, wireless communication module are electrically connected with the microprocessor, and the physical destroying key is installed on the microprocessor;It can judge whether laptop is lost by verifying identification module, and pass through wireless communication module when laptop is lost to external equipment alert, and the data and the remotely booting of control laptop or shutdown destroyed in laptop are remotely controlled by external equipment, when laptop is by physical damage, it can also be by physical destroying by data in key control microprocessor auto-destruct laptop, the anti-theft function of laptop can be effectively promoted, ensures the data safety in laptop.

Description

Laptop
Technical field
The utility model relates to computer field more particularly to a kind of laptops.
Background technique
With the continuous development of electronic technology, laptop (Notebook Computer) is small and exquisite portable by its Feature is liked by people, is widely used among daily life.
Laptop is as traditional desktop computer by hardware such as display, keyboard/mouse, CPU, memory and hard disks Composition, but in the case where forming identical situation, laptop has the characteristics that small in size, light-weight, easy to carry.Generally Come, portability is notebook relative to the maximum advantage of desktop computer, and the weight of general laptop only has 2 kilograms of left sides The right side, either outgoing work is still traveled, can be carried, very convenient.
Existing laptop generally includes: bottom case is leaned on the upper cover of bottom case rotation connection, set on the bottom case Keyboard and touch tablet on one side surface of the nearly upper cover and set on the upper cover on a side surface of the bottom case The components such as display screen, this laptop do not have anti-theft function, and laptop is often difficult to give for change after losing.
Meanwhile laptop currently on the market, also without auto-alarm function, equipment can not give warning in advance when stolen Prompt.Equipment usually can fix a safety line lock constraint in equipment end, cause user to exist in this way when exhibition room or sales field are shown The freedom degree used is limited in experience functions of the equipments, limits the experience effect of user.
Further, laptop currently on the market, which does not have, prevents data to be stolen, destroys the ability of data, pen Remember that there are the risks that significant data is stolen by rival after this computer loss, the enhancing with user to information security awareness, There is the demand of security assurance information function also increasingly to increase laptop, existing laptop is no longer satisfied User demand.
Utility model content
The purpose of this utility model is to provide a kind of laptops, are able to ascend the anti-theft function of laptop, Ensure the data safety in laptop.
To achieve the above object, the utility model provides a kind of laptop, comprising: microprocessor, GPS positioning Module, verifying identification module, wireless communication module and physical destroying key;
The GPS positioning module, verifying identification module, wireless communication module are electrically connected with the microprocessor, institute Physical destroying key is stated to be installed on the microprocessor;
Security software is preset in the laptop, the security software is used for the safe identification information of typing, and will The safe identification information is supplied to verifying identification module;
The GPS positioning module, for positioning the current location of the laptop;
The verifying identification module, for acquiring verification information, and by the verification information and the safe identification information It is compared, and when the verification information and safe identification information are inconsistent, determines that the laptop is in and lose shape State determines that the laptop is in normal condition when the verification information is consistent with safe identification information;
The microprocessor, the operational order for being issued according to the external equipment, is destroyed in the laptop Data, the control laptop booting control the laptop shutdown and are in loss shape in laptop State generates warning message and is supplied to wireless communication module.
The wireless communication module, for sending warning message to external equipment and receiving operational order from external equipment And it is transferred to microprocessor;
The physical destroying key, for when the laptop is by physical damage, control microprocessor to be automatic Destroy data in laptop.
The laptop further include: switching on and shutting down key, the switching on and shutting down key and the microprocessor are electrically connected, For controlling the booting and shutdown of the laptop.
The laptop further include: main power source and auxiliary power;
The main power source respectively with the microprocessor, GPS positioning module, verifying identification module, wireless communication module and Auxiliary power is electrically connected, and the auxiliary power is electrically connected with microprocessor, physical destroying key and wireless communication module respectively;
The main power source is used in laptop booting, is the microprocessor, GPS positioning module, verifying identification Module, wireless communication module and auxiliary power power supply;
The auxiliary power is used in laptop shutdown, is the microprocessor, physical destroying key and channel radio Interrogate module for power supply.
The safe identification information of typing includes: biological information of human body, character password, in the address IP in the security software One or more combinations.
The verifying identification module includes: biological information of human body recognition unit, character password recognition unit, the knowledge of the address IP The combination of one or more of other unit.
The biological information of human body includes: voice information, finger print information, iris information and facial information.
The security software is also used to the safe coordinate range of typing, and the GPS positioning module is also used to judge the notes The current location of this computer is in safe coordinate in the current location of the laptop whether in safe coordinate range When outside range, determine that the laptop is in lost condition, is in safety in the current location of the laptop and sits When marking in range, determine that the laptop is in normal condition.
The microprocessor is also used to run the operating system of the laptop.
The wireless communication module includes: 4G communication unit and WiFi communication unit.
The external equipment is mobile phone or tablet computer.
The utility model has the beneficial effects that the utility model provides a kind of laptop, comprising: microprocessor, GPS are fixed Position module, verifying identification module, wireless communication module and physical destroying key;The GPS locating module, verifying identification mould Block, wireless communication module are electrically connected with the microprocessor, and the physical destroying key is installed on the microprocessor; Can by verify identification module judge whether laptop is lost, and laptop lose pass through wireless communication module to External equipment alert, and pass through the data and control notebook in peripheral equipment control remote destroying laptop Booting computer or shutdown, when laptop is by physical damage, moreover it is possible to which key control microprocessor is pressed certainly by physical destroying It is dynamic to destroy data in laptop, the anti-theft function of laptop can be effectively promoted, ensures the number in laptop According to safety.
Detailed description of the invention
In order to be further understood that the feature and technology contents of the utility model, please refer to practical new below in connection with this The detailed description and accompanying drawings of type, however, the drawings only provide reference and explanation, is not used to limit the utility model.
In attached drawing,
Fig. 1 is the structure chart of the laptop of the utility model.
Specific embodiment
Further to illustrate technological means and its effect that the utility model is taken, below in conjunction with the utility model Preferred embodiment and its attached drawing are described in detail.
Referring to Fig. 1, the utility model provides a kind of laptop, comprising: microprocessor 10, GPS locating module 20, identification module 30, wireless communication module 40 and physical destroying key 50 are verified;
The GPS positioning module 20, verifying identification module 30, wireless communication module 40 are electrical with the microprocessor 10 Connection, the physical destroying key 50 are installed on the microprocessor 10.
Specifically, security software is preset in the laptop of the utility model, the security software is pacified for typing Full identification information, and the safe identification information is supplied to verifying identification module 30, the safe identification information includes human body The combination of one or more of biological information, character password and IP address, wherein biological information of human body includes voice information, refers to The combination of one or more of line information, iris information and facial information.Above-mentioned safe identification information is used per family can basis It needs to carry out customized setting.
Specifically, the verifying identification module 30, for acquiring verification information, and by the verification information and the safety Identification information is compared, and when the verification information and safe identification information are inconsistent, is determined at the laptop In lost condition, when the verification information is consistent with safe identification information, determine that the laptop is in normal condition.
Further, corresponding with the safe identification information, when in safe identification information including biological information of human body, institute Stating verifying identification module 30 also can accordingly include biological information of human body recognition unit, when in the safe identification information including character When password, the verifying identification module 30 also can accordingly include character password recognition unit, when in safe identification information include IP When address, the verifying identification module 30 also can accordingly include IP Address Recognition unit.
It is noted that when safe identification information include it is multiple in biological information of human body, character password and IP address, User can according to the needs of security level, selective enabling it is therein part or all.
Specifically, the GPS positioning module 20, for positioning the current location of the laptop.
Specifically, the microprocessor 10, the operational order for being issued according to the external equipment, destroys the notes Data, the control laptop are switched on or control the laptop shutdown and at laptop in this computer Warning message is generated in lost condition and is supplied to wireless communication module 40.
Specifically, the wireless communication module 40, for sending warning message to external equipment and being connect from external equipment It receives operational order and is transferred to microprocessor 10;
Specifically, the physical destroying key 50, for controlling micro- place when the laptop is by physical damage Manage data in 10 auto-destruct laptop of device.
In addition, the laptop further include: switching on and shutting down key 60, the switching on and shutting down key 60 and the microprocessor 10 are electrically connected, for controlling the booting and shutdown of the laptop.
Further, in some embodiments of the utility model, the laptop further include: main power source 70 and pair Power supply 80;The main power source 70 respectively with the microprocessor 10, GPS positioning module 20, verifying identification module 30, wireless telecommunications Module 40 and auxiliary power 80 are electrically connected, the auxiliary power 80 respectively with microprocessor 10, physical destroying key 50 and channel radio Module 40 is interrogated to be electrically connected;The main power source 70 is used in laptop booting, is the microprocessor 10, GPS positioning Module 20, verifying identification module 30, wireless communication module 40 and auxiliary power 80 are powered;The auxiliary power 80 is used in notebook electricity It is that the microprocessor 10, physical destroying key 50 and wireless communication module 40 are powered when brain shuts down.
Further, the microprocessor 10 is also used to run the operating system of the laptop namely described micro- Processor 10 is the central processing unit (Central Processing Unit, CPU) in general laptop.
Further, the wireless communication module 40 includes: 4G communication unit and Wireless Fidelity (WIreless- Fidelity, WiFi) communication unit, wherein the 4G communication unit can also be substituted with 2G communication unit or 3G communication unit, it is logical Cross while the 4G communication unit and WiFi communication unit that are arranged can guarantee when the laptop is lost, in time with outside Equipment is got in touch, and is issued the user with alarm and is deleted the data in laptop in time according to the needs of users.
Preferably, the external equipment is mobile phone or tablet computer, and usual user can first pass through in advance security software and be held The external equipment for having laptop to hold with it is associated, in order to obtain alarm in time when laptop is lost Information.
It should be noted that the working with notebook computer process of the utility model includes: to press switch key 60 to open pen Remember this computer, to laptop validation information (such as character password and biological information of human body), verification information is by testing After the verifying for demonstrate,proving identification module 30, the operating right of laptop is obtained, normal use laptop, after use, It presses switch key 60 and closes laptop, again to laptop validation information, verification information is known by verifying After the verifying of other module 30, laptop close, that is to say, that be required in the laptop startup and shutdown to Laptop provides correct verification information, could complete startup and shutdown, this set can prevent by non-owner or Unauthorized person opens laptop operating system, deletes and steal the data in laptop hard disk, while preventing from taking down notes When this computer is lost, operator is directly shut down laptop by switch key 60, prevent laptop is from automatic Alarm causes user that cannot know immediately that laptop is lost.
And when verification information can not be by the verifying of verifying identification module 30, then laptop is determined to lose shape State, microprocessor 10 generate warning message, and wireless communication module 40 sends warning message to the external equipment of user-association, prompt Laptop is in lost condition, inquires whether the user needs to delete the data in laptop, user is according to practical feelings Condition sends corresponding operation instruction to microprocessor 10 via wireless communication module 40, and microprocessor 10 is determined according to operational order Whether data in laptop are deleted.
Further, when operator passes through the conduct verification information of sound, fingerprint, facial information, iris and character password, By verifying identification module 30 verifying identification when, when input verification information when the error occurs, will trigger laptop from Dynamic alarm, at this point, in order to avoid false alarm caused by the maloperation as user, user can also in laptop, if The errors number for allowing occur, such as mistake 5 times are set, just start to alarm.And when laptop is believed using IP address as verifying When breath, verifying identification module can judge whether the IP address of the laptop becomes when laptop is opened every time Change, once IP address, which generates variation, will trigger alarm, the deterministic process of IP address is that system is automatically performed, and maloperation is not present The problem of, therefore also do not need generally that the errors number for allowing occur is arranged.
Further, in some embodiments of the utility model, the security software is also used to the safe coordinate model of typing Enclose, the GPS positioning module 20, be also used to judge the current location of the laptop whether in safe coordinate range, And when the current location of the laptop is in outside safe coordinate range, determines that the laptop is in and lose shape State determines that the laptop is in normal when the current location of the laptop is in safe coordinate range State, in this case, once safe coordinate range of the laptop beyond setting, will trigger alarm, such as setting pen Remember the region that this computer is in where certain sales field, at this time when laptop is not in sales field, alarm will be triggered.Work as pen Remember that this computer is triggered when alarming, GPS positioning module 20 can start positioning function automatically and record position at this time, notebook electricity The microprocessor 10 of brain can to 40 alert of wireless communication module, by wireless communication module 40 with mobile network or Wireless network sends location information on terminal electronic device and carries out early warning to user, prevents laptop quilt It steals.
Specifically, when the utility model is additionally arranged at laptop and is switched on or shuts down each time, it is required to acquisition verifying Information is verified, and could be switched on or be shut down after being verified, and laptop can be prevented by non-owner or unauthorized person Laptop operating system is opened, the data in laptop hard disk are deleted and steal;When laptop is lost, prevent Only operator is directly shut down laptop by switch key 60, prevent laptop from automatic alarm, causes to use Family cannot know immediately that laptop is lost.
Specifically, when laptop is lost, if laptop is in open state, user can pass through outside Equipment remotely controls laptop and destroys the data in laptop, prevents data to be stolen, if at laptop In off-mode, then laptop booting can be remotely controlled by external equipment, and remote by external equipment after powering Process control laptop simultaneously destroys the data in laptop, and data is prevented to be stolen, meanwhile, if other people attempt by sudden and violent The physical destroying key 50 that power tears machine open when obtaining data, to be mounted on microprocessor 10 can be triggered, and be pressed by physical destroying Circuit is destroyed in the triggering of key 50, and 10 auto-destruct laptop data of microprocessor prevent data stolen, it is preferable that above-mentioned pen Remember that the data in this computer are the data being stored in the hard disk of laptop.
In conclusion the utility model provides a kind of laptop, comprising: microprocessor, GPS positioning module, verifying Identification module, wireless communication module and physical destroying key;The GPS positioning module, verifying identification module, wireless telecommunications mould Block is electrically connected with the microprocessor, and the physical destroying key is installed on the microprocessor;It can be known by verifying Other module judges whether laptop is lost, and loses in laptop and issued by wireless communication module to external equipment Warning message, and by the data and the booting of control laptop in peripheral equipment control remote destroying laptop or close Machine, when laptop is by physical damage, moreover it is possible to which key control microprocessor auto-destruct notebook is pressed by physical destroying Data in computer can effectively promote the anti-theft function of laptop, ensure the data safety in laptop.
The above, for those of ordinary skill in the art, can with technical solution according to the present utility model and Technical concept makes other various corresponding changes and modifications, and all these change and modification all should belong to the utility model power The protection scope that benefit requires.

Claims (7)

1. a kind of laptop characterized by comprising microprocessor (10), GPS positioning module (20), verifying identification mould Block (30), wireless communication module (40) and physical destroying key (50);The GPS positioning module (20), verifying identification module (30), wireless communication module (40) is electrically connected with the microprocessor (10), and the physical destroying key (50) is installed on On the microprocessor (10);Security software is preset in the laptop.
2. laptop as described in claim 1, which is characterized in that further include: switching on and shutting down key (60), the switching on and shutting down Key (60) and the microprocessor (10) are electrically connected.
3. laptop as described in claim 1, which is characterized in that further include: main power source (70) and auxiliary power (80);
The main power source (70) respectively with the microprocessor (10), GPS positioning module (20), verifying identification module (30), nothing Line communication module (40) and auxiliary power (80) are electrically connected, the auxiliary power (80) respectively with microprocessor (10), physical destroying Key (50) and wireless communication module (40) are electrically connected.
4. laptop as described in claim 1, which is characterized in that typing has safety identification letter in the security software Breath, the safe identification information includes: the combination of one or more of biological information of human body, character password, IP address.
5. laptop as claimed in claim 4, which is characterized in that the verifying identification module (30) includes: that human body is raw The combination of one or more of object information identificating unit, character password recognition unit, IP address recognition unit.
6. laptop as claimed in claim 4, which is characterized in that the biological information of human body includes: voice information, refers to Line information, iris information and facial information.
7. laptop as described in claim 1, which is characterized in that the wireless communication module (40) includes: 4G communication Unit and WiFi communication unit.
CN201820030676.9U 2018-01-08 2018-01-08 Laptop Active CN208255884U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201820030676.9U CN208255884U (en) 2018-01-08 2018-01-08 Laptop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201820030676.9U CN208255884U (en) 2018-01-08 2018-01-08 Laptop

Publications (1)

Publication Number Publication Date
CN208255884U true CN208255884U (en) 2018-12-18

Family

ID=64619888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201820030676.9U Active CN208255884U (en) 2018-01-08 2018-01-08 Laptop

Country Status (1)

Country Link
CN (1) CN208255884U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434916A (en) * 2021-07-07 2021-09-24 浙江广厦建设职业技术大学 Protection system for computer security

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434916A (en) * 2021-07-07 2021-09-24 浙江广厦建设职业技术大学 Protection system for computer security

Similar Documents

Publication Publication Date Title
US6108785A (en) Method and apparatus for preventing unauthorized usage of a computer system
US9513790B2 (en) Electronic device and method for unlocking screen of electronic device
US20150067829A1 (en) Electronic Device and Method for Unlocking Screen of Electronic Device
CN107077355A (en) For the mthods, systems and devices initialized to platform
CN104916010A (en) Control system of mobile device and wearable control equipment
WO2019101096A1 (en) Method and device for security verification and mobile terminal
CN103581378A (en) Smart phone high in safety performance
CN103576787A (en) Panel computer with high safety performance
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
CN101359354B (en) Method and system for implementing power-on protection
CN105184135A (en) Fingerprint recognition method and fingerprint recognition system
CN108038365A (en) Laptop
CN106951757A (en) A kind of method and apparatus for operating application program
TW201822043A (en) Login mechanism for operating system capable of improving the convenience and security of logging into a computer operating system
CN103582184A (en) Double-card smart phone high in safety performance
CN208255884U (en) Laptop
CN202771533U (en) Encryption keyboard and self-service device utilizing the same
WO2016072833A1 (en) System and method to disable factory reset
CN105282337A (en) Intelligent mobile phone encryption method
CN106874795B (en) Mobile terminal and machine disassembly prevention method and device thereof
KR20070076317A (en) Apparatus and method for attesting use of computer
JP2012190096A (en) Information processor and control method thereof
JPH10240368A (en) Computer system
WO2017177502A1 (en) Method and apparatus for controlling working state of terminal
CN105260678A (en) Mobile equipment and equipment operating method

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201111

Address after: In the industrial park of Yunhai Road, No.176, Yuner Road, Hefei Economic and Technological Development Zone, 230000 Anhui Province

Patentee after: Hefei Zhuoyi Hengtong Information Security Co.,Ltd.

Address before: 518000 C1109, 11 floor, Thunis science and Technology Park, 13 Langshan Road, North Nanshan District high tech Zone, Shenzhen, Guangdong

Patentee before: SHENZHEN ZHUOYI HENGTONG COMPUTER TECHNOLOGY Co.,Ltd.