CN208638362U - One kind ruining key circuit structure - Google Patents
One kind ruining key circuit structure Download PDFInfo
- Publication number
- CN208638362U CN208638362U CN201821464005.XU CN201821464005U CN208638362U CN 208638362 U CN208638362 U CN 208638362U CN 201821464005 U CN201821464005 U CN 201821464005U CN 208638362 U CN208638362 U CN 208638362U
- Authority
- CN
- China
- Prior art keywords
- key
- microswitch
- storage
- circuit structure
- key module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The utility model discloses one kind to ruin key circuit structure, including PCB substrate, the PCB substrate is mounted in casing, the PCB substrate upper plate is loaded with microswitch, battery holder, battery and storage cipher key module, the battery is mounted on the battery holder, for providing working power to the storage cipher key module, the storage cipher key module is for storing key information;The input terminal of the microswitch is connected with cover, it uncaps movement for detecting outside, once the cover is opened, the microswitch triggers the microswitch immediately and disconnects, battery described in automatic trigger stops providing working power to the storage cipher key module after the microswitch disconnects, the key information is lost after the storage cipher key module power-off, to realize destruction key.
Description
Technical field
The utility model belongs to security password technical field, specifically a kind of to ruin key circuit structure.
Background technique
Key management refers to the safe and secret management of the overall process implementation to key lifetimes used.In contemporary cryptology
In research, enciphering and deciphering algorithm is typically disclosed, and after cryptographic algorithm determines, the privacy degrees of cryptographic system just depend on completely
In key privacy degrees therefore, key management is the important ring in data encrypting and deciphering technology, in entire secrecy system
If occupying an important position key reasonably cannot protect and manage, no matter how exquisite and complicated algorithm is designed, secrecy system
System is also that the purpose of fragile key management is to ensure that the safety of key, the i.e. authenticity and validity of key, and then comes
Guarantee the safety of data privacy system.Currently, general device private key is stored in nonvolatile memory, but have no effectively
Safeguard measure, once serious information security issue will be will cause by illegally stealing.
Utility model content
The purpose of the utility model is to overcome the technical problems present on, reinforce the safety management of private key, provide one
Kind ruins key circuit structure.
To achieve the above object, the utility model adopts the following technical solutions:
One kind ruining key circuit structure, including PCB substrate, and the PCB substrate is mounted in casing, the PCB substrate upper plate
It is loaded with microswitch, battery holder, battery and storage cipher key module, the battery to be mounted on the battery holder, be used for described
It stores cipher key module and working power is provided, the storage cipher key module is for storing key information;The input of the microswitch
End is connected with cover, uncaps movement for detecting outside, once the cover is opened, described in the microswitch triggers immediately
Microswitch disconnects, and battery described in automatic trigger stops providing work to the storage cipher key module after the microswitch disconnects
Power supply loses the key information after the storage cipher key module power-off, to realize destruction key.
Further, the storage cipher key module is 23K256 storage chip.
Further, the battery is 3.3V button cell.
Further, the microswitch is 4, and is successively connected with each other.
Further, the model PB22E70 of the microswitch.
It further, further include that self-locking button ruins key switch, the self-locking button ruins key switch and is mounted on the machine
On shell, it is connected with the storage cipher key module, after the self-locking button, which ruins key switch, to be pressed, automatic will disconnects that institute is secret to be stated
The working power of key module loses the key information after storage cipher key module power-off, to destroy code key, when it is described from
Lock button ruin key switch be further continued for after being pressed, will connect automatically institute the secret working power for stating key module, realize keep or infuse
Enter key.
Further, the self-locking button ruins the model TS-22A of key switch.
Further, the self-locking button is ruined between key switch and the storage cipher key module circuit and is deposited equipped with bulky capacitor
Storage lotus.
The utility model has the beneficial effects that
1, whether the utility model provides working power to cipher key storage block by battery, opened by jogging switches measurement
Lid, realizes the destruction of key, it is ensured that the safety of key.
2, the utility model by self-locking button ruin key switch realize actively, quickly and easily destroy key, it is ensured that
The safety of key.
3, the utility model stores charge by bulky capacitor, solves the technical issues of maloperation causes cipher key destruction.
Detailed description of the invention
A kind of Fig. 1: circuit diagram for ruining key circuit structure embodiment one of the utility model.
A kind of Fig. 2: circuit diagram for ruining key circuit structure embodiment two of the utility model.
A kind of Fig. 3: circuit diagram for ruining key circuit structure embodiment three of the utility model.
Specific embodiment
The utility model is described in detail with reference to the accompanying drawings and embodiments.
Embodiment one:
As shown in Figure 1, one kind ruins key circuit structure, it is used primarily on information safety devices, the cabinet of information safety devices
For 1U normal structure, shape is square, for preventing the key being stored therein by unauthorized theft.It is described including PCB substrate
PCB substrate is mounted in the cabinet of information safety devices, the PCB substrate upper plate be loaded with 4 microswitches (U34, U35, U33,
U87), battery holder J8, button cell and storage cipher key module U26.
Model CR2032, the 3.3V voltage of button cell, is directly installed on battery holder J8, for close to the storage
Key module U26 provides working power.Specifically: button cell by the pin 1 of battery holder J8 by current-limiting resistance R141 with it is micro-
The pin 3 of dynamic switch U87 is connected, and the pin 2 of microswitch U87 is connected with the pin 3 of microswitch U33, microswitch U33's
Pin 2 is connected with the pin 3 of microswitch U35, and the pin 2 of microswitch U35 is connected with the pin 3 of microswitch U34, fine motion
The pin 2 of switch U34 is connected with the pin 8 of storage cipher key module U26.Wherein, the resistance value of current-limiting resistance R141 is 100 ohm.
The storage cipher key module U26 is 23K256 storage chip, for storing key information.4 microswitches (U34,
U35, U33, U87) input terminal respectively with four Bian Xianglian of information safety devices cover, 4 microswitches (U34, U35,
U33, U87) movement of uncapping that can detecte any one side of cabinet, as long as the cover on any one side is opened, connection is corresponded to
Microswitch will be disconnected automatically, microswitch be disconnected button cell described in rear automatic trigger stop to it is described storage it is close
Key module U26 provides working power, loses saved key information immediately after the storage cipher key module U26 power-off, thus
It realizes and destroys key, it is ensured that key is not by unauthorized theft.Wherein, the model of 4 microswitches (U34, U35, U33, U87) is
PB22E70, the quantity of certain microswitch can also flexible settings according to actual needs.
Embodiment two:
Above-described embodiment is first is that detect whether outside has out automatically by 4 microswitches (U34, U35, U33, U87)
The movement of lid then triggers storage cipher key module U26 realization and ruins key once having detected movement of uncapping.But cover is usually to use
Screw is closely mounted on cabinet, and if such external staff needs to uncap, needing that first all screws are back-outed to come could handle
Apparatus lid opening so cannot rapidly carry out the destruction of key, and two carry out also inconvenience, need to wear corresponding tool.Cause
This can quickly and easily destroy key for operator, and the technical solution of above-described embodiment one is optimized.Such as Fig. 2
Shown, the difference with above-described embodiment one is, the utility model further includes that self-locking button ruins key switch S1, self-locking button
The model TS-22A of key switch is ruined, the self-locking button is ruined key switch S1 and is mounted on the cabinet of information safety devices, with
The storage cipher key module U26 is connected.Specific connection relationship is: the self-locking button ruins pin 2 and the institute of key switch S1
The pin 8 for stating storage cipher key module U26 is connected.The technical approach that the present embodiment two uses is actively to realize to ruin key, i.e., by pressing
Self-locking button is pressed to ruin the technical approach of key switch S1, key is ruined in actively triggering storage cipher key module U26 realization.Specific work is former
Reason is: after the self-locking button, which ruins key switch S1, to be pressed, it will disconnects the work of the storage cipher key module U26 automatically
Power supply loses the key information of storage after the storage cipher key module U26 power-off, so that destruction key is realized, when described immediately
Self-locking button is ruined key switch S1 and is again continued to after being pressed, and will connect automatically the working power of the storage cipher key module U26,
It may be implemented to keep or inject key in this way, so as to active, quickly and easily destroy key.
Embodiment three:
Although the technical solution of above-described embodiment two may be implemented active, quickly and easily destroy key, but due to self-locking
Button is ruined key switch S1 and is mounted on cabinet, and outside operator is easy to the self-locking button of accidentally maloperation and ruins key switch
S1, for example accidentally bruising to self-locking button ruins key switch S1, then key can also be destroyed immediately by storing cipher key module U26, i.e.,
There is technical issues that maloperation causes.In order to solve this problem, the present embodiment three is in two technical solution of embodiment
On the basis of carried out technical optimization, as shown in figure 3, ruining key switch S1 in self-locking button and storage cipher key module U26 is electric
It is equipped with bulky capacitor between road and stores charge C311.The pin 2 that i.e. self-locking button ruins key switch S1 stores charge by bulky capacitor
C311 is connected with the pin 8 of storage cipher key module U26.Bulky capacitor storage charge C311 can store certain electricity, it can
Working power is provided to storage cipher key module U26 within a certain period of time, specific working principle is: when external staff's maloperation
When (such as pressing) self-locking button ruins key switch S1, although self-locking button ruins key switch S1 and can cut off button cell to depositing
The power supply that cipher key module U26 is provided is stored up, but since bulky capacitor storage charge C311 stores certain electricity, it is big at this time
Capacitive charge storage C311 can provide working power to storage cipher key module U26 immediately, ensure to store cipher key module U26 in this way
It will not power off, that is, before bulky capacitor storage charge C311 has consumed electricity, the key being stored on storage cipher key module U26
It will not destroy, i.e., maloperation personnel can quickly press self-locking press before bulky capacitor storage charge C311 electricity has consumed again
Keyed ruins key switch S1, and button self-locking in this way, which ruins key switch S1 again, can connect the working power of storage cipher key module U26, thus
Key will not be destroyed by ensuring to store cipher key module U26, solve the technical issues of maloperation causes cipher key destruction.
It should be noted that the utility model above-described embodiment be do not charge in the case where carry out, that is,
External power supply is not accessed.
Finally, it should be noted that above embodiments are only to illustrate the utility model and not limit the utility model and retouched
The technical solution stated;Therefore, although this specification the utility model is had been carried out referring to above-mentioned each embodiment it is detailed
Illustrate, still, those skilled in the art should understand that, it still can modify to the utility model or equally replace
It changes;And the technical solution and its improvement of all spirit and scope for not departing from the utility model, it should all cover practical new at this
In the scope of the claims of type.
Claims (8)
1. one kind ruins key circuit structure, including PCB substrate, the PCB substrate is mounted in casing, it is characterised in that: the PCB
Substrate upper plate is loaded with microswitch, battery holder, battery and storage cipher key module, the battery and is mounted on the battery holder, uses
In providing working power to the storage cipher key module, the storage cipher key module is for storing key information;The fine motion is opened
The input terminal of pass is connected with cover, uncaps movement for detecting outside, once the cover is opened, the microswitch is immediately
It triggers the microswitch to disconnect, battery described in automatic trigger stops to the storage cipher key module after the microswitch disconnects
Working power is provided, the key information is lost after the storage cipher key module power-off, to realize destruction key.
2. according to claim 1 ruin key circuit structure, it is characterised in that: the storage cipher key module is 23K256 storage
Chip.
3. according to claim 1 ruin key circuit structure, it is characterised in that: the battery is 3.3V button cell.
4. according to claim 1 ruin key circuit structure, it is characterised in that: the microswitch is 4, and successively mutually
Connection.
5. according to claim 4 ruin key circuit structure, it is characterised in that: the model PB22E70 of the microswitch.
6. according to claim 1 ruin key circuit structure, it is characterised in that: further include that self-locking button ruins key switch, institute
It states self-locking button and ruins the installation of key switch on the housing, be connected with the storage cipher key module, when the self-locking button
It ruins after key switch is pressed, automatic will disconnect the secret working power for stating key module of institute, the storage cipher key module is lost after powering off
The key information after the self-locking button, which ruins key switch, to be further continued for being pressed, will connect institute to destroy code key automatically
The secret working power for stating key module is realized and keeps or inject key.
7. according to claim 1 ruin key circuit structure, it is characterised in that: the self-locking button ruins the model of key switch
For TS-22A.
8. according to claim 6 ruin key circuit structure, it is characterised in that: the self-locking button ruin key switch with it is described
It stores and is equipped with bulky capacitor storage charge between cipher key module circuit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201821464005.XU CN208638362U (en) | 2018-09-07 | 2018-09-07 | One kind ruining key circuit structure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201821464005.XU CN208638362U (en) | 2018-09-07 | 2018-09-07 | One kind ruining key circuit structure |
Publications (1)
Publication Number | Publication Date |
---|---|
CN208638362U true CN208638362U (en) | 2019-03-22 |
Family
ID=65743669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201821464005.XU Active CN208638362U (en) | 2018-09-07 | 2018-09-07 | One kind ruining key circuit structure |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN208638362U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112684745A (en) * | 2020-12-28 | 2021-04-20 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Key device is ruined to low-power consumption |
CN115174080A (en) * | 2022-09-07 | 2022-10-11 | 北京安盟信息技术股份有限公司 | Key protection method and device |
-
2018
- 2018-09-07 CN CN201821464005.XU patent/CN208638362U/en active Active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112684745A (en) * | 2020-12-28 | 2021-04-20 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Key device is ruined to low-power consumption |
CN112684745B (en) * | 2020-12-28 | 2022-04-29 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Key device is ruined to low-power consumption |
CN115174080A (en) * | 2022-09-07 | 2022-10-11 | 北京安盟信息技术股份有限公司 | Key protection method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108880810B (en) | Key destroying circuit structure | |
CN209620882U (en) | A kind of safety device for having multichannel and ruining key function | |
CN201465553U (en) | Mobile storage device with self-destruction function | |
CN100520833C (en) | Cabinet security monitoring method and device in modern logistics | |
CN208638362U (en) | One kind ruining key circuit structure | |
CN103797491A (en) | Unlocking a storage device | |
CN102477820A (en) | Dynamic password-based electronic lock system and authentication method thereof | |
CN109306824B (en) | Safety device with multipath key destroying function | |
CN108388810A (en) | A kind of mobile encrypted hard disk and encryption method of having electronic fence function | |
CN104392525A (en) | Intelligent lock system | |
CN206805521U (en) | A kind of mobile data memory unit based on quantum key encryption | |
CN110210260B (en) | Data self-destruction system and method | |
CN205545301U (en) | Key protective film piece | |
CN202771533U (en) | Encryption keyboard and self-service device utilizing the same | |
CN208241354U (en) | A kind of mobile terminal wireless charging electric cabinet | |
CN105743640A (en) | Key protection module | |
CN206693841U (en) | A kind of safety cabinet with traceable formula and remote prompting function | |
CN206737599U (en) | A kind of electronic lock be easy to charge and change battery | |
CN110310104B (en) | Self-destruction type hardware wallet | |
CN204229495U (en) | A kind of intelligent lock system | |
US10721253B2 (en) | Power circuitry for security circuitry | |
CN204576638U (en) | For the master control borad of electronic lock and the control circuit of electronic lock and system | |
CN100357864C (en) | Keyboard encrypting method | |
CN209845006U (en) | Cloud computing data security encryption monitoring platform | |
CN208722182U (en) | A kind of computer information safe protective device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |