CN211038146U - Key-shaped data line plug and key hole-shaped data interface - Google Patents

Key-shaped data line plug and key hole-shaped data interface Download PDF

Info

Publication number
CN211038146U
CN211038146U CN201921080395.5U CN201921080395U CN211038146U CN 211038146 U CN211038146 U CN 211038146U CN 201921080395 U CN201921080395 U CN 201921080395U CN 211038146 U CN211038146 U CN 211038146U
Authority
CN
China
Prior art keywords
shaped
key
data line
lock
keyhole
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201921080395.5U
Other languages
Chinese (zh)
Inventor
杨溢
王涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhixiang Lantian Beijing Technology Co ltd
Original Assignee
Zhixiang Lantian Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhixiang Lantian Beijing Technology Co ltd filed Critical Zhixiang Lantian Beijing Technology Co ltd
Priority to CN201921080395.5U priority Critical patent/CN211038146U/en
Application granted granted Critical
Publication of CN211038146U publication Critical patent/CN211038146U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The utility model provides a combination of a key-shaped data line plug and a keyhole-shaped data interface, which comprises an externally embedded key-shaped USB plug or a USB flash disk and a non-rotating keyhole-shaped data line interface combination; or an embedded key-shaped USB plug or a USB flash disk and a rotatable key hole-shaped data line interface combination; or the embedded key-shaped USB plug or the U disk and the spring marble are connected with the key hole-shaped data line interface combination of the circuit; or a combination of a key-shaped U shield and a mechanical lock or a coded lock, wherein the U shield is a storage medium which stores an electrical code and has a known U disk structure, and the mechanical lock or the coded lock is a known mechanical lock or a coded lock which is unlocked by using a key; or a key-shaped USB plug or a USB flash disk of a special material, wherein the special material comprises at least one of a magnetic material, a photosensitive material, a thermosensitive material and a special resistor. The utility model discloses from the protection of physical hardware angle, realized double insurance, it is safer than simple software encryption.

Description

Key-shaped data line plug and key hole-shaped data interface
Technical Field
The utility model relates to a data line plug and data line interface particularly, are the data line plug of a key shape and have the data line interface of tool to lock structure respectively.
Background
Keys, lock structures are well known products that can physically protect property, for example, reference CN103097631A discloses a lock and key with a double code pattern, CN102165128B discloses a combination of a lock and key with a large number of codes, which are improvements to the structure of the mechanical lock and key itself; the reference CN206863841U discloses an electronic contact lock head and an electronic key of a passive electronic lock cylinder; the key-shaped plug and socket disclosed in CN106159514A is a component of an electrical appliance power supply, and although it can effectively prevent plugs of non-matching electrical appliances from using the socket, it does not have the function of a data carrier, and the plug can not rotate like the known key and lock cylinder; the data line plug and the data line interface which are sold on the market at present hardly adopt the data line plug and the keyhole-shaped data line interface which are combined by a well-known key and a lock structure to prevent data stealing. Therefore, the aforementioned solutions have the problem of being unable to combine flexibly and have the limitation of not completely solving the data theft.
SUMMERY OF THE UTILITY MODEL
The utility model aims at providing a prevent to steal data, and can combine key, tool to lock, data interface, storage medium's complete sets in a flexible way, realize data storage medium's physical protection.
To achieve the above object, the present application provides a key-shaped data line plug and a key-hole-shaped data interface comprising, in combination: the external embedded key-shaped USB plug or the U disk is combined with the non-rotating key hole-shaped data line interface; or the embedded key-shaped USB plug or the U disk is combined with the rotatable key hole-shaped data line interface; or the embedded key-shaped USB plug or the U disk is combined with the keyhole-shaped data line interface of the spring marble access circuit; or a key-shaped U shield and a combination of a mechanical lock or a coded lock, wherein the U shield is a storage medium which stores an electrical code and has a known U disk structure, and the mechanical lock or the coded lock is a known mechanical lock or a coded lock which is unlocked by using a key; alternatively, a key-shaped USB plug or a USB flash drive of a specialty material, the specialty material comprising a magnetic material.
Wherein, the combination of the external embedded key-shaped USB plug or the USB flash disk and the non-rotating key-hole-shaped data line interface should be noted: the tail end of the externally embedded key-shaped USB plug or the U disk is a known data line plug, and the outer side of the key-shaped USB plug or the U disk is provided with a key structure of a known lockset, or physical and biological identification information stored in a known fingerprint lock, a two-dimensional code lock, an electronic coded lock, a magnetic coded lock and the like; the non-rotating keyhole-shaped data line interface is an interface matched with a known data line plug, the extending direction tail end of the interface, and the four walls around the inner side of the groove are at least provided with a spring and a marble structure of a known lockset or scanning equipment matched with at least one of a known fingerprint lock, a two-dimensional code lock, an electronic coded lock and a magnetic coded lock.
Among them, the combination of the embedded key-shaped USB plug or the USB disk and the rotatable key-hole-shaped data line interface should be noted: the data output end of the embedded key-shaped USB plug or the USB flash disk is positioned at the front end of the key, and the output end is connected with a known storage medium of the USB plug or the USB flash disk through a lead; the rotatable keyhole-shaped data line interface is hidden inside the keyhole-shaped groove and does not coincide with the outer opening, and the groove at least has the spring, the marble, the lock core and the unlocking surface structure of the known lockset and is rotatably fixed outside the keyhole-shaped data line interface.
Wherein, the combination of the embedded key-shaped USB plug or U disk and the keyhole-shaped data line interface of the spring marble access circuit should be noted: the data output end of the embedded key-shaped USB plug or the USB flash disk is positioned at a known key protruding position, and the output end is connected with a known storage medium of the USB plug or the USB flash disk through a lead; the rotatable keyhole-shaped data line interface at least has the structures of springs, marbles, lock cores and opening surfaces of known locks, every two spring marbles can not be in conductive connection, and the lock cores and the opening surfaces are connected with encrypted storage equipment by leads with the number at most the same as that of the marbles; when a key-shaped USB plug or a U disk matched with the rotatable key hole-shaped data line interface is inserted, the spring pins and the protruding positions of the key are in contact connection or conductive connection.
Among these, the combination of the key-shaped U-shield and the mechanical or coded lock should be noted: in the context of a keyhole-shaped data line interface structure of any one scheme of an externally-embedded key-shaped USB plug or a U disk, a non-rotating keyhole-shaped data line interface combination, or an embedded key-shaped USB plug or a U disk, a rotatable keyhole-shaped data line interface combination, or an embedded key-shaped USB plug or a U disk, and a keyhole-shaped data line interface combination of a spring marble access circuit, the U-shaped shield is a storage medium which is provided with a keyhole-shaped data line interface and is electrically connected with and stores an electronic password.
Among them, the key-shaped USB plug or U-disk combination of specific materials should be noted: on the basis of the keyhole-shaped data line interface of any one scheme in the externally-embedded keyhole-shaped USB plug structure, the rotatable keyhole-shaped data line interface combination or the keyhole-shaped data line interface combination of the marble spring access circuit, the keyhole-shaped USB plug or the USB flash disk made of the specific material is electrically stored, magnetically stored or optically stored, or is attached with physical and biological identification information which can be scanned and identified by a known fingerprint lock, a two-dimensional code lock, an electronic coded lock, a magnetic coded lock and the like.
From the above description and practical contents about the present invention, the design provided by the present invention has the following beneficial effects compared with the prior art: because the conventional mechanical lock 'universal key' picking lock is to destroy or clamp the marble, the spring and the opening surface of the mechanical lock without directly contacting all marbles, the spring marble is connected into a keyhole-shaped data line interface combination of a circuit, so that the conventional mechanical lock 'universal key' can be directly prevented from opening equipment and stealing data; and the data interface can be destroyed by using the known means of destroying or blocking a marble and a spring by a master key, so that the data can not be copied by the movable storage medium, therefore, the key-shaped data line plug and the data line interface with the lockset structure can not be broken by the traditional master key to cause the data to be stolen, and the physical protection of the data storage medium is realized.
Drawings
Fig. 1 is a schematic view of a part of embodiments according to the present invention.
Fig. 2 is a schematic diagram of one or five embodiments of the present invention.
Fig. 3 is a schematic diagram of a second embodiment of the present invention.
Fig. 4 is a third schematic view of an embodiment according to the present invention.
Fig. 5 is a fourth schematic view of the embodiment according to the present invention.
Reference numerals: 1: a protrusion; 2: a data line interface; 3: identifying information; 4: spring pins; 5: a lock cylinder; 6: opening the noodles; 7: a wire; 8: and (4) a groove.
Detailed Description
In order to make the objects, features and advantages of the present invention more comprehensible, embodiments of the present invention are described in detail below with reference to the accompanying drawings and the embodiments thereof. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of them. On the basis of the following embodiments, those skilled in the art can make modifications without inventive changes to the basic principles involved, and all other embodiments obtained will fall within the scope of protection of the present invention.
The first embodiment is as follows: an external embedded key-shaped USB plug or a U disk is combined with a non-rotating key hole-shaped data line interface 2. Under the condition, the embodiment should pay attention to: the tail end of the externally embedded key-shaped USB plug or the U disk is a known data line plug, and the outer side of the key-shaped USB plug or the U disk is provided with a key structure of a known lockset, or physical and biological identification information 3 stored in a known fingerprint lock, a two-dimensional code lock, an electronic coded lock, a magnetic coded lock and the like; the non-rotating keyhole-shaped data line interface 2 is an interface matched with a known data line plug, the tail end of the interface in the extension direction and the four walls around the inner side of the groove 8 at least have a spring marble 4 structure of a known lockset or scanning equipment matched with at least one of a known fingerprint lock, a two-dimensional code lock, an electronic coded lock and a magnetic coded lock.
Example two: an embedded key-shaped USB plug or a USB flash disk is combined with a rotatable key-hole-shaped data line interface 2. Under this condition, example two should note: the outer side of the key-shaped USB plug or the U disk is provided with a key structure of a known lockset, the data output end of the embedded key-shaped USB plug or the U disk is positioned at the front end position of the key, and the output end is connected with a known storage medium of the USB plug or the U disk through a lead 7; the rotatable keyhole-shaped data line interface 2 is hidden inside the keyhole-shaped groove 8 and is not coincident with the opening on the outer side, and the groove 8 at least has the structures of a spring marble 4, a lock core 5 and an opening surface 6 of a known lockset and is rotatably fixed on the outer side of the keyhole-shaped data line interface 2.
Example three: an embedded key-shaped USB plug or a U disk and a spring marble 4 are connected into a keyhole-shaped data line interface 2 of the circuit. Under this condition, example three should be noted: the data output end of the embedded key-shaped USB plug or the USB flash disk is positioned at the known key protrusion 1, and the output end is connected with the known storage medium of the USB plug or the USB flash disk through a lead 7; the rotatable keyhole-shaped data line interface 2 at least has the structures of spring pins 4, a lock core 5 and an opening surface 6 of a known lockset, every two spring pins 4 cannot be in conductive connection, and the lock core 5 and the opening surface 6 are connected with encrypted storage equipment by leads 7 with the number at most the same as that of the pins; when a key-shaped USB plug or a USB flash disk matched with the rotatable key hole-shaped data line interface 2 is inserted, the spring marble 4 is in contact connection or conductive connection with the protrusion 1 of the key.
Example four: a key-shaped U-shield, and a combination of a mechanical lock or a combination of a key. Under this condition, example four should be noted: in the context of the structure of the keyhole-shaped data line interface 2 according to any one of the first embodiment, the second embodiment and the third embodiment, the U-shaped shield is a storage medium having the keyhole-shaped data line interface 2 and electrically connected to store an electronic password.
Example five: a key-shaped USB plug or a USB flash disk made of special materials. Under this condition, example five should note that: in the context of the structure of the externally-embedded key-shaped USB plug of the first embodiment, the key-shaped USB plug or the USB flash disk of the second embodiment may be electrically, magnetically, optically, or otherwise attached with physical and biometric information 3 that can be scanned and identified by a known fingerprint lock, two-dimensional code lock, electronic code lock, magnetic code lock, or the like.
From the above description and practical contents about the present invention, the present design has the following advantages compared with the prior art: because the cylinder, the spring and the opening surface 6 of the well-known mechanical lock are damaged or clamped without directly contacting all the cylinders, the spring cylinder 4 is connected into the key hole-shaped data line interface 2 combination of the circuit, so that the well-known 'master key' can be directly prevented from opening equipment and stealing data; and the data interface can be damaged by using the known means of destroying or blocking the spring marble 4 by the 'master key', so that the data can not be copied by the movable storage medium, therefore, the key-shaped data line plug and the data line interface 2 with the lockset structure can not be broken by the traditional 'master key', so that the data can not be stolen, and the physical protection of the data storage medium is realized.
In addition, features that are not described in detail in this document, such as structures of locks, keys, and combination locks related to the known technology, structures and combination modes of a known data line interface and an applicable electronic device, and structures of different types of usb disks, data line interfaces, power supplies of computers and electric appliances, ground protection, and the like, belong to the known technology scope. The protected data transmission method, the storage medium, the program encryption method, and how to implement stabilization of the computer, the storage medium, and the circuit themselves are not technical problems to be solved by the present application, and are not included in the scope of the claims.
The above-mentioned solutions are only descriptions of some preferred embodiments of the present application, but the protection scope of the present application is not limited to the above-mentioned embodiments, and any person skilled in the art can easily implement the above-mentioned embodiments within the scope of the present application, or do not change the claims and change or replace the basic principles, such as only changing at least one of the size, shape, material, data type of the key-shaped data line plug and the key-hole-shaped data interface, or only changing the rotation angle and translation distance of the key-hole-shaped data interface after the key is inserted, and do not change the claims and relate to the basic principles, and therefore all shall be covered by the protection scope of the present application, i.e. the protection scope of the present application shall be subject to the claims and protection scope of the present application.

Claims (6)

1. A keyshaped data line plug and a keyshaped data interface, characterized in that it comprises at least one of the following combinations: the external embedded key-shaped USB plug or the U disk is combined with the non-rotating key hole-shaped data line interface; or the embedded key-shaped USB plug or the U disk is combined with the rotatable key hole-shaped data line interface; or the embedded key-shaped USB plug or the U disk is combined with the keyhole-shaped data line interface of the spring marble access circuit; or a key-shaped U shield and a combination of a mechanical lock or a coded lock, wherein the U shield is a storage medium which stores an electrical code and has a known U disk structure, and the mechanical lock or the coded lock is a known mechanical lock or a coded lock which is unlocked by using a key; or the specific material is a key-shaped USB plug or a USB flash disk, and the specific material at least comprises at least one of a magnetic material, a fixed resistor, a photoresistor, a thermistor, a composite material with the surface refractive index range greater than 0.004, a micro identifiable code and a trace element patch.
2. A keyshaped data line plug and keyway-shaped data interface as set forth in claim 1, wherein:
the tail end of the externally embedded key-shaped USB plug or the U disk is a known data line plug, and the outer side of the key-shaped USB plug or the U disk is provided with a key structure of a known lockset, or physical and biological identification information stored in a known fingerprint lock, a two-dimensional code lock, an electronic coded lock, a magnetic coded lock and the like; the non-rotating keyhole-shaped data line interface is an interface matched with a known data line plug, the extending direction tail end of the interface, and the four walls around the inner side of the groove are at least provided with a spring and a marble structure of a known lockset or scanning equipment matched with at least one of a known fingerprint lock, a two-dimensional code lock, an electronic coded lock and a magnetic coded lock.
3. A keyshaped data line plug and keyway-shaped data interface as set forth in claim 1, wherein:
the data output end of the embedded key-shaped USB plug or the USB flash disk is positioned at the front end of the key, and the output end is connected with a known storage medium of the USB plug or the USB flash disk through a lead; the rotatable keyhole-shaped data line interface is hidden inside the keyhole-shaped groove and does not coincide with the outer opening, and the groove at least has the spring, the marble, the lock core and the unlocking surface structure of the known lockset and is rotatably fixed outside the keyhole-shaped data line interface.
4. A keyshaped data line plug and keyway-shaped data interface as set forth in claim 1, wherein:
the data output end of the embedded key-shaped USB plug or the USB flash disk is positioned at a known key protruding position, and the output end is connected with a known storage medium of the USB plug or the USB flash disk through a lead; the rotatable keyhole-shaped data line interface at least has the structures of springs, marbles, lock cores and opening surfaces of known locks, every two spring marbles can not be in conductive connection, and the lock cores and the opening surfaces are connected with encrypted storage equipment by leads with the number at most the same as that of the marbles; when a key-shaped USB plug or a U disk matched with the rotatable key hole-shaped data line interface is inserted, the spring pins and the protruding positions of the key are in contact connection or conductive connection.
5. A keyshaped data line plug and keyway-shaped data interface as set forth in claim 1, wherein:
the combination of the key-shaped U-shield, and the mechanical or combination lock should be noted: in the context of a keyhole-shaped data line interface structure of any one scheme of an externally-embedded key-shaped USB plug or a U disk, a non-rotating keyhole-shaped data line interface combination, or an embedded key-shaped USB plug or a U disk, a rotatable keyhole-shaped data line interface combination, or an embedded key-shaped USB plug or a U disk, and a keyhole-shaped data line interface combination of a spring marble access circuit, the U-shaped shield is a storage medium which is provided with a keyhole-shaped data line interface and is electrically connected with and stores an electronic password.
6. A keyshaped data line plug and keyway-shaped data interface as set forth in claim 1, wherein:
the key-shaped USB plug or U-disk combination of the specific materials should be noted: on the basis of the keyhole-shaped data line interface of any one scheme in the externally-embedded keyhole-shaped USB plug structure, the rotatable keyhole-shaped data line interface combination or the keyhole-shaped data line interface combination of the marble spring access circuit, the keyhole-shaped USB plug or the USB flash disk made of the specific material is electrically stored, magnetically stored or optically stored, or is attached with physical and biological identification information which can be scanned and identified by a known fingerprint lock, a two-dimensional code lock, an electronic coded lock, a magnetic coded lock and the like.
CN201921080395.5U 2019-07-11 2019-07-11 Key-shaped data line plug and key hole-shaped data interface Active CN211038146U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201921080395.5U CN211038146U (en) 2019-07-11 2019-07-11 Key-shaped data line plug and key hole-shaped data interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201921080395.5U CN211038146U (en) 2019-07-11 2019-07-11 Key-shaped data line plug and key hole-shaped data interface

Publications (1)

Publication Number Publication Date
CN211038146U true CN211038146U (en) 2020-07-17

Family

ID=71566302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201921080395.5U Active CN211038146U (en) 2019-07-11 2019-07-11 Key-shaped data line plug and key hole-shaped data interface

Country Status (1)

Country Link
CN (1) CN211038146U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110273582A (en) * 2019-07-11 2019-09-24 智享蓝天(北京)科技有限公司 Key shaped data cable plug and keyhole graphic data interface

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110273582A (en) * 2019-07-11 2019-09-24 智享蓝天(北京)科技有限公司 Key shaped data cable plug and keyhole graphic data interface

Similar Documents

Publication Publication Date Title
US6991479B2 (en) Connector lock for a universal serial bus port
CN1187510C (en) Key and lock device
US9460319B1 (en) Device for securing a computer port
CN201465553U (en) Mobile storage device with self-destruction function
CN211038146U (en) Key-shaped data line plug and key hole-shaped data interface
US20170109547A1 (en) Mechanical Locking Device for Computer Ports and Portable Storage Devices
JPH05502956A (en) Electronically actuated cradle circuit for access or intrusion detection
CN103946852A (en) Input means for a touchscreen
CN103390186A (en) Decoding card, card reader matched with decoding card and application system
EP3671520B1 (en) Data retention device
CA2812607A1 (en) A multi-layer usb storage drive with physically separated secure storage layer and non secure storage layer, and with multiple layers
CN103366435A (en) Fully-enclosed intelligent electric padlock
CN110273582A (en) Key shaped data cable plug and keyhole graphic data interface
CN201681412U (en) Portable type two-dimensional bar-code password card
CN201826640U (en) Electromechanical-integrated intelligent lockset
CN203276262U (en) Portable storage device with encryption lock function
CN202049754U (en) Locking structure of external mobile storage equipment data interface
Li et al. A recoverable chaos‐based fragile watermarking with high PSNR preservation
CN107718928A (en) A kind of electronic retrieval filing container
CN113159258A (en) M1S50 chip encryption system
CN207302057U (en) The storage device of rights management is realized based on Physical key
CN208027251U (en) the security application device of computer information
KR101811491B1 (en) USB Memory apparatus having function for physical protection
CN112085874B (en) Safe passive sign lock dynamic system
CN111967559B (en) Data storage disc with anti-theft component

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant