CN2491897Y - Information key - Google Patents
Information key Download PDFInfo
- Publication number
- CN2491897Y CN2491897Y CN 01232435 CN01232435U CN2491897Y CN 2491897 Y CN2491897 Y CN 2491897Y CN 01232435 CN01232435 CN 01232435 CN 01232435 U CN01232435 U CN 01232435U CN 2491897 Y CN2491897 Y CN 2491897Y
- Authority
- CN
- China
- Prior art keywords
- information
- general
- usb
- purpose microprocessor
- information key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses a portable electric product provided with a build-in exclusive custom key identification code and a special arithmetic program. The portable electric product connected with general external interfaces of computers, information appliances and the like possess the functions of user identification authentication, data encryption and decryption. The utility model mainly comprises a general microprocessor chip and a peripheral auxiliary circuit, wherein, the general microprocessor has the functions of user identity authentication, data encryption and decryption, and communication with the computers or the information appliances, whose input-terminal and output-terminal are connected with USB ports or 1394 ports of the computers or the information appliances by a data line. The utility model exchanges data with the computers and other information appliances through the key identifying function of the microprocessor chip with the information key, the information data and the key cannot be directly read from the information key or the outside of the computer, thereby effectively preventing the leak of the identity authentication password and the piracy of the copyright information.
Description
Technical field
The utility model relates to a kind of Information key that is used for computing machine.It is connected with the universal external interface of equipment such as computing machine, information appliance, and the function of identifying user identity, encrypting and decrypting data is provided.
Background technology
Along with computing machine and network-especially the internet day by day popularizes; the demand of the information that spreads through the internet being carried out copyright protection also strengthens day by day; the important step of copyright protection is exactly the authentication of validated user, more satisfactory identification authentication mode should have be difficult for cracking, not transreplication, be easy to carry, the characteristics of compatible plurality of devices.
Traditional authentication means mostly are software mode, and key is imported by the user, in case key is disclosed, with regard to the illegal propagation of uncontrollable information and software, also just can't prevent the popular of piracy.And traditional hardware encipher mode; as softdog owing to adopted the principle of symmetric cryptography, the software of softdog protection include with dog in key identifying code one to one; in case key authentication program or key schedule are cracked, just can generate the program that does not need dog.More advanced CPU type IC-card does not have the simple problem of algorithm now, but cost is higher, and the inconvenience of IC-card read write line is carried.So, more than several technology be not desirable identification authentication mode.
Summary of the invention
In view of this, the purpose of this utility model provides a kind of digital identity card that almost can not be replicated, and is used for the identity computing machine and various information household appliances checking individual, for the information toll administration provides foundation, and prevents that copyright information is by piracy; Simultaneously this utility model be easy to carry, with inserting with usefulness, and with low cost, do not need special card-reading apparatus.
For achieving the above object, the technical solution of the utility model is: this Information key mainly detects by having whether user identity is legal, encryption and decryption data processing capacity and can forming with general-purpose microprocessor chips and peripheral auxiliary circuits that computing machine or information appliance carry out communication, and the data input/output terminal of this general-purpose microprocessor chips is connected with USB (universal serial bus) (USB) port or 1394 ports of computing machine or information appliance by data line.
The utility model carries out exchanges data by the key authentication function in the microprocessor chip that utilizes Information key and computing machine and out of Memory electrical equipment with cipher mode, from Information key or the computing machine outside can't directly read key or intercepting message data, the leakage of authentication password and the piracy use of copyright information have been prevented effectively, its algorithm routine almost can not be replicated, for payment management provides strong instrument.Small product size size of the present utility model is approximately 1*2.5*5cm, and is small and exquisite flexible, is easy to carry, and can conveniently install the shell of various personalizations additional, hot-swappable, and plug and play and configurable prolongation cable insert computing machine.
Description of drawings
Fig. 1 is circuit theory diagrams of the present utility model.
Embodiment
See also Fig. 1: be Information key circuit theory diagrams of the present utility model; Acp chip that it is main and peripheral auxiliary circuits and parts see also table one: Information key circuit theory diagrams parts complete list.
The program that includes key authentication algorithm, memorizer information decrypted program in the general-purpose microprocessor chips of the present utility model and carry out communication with computing machine or information appliance, because the content in the chip of different user has nothing in common with each other, so will write one by one by write device hand-manipulated, again the chip of finishing writing be inserted in the reservation slot of circuit board.Described circuit board is connected with computing machine that is built-in with application program in advance or out of Memory electrical equipment, carries out exchanges data by the built-in application program of USB (universal serial bus) (USB) port or 1394 ports and computing machine or information appliance.The configuration that prolongs cable is because USB interface is usually located at the rear portion of computing machine, often plugs Information key if desired, can feel inconvenient, prolongs cable and can allow plug carry out in place easily.
The utility model is finished core processing work with general-purpose microprocessor chips, cooperates peripheral auxiliary circuits to realize its various functions.Crucial little process chip have two types optional: first kind of integrated common single-chip microcomputer function and USB microcontroller, resemble Intel, Cypress, National Semiconductor etc., the appended circuit theory diagrams of this paper are example with Cypress CY7C6300X family chip promptly; Second kind does not have the integration USB microcontroller, resembles MCS51, and second kind of chip needs and independent USB interface chip is used, as the PDIUSBD11/PDIUSBD11A/PDIUSBD12 of Philips etc.The program that in the ROM of described little process chip, has key authentication algorithm, memorizer information decrypted program and carry out communication by USB interface with computing machine or information appliance.Also preserve user key among the EPROM of described little process chip, its user key length of preserving is variable, mostly is 1024 most.
Table one: Information key circuit theory diagrams parts complete list
Microprocessor | CPU | CY7C63000X MCS51+ PDIUSBD12 etc. | Whether data processing: it is legal to detect user identity; Encryption and decryption data etc. |
Resistance and resistor chain | R4、 R5、 | 470,4K7 | Stable voltage difference is provided between pin and ground, prevents that voltage fluctuation from impacting microprocessor |
Data line | D+、D- | Slightly | The data input and output |
Crystal | Y1 | 6M | For microprocessor provides frequency |
Light emitting diode | D1、 D2 | Slightly | Power up indication |
Standard 5v direct supply | VCC | Slightly | Power supply |
Electric capacity | C1、 C2 | 0.1uF、4.7uF | Voltage stabilizing |
As shown in Figure 1, described peripheral auxiliary circuits mainly comprises resistance R 4, R5, resistor chain R6, light emitting diode D1, D2, and crystal Y1, they all link to each other with general-purpose microprocessor chips.Described resistance R 4, R5 connect P0.3, the P0.2D end with microprocessor chip; The 1-8 pin of described resistor chain R6 is connected P0.1, P0.0, P0.4-0.7, P1.1, the P1.3 end with microprocessor chip respectively; Crystal Y1 is connected across between the XTALIN end and XTANOUT end of general-purpose microprocessor chips.
The principle of work of the utility model Information key is as follows:
When Information key inserted the USB interface of PC, the power lead in the USB interface was Information key and powers up, and (D1, D2) is luminous for light emitting diode.When powering up, crystal Y1 starts working, and the microprocessor chip of Information key enters duty.Application program in the computing machine will order the data line (D+, D-) by USB interface to pass the microprocessor of Information key, and this microprocessor carries out corresponding computing according to order, and the result is returned to computer applied algorithm.
With following two kinds of typical order-authentications and data decryption is example, the course of work of microprocessor is described: when the microprocessor chip of Information key receives the authentication order of PC, user identification data that soon transmits in the lump and the unique user label that has write microprocessor internal in advance number comparison, and the result returned to computing machine with the form after encrypting, computer applied algorithm is whether the decidable user is legal according to predetermined method after with result's deciphering.When the Information key microprocessor receives the data decryption order that PC transmits, promptly call the decrypted program that writes the PC storer in advance, go out the actual value of having put into the information data of computer memory in advance with specific algorithm computation, and should return to the PC application program after the value encryption, described application program is deciphered the result by predetermined method again, can obtain the actual value of data.The microprocessor of Information key is encrypted return data, can prevent by interception in the people way, because the data of intercepting are still not readable.
Claims (7)
1, a kind of Information key, it is characterized in that: it mainly detects by having whether user identity is legal, encryption and decryption data processing capacity and can forming with general-purpose microprocessor chips and peripheral auxiliary circuits that computing machine or information appliance carry out communication, and the data input/output terminal of this general-purpose microprocessor chips is connected with USB (universal serial bus) (USB) port or 1394 ports of computing machine or information appliance by data line.
2, Information key according to claim 1 is characterized in that: described general-purpose microprocessor chips has been integrated common single-chip microcomputer function and USB interface chip or 1394 interface chips.
3, Information key according to claim 2 is characterized in that: described general-purpose microprocessor chips is a Cypress series.
4, Information key according to claim 1 is characterized in that: described general-purpose microprocessor chips adopts not to be had the microcontroller chip of integration USB or 1394 interface functions and is used USB or 1394 interface chips.
5, Information key according to claim 4 is characterized in that: described general-purpose microprocessor chips adopts MCS51 series.
6, according to claim 1,2,3,4 or 5 described Information key, it is characterized in that: described peripheral auxiliary circuits mainly comprises resistance (R4, R5), resistor chain (R6), light emitting diode (D1, D2), crystal (Y1), they all link to each other with general-purpose microprocessor chips; Described resistance (R4, R5) is connected P0.3, the P0.2D end with microprocessor chip; The 1-8 pin of described resistor chain (R6) is connected P0.1, P0.0, P0.4-0.7, P1.1, the P1.3 end with microprocessor chip respectively; Crystal (Y1) is connected across between the XTALIN end and XTANOUT end of general-purpose microprocessor chips.
7, according to claim 1,2 or 4 described Information key, it is characterized in that: described Information key also comprises the prolongation cable, and the data input/output terminal of described general-purpose microprocessor chips is connected with USB (universal serial bus) (USB) port or 1394 ports of computing machine or information appliance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01232435 CN2491897Y (en) | 2001-07-30 | 2001-07-30 | Information key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01232435 CN2491897Y (en) | 2001-07-30 | 2001-07-30 | Information key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2491897Y true CN2491897Y (en) | 2002-05-15 |
Family
ID=33646490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01232435 Expired - Fee Related CN2491897Y (en) | 2001-07-30 | 2001-07-30 | Information key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2491897Y (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1297861C (en) * | 2004-10-14 | 2007-01-31 | 苏州超锐微电子有限公司 | Method for realizing starting up lock function in network card bootstrap zone |
CN100397862C (en) * | 2004-01-28 | 2008-06-25 | 富士施乐株式会社 | Electronic device and electronic device control method |
CN100547963C (en) * | 2007-02-02 | 2009-10-07 | 刘天飚 | Utilize the method and the device of USB secret key inputting/displaying/transmitting user information |
CN101325492B (en) * | 2008-08-01 | 2011-08-17 | 清华大学 | Universal serial bus cipher lock based on programmable on-chip system |
CN102708321A (en) * | 2012-05-07 | 2012-10-03 | 成都国腾实业集团有限公司 | Cloud terminal security key |
-
2001
- 2001-07-30 CN CN 01232435 patent/CN2491897Y/en not_active Expired - Fee Related
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100397862C (en) * | 2004-01-28 | 2008-06-25 | 富士施乐株式会社 | Electronic device and electronic device control method |
CN1297861C (en) * | 2004-10-14 | 2007-01-31 | 苏州超锐微电子有限公司 | Method for realizing starting up lock function in network card bootstrap zone |
CN100547963C (en) * | 2007-02-02 | 2009-10-07 | 刘天飚 | Utilize the method and the device of USB secret key inputting/displaying/transmitting user information |
CN101325492B (en) * | 2008-08-01 | 2011-08-17 | 清华大学 | Universal serial bus cipher lock based on programmable on-chip system |
CN102708321A (en) * | 2012-05-07 | 2012-10-03 | 成都国腾实业集团有限公司 | Cloud terminal security key |
CN102708321B (en) * | 2012-05-07 | 2016-07-06 | 成都国腾实业集团有限公司 | cloud terminal security key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101266590B (en) | Method and system for dynamically switching equipment arrangement | |
CN100557617C (en) | SD storage card by hardware to identifying identification | |
CN201035502Y (en) | Safety accidental dynamic soft keyboard | |
CN100437618C (en) | Portable information safety device | |
CN2491897Y (en) | Information key | |
CN201150069Y (en) | Information safety equipment supporting multiple identification authentication | |
CN101661563B (en) | Safe multi-interface certificate mobile inquiry system and method thereof | |
CN2771935Y (en) | Smart card for digital input-output interface | |
CN109902453A (en) | A kind of software enciphering method | |
CN1152317C (en) | Secret related computer | |
CN205068404U (en) | Wireless switching device and security certification system | |
CN204990547U (en) | A device is opened to invoice for taxation control system | |
CN202134016U (en) | Safety intelligent password storage chip capable of reconstructing communication files automatically | |
CN207489019U (en) | A kind of USB cryptographic fingerprints device | |
CN212009569U (en) | Interface circuit for multi-factor identity authentication | |
CN2507067Y (en) | Device for personal and network identity identification by USB interface | |
CN2574114Y (en) | Flash storage disk with identity certification and data encryption/decryption | |
CN208367693U (en) | SCM Based computer software encryption device | |
CN205721775U (en) | A kind of embedded computer board based on ARM Cortex-A7 kernel | |
CN2884328Y (en) | Information safety protection device having electronic label | |
CN2475073Y (en) | Computer keyboard with IC card | |
JP3226079U (en) | Computer compatible control system for vending machines | |
CN202003363U (en) | Simple encrypted chip | |
CN209860946U (en) | High-integration softrouter mainboard with multiple network interfaces | |
CN2434738Y (en) | Intelligent card safety identifying device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |