CN2777616Y - Computer encryption structure - Google Patents

Computer encryption structure Download PDF

Info

Publication number
CN2777616Y
CN2777616Y CNU200420009970XU CN200420009970U CN2777616Y CN 2777616 Y CN2777616 Y CN 2777616Y CN U200420009970X U CNU200420009970X U CN U200420009970XU CN 200420009970 U CN200420009970 U CN 200420009970U CN 2777616 Y CN2777616 Y CN 2777616Y
Authority
CN
China
Prior art keywords
mouse
disk
usb interface
computer
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNU200420009970XU
Other languages
Chinese (zh)
Inventor
方炜
金蕾
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Computer (Shanghai) Co., Ltd.
Original Assignee
Shanghai Founder Technology Computer System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Founder Technology Computer System Co Ltd filed Critical Shanghai Founder Technology Computer System Co Ltd
Priority to CNU200420009970XU priority Critical patent/CN2777616Y/en
Application granted granted Critical
Publication of CN2777616Y publication Critical patent/CN2777616Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model discloses a computer encryption structure, which comprises a mouse and a U disk, wherein A USB interface is arranged on the mouse, a host computer is provided with an identification module, the U disk is provided with a corresponding identification response module and the U disk is connected to the host computer through the USB interface. The utility model is formed by the way that the USB interface is arranged on the mouse, the USB interface is provided with the corresponding U disk for identification, the identification module and the corresponding identification response module are arranged in the U disk and the host computer and an identification method can adopts the existing softdog method. Thus, when a computer is not used by a user, the U disk can be directly taken out and the computer can be automatically locked. Moreover, the U disk is arranged on the mouse and is very convenient for inserting and pulling. The identification module which is arranged in the host computer of the utility model also has an identification function to identify the ID of the U disk, and the host computer can not identify other U disks which can be inserted. The ID identification method can adopt a corresponding mature RSA algorithm.

Description

Computer Encrypts Structure
Technical field
The utility model relates to a kind of Computer Encrypts Structure.
Background technology
People more and more pay attention to maintaining secrecy at present.Particularly computing machine, the communications field, some relevant security softwares, file encryption algorithm etc. occur in succession, and this problem has been described.Not only commercial to the know-how need to be keep secret, also more and more come into one's own for the protection of personal information privacy! Just because of this, maintaining secrecy of data more and more has been subjected to the attention of computer user in the computer.Having the data in the computer, is that trade secret or individual secret leak out all and will cause great or irreparable damage to the user.The encryption function of computer is also required by increasing user.
The utility model content
At the existing problem and shortage of above-mentioned existing host computer, the purpose of this utility model provides a kind of Computer Encrypts Structure that can limit computation.
The utility model is achieved in that a kind of Computer Encrypts Structure, include mouse and USB flash disk, described mouse is provided with USB interface, and described main frame is provided with authentication module, described USB flash disk is provided with corresponding authentication response module, and described USB flash disk is connected to described main frame by described USB interface.
Further, the USB interface of described mouse is drawn by described main frame USB interface serial connection.
Further, described main frame authentication module has the function that the ID to described USB flash disk authenticates.
Further, the USB interface place of described mouse is provided with movable overhead door.
The utility model is by being provided with USB interface on mouse, and corresponding authentication USB flash disk is set, and authentication module and corresponding authentication response module are set in USB flash disk and main frame, and authentication method wherein can adopt existing softdog mode.Like this, as user during without computer, directly USB flash disk is taken out, computer is with automatic lock machine.And USB flash disk is located on the mouse, very convenient plug.Authentication module in the utility model main frame also has the function that USB flash disk ID is authenticated, and other USB flash disk inserts and can not discerned by main frame.The method of ID authentication can adopt ripe relatively RSA Algorithm.The USB interface place of the utility model mouse also is provided with movable overhead door, after extracting USB flash disk USB interface is blocked, and prevents entering of dust.
Description of drawings
Below in conjunction with accompanying drawing, the utility model is made detailed description.
Fig. 1 is a structural representation of the present utility model;
Fig. 2 is a workflow diagram of the present utility model.
Embodiment
As shown in Figure 1, 2, the utility model comprises mouse, USB flash disk, and mouse is provided with USB interface, and USB flash disk is connected with main frame by USB interface.Authentication module and corresponding authentication response module are set in USB flash disk and main frame, and authentication method wherein can adopt existing softdog mode.Like this, as user during without computer, directly USB flash disk is taken out, computer is with automatic lock machine.USB flash disk is located on the mouse, very convenient plug, convenient for users to use.Authentication module of the present utility model also has the function of USB flash disk ID authentication.
Mouse can be optical mouse, has the function of common mouse.As long as portion leaves certain USB interface space that is provided with within it.After USB flash disk inserted mouse, at first to the legal ID authentication of USB flash disk, if identity is illegal, main frame did not respond main frame.The method of ID authentication can adopt ripe relatively RSA Algorithm.After identification was legal, main frame was enabled the authentication of software in the USB flash disk, had only the USB flash disk that main frame is admitted to insert in the mouse, and by the identification approval of software, the user can use a computer.Do not have the cooperation of USB flash disk, computing machine can't use.
The USB interface place of the utility model mouse also is provided with movable overhead door, after extracting USB flash disk USB interface is blocked, and prevents entering of dust.

Claims (3)

1, a kind of Computer Encrypts Structure comprises main frame, mouse and USB flash disk, it is characterized in that, described mouse is provided with USB interface, described main frame is provided with authentication module, and described USB flash disk is provided with corresponding authentication corresponding module, and described USB flash disk is connected to described main frame by described USB interface.
2, Computer Encrypts Structure as claimed in claim 1 is characterized in that, the USB interface of described mouse is drawn by described main frame USB interface serial connection.
3, Computer Encrypts Structure as claimed in claim 1 is characterized in that, the USB interface place of described mouse is provided with movable overhead door.
CNU200420009970XU 2004-12-20 2004-12-20 Computer encryption structure Expired - Lifetime CN2777616Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU200420009970XU CN2777616Y (en) 2004-12-20 2004-12-20 Computer encryption structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU200420009970XU CN2777616Y (en) 2004-12-20 2004-12-20 Computer encryption structure

Publications (1)

Publication Number Publication Date
CN2777616Y true CN2777616Y (en) 2006-05-03

Family

ID=36744998

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU200420009970XU Expired - Lifetime CN2777616Y (en) 2004-12-20 2004-12-20 Computer encryption structure

Country Status (1)

Country Link
CN (1) CN2777616Y (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116729A (en) * 2013-01-15 2013-05-22 厦门市美亚柏科信息股份有限公司 Method and system of automatic export of data of portable device
CN105590041A (en) * 2015-12-23 2016-05-18 北京握奇智能科技有限公司 Security authentication and human-computer interaction integrated equipment and software protection method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116729A (en) * 2013-01-15 2013-05-22 厦门市美亚柏科信息股份有限公司 Method and system of automatic export of data of portable device
CN103116729B (en) * 2013-01-15 2016-02-03 厦门市美亚柏科信息股份有限公司 A kind of portable device data derives method and system automatically
CN105590041A (en) * 2015-12-23 2016-05-18 北京握奇智能科技有限公司 Security authentication and human-computer interaction integrated equipment and software protection method

Similar Documents

Publication Publication Date Title
CN100500091C (en) Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN101751524B (en) Device, method and computer for management of computer external equipment
CN103164645A (en) Information security management method and mobile terminal
CN1474967A (en) Storage medium
CN103905200B (en) A kind of identity identifying method and system based on sound wave communication
CN104375836A (en) Method and device for showing lock screen window
CN101557428A (en) Data card
CN100377024C (en) Method and system for acquiring resource usage log and computer product
CN103310139A (en) Input validation method and input validation device
CN103577732A (en) Information processing method and device and electronic device
CN1668003A (en) Method for filling-in user data automatically using fingerprint identification
CN101930521A (en) File protecting method and device thereof
CN2777616Y (en) Computer encryption structure
CN102184144A (en) Hardware-encryption mobile hard disk drive and application method thereof
CN102289611B (en) Secure smart cryptographic chip and automatic virtual communication file building method based on same
CN109410955A (en) A kind of time slot scrambling of voice data, system, device and storage medium
CN1405780A (en) System guiding device base on core and method for realizing said guide
CN201409223Y (en) Mobile communication terminal
CN100426178C (en) A method for identification of driver identity
CN102385673A (en) Human body lock
CN106549761A (en) Fingerprint USB Key
CN102567230B (en) Smart card and method for safely managing same
CN210515294U (en) Computer information anti-theft device
CN103778371A (en) Plug-in installation monitoring method and terminal
CN207198848U (en) A kind of data mining device for secret protection

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Peking Founder Group Co., Ltd.

Assignor: Beida Fangzheng Science & Technology Computer System Co., Ltd., Shanghai

Contract fulfillment period: 2007.10.8 to 2013.10.7

Contract record no.: 2008110000206

Denomination of utility model: Computer encryption structure

Granted publication date: 20060503

License type: Exclusive license

Record date: 20081217

LIC Patent licence contract for exploitation submitted for record

Free format text: EXCLUSIVE LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2007.10.8 TO 2013.10.7; CHANGE OF CONTRACT

Name of requester: BEIJING UNIVERSITY FOUNDER GROUP CO.

Effective date: 20081217

ASS Succession or assignment of patent right

Owner name: ACER (SHANGHAI) CO., LTD.

Free format text: FORMER OWNER: BEIDA FANGZHENG SCIENCE + TECHNOLOGY COMPUTER SYSTEM CO., LTD., SHANGHAI

Effective date: 20101026

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100871 8/F, FANGZHENG MANSION, ZHONGGUAN VILLAGE, NO.298, CHENGFU ROAD, HAIDIAN DISTRICT, BEIJING TO: 200001 HOUSE 3, NO.168, XIZANG MIDDLE ROAD, HUANGPU DISTRICT, SHANGHAI

TR01 Transfer of patent right

Effective date of registration: 20101026

Address after: 3, No. 168 middle Tibet Road, No. 200001, Shanghai, Huangpu District

Patentee after: Acer Computer (Shanghai) Co., Ltd.

Address before: 100871, Beijing, Haidian District, Cheng Fu Road, No. 298, Zhongguancun Fangzheng building, 8 floor

Patentee before: Beida Fangzheng Science & Technology Computer System Co., Ltd., Shanghai

C17 Cessation of patent right
CX01 Expiry of patent term

Expiration termination date: 20141220

Granted publication date: 20060503