The information safety protection equipment that has electronic tag
Technical field
The utility model relates to a kind of information safety devices, is a kind of information safety protection equipment that has electronic tag specifically.
Technical background
Present global software product is paid several hundred billion U.S. dollars, but the piracy software scale has reached 1/3 more than, and number has suffered destruction with the software market of hundred billion U.S. dollars.Increasing along with online transaction, more and more informational needs that relate to individual privacy and secret of the trade pass through network delivery.Yet deliberate threats such as virus, hacker, phishing and the counterfeit swindle of webpage have brought great challenge for the security of online transaction.Information security in the network trading also becomes the focus that everyone pays close attention to.Press for a kind of high safe protection equipment at present, protection information security, protection copyrighted software.
Existing information safety protection equipment generally all is to connect by USB port; inside has the hardware device of microprocessor; this device security height; but the authentication mode that has only a kind of wired connection; must be by directly being connected with computer; could realize the purpose of safety certification, protection software, protection communication information, so authentication mode is more single.
RFID (less radio-frequency sets) technology is nearly 2 years a kind of equipment that is used for identification that grows up, and this technology can realize the function of wireless authentication, but its security is not high enough.And because the circulation of information safety devices is very big, the publisher of distribution equipment is pretty troublesome when identification and management information safety equipment, need being inserted into each equipment on the computing machine of having discerned, the numbering on the recording unit shell is gone in the needs personnel selection that has, do not design identification equipment on the equipment that also has, the publisher sells and can not distinguish which equipment behind the equipment and be dealt into which family, like this, need rework equipments if run into, just can only scrap processing, cause unnecessary man power and material's waste.
In sum, still do not have at present a kind of equipment that can realize multiple authentication, and under certain occasion, can be connected to equipment on the computing machine and can finish safety certification yet.Management facilitation for the information safety devices of selling has also proposed challenge to equipment manufacturers.
The utility model content
The utility model has overcome above-mentioned shortcoming, and a kind of simple in structure, safe information safety protection equipment that has electronic tag is provided.
The technical scheme in the invention for solving the technical problem is: a kind of information safety protection equipment that has electronic tag; comprise one by housing encapsulated information security protection unit; described information safety protection unit comprises the communication interface that is used to connect main frame, the intelligent processor that is used for control information safety, the storer that links to each other with described intelligent processor and is connected communication interface module between described data-interface and the intelligent processor; also comprise the electronic tag unit, also be encapsulated in the described housing.
Described intelligent processor, communication interface module, storer and electronic tag unit can be arranged on the same circuit board.
Described electronic tag unit can comprise coupling module, transceiver module, control module, power module, identifying information module, described coupling module links to each other with described transceiver module, power module respectively, described power module links to each other with described transceiver module, control module, identification module respectively and working power is provided, and described control module also links to each other with the identifying information module with described transceiver module respectively.
The described data-interface that is used to connect main frame is a USB interface.
Described intelligent processor is the little process chip that comprises CPU, MCU, single-chip microcomputer or smart card, and described storer comprises program storage and data-carrier store.
The utility model is by being provided with the electronic tag unit in being packaged with the information safety protection unit housing; because wireless identification tag has globally unique characteristic; the uniqueness that after described information safety protection unit and electronic tag integration, also has hardware; hardware device can not be replicated, and prevents that the bootlegger from carrying out the identity information that hardware duplicates piracy software, steals the user.Electronic tag has wireless connections, does not need power supply and each electronic tag all to have unique sequence number, make the publisher not need to be connected on the computer, the sequence number of recording unit does not need to choose yet, only need to use special-purpose read-write equipment, product there is not line sweep, just can solve the complicacy of equipment publisher safety product identification in enormous quantities and management to the information safety devices identification and the unified management of selling.
Description of drawings
Fig. 1 is the utility model theory diagram
Embodiment
Present information safety protection equipment is divided into two classes, and wherein a class is the Dongle of protection software, and another kind is the intelligent key that is used to discern identification system, and these two kinds of products can be realized in a portable equipment.Basic comprising is by an intelligent processor, a USB interface chip, and program storage and data storage constitute.And because development of electronic technology, at present a lot of chips can integrated above 4 kinds of functions, that is to say and can realize information safety protection equipment by single-chip, greatly reduced volume.
Present electronic tag mainly is to use the RFID agreement; inside is preserved module by power supply coupling module, data process method, data message and is constituted; very small and exquisite on the volume; the utility model is by the composite information safety features with described electronic label technology and two interfaces of information safety protection equipment formation; the function that not only has information safety protection also can realize the function of wireless identification tag.And because the volume of product is little, does not lose portable characteristic and below in conjunction with specific embodiment the utility model content is described further, as shown in Figure 1, the utility model is made of information safety protection unit 103,104 two parts in electronic tag unit.
Wherein information safety protection unit 103 is mainly by communication interface 114; microprocessor 107; data storage module 108; program storage 106 constitutes; the described communication interface 114 that is used to connect main frame can be a USB interface; physical interfaces such as parallel interface or RS232 interface; and link to each other with described intelligent processor 107 by the communication interface module 105 that is used to carry out the communications protocol conversion; the described intelligent processor of control information safety that is used for is for comprising CPU; MCU; little process chip of single-chip microcomputer or smart card also is connected with the data-carrier store 108 and the program storage 106 that are made of FLASH or E2ROM.Described communication interface module 105, intelligent processor 107, program storage 106 and data-carrier store 108 can realize that the annexation of described like this 4 parts is realized by chip internal by an integrated chip.
Described electronic tag unit 104 is by the coupling module 109 that is used for the wireless signal transmitting-receiving, be used for that modulation is received or the transceiver module 110 of the wireless signal that sends, the control module 111 that is used for logical process, be used to deposit the identifying information module 112 and the power module 113 of identifying information, described electronic tag unit comprises coupling module, transceiver module, control module, power module, the identifying information module, described coupling module respectively with described transceiver module, power module links to each other, described power module respectively with described transceiver module, control module, identification module links to each other and working power is provided, and described control module also links to each other with the identifying information module with described transceiver module respectively.
Described coupling module 109 can be coil or microstrip antenna, for example use the coil of copper wire coiling or use the mode of on circuit board, drawing coil, also can use and inherit the coil that material is scribed, and respectively with described transceiver module 110, power module 112 links to each other, described power module 112 obtains energy from the oscillator signal of described coupling module 104, and respectively with described transceiver module 110, control module 111, identification module 113 links to each other and working power is provided, described control module 111 also links to each other with identifying information module 113 with described transceiver module 110 respectively, the reservoir that described identification module can adopt power down not lose also can be a microprocessor.The formation of 109 antennas wherein, described transceiver module 110, control module 111, power module 112 and identifying information module 113 can be encapsulated in the chip.
It is mutual that the utility model directly is connected the line data of going forward side by side by described information safety protection unit 103 and described computing machine 101; realize the purpose of wired safety certification and information protection; utilize the electronic tag unit 104 and the read write line 102 of computing machine to carry out data interaction; realization is to the purpose of identification of the present utility model and management; utilize the powerful processing power of computing machine then; finish complicated data base administration work; convenient management and tracking to each information safety devices realize that wireless security authenticates and the purpose of information protection.
The utility model provides the protection equipment that can use wired mode and wireless mode authentication, has improved the security of system rank, has solved the shortcoming that traditional information safety protection equipment has only a kind of authentication mode.The utility model is interior owing to increased an electronic module tag, electronic tag has wireless connections, does not need power supply and each electronic tag all to have unique sequence number, make the publisher not need to be connected on the computer, the sequence number of recording unit does not need to choose yet, only need to use special-purpose read-write equipment, product there is not line sweep, just can solve the complicacy of equipment publisher safety product identification in enormous quantities and management to the information safety devices identification and the unified management of selling.And do not need to use power supply owing to electronic tag has, do not have directivity, can respond the request of identification whenever and wherever possible.Can discern and manage equipment more quickly and easily.The more important thing is; because wireless identification tag has globally unique characteristic; also have the uniqueness of hardware after described information safety protection unit and electronic tag integration, hardware device can not be replicated, and prevents that the bootlegger from carrying out the identity information that hardware duplicates piracy software, steals the user.
More than the information safety protection equipment that has electronic tag provided by the utility model is described in detail, used specific case herein principle of the present utility model and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present utility model and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present utility model, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as restriction of the present utility model.