M397664 五、新型說明: 【新型所屬之技術領域】 本新型是有關於-種防竊器,特別是指—種網 防竊器。 【先前技術】 “隨著科技迅速發展,網路已成為生活不可缺的一部分 ,藉由網路快速傳輸資訊,能夠在最短的時間得到需要: 資料,但網際網路的使用並不如想像令安全,例如,電腦 系統可能被駭客入侵而竊取檔案資料或破壞電腦系統,造 成使用者難以估計的損失,目前大部分的使用者是藉由= 裝在電腦中的防毒軟體(或防火牆)來保護電腦以使電腦 於感染病毒或遭受人為破壞。一般來說,防毒軟體會依據 内建之病毒碼來對電腦中之檔案(或正在存取中之檔 進行比對掃描,若發現病毒程式時,即會通知使用:進 處理或自動進行病毒排除作業等等。 然而’隨著網路技㈣升以及交換㈣量的增加 重的流量會逐漸增加防毒軟體的負擔,使得防毒軟體必須 不停的更新版本,而線上更新防毒軟體不僅耗費時間,而 且具有會員或付費的機制般對於電腦操作較不孰 ’從下載軟體、安裝、開啟程式、更新等步驟較為生二 因而造成防毒軟體使用上的不便,導致使用者在使L 困擾,部分使用者甚至會忘記或完全不知道要更新病二 ,導致防毒軟體整體之安全保護效能低落,進而無法 防止日新月異之各翻&木馬程式對於電腦线造成二 M397664 破壞或是資料竊取。再者,該防毒軟體是安裝於電腦中, 當該電腦同時處理多個程式時,該防毒軟體較容易佔用其 他%式的運算資料而產生排擠的效果,進而影響電腦的運 算效能。 【新型内容】 因此,本新型之目的,即在提供一種使用方便且不會 造成電腦運算負擔的網路資料防竊器。 於是,本新型網路資料防竊器,能夠電連接一數據單 元:d及一網路收發單元’並用以傳輸該數據單元與網路收 發單元之間所收發的資料,該網路資料防竊器包含一呈中 空狀的殼體單元、-連接單^切換單元、—處理單元 、一警示單元,及一電力單元。 时該連接單元具有_整合於該殼體單元内並穿伸出該殼 體且可電連接該數據單元的第__連接《,及—整合於 ::殼體單元内並穿伸出該殼體單元且可電連接該網路收發 單元的第二連接埠。 :玄切換早兀整合於該殼體單元内並電連接該第一連接 ^該第二連接埠’且用以控制該第一連接谭與該第二連 埠之間的導通與否。 ,X處理單元整合於該殼體單元内且電連接該切換單元 、偵測。亥第一、二連接埠導通時該第一連接埠傳輸至 =接蟑的資料流量,並於資料流量大於一設定值時產 王—警示訊號。 “ T單元正合於該殼體單元上並電連接該處理單元 4 M397664 ,能夠接收該處理單元所發出的擊 :電力單元整合於該殼體單元内並電連接該處理單元 、刀換早几與警示單元,用以提 所需電能。 干凡/、&不早兀M397664 V. New description: [New technical field] The new type is related to anti-theft device, especially the kind of anti-theft device. [Prior Art] "With the rapid development of technology, the Internet has become an indispensable part of life. By transmitting information quickly through the Internet, it is possible to get the required information in the shortest time: but the use of the Internet is not as safe as imagined. For example, computer systems may be invaded by hackers to steal files or damage computer systems, causing users to estimate the loss. Most users currently protect them with the anti-virus software (or firewall) installed in the computer. The computer is used to make the computer infected with viruses or subject to human damage. Generally speaking, the anti-virus software will compare the files in the computer (or the files being accessed in the middle of the virus code according to the built-in virus code. If a virus program is found, Will inform the use: into the processing or automatic virus exclusion, etc.. However, with the increase in network technology (four) and exchange (four) increase in traffic will gradually increase the burden of anti-virus software, so that anti-virus software must constantly update Version, while online update anti-virus software is not only time-consuming, but also has a membership or payment mechanism for computer operation It is less awkward. From the steps of downloading software, installing, opening programs, and updating, it causes inconvenience in the use of anti-virus software. As a result, users are troubled by L. Some users even forget or do not know how to update the disease. As a result, the overall security protection performance of the anti-virus software is low, and thus it is impossible to prevent the ever-changing & Trojan horse program from causing two M397664 damage or data theft on the computer line. Moreover, the anti-virus software is installed in the computer, when the computer is simultaneously When dealing with multiple programs, the anti-virus software is more likely to occupy other %-type computing data and produce a crowding effect, which in turn affects the computing performance of the computer. [New content] Therefore, the purpose of the present invention is to provide an easy to use and not Therefore, the network data theft prevention device can electrically connect a data unit: d and a network transceiver unit and transmit the data unit and the network transceiver unit. Between the data sent and received, the network data theft prevention device comprises a hollow shell unit, - Receiving a switching unit, a processing unit, a warning unit, and a power unit. The connecting unit has a __ integrated in the housing unit and extending through the housing and electrically connecting the data unit The connection ", and - is integrated in: the housing unit and extends through the housing unit and can be electrically connected to the second connection port of the network transceiver unit. : The switch is integrated in the housing unit and is electrically Connecting the first connection ^ the second connection 埠' and controlling the conduction between the first connection TAN and the second connection ,. The X processing unit is integrated in the housing unit and electrically connected to the switch Unit, detection. When the first and second connections are turned on, the first connection is transmitted to the data flow of the interface, and when the data flow is greater than a set value, the king-warning signal is generated. The processing unit 4 M397664 is electrically connected to the housing unit, and is capable of receiving a blow generated by the processing unit: the power unit is integrated into the housing unit and electrically connected to the processing unit, the knife changing device and the warning unit are used for lifting Required power. Dry /, & not early
本新型之功效在於,藉由該處理單元偵測該數據單元 流通至網路收發單元的資料流量,並在流量異㈣自動斷 線或口知使用者手動斷線,再者’本新型網路資料防竊器 是以獨立硬體進行㈣,隨插即拔的特性能夠提高安裝連 接與使用的方便性,亦可免除以軟體的方式進行偵測,藉 此有效降低對電腦運算的負擔。 【實施方式】 有關本新型之前述及其他技術内容'特點與功效,在 以下配合參考圖式之二個較佳實施例的詳細說明中將可 清楚的呈現。The function of the novel is to detect the data flow of the data unit flowing to the network transceiver unit by the processing unit, and automatically disconnect the line in the flow difference (4) or manually disconnect the user, and then the new network The data anti-theft device is implemented by independent hardware (4). The plug-and-play feature improves the convenience of installation and connection, and eliminates the need for software detection. This effectively reduces the burden on the computer. [Embodiment] The above and other technical contents of the present invention will be clearly described in the following detailed description of the preferred embodiments of the present invention.
示訊號並同時產生作動 在本新型被詳細描述之前,要注意的是,在以下的說 明内容中’類似的元件是以相同的編號來表示。 如圖1、2所示,本新型網路資料防竊器之第一較佳實 施例,包含一呈中空狀的殼體單元93、一連接單元2、一 整合於該殼體單元93内的切換單元3、一整合於該殼體單 元93内的處理單元4、一整合於該殼體單元93上的警示單 元5、一整合於該殼體單元93内的電力單元6,及一整合 於該殼體單元93上並可供使用者選擇自動模式或手動模式 進行的控制開關91,該網路資料防竊器能夠電連接一數據 M397664 單元7, ^網路收發單元8,並用以傳輸該數據單元 網路收發單元8之間所收發的資料。 、 該連接單元2具有一整合於兮和與„ _ 置、 °於°“體早凡93内並穿伸出 忒ΛΧ體早7L 93且可電連接該數據單元7的第一連接埠幻 及-整合於該殼體單元93内並穿伸出該殼體單元%且了 電連接該網路收發單元8的第二連接蟑22,在本實施例中 ’該數據單it 7為電腦,該網路收發單元8為路由l 中因視角關係未顯現該第-、二連接蟑21、22穿伸出㈣ 體單元93,但由於該第一、二連接槔I”可藉由外接網 路線94分別與該數據單元7與網路收發單元8電連接,因 此-玄第 '一連接缚21、22確實是外露於該殼體單元%。 該切換單it 3為-種電子式的切換開關,該切換單元3 電連接該連接單元2之卜連接槔21與該第二連接蜂η, 用以控制該第一連接埠21與該第二連接埠22之間的導通 與否。 該處理單元4電連接該切換單元3且可控制該切換單 元3’並用則貞測該第—、二連接埠21、22在導通時該第 -連接蟑21傳輸至第二連接蟑22❼資料流量(即上傳資料 流量),能夠於資料流量大於一設定值時產生一警示訊號, 至於該内建設定值則可配合實際使用之需要而定。 。該警示單元5能夠接收該處理單元4所發出的警示訊 號,且具有一電連接該處理單元4的警示燈5u,該警示燈 511在接收到警示訊號時即呈發光的狀態,另外,該擎示單 元5還具有-能夠於該數據單元7進行資料上傳時亮燈的 6 M397664 上傳顯示燈512、-能夠於該數據單元7進行資料下栽時亮 燈的下載顯示燈513,及-狀態顯示燈514,該狀態顯示燈 514能夠分別在自動或手動模式亮不同顏色的燈光藉以供 使用者識別進行中的模式。 。。該電力單元6電連接該處理單元4、切換單元3與警示 早兀5,且具有二可供一⑽線%插置的插槽6卜該 線95能夠再插置於該數據單元7之插槽7丨,進而能夠 引導電能至該處理單元4、切換單元3與警示單元%藉以 提供所需電能,值得-提的是,當其中—插槽61供該⑽ 線95插置而源引電源,另一插槽61可再外接另一電器 藉以將電源導引至該電器,而作為該電器的外接電源/ ’ 依據上述之結構,啟動該網路資料防竊器時, 態為手動模式,使用者可將該第_、二連接埠21、22 = 以網,線94 f連接該數據單元7(電腦)與網路收發單元 路由益),該數據單元7會對該網路收發單元8進行上傳與 7下=包⑽路上進行傳輸的最小:纽單位),當該數據單元 21往該2至:網路收發單元8時,即透過該第-連接琿 μ 接埠22傳送’此時,該處理 設定值_封包傳輸的㈣流量。 …當資料流量大於設定值而處於之異常狀態時,該處理 警示訊號會傳送至該警示單元5之警示燈5ιι,進 切換單元3" 式轉換成自動模式,使該 即自動切換該第―、二連接槔2卜22斷路,進 7 M397664 可抑止該數據單元7不當地上傳資料。 ,二的V該控制開關91亦具有重置切換的功能 使:早切換該第一、二連接蜂21、22斷路後, 置而" 制開關91,該處理單元4即被驅動重 置而恢復初始狀態的手動模放 料流量。 劲換式並重新備測封包傳輸的資 舉例來說,在手動模式且使用者並未主動 傳作業的情況下(例如使用者僅是在電腦上看则,並 ^任何網路作業),條若此時外界正透過網路不當地 ^之電腦中竊取資料,則上傳之封包量勢必會增加,而該 :理單元4即會偵測到該非預期的資料上傳量已超出該設 並指示該警示單元5發出對應之警示,而使用者在 ^到該警示後,即會意識到其電腦令之資料可能正被不當 竊取中,進而馬上切換該控制開_ 91,使該處理單元 手動模式轉換成自動模式,接著再由該切換單元3切換該 第一連接痒21、22斷路,藉此中斷該電腦與網際網路 之間的連接,以強迫中止未經許可的資料上傳。 另-方面’若本新型網路資料防竊器係處於自動模式 且使用者並未主動進行資料上傳作業的情況下(例如電^ 於待機狀態,且使用者離開電腦),倘若此時外界正透過: 路不當地從使用者之電腦中竊取資料,則上傳之封包量勢 必會增加,而該處理單元4即會債測到該非預期的資二上 傳量已超出該設定值’並指示該警示單元5發出對庫之驻 示,且自動控制該切換單元3切換該第一、二連接埠Μ: 8 22斷路’藉此中 岍4電恥與網際網路之間的連接,以強迫 中止未經許可的皆斗立 〇〇 枓上傳,且在強迫中止上傳後繼續維持 8亥&示单元5所路山认敬一 ‘ 交出的s不,使該使用者在回到電腦並看 ^該警示後’即可意識到方才可能有不當的資料上傳狀況 生且系統已自動強迫終止該不當上傳,而使用者若需要 系先回到初始狀態,僅需再次切換該控制開關91即可。 、—值侍左思的是,本新型網路資料防竊器是以獨立硬體 、T偵利,並可利用網路線隨插即拔而導通於該數據單元 7(電腦)與網路收發單& 8(路由器)之間,能夠提高安裝連接 ”使用的方便性’此外,藉由該處理單元4彳貞測該數據單 元7流通至該網路收發單元8的資料流量,能夠免除以軟 體的方式進行彳貞測’藉此有效降低對電腦運算的負擔。 如圖3所示,本新型網路資料防竊器的第二較佳實施 例,大致上是與第一較佳實施例所揭露之結構相同,因此 "玄内。p連結關係可配合參閱圖2,不同的地方在於:該警示 皁元5具有一電連接該處理單元4並於接收警示訊號時發 出聲響的蜂鳴器52,該電力單元6具有一可供一電池以放 置而能夠引導電能至該處理單元4與警示單元5的插置座 63 ° 藉由上述之設計’本實施例不僅同樣能夠達到第一較 佳實施例之視覺警示功效,更可藉由該蜂鳴器52所發出之 聲響來提供聲音警示,以達到雙重警示之作用,而且,刺 用放置在該插置座63的電池62所提供的電能.,能夠使該 網路資料防竊器的使用地點不受外接特定電源(U s B或市電) M397664 進而能夠滿足使用者不同的使 的褐限而增加實施的地域 用需求。 ‘上所述’藉由該處理單元4偵測該數據單元7流通 至该網路收發單元8的資料流量,並在上傳流量異常時自 動斷線或告知使用者手動斷線,以即時防止外界透過網路 而不當竊取使用者電腦中之資料,再者,本新型網路資料 防竊器是以獨立硬體進行偵測,隨插即拔的特性能夠提高 安裝連接與使㈣枝性,_免除以㈣时式進行偏 測’藉此有效降低對電料算㈣擔,故確實能達成本新 型之目的。 惟以上所述者,僅為本新型之較佳實施例而已,當不 能以此限定本新型實施之範圍,即大凡依本新型申請:利 範圍及新型說明内容所作之簡單的等效變化與修飾, 屬本新型專利涵蓋之範圍内。 【圖式簡單說明】 圖1疋立體圖,說明本新型網路資料防竊器的第一 較佳實施例; 圖2是-方塊圖’說明該第一較佳實施例的内部連結 關係;及 圖3疋一立體圖,說明本新型網路資㈣竊器 較佳實施例。 _ 10The present invention is described in detail in the following description. As shown in FIG. 1 and FIG. 2, the first preferred embodiment of the network data theft prevention device comprises a hollow housing unit 93, a connecting unit 2, and a housing unit 93. a switching unit 3, a processing unit 4 integrated in the housing unit 93, an alarm unit 5 integrated in the housing unit 93, a power unit 6 integrated in the housing unit 93, and an integrated The housing unit 93 is provided with a control switch 91 for the user to select an automatic mode or a manual mode. The network data anti-theft device can electrically connect a data M397664 unit 7, a network transceiver unit 8, and transmit the same. Data transmitted and received between the data unit network transceiver units 8. The connecting unit 2 has a first connection 整合 及 整合 整合 整合 整合 整合 整合 整合 整合 ° ° ° ° ° ° 93 93 93 93 93 93 93 93 93 93 93 93 93 93 93 93 93 93 93 且 且 且 且 且 且 且a second port 22 integrated in the housing unit 93 and extending through the housing unit % and electrically connected to the network transceiver unit 8. In the present embodiment, the data sheet it 7 is a computer. The network transceiver unit 8 extends the (four) body unit 93 for the first and second ports 21, 22 due to the view relationship in the route 1, but since the first and second ports 槔I" can be routed through the external network 94 The data unit 7 and the network transceiver unit 8 are respectively electrically connected, so that the -the first connection 21, 22 is actually exposed to the housing unit %. The switching unit it 3 is an electronic type of switch, The switching unit 3 is electrically connected to the connection port 21 of the connection unit 2 and the second connection bee η for controlling the conduction between the first connection port 21 and the second connection port 22. The processing unit 4 Electrically connecting the switching unit 3 and controlling the switching unit 3' and using the first and second ports 21, 22 to conduct The first port 21 is transmitted to the second port 22 to transmit data traffic (ie, uploading data traffic), and can generate a warning signal when the data traffic is greater than a set value, and the built-in setting value can be matched with the actual use requirement. The warning unit 5 can receive the warning signal sent by the processing unit 4, and has a warning light 5u electrically connected to the processing unit 4, and the warning light 511 is in a state of being illuminated when receiving the warning signal, and The engine unit 5 further includes a 6 M397664 uploading display lamp 512 that can be turned on when the data unit 7 performs data uploading, and a download display lamp 513 that can be turned on when the data unit 7 performs data downloading, and a status display light 514 capable of respectively lighting different colors in an automatic or manual mode for the user to recognize the ongoing mode. The power unit 6 is electrically connected to the processing unit 4, the switching unit 3 and Warning early 5, and having two slots for a (10) line % insertion, the line 95 can be inserted into the slot 7 of the data unit 7, thereby being able to conduct power to the slot The unit 4, the switching unit 3 and the warning unit % provide the required power, and it is worth mentioning that when the slot 61 is for the (10) line 95 to be inserted and the source is powered, the other slot 61 can be externally connected. An electric appliance is used to guide the power source to the electric appliance, and as an external power source of the electric appliance / ' According to the above structure, when the network data anti-theft device is activated, the state is a manual mode, and the user can connect the first and second connections.埠 21, 22 = connect the data unit 7 (computer) and the network transceiver unit with the network 94, the line 94 f, the data unit 7 will upload the network transceiver unit 8 and 7 times = package (10) The minimum transmission: the unit of the transmission, when the data unit 21 goes to the 2: network transceiver unit 8, that is, through the first connection 珲μ interface 22, 'at this time, the processing set value _ packet transmission (four) flow. ...when the data flow is greater than the set value and is in an abnormal state, the processing warning signal is transmitted to the warning light 5 of the warning unit 5, and the switching unit 3" is converted into the automatic mode, so that the automatic switching of the first, The second connection 槔 2 卜 22 is open, and the 7 M397664 can suppress the data unit 7 from improperly uploading data. The control switch 91 of the second V also has the function of reset switching: after the first and second connection bees 21, 22 are switched off early, and the switch 91 is set, the processing unit 4 is driven and reset. Restore the manual die discharge flow in the initial state. For example, in the manual mode and the user does not actively transfer the job (for example, the user only looks at the computer and ^ any network operation), for example, If the outside world is stealing data from a computer that is not properly connected to the network, the amount of the uploaded packet will inevitably increase, and the unit 4 will detect that the unintended data upload amount has exceeded the setting and indicate the The warning unit 5 issues a corresponding warning, and after the user reaches the warning, the user realizes that the data of the computer instruction may be improperly stolen, and then immediately switches the control to open, so that the processing unit is manually switched. In the automatic mode, the switching unit 3 then switches the first connection itch 21, 22 to open, thereby interrupting the connection between the computer and the Internet to force the suspension of unauthorized data upload. Another aspect: If the new network data theft prevention device is in the automatic mode and the user does not actively upload the data (for example, the standby state and the user leaves the computer), if the outside world is Through: If the data is not properly stolen from the user's computer, the amount of the uploaded packet will inevitably increase, and the processing unit 4 will measure that the unanticipated upload amount of the second asset has exceeded the set value' and indicate the warning. The unit 5 issues a station to the library, and automatically controls the switching unit 3 to switch the first and second ports: 8 22 disconnects 'by taking the connection between the 4th shame and the Internet to force the suspension After the permission is uploaded, the upload is continued, and after the forced suspension of the upload, the maintenance of the 8 Hai & unit 5 is considered to be the same as the one that was handed over, so that the user can return to the computer and see ^ After the warning, you can realize that there may be improper data uploading and the system has automatically forced the termination of the improper upload. If the user needs to return to the initial state, he only needs to switch the control switch 91 again. , - value left thinking is that the new network data anti-theft device is independent hardware, T-detection, and can use the network route to plug and unplug the data unit 7 (computer) and network transceiver & 8 (router), it is possible to improve the ease of use of the installation connection. Further, by the processing unit 4, the data flow of the data unit 7 to the network transceiver unit 8 can be detected, and the software can be dispensed with. The method of performing the test 'is effectively reducing the burden on the computer. As shown in FIG. 3, the second preferred embodiment of the novel network data theft prevention device is substantially the same as the first preferred embodiment. The disclosed structure is the same, so the "Xuan Nei.p connection relationship can be referred to FIG. 2, the difference is that the warning soap element 5 has a buzzer that electrically connects the processing unit 4 and emits an audible sound when receiving the warning signal. 52. The power unit 6 has a socket 63 for allowing a battery to be placed to guide the power to the processing unit 4 and the warning unit 5. By the above design, the present embodiment can not only achieve the first advantage. Vision of the embodiment The warning function can further provide an audible alarm by the sound emitted by the buzzer 52 to achieve the double warning function, and the electric energy provided by the battery 62 placed in the insertion seat 63 can be made. The location of the network data theft prevention device is not subject to the external specific power supply (U s B or commercial power) M397664, and thus can meet the different browning limits of the user and increase the geographical demand for implementation. The processing unit 4 detects the data flow that the data unit 7 circulates to the network transceiver unit 8, and automatically disconnects the line or informs the user to manually disconnect the line when the uploading flow is abnormal, so as to prevent the outside from stealing the user through the network. The data in the computer, in addition, the new network data anti-theft device is detected by independent hardware, the plug-and-play feature can improve the installation connection and make (4) branching, _ exemption (4) time-based bias measurement 'This effectively reduces the amount of electricity calculations (4), so it can achieve the purpose of this new type. However, the above is only the preferred embodiment of the present invention, and cannot limit the scope of the implementation of the present invention. That is, the simple equivalent changes and modifications made by this new type of application: the range of benefits and the new description are within the scope of this new patent. [Simplified illustration] Figure 1 is a perspective view of the new network data. The first preferred embodiment of the anti-theft device; FIG. 2 is a block diagram showing the internal connection relationship of the first preferred embodiment; and FIG. 3 is a perspective view showing the preferred implementation of the novel network (4) stealer. Example. _ 10