TWM418330U - Interface locking device featuring encryption and decryption - Google Patents

Interface locking device featuring encryption and decryption Download PDF

Info

Publication number
TWM418330U
TWM418330U TW100207721U TW100207721U TWM418330U TW M418330 U TWM418330 U TW M418330U TW 100207721 U TW100207721 U TW 100207721U TW 100207721 U TW100207721 U TW 100207721U TW M418330 U TWM418330 U TW M418330U
Authority
TW
Taiwan
Prior art keywords
encryption
decryption
lock
interface
creation
Prior art date
Application number
TW100207721U
Other languages
Chinese (zh)
Inventor
sheng-fa Zhang
Original Assignee
Chesen Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chesen Electronics Corp filed Critical Chesen Electronics Corp
Priority to TW100207721U priority Critical patent/TWM418330U/en
Publication of TWM418330U publication Critical patent/TWM418330U/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

M418330 五、新型說明: 【新型所屬之技術領域】 本創作係有關一種介面鎖裝置,特指一種具 DSB、記憶卡及HDMI介面的主機系統,能夠透過一種 相對應介面之硬體啟動執行資料加解密功能及自動 隱藏之加解密介面鎖裝置。 【先前技術】 由於數位時代來臨,尤其主控權完全在使用者之 W_eb3.0及微網誌(Micr〇B1〇gging)與社群服務的流 行’個人資料的隱私與創作的智慧財產權的保護,已 成為須正視的重要課題,又由於資訊發達,使得數位 内令的可攜性與重製性資料之取得與傳遞變得很容 易,數位安全管理也變得十分重要,而現有數位檔案 :料加解密方式,多透過專屬加解密裝置(如:加密 2碟、加密硬碟等)或是透過加密軟體來實現其加 ::能’然此等封閉作用,僅能針對特定的裝置或 蛴虛棰。。如 放此方面更須透過主機系 嘗枯/ ^故造成了降低整體系統運 '轨行效能,又利用齡《I*拈> , f奴執仃加解密除了前述有關主 機連度上受到影變外,i e y 去 〜 a /、知序很容易被側錄破解,谁 者’該寺加解密之檔宰資料 進 廿卜 田系貝科及加解密之軟體工具巷4' 並無法在加解密後自動障葳 式 1瓦曰勒丨思臧,有心人士則可以輕易對 M418330 該等資料作直接對私 人或企業之隱私…,之資料作破解竊取’個 戋企聿碑成难y + a在極有可能被揭露,進而對個人 次止菜仏成相益或利益 , ^ , A 彳又犯,本創作人以此點為考 里认计,終成一能將且 — 巧 機糸銥.类,β 士 5己’fe卡及HDMI介面主 機糸統,透過相對應本 加解密功能,並適用於2之加解"、介面鎖裝置啟動 浐安資料於值# 、夕種不同系統平台,對主機端 •^白叙脬茲斤入延仃加解雄、及結束同與工具程 其增益之處。 ^與使用者之所需,足見 【新型内容】 之處,本創作目的在 介面鎖裝置,以期克 為解決上述之現有技術不足 提供一種於結構上改良之加解密 服現有技術中之難處。M418330 V. New Description: [New Technology Field] This creation is about a kind of interface lock device, especially a host system with DSB, memory card and HDMI interface. It can execute data plus through a corresponding interface hardware. Decryption function and automatic hidden encryption and decryption interface lock device. [Prior Art] Due to the advent of the digital age, especially the mastership is completely protected by the user's W_eb3.0 and microblogging (Micr〇B1〇gging) and the popularity of community services. It has become an important issue to be faced with, and because of the developed information, it has become easy to obtain and transfer digital intermediaries and reproducible data. Digital security management has become very important, and existing digital files: Adding and decrypting methods, mostly through exclusive encryption and decryption devices (such as: encryption 2 discs, encrypted hard drives, etc.) or through encryption software to achieve its addition:: can be such a closed function, only for specific devices or devices False. . If you want to put this aspect through the host system, you will have to reduce the overall system's performance, and use the age of "I*拈>, f slaves, encryption and decryption in addition to the above-mentioned related host connectivity. Change, iey go ~ a /, the order is easy to be cracked by the side, who 'the temple encryption and decryption file slaughter data into the Bu Tian Department of Beca and encryption and decryption software tool Lane 4' and can not be encrypted After the automatic barrier-type 1 watt 曰 丨 丨 臧 臧 臧 臧 臧 臧 臧 臧 臧 M M M M M M M M M M M M M M M M M M 418 418 M M 418 M M M M M M M M M M M M M M It is very likely that it will be revealed, and then it will be a benefit or benefit to the individual. ^, A 彳 彳 , , 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本Class, β 士5己'fe card and HDMI interface host system, through the corresponding encryption and decryption function, and applicable to the 2 plus solution, the interface lock device to start the security information on the value #, 夕 kind of different system platform On the host side • ^白叙脬zjin into the delay and add the solution, and the end of the same tool Department of gain. ^ With the needs of the user, it is evident that [the new content], the purpose of this creation is in the interface lock device, in order to solve the above-mentioned problems of the prior art, to provide a structurally improved encryption and decryption service in the prior art.

本創作所欲解決之問題,係由於 :加解密方式,多透過專屬加解密裳置(心: 加密硬碟等)或是透過加密軟體來實現其力二 ^ ’然此等封閉作用,僅能針對特定的裝置或主 機貫現加解密功能,在效能方面更須透過 ;^ :器執行加解密運算,造成降低整體系統運算 且其程序很容易被侧錄破解,又加解密之槽案次 :及加解密之軟體工具程式在加解密後無法自動隱 =有心人士則可以輕易對該等槽案資料作直接對: 在或機密之資料作破解竊取。 5 鎖裳目的’本_係提供—種加解密介面 -加解密錢’於㈣設有與能發出命令或樓 /、貝^之主機端連接相對應之裝置介面; 一裝置控制單元,係設於加解密鎖殼内且盘 ^面作電性連接,並接收來自主機端的命令或槽案資 :微處理器,係設於加解密鎖殼内且與裝置控制 二 接,以處理接收來自主機端的命令或槽案 貧科並回應主機端狀態或數據; 器電體單Γ係設於加解密鎖殼内且與微處理 鎖f置_ Ji"提供程式碼麵及本料加解密介面 、乂運作過程中變數參數資料暫存; 機料元,係設於加解密鎖殼内,係將主 密介面卿置内:所f供的電源轉換成本創作加解 一、裝置内邛工作時所需之電源; 产理〜解密運异單70,係設於加解密鎖殼内且與微 電料接,錢供接㈣自 =演算法運算及提供加密…料的二 内且一與!:資::/:緩衝記憶趙’係設於加解密鎖毅 山運异早元電性連接,以提供加解密運算 M418330 時的檔案資料暫存。 較佳者’本創作其加解密鎖殼之裝置介面種類俜 f自由。咖、記憶卡、_、二 •,且成之-群組其令之-種種類。The problem that this creation wants to solve is due to: encryption and decryption, more through the exclusive encryption and decryption (heart: encryption hard disk, etc.) or through the encryption software to achieve its power ^ ^ such a closed role, only For the specific device or host to implement the encryption and decryption function, it is necessary to pass the performance; ^: The device performs the encryption and decryption operation, which causes the overall system operation to be reduced and the program is easily cracked by the side record, and the slot is added and decrypted: And the software program of encryption and decryption cannot be automatically hidden after encryption and decryption. If you are interested, you can easily make a direct comparison to the data of the case: the data in the secret or the secret is used for cracking. 5 locks the purpose of 'the _ system provides a kind of encryption and decryption interface-encryption and decryption money' in (4) with a device interface that can issue commands or the connection of the main unit of the building / Bay; a device control unit, system In the encryption and decryption lock case and the disk surface is electrically connected, and receives the command or slot case from the host end: the microprocessor is disposed in the encryption and decryption lock case and connected to the device control to process the receiving from the host The terminal command or slot case is poor and responds to the host side status or data; the device body is set in the encryption and decryption lock case and is set with the microprocessor lock f_ji" provides the code surface and the material encryption and decryption interface, 乂In the course of operation, the variable parameter data is temporarily stored; the machine element is set in the encryption and decryption lock case, and the main secret interface is placed inside: the power conversion cost of the f supply is created and solved. The power supply; the production rationalization ~ decryption transport different single 70, is set in the encryption and decryption lock shell and connected with the micro-electric material, money for connection (four) from the algorithm operation and provide encryption ... material two and one! ::/: Buffer memory Zhao's system is set in the encryption and decryption Then, in order to provide the information when the file encryption and decryption operations M418330 scratch. Preferably, the device interface type of the encryption and decryption lock is 自由f free. Coffee, memory card, _, two, and into - the group of its kind - kind.

較佳者,本創作其加解密鎖殼之裝置 卡係為SD。 ^ U 較佳者’本創作其加解密鎖殼之裝置介面 卡係為microSD。 隐 错此设計,將具USB、記憶卡及_介面主機 統,透過相對應本創作之加解密介面鎖裝置啟動力結 並適用於多種不同…,對; - 貝料於傳輪過程進行加解密及結: 作自動隱藏。 时/、具耘式 【實施方式】 為利貴審查員瞭解本創作之創作特徵、内容盘 優點及其所能達成之功效’兹將本創作配合附圖,並 以實施例之表達形式詳細說明如 並 之F14 ϋ匕版达 而於文中所使用 圖式,3 θ僅為不意及輔助說明書之Κ 本創作實施後之真實比例與精準 為 之圖式的比例與配置關係侷限本 +應就所附 的專利範圍,合先敘明。本創作於實際實施上 請參閱第八圖及第一圖、第二圖、第三圖、第四 =介第五β圖所示,係分別為本創作加解 裝置系統硬體方塊圖、為本創作之USB介 二L:0USB加解密鎖之立體圖、本創作之_介 σ在鎖另—實施例之立體分解圖、立體组人圖、 本創作之記憶卡介面 σ 之立體圖、本創作之_ H microSD) 之立體m 1 介面加解密鎖 — θ,本創作之加解密介面鎖裝置丨於一較佳之 貫施例中係包括有—加解密储1G、-裝置控制單 二:1二「微處理器12、—記憶體單元13、一電源控 制早凡14、-加解密運算單元15、—標案資料暫存 缓衝記憶體1 6。 前述之-加解密鎖殼1〇,於外側設有與能發出命 令或播案資料之主機2端連接相對應之裝置介面 100’該裳置介面1〇〇之種類係選自纟顯如第一圖 所示),而_即所謂之通用串列匯流排(univmai Send BuS)、micr0USB(如第二圖所示)、記憶卡、 HDMI(如第六圖所示),而_即所謂之可以提供高 達5Gbps資料傳輸帶寬且無I縮音頻及高解析度視 頻信號之高清晰度多媒體介面(HiGH DEFiNin⑽ ULTIMEDIA)、nuniHDMI (如第七圖所示)所組成之一 群組其中之一種種類,但並不以此限制本創作,其亦 M4183.30 可為各種介面,都屬本創作的保護範圍, 例該記憶卡係可為SDUlcroSD( …所示),,所謂之安全數位記憶卡圖、弟 (Secured Digital Mein〇ry Card)。 進者,敬請參閱箆二同 1弟一圖1目圖所示之本 _介面加解密鎖另一實施例之立體分解 合圖,其亦可將本創作加解密介面鎖裝置^置 介面100處設有-帽蓋101,而該帽蓋m之开;狀係 可為鑰匙形狀,同樣並不以此限 $狀係 此隈制本創作,其亦可為 各形狀,都屬本創作的保護範圍。 前述之-裝置控制單元u,係設於加解密鎖殼 内且與裝置介面100作電性連接,並接收來自主 機2端的命令⑴或檔案資料⑴。 收;自 前述之-微處理器12’係設於加解密鎖殼1〇内 且與農置控制單元11電性連接,以處理接收來自主 機2端的命令U1或檔案資 態或數據。 、…主機2端狀 前述之一記憶體單元13,係設於加解密鎖殼1〇 内且與微處㈣12電性連接,以提供程式碼存放及 本創作加解密介面鎖裝置1運作過程中變數參數資 料暫存。 9 前述之一電源控制單 10内,係將主批9山 ,係没於加解密鎖殻 ,、、機2鳊透過裝置介面1〇〇 源’轉換成本創作加解密介面 =- 需之電源。 < 且1円口卩工作時所 前述之一加解密運算罩 10内且虚微處理”9 係設於加解密鎖殼 機接,储供接收來自主 機2端的檔案資料 主 案資料的解密演算法運算斤法運鼻及提供加密槽 鎖二述内之―資料暫存缓衝記憶體16,係設於加解密 二二運Γ解密運算^15電性連接,以提供 山運π時的檔案資料暫存。 敬請參閱第九圖所示, 方塊圖,本創作1執…本創作加密執行程序 32,接菩ϋ 雄、程序31係先輸入密碼 之判斷,若為入^碼I之後再作密碼正確34 序,若 ^ 〇)則重新進入輸入密碼32之程 : eS )則進入案資料加密35之程序。 方塊二閱第十圖所示’為本創作解密執行程序 =鬼圖’本創作其執行解 密碼37,拯基从— 丨)银你无輸入 則奸入_雄、碼正確38之判斷,若為否W =:.碼37之程序,若為是(蝴 貝枓解密39裎序。 四二:參Γ第十—圖、第十二圖、第十三圖、第十 θ不’係分別為本創作檔案資料加解密執行程序 方塊圖、本創作功能示意圖( 創作於本實施例係用於電腦之“J:、(三),本 此限制本創作,其亦可用於手二千° 5,但並不以 統平台5 ’都屬本創作的 ^ 各種不同之系 料加解密執行程序4,首先俜:二,本創作其槽案資 即出百先係將主機系統開機41後, Ρ出現鑰延之圖面51 (如第 二執行程序,即分別走向,不),其分设有 0Η , ^ —條路揸,—為一般檔荦資 枓加解密工具式(隱藏)42m (障麄)‘妒— 另則為加密檔案資料 广具程式(隱藏)43,之後當分別插 資料:二’其則分別進入處理-般檔案 /、辁式422、加密檔案資料(可視) 出現加雄'工具程式432,其分別如 52、53所示,若此時拔 ° ^ 創幻,則分別返回至最前端之鎖423、433時(即本 . r r ^ Λ戒月】螭之—般檔案資料加解密 工加密稽案資料(隱藏)加解密 則;=減)43’若未拔除介面鎖…33, 丄二二拖放一般樓索資料至工具程式視窗 。讀“料至工具程式 =即達成並分別作加密程序仍、解密程序435 如二十四圖示)之譯碼之畫面Μ 碼:晝面Μ—),並再分別返回至加密樓; U (可,h現加解密工具程式似、一般案資料 出現加解密工具程式似之處理執行程序。 藉此設計,本創作具有下列特點: 料18330 1、 實體硬體晶片鎖起。 2、 透過介面啟動加解密功能,適用於多種不同 統平台(電腦、手機等) ^ 3、 以硬體方式執行檔案内容資料加解密,快速又安 全並能避免軟體執行上速度與程序容易被側錄女 破解問題。 、 4、 加解密介面鎖裝置拔除加密檀案自動隱藏。 5、 加解密介面鎖裴置拔除工具程式自動隱藏。 /而II此設計,將具USB、記憶卡及咖介面 2統,透過相對應本創作之加料介面鎖裝置丄啟動 加解密功能,並適用於多種不同系統平台’對主機2 ^槽案資料㈣㈣料行續密及^時同時將 广具程式自動隱藏’符合進步、實用與使用者所 而’足見其增益之處。 综觀上述可知,本創作在突破先前之技術結構 者=達到所欲增進之功效’且也非熟悉該項技 ::所易於思及,再者,本創作申請前未曾公開,兑 2具,進步性、實用性,顯已符合創作專利之申請要 專利C出創作申請,懇請貴局核准本件創作 申喷案,以勵創作,至感德便。 想及為說明本創作之技術思 朴’” 、使4習此項技蟄之人士能夠瞭解 ,之内容並據以實施,當不能以之限定本創作之 12 M4183.30 專利範圍,即大凡依本創作所揭示之精神所作之均等 變化或修飾,仍應涵蓋在本創作之專利範圍内。 13 【圖式簡單說明】 第 ""· Γρ*1 園 :為本創作之USB介面加解密鎖之立體 圖。 第 一 IS3 一* SJ :為本創作之roicroUSB介面加解密鎖之 立體圖。 第 三圖 .為本創作之USB介面加解密鎖另一實施 例之立體分解圖。 第 四圖 .為本創作之USB介面加解密鎖另一實施 例之立體組合圖。 ^ A圖為本創作之§己憶卡介面加解密鎖(SD ) 之立體圖。 第五B圖:為本創作之記憶卡介面加解密鎖 (microSD)之立體圖。 第六圖:為本創作之HDMi介面加解密鎖之立體 圖。 第七圖:為本創作之心刚顧介面加解密鎖之 立體圖。 第八圖:為本創作加解密介㈣m统硬體 方塊圖。 第九圖:為本創作加密執行程序方塊圖。 第十圖:為本創作解密執行程序方塊圖。 第十-圖:為本創作檔案資料加解密執行程序 方塊圖。 14 M418330 « « 第十二圖:為本創作功能示意圖(一) 第十三圖:為本創作功能示意圖(二) 第十四圖:為本創作功能示意圖(三) 【主要元件符號說明】 1···加解密介面鎖裝置 10…加解密鎖殼 100···裝置介面 101…帽蓋 11…裝置控制單元 111…命令 112…資料 12…微處理器 13…記憶體單元 14…電源控制單元 15…加解密運算單元 16…資料暫存缓衝記憶體 2···主機 3…加解密程序 31…加密程序 32···輸入密碼 33…重覆輸入密碼 34...密碼正確 35…檔案資料加密 36…解密程序 37…輸入密碼 38···密码正確 3 9…檔案資料解密 程序 4…檔案資料加解密執行 41…主機系統開機Preferably, the device card for which the encryption and decryption lock is created is SD. ^ U is better. The device interface of the encryption and decryption lock case is microSD. The design of the USB, memory card and _ interface host system will be activated by the encryption and decryption interface lock device corresponding to the creation and applied to a variety of different... Decryption and knot: Automatically hide. Time/, 耘 【 [Embodiment] For the valuable examiner to understand the creative characteristics of the creation, the advantages of the content disc and the effects that can be achieved, the author will cooperate with the drawings and explain in detail in the expression of the examples. And the F14 ϋ匕 version reaches the text used in the text, 3 θ is only for the accidental and auxiliary instructions Κ The real proportion and precision of the pattern after the implementation of the creation of the scale and configuration relationship limitations + should be attached The scope of the patent is described in advance. In the actual implementation, please refer to the eighth picture and the first picture, the second picture, the third picture, and the fourth=the fifth β picture, which are respectively the hardware block diagram of the creation and solution device system. The USB interface of the creation of the second L:0USB encryption and decryption lock, the creation of the _ σ σ in the lock another embodiment of the three-dimensional exploded view, three-dimensional group diagram, the creation of the memory card interface σ stereoscopic map, the creation of this _ H microSD) Stereo m 1 interface encryption and decryption lock - θ, the creation of the encryption and decryption interface lock device in a preferred embodiment includes - encryption and decryption storage 1G, - device control single two: 1 2" The microprocessor 12, the memory unit 13, a power supply control 14, the encryption and decryption operation unit 15, and the standard data temporary storage buffer memory 16. The aforementioned - encryption and decryption lock case 1〇, on the outside The device interface 100' corresponding to the host 2 end connection capable of issuing commands or broadcast data is selected from the group shown in the first figure, and _ is called universal Serial bus (univmai Send BuS), micr0USB (as shown in the second figure), memory card, HDM I (as shown in Figure 6), and _ is the so-called high-definition multimedia interface (HiGH DEFiNin (10) ULTIMEDIA) and nuniHDMI (such as the seventh) that can provide up to 5 Gbps data transmission bandwidth without I-reduced audio and high-resolution video signals. The figure shows one of the groups, but it does not limit the creation. It also has M4183.30 for various interfaces, which are the protection scope of this creation. For example, the memory card can be SDUlcroSD. (...), the so-called Secure Digital Mein〇ry Card. For those who are in, please refer to the _ interface encryption and decryption lock shown in Figure 1 of the second brother. A three-dimensional exploded view of another embodiment, which can also be provided with a cap 101 at the interface 100 of the creation and decryption interface locking device, and the cap m can be opened; the shape can be a key shape, and This type of creation is not limited by this limitation, and it can also be various shapes, which are the protection scope of the creation. The aforementioned device control unit u is disposed in the encryption and decryption lock case and is connected with the device interface 100. Electrically connected and receive commands (1) or files from host 2 The data (1) is received; from the foregoing - the microprocessor 12' is disposed in the encryption and decryption lock case 1〇 and is electrically connected to the farm control unit 11 to process the command U1 or file status from the host 2 end or The data storage unit 13 is disposed in the encryption and decryption lock case 1 and is electrically connected to the micro (4) 12 to provide code storage and operation of the creation and decryption interface lock device 1 . During the process, the variable parameter data is temporarily stored. 9 In one of the above power control orders 10, the main batch is 9 mountains, which is not in the encryption and decryption lock case, and the machine 2 is transmitted through the device interface. Decryption interface =- required power. < and 1 加 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 卩 且 卩 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚 虚The method of calculating the operation of the nose and providing the encryption slot lock is described in the data storage buffer memory 16, which is set up in the encryption and decryption operation of the decryption operation ^15 electrical connection to provide the file of the mountain π Please refer to the ninth figure, the block diagram, the creation of this creation... The creation of the encryption execution program 32, the connection of the Bo Xiong, the program 31 is the first to enter the password, if it is after the code I Make the password correct 34 order, if ^ 〇) then re-enter the process of entering the password 32: eS) enter the program data encryption 35. Block 2 read the first picture of the creation of the decryption execution program = ghost map Create its execution solution password 37, save the base from - 丨) silver, you have no input, then rape into the _ male, the code is correct 38 judgment, if it is no W =:. Code 37 program, if it is (Butterfly decryption 39裎 。. 42: Participation in the tenth - map, twelfth, thirteenth, tenth θ not 'separate The creation of the archive data encryption and decryption execution program block diagram, the creation function diagram (created in this embodiment is used for the computer "J:, (three), this limits the creation, it can also be used for the hand two thousand ° 5, but It is not the same as the platform 5' is the creation of the ^ various different materials to encrypt and decrypt the execution of the program 4, first of all: Second, the creation of its slot case is out of the 100 first system after the host system boot 41, the key appears The extension of the map 51 (such as the second implementation of the program, that is, respectively, no), it is divided into 0 Η, ^ - road 揸, - for the general file 荦 枓 枓 工具 ( (hidden) 42m (obstacle)妒 另 另 另 另 另 另 另 另 另 另 另 另 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密432, respectively, as shown in 52, 53, if at this time pull the ^ ^ creative, then return to the front of the lock 423, 433 (ie, this. rr ^ Λ 月 螭 — — — — — — — — 档案 档案 档案 档案 档案 档案 档案Work encryption case data (hidden) encryption and decryption; = minus) 43' if not removed Lock...33, 丄2 2 Drag and drop the general building data to the tool program window. Read the picture of “Decoding to Tool=Complete and complete the encryption program, decryption program 435 as shown in Fig. 24” Code: 昼面Μ—), and then return to the encryption building separately; U (can, h is the encryption and decryption tool program, the general case data appears to be the encryption and decryption tool program to process the execution program. By this design, the creation has the following Features: Material 18330 1. Solid hardware chip lock. 2. Enable encryption and decryption function through interface, suitable for many different platforms (computer, mobile phone, etc.) ^ 3. Perform file content data encryption and decryption in hardware mode, fast and fast Security and can avoid software execution speed and the program is easy to be scammed by the female. 4, encryption and decryption interface lock device to remove the encrypted Tan case automatically hidden. 5. The encryption and decryption interface lock device is automatically hidden. /II This design will be equipped with USB, memory card and coffee interface 2, through the corresponding interface interface lock device to start the encryption and decryption function, and applicable to a variety of different system platforms 'to the host 2 ^ slot file information (four) (four) At the same time, the program will continue to hide and the program will automatically hide the 'fit for the progress, practical and user' to see its gain. Looking at the above, we can see that this creation breaks through the previous technical structure = achieve the desired effect of 'improvement' and is not familiar with the technology: it is easy to think about it, and again, this creation has not been made public before the application, against 2 Progressive and practical, it has been in line with the application for creating a patent. It is necessary to apply for a patent C, and you are requested to approve the application for the creation of this application, in order to encourage creation, to the sense of virtue. If you want to explain the technical thinking of this creation, you can understand the content of this skill and implement it. If you can't limit the scope of this creation, the 12 M4183.30 patent scope, that is, Dafanyi The equal changes or modifications made by the spirit of this creation should still be covered by the scope of this creation patent. 13 [Simple description of the diagram] The first ""· Γρ*1 Garden: encryption and decryption of the USB interface for this creation Stereo view of the lock. The first IS3 one* SJ: a perspective view of the roicroUSB interface encryption and decryption lock for the creation. The third figure is an exploded perspective view of another embodiment of the USB interface encryption and decryption lock of the present invention. The three-dimensional combination diagram of another embodiment of the USB interface encryption and decryption lock of the present invention. ^ A picture is a perspective view of the § memory card interface encryption and decryption lock (SD) of the creation. The fifth picture B: the memory card interface of the creation Stereo view of the encryption and decryption lock (microSD). Figure 6: The perspective view of the HDMi interface encryption and decryption lock for the creation. The seventh picture: the three-dimensional diagram of the encryption and decryption lock of the creation of the heart. plus密介(四)m unified hardware block diagram. The ninth picture: block diagram of the encryption execution program for this creation. The tenth picture: block diagram of the execution decryption execution program for this creation. Tenth-picture: Encryption execution program block for the creation of archive data Fig. 14 M418330 « « Twelfth picture: Schematic diagram of the creation function (1) Thirteenth picture: Schematic diagram of the creation function (2) Figure 14: Schematic diagram of the creation function (3) [Description of main components 】 1···Addition and decryption interface lock device 10...Encryption and decryption lock case 100···Device interface 101...Cap 11...Device control unit 111...Command 112...Data 12...Microprocessor 13...Memory unit 14...Power supply Control unit 15...Encryption/decryption operation unit 16...data temporary buffer memory 2··host 3...addition and decryption program 31...encryption program 32···enter password 33...repeated input password 34...password correct 35 ...Archive data encryption 36...Decryption program 37...Enter password 38···Password correct 3 9...File data decryption program 4...File data encryption and decryption execution 41...Host system boot

42…一般樓案資料加解密工 421..·插入介面鎖 具程式 (隱藏) 422··· —般檔案資料出 423···拔除介面鎖 424."拖放一 < 檔案資料至工 425…加密程序42...General building data encryption and decryption work 421..·Insert interface lock program (hidden) 422··· General file data out 423···Unplug interface lock 424."Drag and drop one< Archive data to work 425 ...encryption program

現加解密工具程式 具程式視窗 43..·加密標案資料加解密工具程式(隱藏) 431…插入介面鎖 432···加密稽案資料(可視)&現加解密工具程 式 433…拔除介面鎖 434..·拖放加密檔案資料至工具程式視窗 435···解密程序 5…系統平台 5 1 ···晝面 16 M418330 52…晝面 53…晝面 54…譯碼晝面 5 5…解碼晝面Now encryption and decryption tool program window 43..·Encryption standard data encryption and decryption tool program (hidden) 431... Insert interface lock 432···Encryption audit data (visual) & now encryption and decryption tool program 433...plug interface Lock 434..·Drag and drop encrypted file data to tool program window 435···Decryption program 5...System platform 5 1 ···昼面16 M418330 52...昼面53...昼面54...Decoding page 5 5... Decoding face

Claims (1)

M4183.30 六、申請專利範圍: 1、一種加解密介面鎖裝置,其包括: 一加解密鎖殼,於外側設有與能發出命令或檔案 資料之主機端連接相對應之裝置介面; 一裝置控制單元,係設於加解密鎖殼内且與裝置 介面作電性連接,並接收來自主機端的命令或檔案資 料; Φ 一微處理器,係設於加解密鎖殼内且與裝置控制 單元電性連接,以處理接收來自主機端的命令或檔案 資料並回應主機端狀態或數據; 一記憶體單元,係設於加解密鎖殼内且與微處理 器電性連接,以提供程式碼存放及本創作加解密介面 鎖裝置運作過程中變數參數資料暫存; 一電源控制單元,係設於加解密鎖殼内,係將主 Φ 機端透過裝置介面所提供的電源轉換成本創作加解 密介面鎖裝置内部工作時所需之電源;. 一加解密運算單元,係設於加解密鎖殼内且與微 處理器電性連接,係提供接收來自主機端的檔案資料 的加密演算法運算及提供加密檔案資料的解密演算 法運算; 一檔案資料暫存缓衝記憶體,係設於加解密鎖殼 内且與加解密運算單元電性連接,以提供加解密運算 18 M418330 I · 時的檔案資料暫存。 2、如申請專利範圍第1項所述之加解密介面鎖裴 置,其中,加解密鎖殼之裝置介面種類係選自由USB microUSB、記憶卡、HDMI、rainiHDMI 所組成之—* 組其中之一種種類。 ^ 2項所述之加解密介面鎖裝M4183.30 VI. Patent application scope: 1. An encryption and decryption interface lock device, comprising: a encryption and decryption lock shell, and a device interface corresponding to a host end connection capable of issuing a command or file data on the outer side; The control unit is disposed in the encryption and decryption lock case and electrically connected to the device interface, and receives commands or file data from the host end; Φ a microprocessor is disposed in the encryption and decryption lock case and is electrically connected to the device control unit Sexual connection to process receiving commands or file data from the host side and responding to host state or data; a memory unit is disposed in the encryption and decryption lock housing and electrically connected to the microprocessor to provide code storage and During the operation of the creation and decryption interface lock device, the variable parameter data is temporarily stored; a power control unit is disposed in the encryption and decryption lock case, and the main Φ machine end is provided through the device interface to convert the power supply to create and decrypt the interface lock device. The power supply required for internal operation; a cryptographic operation unit, which is disposed in the encryption and decryption lock case and electrically connected to the microprocessor, The encryption algorithm operation for receiving the archive data from the host end and the decryption algorithm operation for providing the encrypted file data; a file data temporary storage buffer memory, which is disposed in the encryption and decryption lock shell and electrically connected to the encryption and decryption operation unit To provide the encryption and decryption operation 18 M418330 I · when the file data is temporarily stored. 2. The encryption/decryption interface lock device according to claim 1, wherein the device interface type of the encryption and decryption lock is selected from the group consisting of USB microUSB, memory card, HDMI, and rainiHDMI. kind. ^ The encryption and decryption interface lock described in item 2 一 π〜,.政之裴置介 面之記憶卡係為 3、 如申請專利範圍第 置,其中, 4、 如申請. 置,其中,v % π , microSD 〇 19The memory card of a π~,. 政 裴 介 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。
TW100207721U 2011-04-29 2011-04-29 Interface locking device featuring encryption and decryption TWM418330U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100207721U TWM418330U (en) 2011-04-29 2011-04-29 Interface locking device featuring encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100207721U TWM418330U (en) 2011-04-29 2011-04-29 Interface locking device featuring encryption and decryption

Publications (1)

Publication Number Publication Date
TWM418330U true TWM418330U (en) 2011-12-11

Family

ID=46450509

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100207721U TWM418330U (en) 2011-04-29 2011-04-29 Interface locking device featuring encryption and decryption

Country Status (1)

Country Link
TW (1) TWM418330U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9607873B2 (en) 2014-02-07 2017-03-28 Taiwan Semiconductor Manufacturing Company Ltd. Apparatus and operation method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9607873B2 (en) 2014-02-07 2017-03-28 Taiwan Semiconductor Manufacturing Company Ltd. Apparatus and operation method thereof

Similar Documents

Publication Publication Date Title
CN107111567B (en) Operating system dongle
US9245130B2 (en) Multi-user universal serial bus (USB) key with customizable file sharing permissions
US20110258333A1 (en) Cloud connector key
WO2011079031A1 (en) Portable content container displaying a/v files in response to a command received from a consumer device
US10937088B2 (en) Mobile account data access systems and methods
TW200910089A (en) Method of storing and accessing header data from memory
CN103701977A (en) Portable electronic device, communication system and information authentication method
US20150127942A1 (en) Security key device for secure cloud service, and system and method for providing secure cloud service
CN105227299A (en) A kind of data encrypting and deciphering management equipment and application process thereof
WO2017020468A1 (en) Data exchange method and apparatus for composite smart card device
US8402284B2 (en) Symbiotic storage devices
CN104065623A (en) Information processing method, trust server and cloud server
TW201205337A (en) Download management system
TWM418330U (en) Interface locking device featuring encryption and decryption
CN202838313U (en) Encrypted mobile hard disk of integrated NFC technology
WO2017137481A1 (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
CN207367209U (en) From encryption hard-disk system
CN104036201A (en) Application-layer file hiding method on Windows operating system
WO2017041564A1 (en) Method and system for realizing set top box on-demand function
TWI497339B (en) Computer system being capable of respectively saving account number and password for anti-spyware
CN202404578U (en) Encryption and decryption interface lock device
CN207367207U (en) Encrypt bridge
CN204652425U (en) A kind of personalized digital media broadcast control system
CN209447548U (en) A kind of external connected hand disk box device
CN205596144U (en) System for terminal security inserts authentication

Legal Events

Date Code Title Description
MM4K Annulment or lapse of a utility model due to non-payment of fees