WO2018017047A1 - Verrouillage de port - Google Patents

Verrouillage de port Download PDF

Info

Publication number
WO2018017047A1
WO2018017047A1 PCT/US2016/042809 US2016042809W WO2018017047A1 WO 2018017047 A1 WO2018017047 A1 WO 2018017047A1 US 2016042809 W US2016042809 W US 2016042809W WO 2018017047 A1 WO2018017047 A1 WO 2018017047A1
Authority
WO
WIPO (PCT)
Prior art keywords
locking
dongle
usb
port
key
Prior art date
Application number
PCT/US2016/042809
Other languages
English (en)
Inventor
Jeffery CLARK
Gabriel GOLDSTEIN
Original Assignee
Clark Jeffery
Goldstein Gabriel
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Clark Jeffery, Goldstein Gabriel filed Critical Clark Jeffery
Priority to PCT/US2016/042809 priority Critical patent/WO2018017047A1/fr
Publication of WO2018017047A1 publication Critical patent/WO2018017047A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Definitions

  • Port Lock This invention is titled "Port Lock”.
  • the Port Lock was invented by Jeffery P. Clark, a resident of the United States, with the following residence address: 14925 Lipscomb Road, Harvest, Alabama 35749 and Gabriel Goldstein, a resident of the United States, with the following residence address: 986 Cosmos Court, Wellington, Florida 33414.
  • This present invention relates to a lock for USB ports on personal computers and other electronic devices. More particularly, the present invention relates to a locking device for locking into a USB port physically blocking access to the port. This lock is both mechanical and electronic in nature. A USB dongle physically locks into the USB port and a separate electronic key device is required to electronically unlock the USB dongle.
  • All computers containing a USB port are at risk of attack from viruses transmitted via thumb drive.
  • Computers used in a work environment particularly secure environments such as government facilities, banking, and corporate offices, are all at risk of attack from viruses and malware transmitted via thumb drives, backup hard drives, cell phones and other devices that an employee or end user may plug into a USB port of the computer.
  • hackers and spies have been known to penetrate a computer network by first loading an infectious file onto a portable device such as a USB thumb drive, a tablet device, or a mobile phone.
  • a portable device such as a USB thumb drive, a tablet device, or a mobile phone.
  • This virus will be launched from within the computer network, allowing it to circumvent the computer's firewall.
  • One example of this is the infection via thumb drive on the computers controlling Iran's nuclear material centrifuges with the Stuxnet worm, resulting in the elimination of approximately twenty percent of Iran's nuclear enrichment capability.
  • USB thumb drives are small, easily hidden, and often embedded into common items like key chains and ink pens.
  • a data thief with access to a computer network can utilize a USB thumb drive to copy and steal data undetected.
  • Kung discloses a USB lock wherein a lock piece is inserted into a USB port.
  • the lock piece inserted into the USB port functions as a plug blocking all access to the port.
  • the lock piece remains in the USB port and can not be removed.
  • this device eliminates access to the USB port, the locking device is not removable resulting in a permanent loss of access to the port.
  • Quinby (US 7,390,201 B l) discloses a device to plug a USB port.
  • the invention of Quinby comprises a plug that has at least one engagement member to partially extend through at least one aperture of the plug and lock to at least one structure within the USB connector receptacle.
  • the Quinby device is not designed to be removed. If future use of the USB port is desired, then Quinby has an alternate embodiment that plugs the USB port but allows unfettered access to an attached port.
  • the locking mechanism employed by Quinby securely blocks access to the USB port, none of the embodiments disclosed provides for removal of the USB port plug without damaging the port.
  • Lee discloses a connector lock with a plug that fits within a USB port and a mechanical key that unlocks said plug.
  • the retaining members that actually lock the plug into the USB port protrude outward from the sides of the plug.
  • This arrangement of the pins is easy to unlock by anyone possessing a pair of tweezers or similar device.
  • Lee also discloses that only the correct key can unlock the plug. But, anyone with a similarly configured key could release the plug and gain access to the USB port. Additionally, it would be relatively easy to create a similarly shaped device to operate as a key to release the plug from the port.
  • a USB port plugging device comprising a locking member that plugs the port.
  • the locking member utilizes two barbs that are extended down into the USB port plugging the port.
  • a cylindrical key fits into the locking member to lock and unlock the device.
  • the key has a T-shaped extension that fits into an opening on the plug. Upon insertion and turning of the T-shaped extension, the plug is released from the USB port.
  • Teen having access to a similarly shaped key or object would be able to access the port. Additionally, it would not be difficult for a data thief to fashion his or her own key to unlock the plug.
  • Poppe (US 7,635,272 B2) discloses a lock for USB ports including a locking member with retractable barbs that engage the USB port, blocking access to the port. Poppe utilizes a key of a certain shape that fits into the locking member to retract the locking barbs. Race having access to the key would be able to remove the port lock and access data contained on the electronic equipment.
  • Chen discloses a USB port locking device wherein a combination lock is incorporated within the USB device. Chen requires a 5 number numerical code to unlock the device. The Chen device is secured into the USB port by two hooking arms that are compressed downward when the device is inserted into a USB port. Sandra with access to the combination would be able to remove the locking member and have access to the USB port.
  • Weksler et al. discloses a USB port locking device wherein one or more pins of the device are engaged and disengaged in response to an electrical signal generated within the USB locking device. This electrical signal is generated when the correct password is entered into the computer (US 7,578,691 B2). This device is easily penetrated by anyone obtaining the password.
  • the Port Lock comprises a USB locking dongle that is locked into a USB port and an electronic key that unlocks the USB locking dongle.
  • the Port Lock can be mechanically engaged within the USB port irrespective of whether the computer is powered on.
  • the dongle has an external locking interface that engages at least one protruding barb with the female connector of a standard USB port socket.
  • the dongle comprises an external lock housing that slides over the inner case.
  • the locking blade is hard fixed to the external lock housing of the dongle. When a user manually slides the external lock housing over the inner case, a sliding member forces the protruding tabs to extend downward into the USB port. Activation of an electromagnet within the dongle unlocks the locking blade and disengages the protruding arms.
  • the electromagnet unlocks the USB dongle in response to an electrical signal generated by an electronic key.
  • the key can be any device that can store a plurality of encrypted data bits.
  • One embodiment uses an iButton ® as a key.
  • An iButton ® device is a computer chip enclosed within a 16 mm thick stainless steel can.
  • Computer software is utilized to maintain key codes and program an iButton ® or other memory device with a programmable security code to unlock the Port Lock.
  • a personal computer is attached to a programming station where integration and programming of each electronic key and the USB locking dongle is performed.
  • the present invention is superior to the prior art listed above because it incorporates both a mechanical and an electrical lock into the same locking device.
  • the user in order to release the physical lock after insertion into a USB port, the user is required to have an electronic key capable of generating an electrical signal to unlock the device. If an unauthorized user obtains or creates an electronic key, said key will be inoperable because only a key having the correctly coded electrical signal will be able to successfully unlock the USB dongle.
  • this invention provides much greater security for devices with USB ports. If the key is lost, then a new key can be programmed to remove the locking dongle.
  • the present invention can be incorporated into a programming system wherein a system administrator can program and maintain security for a number of computers within a network of computers. An unauthorized user can not simply create a new key to unlock the USB dongle because only those keys programmed by the administrator will unlock the locking mechanism.
  • FIGS. 1 through 10 depict an electromagnet embodiment
  • FIGS. 13 through 21 depict an embodiment that includes a hook-shaped casting
  • FIGS. 22 through 25 are flow charts depicting the programming and electronic operation of the Port Lock
  • FIGS. 11 and 12 depict the electronic mechanism and electronic configuration of the Port Lock.
  • FIG. 1 illustrates a top view of an unlocked USB locking dongle angled so that the side is also depicted
  • FIG. 2 illustrates a top view of a locked USB locking dongle with the inner case cut away;
  • FIG. 3 illustrates an internal, top view of the USB locking dongle
  • FIG. 4 illustrates an internal, top view of the unlocked USB locking dongle wherein the external lock housing and inner case have been removed;
  • FIG. 5 illustrates a top, angled view of the USB locking dongle in an unlocked position with the external lock housing and inner case removed;
  • FIG. 6 illustrates a top, angled view of the USB locking dongle in a locked position with the external lock housing and inner case removed;
  • FIG. 7 illustrates a sectional view of the USB locking dongle in an unlocked position
  • FIG. 8 depicts a top view of s locked USB locking dongle in a non-energized state with the inner case and external lock housing removed;
  • FIG. 9 illustrates a top view of an unlocked USB locking dongle in an energized state.
  • the USB locking dongle is illustrated with the external lock housing and inner case removed;
  • FIG. 10 illustrates a top view of the USB locking dongle oriented in relation to an iButton® or similar electronic key
  • FIG. 11 illustrates the configuration of the electronic mechanism of the USB locking dongle
  • FIG. 12 illustrates the Port Lock programming system.
  • FIG. 13 depicts an exterior, top angled view and FIG. 14 depicts an exterior, bottom angled view of the hook casting embodiment.
  • FIG. 15 depicts an exterior, side view of the hook casting embodiment with the rear of the device visible.
  • FIG. 16 depicts a sectional view of the hook casting embodiment in the locked position
  • FIG. 17 depicts a sectional view in the unlocked position.
  • FIG. 18 depicts a top view of the printed circuit board included within the hook casting embodiment.
  • FIG. 19 depicts a top-angled view of the hook casting embodiment in the locked position with the outer casing removed.
  • FIG. 20 depicts a top-angled view during the unlocking mechanism with the outer casing removed.
  • FIG. 21 depicts a sectional view of the hook casting embodiment in a locked position.
  • FIG. 22 depicts a sectional view of the hook casting embodiment in during the unlocking mechanism.
  • FIG. 23 depicts a sectional, angled view of the hook casting embodiment in the locked position.
  • FIG. 24 depicts a sectional, angled view of the hook casting embodiment during the unlocking mechanism.
  • FIG. 25 depicts the hook casting removed from the Port Lock device.
  • FIG. 26 depicts a sectional view of the Port Lock hook casting embodiment in an unlocked position.
  • FIG. 27 is a flow chart that illustrates the programming steps to initialize the USB locking dongle
  • FIG. 28 is a flow chart that illustrates the programming of a USB locking dongle
  • FIG. 29 is a flow chart that illustrates the programming of an iButton® 26.
  • FIG. 30 is a flow chart that illustrates decoding of the iButton® 26 or electronic key device to unlock the USB locking dongle.
  • the present invention is directed to a USB port locking device.
  • the Port Lock comprises a dongle that physically locks into a USB port and an electronic key to unlock the dongle and release the dongle from the port.
  • the Port Lock can be installed into any computer port regardless of whether the computer is powered on. A user simply inserts the USB locking dongle into the USB port of a computer or electronic device. The user slides the external lock housing 12 over the inner case 6, manually locking the USB dongle into the port.
  • the USB dongle comprises a plug 8 that fits into the USB port, blocking access to said port, an external lock housing 12 that encloses the locking mechanism, and an interface to electronically interact with a key.
  • FIG. 1 illustrates an angled, top view of the USB locking dongle in an unlocked position.
  • the USB shell or plug 8 is configured to fit within a USB port.
  • the plug 8 is composed of metal or other suitable material to mechanically plug a USB port.
  • the external lock housing 12 mechanically slides over an inner case 6 to engage the Port Lock into the USB port.
  • Both the external lock housing 12 and the inner case 6 are composed of plastic or other suitable material that is rigid, resistant to physical impact, and cost effective to
  • the Port Lock is shown in an unlocked position in FIG. 1.
  • the Port Lock is in an unlocked position the printed circuit board 2 is pushed away from the plug 8 so that the key terminals 22 are not accessible to an electronic key device because they do not extend far enough out from the USB locking dongle to make contact with said electronic key.
  • FIG. 1 illustrates the location of the key platform 20, which provides a platform to receive a preprogrammed electronic key device to unlock the Port Lock.
  • An electronic key engages with the plurality of key terminals 22 that project from the printed circuit board 2.
  • Three key terminals 22 are depicted in one embodiment. The number of key terminals 22 may vary depending upon what embodiment of electronic key is utilized.
  • the key terminals 22 are soldered to the printed circuit board 2 at the end of the printed circuit board 2 near the key platform 20.
  • This embodiment contains three key terminals 22.
  • the electronic key transfers electronic data including a key code that is specifically programed for unlocking a particular USB locking dongle. While an iButton ® is disclosed as the preferred embodiment of the electronic key, other methods of signal transfer between a key and an electronic USB lock may also be used. Any memory device that stores a key code in nonvolatile memory and allows the transfer of data such as a security key code or similar code, may be used instead of an iButton ® .
  • FIG. 1 illustrates the location of a LED light 28 which is positioned on the top of the external lock housing 12 in this embodiment.
  • the LED light 28 indicates the status of the USB locking dongle.
  • the LED light 28 comprises both a red and a green light.
  • the LED light 28 controls the LED light 28.
  • the LED light 28 flashes red to indicate that the USB locking dongle is locked or engaged via one or more protruding barbs 14 in the female connector of a USB port on a computer or electronic device.
  • the LED light 28 flashes green to indicate that neither of the protruding barbs 14 is engaged with the female connector of the USB port.
  • the Port Lock LED light 28 is flashing green, the USB locking dongle can be safely removed from the USB port.
  • FIG. 2 illustrates a top view of a locked USB locking dongle with the inner case 6 cut away.
  • the locking dongle operates as a plug physically blocking access to the USB port when inserted.
  • the plug 8 is configured to fit within the USB port blocking all access to the USB port.
  • the user slides the external lock housing 12 over the inner case 6.
  • the sliding member 16 pushes the latch tab 48 towards the plug 8, the latch tab 48 movement pushes the locking arm pins 41 causing the locking arms 40 pivot pushing the locking blades 42 into two notches located on the sliding member 16.
  • the locking procedure is performed manually without any electrical power.
  • the Port Lock can be installed in any USB port irrespective of whether the computer or electronic device containing said port is powered on.
  • FIG. 2 depicts the two locking arms 40 while in a locked position.
  • the locking arms 40 are anchored to inner case 6.
  • Locking arms 40 pivot about locking arm pins 41 to move the locking blades 42 out of a locked position unlocking the USB locking dongle.
  • At the end of each locking arm 40 is a half-moon shaped locking blade 42.
  • the locking blades 42 are the physical means of locking the plug 8 into the USB port.
  • the locking arms 40 move so that the locking blades 42 are positioned within a circular notch on the sliding member 16.
  • the sliding member 16 moves within the USB locking dongle to mechanically unlock the dongle when the correct electronic key is received.
  • the shape of the locking blades 42 prevents the sliding member 16 from moving without the presentation of the correct electronic key.
  • FIG. 2 illustrates the location of the solenoid 46 within the external lock housing 12.
  • the solenoid 46 powers the unlocking motion of the USB dongle when signaled.
  • the solenoid 46 is powered by the computer or electronic device via the USB port, which provides 5 volts of power.
  • the electromagnet 44 is positioned on the solenoid 46 so that said electromagnet is positioned in line with the lock pin 70 and the latch tab 48.
  • the electromagnet 44 is composed of iron or a suitable material to create an electromagnet force when the solenoid 46 is energized.
  • the latch tab 48 and lock pin 70 are composed of a ferromagnetic material such as iron, nickel, cobalt, some alloys of rare earth metals, and some naturally occurring minerals such as lodestone.
  • the latch tab 48 is fashioned out of the same piece of metal as lock pin 70.
  • the movement of the latch tab 48 causes said latch tab 48 to push into the locking arm pins 41 that are located on the locking arms 40 allowing the locking arms 40 to pivot about the locking arm pins 41.
  • the pivoting motion of the locking arms 40 causes the movement of the locking blades 42 out of the notches located on the sliding member 16. This releases the sliding member 16 so that a user can manually move the sliding member 16 away from the plug 8, which allows the spring tab 10 to move into the inner case 6 releasing the protruding barbs 14 from the USB port.
  • FIG. 3 depicts an internal, top view of the USB locking dongle.
  • the external lock housing 12 houses the solenoid 46, the electromagnet 44, two case springs 54, and a key platform 20 to position an electronic key to unlock the dongle.
  • Beneath the external lock housing 12 at the key end of the locking dongle are two case springs 54 that secure the external lock housing 12 to the inner case 6.
  • Each of these case springs 54 are compression springs that anchor the external lock housing 12 to the latch tab 48.
  • Molded within the external lock housing 12 are two spring chambers 66.
  • the spring chambers 66 allow the two case springs 54 to coil and uncoil allowing the external lock housing 12 to move in relation to the inner case 6 while said case springs 54 maintain contact with both the external lock housing 12 and the inner case 6.
  • Each spring chamber 66 is positioned on opposite sides of the external lock housing 12 in alignment with the inner case 6.
  • the electromagnet 44 is positioned on solenoid 46 towards the plug 8. Both the electromagnet 44 and the solenoid 46 are centered within the external lock housing 12. A manual release 50 abuts latch tab 48. The manual release allows for the manual removal of the USB locking dongle when said dongle is installed in a computer USB port but is not in a locked position.
  • the solenoid 46 receives an electrical signal from the CPU 80 (shown in FIG. 4) when the correct key is positioned near the key platform 24.
  • the solenoid 46 sends an electrical signal to the electromagnet 46, which energizes the electromagnet 44, causing the electromagnet 44 to produce a ferromagnetic charge that attracts the lock pin 70 and the latch tab 48.
  • FIG. 3 shows the position of the latch tab 48 relative to the two locking arms 40 and the two locking blades 42.
  • Anchoring latch tab 48 to the inner case 6 are two latch tab springs 52. Each latch tab spring 52 is a compression spring. Each latch tab spring 52 is positioned on opposite sides of the outer most points on a "T"-shaped perpendicular extension of the latch tab 48.
  • FIG. 4 depicts an internal view of the USB locking dongle from the top while the USB locking dongle is in an unlocked position. Both the inner case 6 and the external lock housing 12 have been removed from FIG. 4.
  • the printed circuit board 2 is attached to the sliding member 16. Both the printed circuit board 2 and the sliding member 16 move together as one unit.
  • a locking arm 40 is extended outward from the printed circuit board 2 at an angle other than perpendicular to said printed circuit board 2.
  • the printed circuit board 2 extends from the plug 8 through both the inner case 6 and the external lock housing 12 to the terminal pins 22.
  • the printed circuit board 2 mechanically supports the terminal pins 22, the central processing unit 80 (hereinafter "CPU"), the solenoid 44, the latch tab 48, the sliding member 16, and two prongs 4 on the top surface of the plug 8 that physically anchor into USB port or other electronic port.
  • the printed circuit board electrically connects the terminal pins 22, the CPU 80, the solenoid 46, and the locking arms 40 using conductive tracks, pads, and other features.
  • the CPU 80 is positioned on top of the printed circuit board 2 beneath the external lock housing 12 mid way between the attachment points of the terminal pins 22 and the solenoid 44.
  • An electronically coded key device interacts with the terminal pins 22, which transmit the code to the CPU 80.
  • the CPU 80 processes the transmitted code and energizes the solenoid 46 when the correct code is received.
  • FIG. 5 depicts the USB dongle from the top with the inner case 6 and external lock housing 12 removed.
  • the spring tab 10 is located on the bottom of the USB plug 8 and contains two protruding barbs 14 at its free end that are extended down through the plug 8 and into the port of the electronic device plugging said port.
  • the spring tab 10 and protruding barbs 14 are composed of metal, plastic, or other rigid material suitable for creating a lock.
  • the location of the protruding barbs 14 on the bottom of the plug 8 prevents the removal of the Port Lock from a USB port through the use of tweezers or a similar instrument. Any removal of the USB dongle when the protruding barbs 14 are engaged will damage or destroy the USB port making said port inoperable.
  • the external lock housing 12 can be reversibly moved over the inner case 6.
  • the spring tab 10 and protruding barbs 14 are contained within the plug 8 when the USB locking dongle is unlocked.
  • the locking arms 40 are positioned within notches on the latch tab 48.
  • the locking arms 40 are not locked within the notches located on the latch tab 48.
  • the sliding member 16 can be moved in and out of plug 8.
  • the solenoid 46 and electromagnet 44 are not energized.
  • the solenoid 46 and electromagnet 44 are only energized during the unlocking procedure.
  • the USB locking dongle is shown in a locked position in FIG. 6.
  • the spring tab 10 When locked, the spring tab 10 is flush with the plug 8, the protruding barbs 14 are fully extended through plug 8 so that they can latch onto a USB port or other computer port, both locking arms 40 are positioned so that the locking blades 42 are positioned within two corresponding notches located on the sliding member 16 preventing the movement of said sliding member 16, and the solenoid 46 and electromagnet 44 are not energized.
  • FIG. 6 depicts the location of the solenoid 46 and electromagnet 44 in relation to the latch tab 48. The solenoid 46 and electromagnet 44 are much closer to the latch tab 48 in the locked position shown in FIG. 6 than in the unlocked position shown in FIG. 5. In the unlocked position shown in FIG.
  • the sliding member 16 and the printed circuit board 2 may be fully extended from plug 8. Whereas, in the locked position, a much larger length of both the sliding member 16 and the printed circuit board 2 are pushed within the plug 8 and are no longer visible to the user.
  • the overall length of the USB locking dongle is less when the dongle is locked than when the dongle is unlocked and fully extended.
  • the external lock housing 12 houses an electromagnet 44, a solenoid 46, two case springs 54, a key platform 20, and two lock pins 22.
  • the plug 8 comprises the external locking interface, a spring tab 10, and two protruding barbs 14 attached to the free end of the spring tab 10.
  • the two locking arms 40 fit into notches on the sliding member 16.
  • Manually sliding the external lock housing 12 over the inner case 6 forces the sliding member 16 into the plug 8. This pushes the spring tab 10 downward, which pushes the protruding barbs 14 down into the female connector of the USB port.
  • the protruding barbs 14 physically anchor the USB dongle into the USB port.
  • FIG. 5 depicts a side view of the USB dongle in an unlocked position.
  • FIG. 6 depicts a side view of the USB dongle in a locked position.
  • the bottom half of the external lock housing 12 and the inner case 6 have been cut away from these figures.
  • the protruding barbs that are almost absent from FIG. 5, are prominently depicted in FIG. 6.
  • FIG. 5 shows the relative position of sliding member 16 in an unlocked USB locking dongle. Note that the sliding member 16 is positioned on top of the printed circuit board 2.
  • FIG. 6 depicts the sliding member 16 within the USB shell 8 when the USB locking dongle is engaged.
  • Lock pen 70 is obscured by the locking latch springs 52 in the unlocked position of FIG. 5. In the locked position depicted in FIG. 6, lock pin 70 is fully visible.
  • lock pin 70 When the locking dongle is in a locked position, the lock pin 70 does not contact the sliding member 16. When the USB locking dongle is unlocked, lock pin 70, which is attached to the latch tab 48, remains stationary. Lock pin 70 and latch tab 48 only move when the USB locking dongle is energized.
  • FIG. 7 depicts a mid sectional view of the USB locking dongle in an unlocked position.
  • the USB locking dongle In the unlocked position, the USB locking dongle has its maximum overall length.
  • the length of the external lock housing 12 visible to the user is consistent whether the USB locking dongle is locked or unlocked, the visible lengths of both the inner case 6 and the plug 8 are reduced during the locking process.
  • the external lock housing 12 slides over the inner case 6 during the locking mechanism which reduces the overall visible length of the inner case 6.
  • inner case 6 slides over plug 8 during the locking process reducing the visible length of plug 8.
  • FIG. 7 shows the position of the protruding barb 14 when the USB locking dongle is unlocked.
  • the protruding barb 14 is shown retracted within plug 8 in FIG. 7.
  • the protruding barb 14 attaches to the spring tab 10, which attaches to the plug 8.
  • the sliding member 16 is physically secured to the printed circuit board 2. In the unlocked position shown, the sliding member 16 and the printed circuit board 2 are not in contact with the spring tab 10.
  • the USB dongle locks when the sliding member 16 and printed circuit board 2 are pushed into the plug 8 so that the sliding member 16 pushes the spring tab 10 downward, which pushes the protruding barb 14 outside of plug 8 and into a USB port.
  • FIG. 7 shows the length of the printed circuit board 2, which connects to the terminal pins 22 at the electronic key platform 20, spans the length of the dongle, and terminates at the point that the sliding member 16 terminates.
  • the lock pin 70 is at its maximum distance from electromagnet 44 when the USB locking dongle is unlocked. Locking the dongle decreases the distance between the electromagnet 44 and the lock pin 70, which decreases the overall length of the USB locking dongle. During the unlocking process, latch tab 48 and lock pin 70 move closer to the electromagnet 44, which decreases the distance between the lock pin 70 and the electromagnet 44 and decreases the overall length of the USB locking dongle.
  • compression locking latch spring 52 and case spring 54 are shown in an unlocked Port Lock in FIG. 7.
  • the locking latch springs 52 and case springs 54 are at their further positions from each other when the USB locking dongle is unlocked.
  • the external lock housing 12 slides over inner case 6 reducing the distance between the locking latch springs 52 and the case springs 54.
  • FIG. 8 depicts a top view of the USB locking dongle in a non-energized state while FIG. 9 depicts a top view of the USB locking dongle in an energized state.
  • the USB locking dongle is locked in FIG. 8 and unlocked in FIG. 9. Both the external lock housing 12 and the inner case 6 have been removed from the USB locking dongle shown in FIGS. 8 and 9.
  • FIG. 8 shows the USB locking dongle in locked, non-energized state.
  • the locking arms 40 are positioned so that the locking blades 42 are positioned within a notch on the printed circuit board 2.
  • the half-moon shape of the locking blades 42 prevents the removal of the USB locking dongle from the port because the locking blades 42 push against the notch when the external lock housing 12 or the inner case 6 or manually manipulated when the USB locking dongle is non-energized.
  • the lock pin 70 is not in physical contact with electromagnet 44 and lock pin 70 is not magnetically attracted to electromagnet 44 when the USB locking dongle is non-energized.
  • FIG. 9 depicts the USB locking dongle when energized.
  • the USB locking dongle is energized by the USB port when a properly coded electronic key is positioned correctly on the key platform 20 so that said key makes physical contact with all of the key terminals 22. 5 volts of energy are transferred from the USB port to solenoid 46 when the correct key is received. This energy powers solenoid 46, which powers electromagnet 44 and activates the magnetic charge of said electromagnet 44.
  • the energized electromagnet 44 magnetically attracts lock pin 70 to said electromagnet 44 causing the physical movement of lock pin 70 and latch tab 48 towards electromagnet 44 until lock pin 70 sticks to electromagnet 44.
  • the latch tab 48 moves with lock pin 70.
  • FIG. 10 shows a top view of the USB locking dongle with an iButton ® in position to unlock the Port Lock.
  • the memory device 26 makes contact with the three terminal pins 22 located on the key platform 20 that are projecting from the printed circuit board 2.
  • the iButton ® is a commercially available botton-shaped device with an internal, programmable memory device.
  • the iButton ® 26 does not require an internal battery.
  • the iButton ® 26 receives power from the USB port via the key terminals 22 located on the key platform 20 of the USB locking dongle.
  • the stainless steel case of the iButton ® 26 is utilized as a electronic communications device.
  • the iButton ® has two contact points that make contact with the three key terminals 22. Each of these contact points is connected to a silicon chip contained within the iButton ® . Two of these key terminals 22 are data contacts and the third key terminal 22 is a ground contact. This figure shows lock pin 70 making contact with electromagnet 44.
  • the configuration of the electronic locking mechanism located with the lock housing 12 of the locking dongle is depicted in FIG. 11.
  • the key electronic component of the USB locking dongle is the central processing unit 80 (hereinafter "CPU").
  • the CPU 80 contains the firmware that performs all functions in the system and has the non-volatile memory 82 necessary to store the serial number, group ID, and other data elements that are used for decoding the electronic memory device or iButton ® 26.
  • the CPU 80 controls the communications channel for interfacing and transferring information to and from the iButton ® 26 . Additionally, the CPU 80 controls the communications channel for transferring information to and from the programmer.
  • the CPU 80 can be used to transmit data to the computer when the Port Lock is engaged in the USB port.
  • the CPU 80 also can be utilized to communicate with the computer to send data to the programmer relating to any attempts to remove the Port Lock.
  • FIG. 12 illustrates the software and hardware components of the Port Lock.
  • the software and hardware components enable the programming of the iButton ® 26 with the appropriate response so that the USB locking dongle can be disengaged from the USB port.
  • the programmer consists of a computer hard drive, monitor, and key board (34, 36, and 38 respectively), a programming station 30 that can hold one or two iButton ® s 26 and up to eight USB locking dongles.
  • the computer hard drive 34 will maintain a database or be attached to a database server for the assignment of and storage of the USB locking dongle key codes.
  • the computer hard drive 34 is attached via a USB port to the programming station 30 where it is capable of integrating and programming each iButton ® 26 and each USB locking dongle.
  • the programmer will start the programming application and insert one or more 26 and one or more USB locking dongles into 30.
  • the programming application will allow the creation of keys and locks, the programming of a new key for an existing lock, or the programming of one or more new locks for an existing key.
  • Plug 8 is composed of metal or other suitable material to mechanically plug a USB port.
  • Inner case 206 freely slides within outer case 212 when in an unlocked position.
  • An iButton® is positioned against rear sidewall 221 so that it interacts with key terminals 225.
  • Rear sidewall 224 encases rear surface of the device.
  • Inner case 206, outer case 212, and rear sidewall 224 are composed of a suitable material, such as sheet metal, to protect the internal components of the Port Lock and to resist water, corrosion, and tampering.
  • FIG. 14 depicts an exterior, angled view of the bottom of the Port Lock. The top and bottom portions of outer case 212 are secured tightly together with screws shown in this illustration.
  • Plug 8 includes spring tab 10 that contains barbs 14 (numbered in FIG. 17) that are utilized to anchor plug 8 into the USB port.
  • FIG. 15 shows rear sidewall 223 that is shaped to receive an iButton®. Key terminals 21, and two key terminals 222 interact with an iButton® to initiate the unlock function.
  • FIGS. 16 and 17 Sectional illustrations of the Port Lock in both unlocked and locked positions is shown in FIGS. 16 and 17, respectively.
  • spring tab 10 is not engaged with a USB port
  • inner case 206 moves freely in and out of outer case 221
  • solenoid 244 in not powered on
  • the hook 230 of the hook casting member (hook 230, solenoid link mount 236, and cast chassis mount 232) is not in contact with the cast latch ramp 260 or the cast latch shelf 262
  • the printed circuit board 250 moves freely within inner case 206
  • key terminals 222 are not receiving the correct signal from a corresponding iButton®.
  • FIG. 17 illustrates the locked position wherein: printed circuit board 250 is engaged with spring tab 10 forcing barbs 14 into the USB port plugging it, inner case 206 is fully contracted within outer case 212 and is no longer able to freely move back and forth, hook 230 is secured upon cast latch shelf 262 (shown in FIG. 22), solenoid 244 is powered "off, solenoid arm 240 is in a locked position, solenoid link mount 236 is perpendicular to printed circuit board 250, and key terminals 222 are accessible to an iButton®.
  • FIG. 18 depicts a top view of printed circuit board 250.
  • Solenoid link mount 236 is positioned perpendicular to printed circuit board 250 in an "off position. Hook 230 can be seen beneath solenoid link mount 236.
  • Solenoid pull 234 connects to solenoid arm 240 and to chain link 233.
  • the solenoid 244 is powered “on”, which causes solenoid arm 240 to retract within solenoid 244, pulling solenoid pull 234.
  • the pulling motion of solenoid pull 234 causes chain links 233 to pull solenoid link mount 236 so that it is no longer perpendicular to printed circuit board 250, which moves hook 230 into an unlocked position.
  • FIG. 19 A top-angled view of the hook casting embodiment in the locked position without the inner case 206 or outer case 212 is shown in FIG. 19.
  • the unlocking, top-angled view with the casing removed is shown in FIG. 20.
  • the locked position features includes: hook 230 is fixed upon cast latch shelf 262 (shown in FIG. 22) so that hook 230 is positioned parallel to printed circuit board 250, cast chassis mount 232 is parallel to printed circuit board 250 while solenoid link mount 236 is perpendicular to printed circuit board 250, solenoid 244 is powered "off, solenoid pull 234 is not engaged and is fully extended via solenoid arm 240 from solenoid 244, and key terminals 222 are accessible to an iButton®.
  • FIG. 22 A top-angled view of the hook casting embodiment in the locked position without the inner case 206 or outer case 212 is shown in FIG. 19.
  • the unlocking, top-angled view with the casing removed is shown in FIG. 20.
  • the locked position features includes: hook 230 is fixed upon cast
  • FIG. 20 depicts the unlocking mechanism of the hook casting embodiment wherein printed circuit board 250 is freely movable within inner case 206 (shown in FIG. 16), hook 230 is positioned at an angle to printed circuit board 250 as it travels down catch latch ramp 260 (shown in FIG. 22), cast chassis mount 232 is positioned at an angle to printed circuit board 250, solenoid link mount 236 is moves so that it no longer is perpendicular to printed circuit board 250, and solenoid pull 234 is being pulled toward solenoid 244 by solenoid arm 240 while solenoid 244 is powered "on”.
  • FIG. 21 depicts a sectional view of the hook casting embodiment in a locked position and FIG. 22 depicts it during the unlocking mechanism.
  • FIG. 21 depicts the Port Lock in a locked position wherein printed circuit board 250 forces barbs 14 to be fully extended locking the device into a USB port, inner case 206 is fully retracted within outer case 212, hook 230 is locked onto cast latch shelf 262 and unable to slide along cast latch ramp 260, cast chassis mount 232 and hook 230 are parallel to printed circuit board 250, cast chassis mount 232 is pressing against cast chassis mount stop 282, solenoid arm 240 is fully extended from solenoid 244, and void space 280 is at it's smallest length.
  • FIG. 21 depicts the Port Lock in a locked position wherein printed circuit board 250 forces barbs 14 to be fully extended locking the device into a USB port, inner case 206 is fully retracted within outer case 212, hook 230 is locked onto cast latch shelf 262 and unable to slide along cast latch ramp 260, cast chassis mount 232 and hook
  • FIG. 23 A sectional, angled view of the hook casting embodiment is shown in the locked position in FIG. 23.
  • hook 230 is securely locking inner case 206 into outer case 207 forcing barbs 14 to extend outside of the Port Lock.
  • Case chassis mount 232 is forced against chassis mount stop 282 in a locked position, chain link 233 is in a locked position so that solenoid link mount 236 is perpendicular to printed circuit board 250 and solenoid arm 240 is fully extended from solenoid 244.
  • FIG. 24 shows a sectional view of the Port Lock hook casting embodiment during the unlocking mechanism wherein: hook 230 is lifted off of cast latch shelf 262 and slides down along cast latch shelf ramp 260.
  • FIG. 25 depicts the hook casting member which is composed of the following parts:
  • FIG. 26 depicts a sectional view of the Port Lock device in an unlocked position wherein inner case 206 freely moves within outer case 212.
  • Hook 230 rests parallel to printed circuit board 250 along inner case 206.
  • Void 280 is at its maximum length when the device is unlocked.
  • Cast chassis mount 232 is at its maximum distance from chassis mount stop 282 so that it does not contact it.
  • Chain link 233 is in a fixed position when solenoid 244 is powered "off.
  • FIG. 27 is a flow chart that illustrates an example of the steps to initialize the USB locking dongle for programming.
  • the programmer Upon placing one or more USB locking dongles into the programming station 30, the programmer takes the steps as set forth in FIG. 27.
  • the USB locking dongle is inserted into the programming station 30 so that the external lock housing 12 contacts a port on the programming station 30 and the terminal pins 22 (not shown) are in contact with receptors (not shown) located on the programming station 30.
  • the programmer utilizes the Host PC (34, 36, and 38) to select to program the port(s) located on the programming station 30 that corresponds to the port wherein the USB locking dongle is inserted.
  • the Host PC (34, 36, and 38) performs
  • the Host PC (34, 36, and 38) sends a "Reset” packet at Box 104 and, a "Config Enable” packet at Box 106 with the enable code.
  • the "Config Enable” packet contains the code that will unlock the USB locking dongle. If the unlock code sent by the Host PC (34, 36, and 38) is valid at Box 108, then the USB locking dongle responds with an Unlock Response with Acknowledgment (hereinafter "ACK") at Box 112.
  • ACK Unlock Response with Acknowledgment
  • the "Unlock Response with ACK" command informs the Host PC (34, 36, and 38) that a valid code has been received and the USB locking dongle is ready to accept information. If the unlock code sent by the Host PC (34, 36, and 38) is invalid at Box 108, then the programming fails at Box 110 and the initialization process must be repeated starting with Box 102.
  • the Host PC (34, 36, and 38) sends the "Get Serial Number” command at Box 114.
  • the USB locking dongle returns either a current "Serial Number” or no "Serial Number” reply to the Host PC (34, 36, and 38) at Box 116.
  • the Serial Number is a unique number used to identify the USB locking dongle or other device.
  • USB locking dongle does not have an assigned Serial Number at Box 118 as when the electronic key is not an iButton®, then the Host PC (34, 36, and 38) allocates a new Serial Number to the USB locking dongle and sends to the dongle a "Set Serial Number" packet assigning a new Serial Number to the dongle Box 120.
  • the Serial Number is assigned so that it will correspond to a particular iButton® 26 or set of iButton®s 26.
  • the USB locking dongle sets the Serial Number so that it is identified by said Serial Number at Box 122.
  • USB locking dongle responds to the Host PC (34, 36, and 38) with the "Set Serial Number with ACK" response to communicate to the Host that the assigned Serial Number has been successfully assigned and stored in the USB locking dongle memory.
  • the USB locking dongle is now ready for programming, Box 124. The process from Box 102 to Box 124 must be repeated for all USB locking dongles to be initialized.
  • FIG. 28 illustrates the programming of a USB locking dongle by the Host PC (34, 36, and 38). These steps can be taken to either program or reprogram a USB locking dongle.
  • the first step in the programming process is the selection by the Host PC (34, 36, and 38) of which port/device to communicate with at Box 130. Then the Host PC (34, 36, and 38) sends the "Set Master Key" command to the USB locking dongle.
  • the USB locking dongle contains a value known as the Master Key.
  • the Master Key is used to encrypt and decrypt the Memory Encode Key as well as being part of the signature encrypt and decrypt process.
  • the USB locking dongle responds to the "Set Master Key” command at Box 132 by sending a "Set Master Key Response” command at Box 134 to the USB locking dongle.
  • the Host PC (34, 36, and 38) sends to the USB locking dongle a "Set Group ID” command at Box 136.
  • the Group ID is specific to a USB locking dongle or group of USB locking dongles, corresponds to the Group ID assigned to a particular electronic key device, and is used as part of the encryption protocol to unlock the USB locking dongle.
  • the Group ID is assigned to the USB locking dongle and the dongle sends a "Set Group ID Response" shown in Box 138 to the Host PC (34, 36, and 38).
  • the "Set Group ID Response" shown in Box 138 informs the Host PC (34, 36, and 38) that the USB locking dongle is properly programmed at Box 140. Steps shown in Boxes 130 through 140 are repeated for each USB locking dongle to be programmed, Box 142.
  • FIG. 29 illustrates the process of programming an iButton® 26 to function as an electronic key that can unlock the USB locking dongle from a USB computer port.
  • the Host PC 34, 36, and 38 programs the iButton® 26 to unlock a specific USB locking dongle or group of USB locking dongles.
  • an iButton® 26 does not need to be programmed with a Serial Number because it comes preprogrammed with a Master Key that is used to encrypt and decrypt the Memory Encode Key and is part of the signature encrypt and decrypt process. While the encryption/decryption process of the instant invention is proprietary, it should be apparent to one of ordinary skill in the art that any suitable
  • the Host PC retrieves the Master Key from the iButton® 26 and randomly generates a Memory Encode Key.
  • the Memory Encode Key is then encrypted using a proprietary encryption scheme with the Master Key.
  • the Master Key and the plain text Memory Encode Key and the Group ID's for a specific iButton® 26 are all encrypted creating a signature, which is appended to the Memory Encode Key and stored on the iButton® 26.
  • the information stored on the iButton® 26 is broken down into segments with each segment having a cyclic redundancy check computed and stored on the iButton® 26. Each iButton® 26 can be programmed with multiple signatures until the device is full.
  • FIG. 30 is a flow chart depicting the steps in decoding the iButton® 26 to unlock the USB locking dongle.
  • the USB locking dongle Upon positioning the iButton® 26 or electronic key device in contact with the terminal pins 22 of the USB locking dongle at Box 160, the USB locking dongle verifies that the cyclic redundancy check stored on the iButton® 26 is correct, Box 162.
  • the USB locking dongle retrieves a data page of non-volatile memory from the iButton® 26 to verify that the cyclic redundancy check is correct at Box 162.
  • the USB locking dongle attempts to read the cyclic redundancy check up to three more times at Box 166. Prior to unlocking, the LED light 28 flashes red to indicate that the USB locking dongle can not be removed from the port. If the cyclic redundancy check can not be verified, the unlock procedure can not be initiated and the USB locking dongle remains locked in the USB port or other computer interface port plugging said port. If the cyclic redundancy check is correct Box 164, then the USB locking dongle verifies that the Memory Encode Key stored on the iButton® 26 is correct at Box 168.
  • the USB locking dongle retrieves its internally stored Master Key at Box 170 and uses the Master Key to decode the Memory Encode Key stored on the USB locking dongle at Box 172.
  • the USB locking dongle concatenates the Master Key and the Memory Encode Key together and uses them to decrypt each signature retrieved from the iButton® 26 at Box 174.
  • the USB locking dongle confirms that the iButton® 26 signature matches the Group ID stored on the USB locking dongle at Box 178. If the Group ID does not match at Box 178, then the USB locking dongle remains locked within the USB port or other computer interface port at Box 180.
  • the LED light 28 flashes red to indicate that the USB locking dongle is in a locked position. If the signature and Group ID coded on the iButton® 26 don't match the USB locking dongle, the next signature key is decoded and verified. If no valid signature is decoded, the LED light 28 displays a red color. If the iButton® 26 signature matches the Group ID stored on the USB locking dongle at Box 178, then the solenoid within the USB locking dongle engages to unlock the USB locking dongle from the USB port at Box 182. The LED light 28 flashes green to indicate that the USB locking dongle is unlocking. The iButton® 26 or electronic key device may be removed from the terminal pins 22 of the USB locking dongle once the unlock mechanism begins within the USB locking dongle, Box 184.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Details Of Connecting Devices For Male And Female Coupling (AREA)

Abstract

La présente invention concerne un dispositif de verrouillage de port USB comprenant une clé électronique de verrouillage USB qui se verrouille dans un port USB et une clé électronique qui déverrouille la clé électronique USB. La clé électronique de verrouillage USB peut être verrouillée manuellement dans un ordinateur même si l'ordinateur ne reçoit pas d'énergie. La clé électronique de verrouillage USB contient une ou plusieurs barbes saillantes qui viennent en prise avec le connecteur femelle sur un port USB bloquant physiquement l'accès au port. La clé électronique de verrouillage USB peut être retirée en toute sécurité lorsqu'une clé électronique programmée est positionnée le long d'une ou de plusieurs bornes de touche situées sur la clé électronique de verrouillage USB à l'opposé des barbes saillantes. La clé électronique est un dispositif de mémoire spécialement programmé, tel qu'un iButon®, qui peut être programmé pour déverrouiller une clé électronique de verrouillage USB spécifique ou un ensemble de clés électroniques de verrouillage USB.
PCT/US2016/042809 2016-07-18 2016-07-18 Verrouillage de port WO2018017047A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2016/042809 WO2018017047A1 (fr) 2016-07-18 2016-07-18 Verrouillage de port

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2016/042809 WO2018017047A1 (fr) 2016-07-18 2016-07-18 Verrouillage de port

Publications (1)

Publication Number Publication Date
WO2018017047A1 true WO2018017047A1 (fr) 2018-01-25

Family

ID=60993285

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2016/042809 WO2018017047A1 (fr) 2016-07-18 2016-07-18 Verrouillage de port

Country Status (1)

Country Link
WO (1) WO2018017047A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116644482A (zh) * 2023-06-11 2023-08-25 广州进明网络科技有限公司 一种用于计算机软件保护的加密装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050174238A1 (en) * 2001-05-29 2005-08-11 Knut Foseide Theft protection plug for electrical devices
US20060059367A1 (en) * 2004-03-29 2006-03-16 Yarvis Mark D Radio frequency identification tag lock and key
WO2006090091A1 (fr) * 2005-02-23 2006-08-31 Stonewood Electronics Ltd Authentification de l'utilisateur d'un ordinateur
US20100217972A1 (en) * 2007-09-28 2010-08-26 Iloq Oy Lock administration system
US20140130555A1 (en) * 2012-11-15 2014-05-15 Jeff Clark Data port lock
US20150020189A1 (en) * 2013-07-09 2015-01-15 High Sec Labs Ltd. Electro-mechanic usb locking device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050174238A1 (en) * 2001-05-29 2005-08-11 Knut Foseide Theft protection plug for electrical devices
US20060059367A1 (en) * 2004-03-29 2006-03-16 Yarvis Mark D Radio frequency identification tag lock and key
WO2006090091A1 (fr) * 2005-02-23 2006-08-31 Stonewood Electronics Ltd Authentification de l'utilisateur d'un ordinateur
US20100217972A1 (en) * 2007-09-28 2010-08-26 Iloq Oy Lock administration system
US20140130555A1 (en) * 2012-11-15 2014-05-15 Jeff Clark Data port lock
US20150020189A1 (en) * 2013-07-09 2015-01-15 High Sec Labs Ltd. Electro-mechanic usb locking device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116644482A (zh) * 2023-06-11 2023-08-25 广州进明网络科技有限公司 一种用于计算机软件保护的加密装置
CN116644482B (zh) * 2023-06-11 2024-03-15 长沙左卡信息技术有限公司 一种用于计算机软件保护的加密装置

Similar Documents

Publication Publication Date Title
US9858212B2 (en) Port lock
EP2827279B1 (fr) Dispositif de verrouillage d'USB électro-mécanique
US6745330B1 (en) Computer system having peripheral device look
US11933073B2 (en) Digital lock
CN1187510C (zh) 钥匙和锁装置
US20070037454A1 (en) Lock for serial bus connector plugs
US9460319B1 (en) Device for securing a computer port
CN105900107B (zh) 局域网络接口锁定装置
US20080110217A1 (en) Security System and Related Devices and Methods
US20160066444A1 (en) Anti-data theft structures and electronic devices with the same
WO2013101285A1 (fr) Procédé et système pour bus usb avec une clé de contact cryptographique intégrée
US11864335B2 (en) Data center security systems and devices
WO2018017047A1 (fr) Verrouillage de port
US20120028508A1 (en) Memory Jack
US6979220B1 (en) Plug locking mechanism
KR101714426B1 (ko) Usb 보안 시스템 및 usb 보안방법
WO2021155131A1 (fr) Verrou à base de dispositif via une douille électrique
CN110110559B (zh) 一种交互信息处理系统
US11849550B2 (en) Portable dock for electronic key retention devices
WO2007077556A2 (fr) Verrou electronique de memorisation sans energie
CN114784573B (zh) 一种usb插口防护装置
WO2007080508A2 (fr) Système de contrôle d'accès électronique
CN111415439B (zh) 资料保管方法
US20230199999A1 (en) Data center security systems and devices
CN112909654B (zh) 一种计算机信息保护用密码型接口

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16909643

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16909643

Country of ref document: EP

Kind code of ref document: A1