Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer lock and safety case

A computer lock and computer technology, applied in the field of computer locks and security boxes, can solve the problems of insufficient security of computer locks and security boxes, and achieve the effects of enhanced security, convenient use, and enhanced reliability

Inactive Publication Date: 2008-07-30
SHENZHEN JUNWU TECH +2
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to propose a computer lock and a security box containing the computer lock to solve the problem that the computer lock and the security box in the prior art are not safe enough The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer lock and safety case
  • Computer lock and safety case
  • Computer lock and safety case

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The security box management and control system of this specific embodiment is shown in Figure 1, including: an upper layer management terminal, a handheld device, a security box and a password input device.

[0043] The upper management terminal mainly includes a computer and upper management software running on the computer, which may also include a data storage server. The data storage server is used to store data, and it conducts two-way communication with the upper management terminal. The upper management terminal can obtain the required data from the data storage server, and can also transmit the data to the data storage server for storage. The data storage server is generally a dedicated server computer; for relatively small financial institutions, the data storage server can also share a computer host with the upper management terminal. It can also be considered that the upper-layer management terminal has a database associated with the upper-layer management s...

Embodiment 2

[0078] The difference between this specific embodiment and the first embodiment is that the computer lock of the security box also includes a backup system. Because the security box may often encounter falling and falling situations during on-site operation, the computer lock can also be opened through the backup system in the case of failure to open the box normally, so as to ensure that the use will not be seriously affected, and the reliability of the computer lock and the security box will be improved. .

[0079] The functional block diagram of the backup system is shown in Figure 5, including: a computer lock backup processor, a second lock pin drive unit and a computer lock backup interface. The spare interface of the computer lock is used to connect with the spare interface on the hand-held device, receive forced unlocking data and obtain power supply from the hand-held device.

[0080]Of course, before the upper-level management terminal needs to send the forced unloc...

Embodiment 3

[0082] As shown in FIG. 6 , the difference between this embodiment and Embodiment 1 and Embodiment 2 is that a radio frequency reader is also included. The principle of the radio frequency reader is shown in Figure 7. Its core is a microprocessor. In order to show the difference, it is called the processor of the radio frequency reader. In addition, it also includes the wireless transmission module and storage The unit, the clock circuit and the power supply are referred to here as the first wireless transmission module of the RF reader, the storage unit of the RF reader, the clock circuit of the RF reader, and the power supply of the RF reader. In addition, the radio frequency reader in this specific embodiment also includes a 485 bus, which is used to connect multiple radio frequency readers in series and electrically connect with the upper management terminal. The first wireless transmission module of the radio frequency reader uses 2.4G Hz to communicate wirelessly with th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personal computer lock and a private security box. The personal computer lock is matched with a password input device which is used for inputting an unlocking password of the personal computer lock. The personal computer lock comprises a lock body and a lock catch. The lock body comprises a lock pin, a lock pin drive device, and a main board of the personal computer lock controlling the lock pin drive device. The lock pin drive device is dynamically connected with the lock pin, and the main board of the personal computer lock is electrically connected with the lock pin drive device. The main board of the personal computer lock stores the personal computer lock control data of an upper management terminal configuration. The personal computer lock control data and the unlocking password control the action of the personal computer lock together. With adopting the personal computer lock and the private security box of the technical proposal of the invention, because the personal computer lock is arranged in the private security box, and the personal computer lock control data of the upper management terminal configuration and the unlocking password sent by an electronic key control the action of the personal computer lock together, the safety of the personal computer lock and the private security box which comprises the personal computer lock is greatly increased.

Description

technical field [0001] The invention relates to the technical field of financial security management and control, in particular to a computer lock and a security box including the computer lock. Background technique [0002] At present, the security boxes used by banks, security companies and other systems to store and transport cash, securities, gold, silver and jewelry (for banks, they generally store and transport cash, so they are called cash boxes. The safe box generally refers to the box used to store and transport all valuables and items that need to be kept strictly confidential.), most of them are locked with one or two padlocks outside the box made of iron. Traditional mechanical padlocks are not very safe because their keys are easy to duplicate. And because the padlock is on the outside of the box, it can be easily picked open by violence. In addition, it is impossible for traditional mechanical padlocks to record the information of opening the box, which is in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): E05B49/00E05G1/00
Inventor 陈复兴李知岭邱成明赵秋云
Owner SHENZHEN JUNWU TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products