Information processing and conversion equipment with information security system
An information security system and conversion equipment technology, which is applied in the field of information processing and conversion equipment, equipment, and multi-functional all-in-one machines, can solve problems such as insecurity and undiscovered information security problems, achieve convenient cost control, and avoid unauthorized use And the effect of misusing and preventing leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Embodiment 1: as figure 2 As shown, it is an information processing and conversion device with an information security system. It is a multifunctional machine with printing, copying, scanning, and fax functions. It can also be a printer, or a copier, or a scanner, or a fax. It can also be a combination of printing and copying, or a combination of copying, scanning and faxing. It consists of an information processing and conversion device main controller 1, a dynamic random access memory (DRAM) 2, a boot memory (Boot Rom) 3, information security system, and shell etc.; Described information security system has security chip 4; This security chip 4 is an integrated circuit chip with LPC interface, and one end has an interface and information processing and conversion equipment The interface of the main controller 1 is connected, and the other end has an interface connected with the boot memory 3; one end of the security chip 4 described in this embodiment is an LPC inter...
Embodiment 2
[0030] The difference from Embodiment 1 above is that the security chip 4 is connected to the boot memory 3 with an SPI interface through an SPI interface.
Embodiment 3
[0032] What is different from above-mentioned embodiment 1 is that described information security system also has a Key5, and safety chip 4 has an interface to be connected with Key5; Safety chip 4 also has USB interface, or MMC card interface, or SD card interface, or MS card One of the interfaces is connected to the corresponding interface of Key5; to be specific: according to the different Key used, the interface of the connected security chip 4 is also different. The optional Key here is USB Key (Device / Host / OTG), In this embodiment, the security chip 4 has a USB interface connected to the USB interface of the Key5.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 