Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wireless information security device system and method

A technology for information security, wireless transceiver equipment, applied in the field of wireless information security equipment system, can solve the problems of computer crash, data loss, inconvenience, etc., to achieve high practical value and improve the effect of convenience

Active Publication Date: 2018-05-11
BEIJING SENSESHIELD TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. As a hardware device, the encryption lock may have static electricity when it is physically connected to the USB interface of the computer through the USB connector, which may cause the computer to crash and cause data loss
[0006] 2. When the user is using the encryption lock, if he forgets to unplug the encryption lock when he leaves temporarily for something, then the illegal person may take advantage of it and steal the user's privacy or other data information
[0007] 3. When people use the encryption lock, they may need to insert and remove the encryption lock frequently (such as the process of inserting and removing the lock when going to get off work, leaving work, leaving, etc. every day)
Especially in today's society that advocates convenience and high efficiency, such frequent and repetitive operations have brought great inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless information security device system and method
  • A wireless information security device system and method
  • A wireless information security device system and method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0142] In this embodiment, the host is a Lenovo (ThinkPad) notebook computer with a wireless switch, the wireless communication is bluetooth, the information security device is a dongle, the wireless communication unit in the dongle is a bluetooth communication component, and the dongle switch is open by default. Both the lock confirmation unit and the switch are in the form of buttons. According to a specific embodiment of the present invention, the method for securely transmitting data through a wireless information security device includes specific steps:

[0143] 1. Turn on the wireless switch of the laptop and turn on the Bluetooth function;

[0144] 2. The Bluetooth component of the notebook automatically detects wireless signals within a certain range around;

[0145] 3. When the dongle enters the coverage area of ​​the notebook Bluetooth signal, the notebook Bluetooth component automatically connects with the Bluetooth communication component inside the dongle;

[01...

specific Embodiment 2

[0152] This embodiment is similar to the operation steps of Embodiment 1, the difference is that the host in this embodiment is a computer without wireless communication components, the information security device is a dongle, the dongle has a built-in Bluetooth wireless communication unit, and the wireless transceiver device is similar in shape A USB receiver for a wireless mouse (hereinafter referred to as a USB transceiver), according to an embodiment of the present invention, the method steps of a wireless information security device include:

[0153] 1. Electrically connect the USB transceiver to the host interface;

[0154] 2. The detection module of the USB transceiver automatically detects wireless signals within a certain range around;

[0155] 3. When the dongle enters the wireless signal range, the USB transceiver is automatically connected to the Bluetooth wireless communication unit of the dongle;

[0156] 4. Perform wireless matching (pairing) through the confir...

specific Embodiment 3

[0160] This embodiment is similar to Embodiments 1 and 2, the difference is that this embodiment uses a cable, and the steps of the wireless information security device method provided by this embodiment are:

[0161] 1. When the information security device performs data interaction with the host through wireless communication with the host's own wireless communication components or wireless transceiver equipment, the cable is electrically connected to the information security device and the host;

[0162] 2. The information security equipment communication switching unit automatically switches the wireless communication mode to the USB communication mode, and at the same time, the cable charges the information security equipment;

[0163] 3. When the cable is disconnected from the host, the information security device communication switching unit automatically switches the USB communication mode to the wireless communication mode, and the information security device and the ho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless information security equipment system and method. The system includes wireless transceiver equipment, information security equipment and cables. The invention provides automatic switching between wireless communication and USB communication modes. When there is a cable connection, it interacts with the host through the USB communication mode and charges through the USB; when there is no cable connection, it automatically switches to the wireless communication mode. Automatically detect whether the information security device is within the effective range through wireless, and perform corresponding automatic connection or automatic disconnection and other processing operations accordingly, without manual plugging and unplugging. Through the method provided by the invention, under the premise of safety, the convenience for users to use is greatly improved, and has extremely high practical value.

Description

technical field [0001] The invention relates to the field of information security, in particular to a wireless information security device system and method. Background technique [0002] With the progress of society and the improvement of people's living standards, computers have been used in various fields of society one after another, creating a lot of wealth for society and families. However, with the development of computers and the Internet, due to the inherent deficiencies of the Internet, some lawbreakers can take advantage of them. They use viruses, Trojan horses or other malicious programs to invade other people's computers, or intercept the data being transmitted by others at will, steal data information or Destruction caused great losses to users. In today's society, in order to ensure that the software or data information in the computer is not damaged, and to prevent their legitimate rights and interests from being stolen by others, more and more people begin ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/06H04W12/03H04W12/08
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products