Sound key and computer security protecting method

A computer security and computer technology, applied in the direction of digital data authentication, etc., can solve problems such as being easily cracked, and achieve the effect that it is not easy to steal

Inactive Publication Date: 2014-06-11
HONG FU JIN PRECISION IND WUHAN CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This way of setting the password is easy to be cracked, and the user needs to be authorized to remember the password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sound key and computer security protecting method
  • Sound key and computer security protecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] refer to figure 1 Shown is a functional block diagram of a preferred embodiment of the sound key 10 of the present invention. In this embodiment, the sound key 10 includes a sound sensor 20 , a microprocessor chip 30 , a memory 40 and an interface 50 . The micro-processing chip 30 includes a receiving unit 31 , an analog / digital (A / D) conversion unit 32 , an encryption unit 33 , a storage unit 34 and a sending unit 35 . Units 31-35 are components containing solidified computerized program instructions, and the computerized programs contained in each unit can complete special functions (for details, please refer to the specific introduction of units 31-35 below).

[0013] The sound key 10 is a portable electronic device, which can be connected to the computer 2 through the interface 50 to perform encryption and decryption operations on the computer 2 . The interface 50 can be a serial interface, a USB interface and the like. The sound key 10 can also include a keypad ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sound key. The sound key comprises a sound sensor, a microprocessing chip, a memory and an interface and is connected with a computer through the interface, wherein the microprocessing chip triggers the sound sensor to record a sound signal input by a user after receiving a first pressing signal that the user presses a recording code key, converts the sound signal into a code for storage in the memory and transmits the code to the computer; the computer stores the code; after the sound key is pulled out from the computer, the computer locks a system through the code. The invention also provides a computer security protecting method.

Description

technical field [0001] The invention relates to a computer security protection system and method, in particular to a device and method for encrypting and protecting a computer. Background technique [0002] In order to protect the security of the data in the computer, usually the authorized user adopts the method of setting a power-on password to prevent unauthorized users from using the computer. This way of setting the password is easy to be cracked, and the user needs to be authorized to remember the password. Contents of the invention [0003] In view of the above, it is necessary to provide a device and method for computer security protection, the encrypted password is not easy to be cracked, and does not require legal user memory. [0004] The invention provides a sound key, which comprises: a sound sensor, a micro-processing chip, a memory and an interface. The sound key is connected with the computer through the interface. Wherein, the microprocessing chip: afte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32G06F21/34
Inventor 洪建宏王信书杨敏
Owner HONG FU JIN PRECISION IND WUHAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products