Management-use separated computer encryption lock

A computer and encryption lock technology, applied in the field of electronic combination locks, can solve the problems of inconvenience, information leakage, and hardware being easily cloned and used, and achieve the effect of increasing security, high security, and improving security.

Pending Publication Date: 2017-06-27
SHENZHEN ZHENHUA MICROELECTRONICS +1
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users of this kind of encryption device may leak information due to negligence, misunderstanding, or troublesome operations in the process of information use, such as dismantling the encryption device, or privately connecting lines, etc.
[0003] At present, there is also a product that encrypts the source, but this product generally has disadvantages such as hardware being easily cloned and inconvenient to use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management-use separated computer encryption lock
  • Management-use separated computer encryption lock
  • Management-use separated computer encryption lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to further illustrate the technical means adopted by the present invention and its effects, the following describes in detail in conjunction with preferred embodiments of the present invention and accompanying drawings.

[0064] see figure 1 , The functional separate computer encryption lock provided by the present invention includes an encryption board 100 inserted between the main board of the computer and the hard disk 700, and an electronic key 300 plugged into the encryption board to perform identity authentication with the encryption board 100 .

[0065] In the present invention, the encryption board 100 and the electronic key 300 respectively perform self-inspection on their own hardware after power-on, and after the self-inspection is completed, the electronic key 300 performs hardware pairing detection with the encryption board 100, and performs real-time identity authentication , after the identity authentication is passed, the encryption board 100 en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A management-use separated computer encryption lock includes an encryption board inserted between a main board and a hard disk of a computer; an electronic key which is inserted in the encryption board and can perform real-time identity authentication with the encryption board; the electronic key and the encryption board perform real-time identity authentication and firmware anti-copy detection, and perform encryption on data accessing between the electronic key and the encryption board; after identity authentication and firmware anti-copy detection is completed, the electronic key combines a part of user key lists stored in an inner part and a part of user key lists of the encryption board, and a part of user keys are randomly selected from the key lists according to different storage partitions of the hard disk to perform encryption on data accessing the hard disk. The security of the computer encryption lock is high, the firmware will not be copied, encrypted data in the hard disk and electronic key and encryption board communication data are encrypted and will not be cracked, and the confidentiality is high.

Description

technical field [0001] The invention relates to an electronic password lock, in particular to a computer encryption lock with separated functions. Background technique [0002] At present, the vast majority of information security products mainly protect the outside of the information like a firewall, but do not deal with the protection of the information itself, that is, do not encrypt and decrypt the stored information, and only add an encryption device at the information output end. encryption. For reasons such as ignorance, misunderstanding, or trouble, users of such encryption devices may leak information once they violate regulations during information use, such as dismantling the encryption device or privately connecting lines. [0003] At present, there is also a product that encrypts the source of information, but this product generally has shortcomings such as hardware being easily cloned and inconvenient to use. Contents of the invention [0004] The technical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/72G06F21/31
CPCG06F21/31G06F21/72G06F21/78
Inventor 张建国易子林
Owner SHENZHEN ZHENHUA MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products