Mobile PC divulgence prevention device based on user track after departing from predetermined track

A technology of predetermined trajectory and user trajectory, applied in encryption devices with shift registers/memory, services based on location information, secure communication devices, etc., can solve problems such as user information leakage, hidden dangers of people's information security, etc., to prevent Effects of data breaches

Pending Publication Date: 2020-11-24
拾贰叁零智能科技(海安)有限公司
0 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] Existing mobile PCs can easily cause user information leakage after deviating from t...
View more

Abstract

The invention discloses a mobile PC divulgence prevention device based on user track after departing from a predetermined track. The device comprises a large-capacity storage system, a four-in-one positioning chip, an encryption chip, a main control MCU chip, an NB-IOT real-time online Internet of Things online monitoring module, a USB3.0 high-speed data interface, a user computer data interface and a system power management module. The device is characterized in that the system power management module provides power for the large-capacity storage system, the four-in-one positioning chip, theencryption chip, the main control MCU chip, the NB-IOT real-time online Internet of Things online monitoring module, the USB3.0 high-speed data interface and the user computer data interface. According to the invention, an encryption task can be set, encryption equipment and important data are strictly monitored, and the encryption equipment and the important data are moved and used in a specifiedtime and a specified track, so that data leakage and acquisition by lawbreakers, competitors and the like are prevented.

Application Domain

Encryption apparatus with shift registers/memoriesInternal/peripheral component protection +2

Technology Topic

Embedded systemInternet of Things +4

Image

  • Mobile PC divulgence prevention device based on user track after departing from predetermined track
  • Mobile PC divulgence prevention device based on user track after departing from predetermined track
  • Mobile PC divulgence prevention device based on user track after departing from predetermined track

Examples

  • Experimental program(2)

Example Embodiment

[0018] Example 1: Please refer to Figure 1-3 , An anti-leakage device for mobile PCs based on user trajectories after leaving a predetermined trajectory, including a large-capacity storage system, four-in-one positioning chip, encryption chip, master MCU chip, NB-IOT real-time online IoT online monitoring module, USB3 0 High-speed data interface, user computer data interface and system power management module, the system power management module is for mass storage system, four-in-one positioning chip, encryption chip, master MCU chip, NB-IOT real-time online IoT online Monitoring module, USB3.0 high-speed data interface, user computer data interface power supply, the main control MCU chip is also connected to the encryption chip, four-in-one positioning chip, NB-IOT real-time online IoT online monitoring module and USB3.0 high-speed data interface, The encryption chip is also connected to the mass storage system, and the USB3.0 high-speed data interface is also connected to the user's computer data interface.
[0019] User management software functions: set encryption tasks, connect to encryption devices, set encryption tasks on the management software (time, motion track, positioning alarm accuracy, alarm handling methods, etc.), set the encryption tasks on the software, and complete the settings according to the tasks , The setting parameters and navigation track parameters will be downloaded to the encryption device, and recognized and executed by the encryption device. The management software still monitors the mobile location of the encryption device and the completion of the encryption task (comparison of the set parameters) in real time (whether it exceeds the predetermined regulations).
[0020] The embedded ARM system SAM L11 inside the main control MCU chip runs the Linux operating system. The capacity of the mass storage system is 128GB-2TB. The four-in-one positioning chip supports GPS/GLONASS/Galileo/Beidou/Beidou-3. The model of the encryption chip is ICP209. The encryption chip supports the national secret algorithm, adopts the irreversible international universal SHA encryption algorithm, anti-copy board/anti-cloning dynamic random authentication, and two-way key authentication to encrypt and store key data.
[0021] The entire encryption device workflow is divided into the following steps:
[0022] 1. PC-side task management software: When the user opens the PC-side management software and connects to the encrypted device, the computer automatically recognizes the encrypted device (standard USB3.0 data interface).
[0023] 2. Set the encryption task, click on the set encryption task software to open the map (support and compatible with Baidu map, Gaode map, Tencent map).
[0024] 3. Set the location route (similar to navigation), from where to where.
[0025] 4. After setting the route, click to generate encrypted route map, the software will automatically intercept the route trajectory of the navigation map and store it in the encrypted device.
[0026] 5. Set the encryption accuracy: the highest accuracy can be selected from 5 meters-50 kilometers, and the default is 200 meters-1 kilometers.
[0027] 6. Set alarm handling: alarm equipment exceeding the predetermined track 200 meters once for 10 minutes (the number and time can be selected), APP alarm, exceeding 2 times, 20 minutes, APP alarm + locking encryption equipment, exceeding 3 times, 30 minutes , APP alarm + lock encryption device + destroy data (each grade can be selected and set).
[0028] 7. The encryption device has its own NB-IOT alarm module. Built-in Internet of Things data card, automatically real-time online, connect to the network and user alarm APP, background management software.

Example Embodiment

[0029] Embodiment 2: On the basis of Embodiment 1: The system power management module includes a 10000mAh battery, which ensures that the device can be used for 2-3 months without power supply, and is automatically charged when the power is plugged in/connected to the PC.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Keyboard with one-key screen locking function

InactiveCN108459724APrevent Data Leakage
Owner:XIANGYANG NO 42 MIDDLE SCHOOL

Remote access method, computing device and readable storage medium

PendingCN114756317Aavoid visitingPrevent Data Leakage
Owner:UNIONTECH SOFTWARE TECH CO LTD

Design method and device for lubricating oil system for air blower and auxiliary equipment of compressor

ActiveCN106870911Aavoid duplication of effortPrevent Data Leakage
Owner:SHENYANG BLOWER WORKS GROUP CORP

UEFI (Unified Extensible Firmware Interface)-based backup and one-key startup item guiding method

PendingCN114168207APrevent Data Leakageeasy to operate
Owner:成都傲梅科技有限公司

Classification and recommendation of technical efficacy words

  • Prevent Data Leakage

Commodity anti-counterfeiting traceability method based on block chain technology

InactiveCN112184252APrevent Data LeakageProtect business privacy data protection
Owner:雲禾(浙江)科技集团有限公司

Distributed cloud security storage method and system and storage medium

PendingCN113641648APrevent Data Leakage
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Message notification isolation method and device

InactiveCN107231293APrevent Data Leakage
Owner:SANGFOR TECH INC

Design method and device for lubricating oil system for air blower and auxiliary equipment of compressor

ActiveCN106870911Aavoid duplication of effortPrevent Data Leakage
Owner:SHENYANG BLOWER WORKS GROUP CORP

UEFI (Unified Extensible Firmware Interface)-based backup and one-key startup item guiding method

PendingCN114168207APrevent Data Leakageeasy to operate
Owner:成都傲梅科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products