Mobile PC divulgence prevention device based on user track after departing from predetermined track
A technology of predetermined trajectory and user trajectory, applied in encryption devices with shift registers/memory, services based on location information, secure communication devices, etc., can solve problems such as user information leakage, hidden dangers of people's information security, etc., to prevent Effects of data breaches
Pending Publication Date: 2020-11-24
拾贰叁零智能科技(海安)有限公司
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention discloses a mobile PC divulgence prevention device based on user track after departing from a predetermined track. The device comprises a large-capacity storage system, a four-in-one positioning chip, an encryption chip, a main control MCU chip, an NB-IOT real-time online Internet of Things online monitoring module, a USB3.0 high-speed data interface, a user computer data interface and a system power management module. The device is characterized in that the system power management module provides power for the large-capacity storage system, the four-in-one positioning chip, theencryption chip, the main control MCU chip, the NB-IOT real-time online Internet of Things online monitoring module, the USB3.0 high-speed data interface and the user computer data interface. According to the invention, an encryption task can be set, encryption equipment and important data are strictly monitored, and the encryption equipment and the important data are moved and used in a specifiedtime and a specified track, so that data leakage and acquisition by lawbreakers, competitors and the like are prevented.
Application Domain
Encryption apparatus with shift registers/memoriesInternal/peripheral component protection +2
Technology Topic
Embedded systemInternet of Things +4
Image
Examples
- Experimental program(2)
Example Embodiment
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Keyboard with one-key screen locking function
InactiveCN108459724APrevent Data Leakage
Owner:XIANGYANG NO 42 MIDDLE SCHOOL
Remote access method, computing device and readable storage medium
PendingCN114756317Aavoid visitingPrevent Data Leakage
Owner:UNIONTECH SOFTWARE TECH CO LTD
User plane function information reporting method, access network equipment and core network equipment
PendingCN114071791APrevent Data Leakage
Owner:BAICELLS TECH CO LTD
Design method and device for lubricating oil system for air blower and auxiliary equipment of compressor
ActiveCN106870911Aavoid duplication of effortPrevent Data Leakage
Owner:SHENYANG BLOWER WORKS GROUP CORP
Classification and recommendation of technical efficacy words
- Prevent Data Leakage
Commodity anti-counterfeiting traceability method based on block chain technology
InactiveCN112184252APrevent Data LeakageProtect business privacy data protection
Owner:雲禾(浙江)科技集团有限公司
Distributed cloud security storage method and system and storage medium
PendingCN113641648APrevent Data Leakage
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Message notification isolation method and device
InactiveCN107231293APrevent Data Leakage
Owner:SANGFOR TECH INC
Design method and device for lubricating oil system for air blower and auxiliary equipment of compressor
ActiveCN106870911Aavoid duplication of effortPrevent Data Leakage
Owner:SHENYANG BLOWER WORKS GROUP CORP