Self-hiding data transmission port data theft prevention encryption device for computer

A technology of hiding data and transmission ports, applied in the protection of internal/peripheral computer components, transmission systems, electrical components, etc., can solve problems affecting transmission efficiency and other issues

Inactive Publication Date: 2021-04-16
杭州墨磬智能技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the deficiencies of the prior art, the present invention provides an encryption device for computers to prevent data theft by hiding the data transmission port, which has the advantages of automatically hiding the data transmission port to prevent data theft, auto

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-hiding data transmission port data theft prevention encryption device for computer
  • Self-hiding data transmission port data theft prevention encryption device for computer
  • Self-hiding data transmission port data theft prevention encryption device for computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] see Figure 1-5 , an encryption device for preventing data theft with a self-concealed data transmission port for a computer, comprising a mount 1, a return spring 2 is movably connected to the top of the mount 1, a connecting rod 3 is movably connected to the top of the return spring 2, and the top of the connecting rod 3 is movably connected Push block 4 is arranged, and explosion-proof plate 5 is movably connected to the top of push block 4, and stro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computer encryption, and discloses a self-hiding data transmission port data theft prevention encryption device for a computer, which comprises a mounting base, a reset spring is movably connected to the top of the mounting base, a connecting rod is movably connected to the top of the reset spring, and a push block is movably connected to the top of the connecting rod. The top of the push block is movably connected with an explosion-proof plate, the top of the explosion-proof plate is movably connected with a strong magnetic block, the left side of the strong magnetic block is movably connected with a transmission port, magnetism is generated by electrifying an electrified coil, and therefore an encryption spring is stretched to deform to drive an encryption magnet to move, and the encryption magnet moves to drive the transmission port to move. Meanwhile, the force compresses the reset spring to deform and then drive the explosion-proof plates to move, and the two explosion-proof plates move oppositely at the moment, so that the two strong magnetic blocks are separated, the connecting seat is completely exposed, and the effect of automatically hiding the data transmission port to prevent data from being stolen is achieved.

Description

technical field [0001] The invention relates to the technical field of computer encryption, in particular to an encryption device used by a computer to prevent data theft from a self-hidden data transmission port. Background technique [0002] With the development of computer technology, people are inseparable from the help of computers in their daily work. People can realize real-time data interaction and information transmission through computers, so that computers often store a large number of secret data of enterprises. Enterprise privacy often chooses to establish an intranet and encrypt files to prevent data leakage. [0003] Although this encryption method is effective, once the encrypted file is transmitted, it may be cracked, which will cause losses to the enterprise. However, the current computer does not have an encryption device for the data transmission port. A large amount of dust accumulated in the port leads to inefficient data transmission. [0004] Theref...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/88
Inventor 姜趁铧
Owner 杭州墨磬智能技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products