Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A low power consumption key destruction device

A key-breaking and key-pressing technology, applied in the field of low-power key-breaking devices, can solve problems such as the inability to effectively guarantee product safety and reliability, increase equipment maintenance costs, affect user experience, etc., and achieve reliable storage and low cost. , The effect of easy maintenance and adjustment

Active Publication Date: 2022-04-29
武汉船舶通信研究所
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes the safety protection design of many motherboards repeated in actual use, which may conflict with each other in actual use.
At the same time, since the security protection functions are all integrated on the main board, it is impossible to adjust the design for the relevant modules of the security protection function separately, so that the product has certain design defects in the low power consumption processing of the security protection and the multi-power switching processing, which seriously affects the User experience, because the integration with the motherboard also increases the maintenance cost of the equipment later, and the safety and reliability of the product cannot be effectively guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A low power consumption key destruction device
  • A low power consumption key destruction device
  • A low power consumption key destruction device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0028] In the following introduction, the terms "first" and "second" are only used for the purpose of description, and should not be understood as indicating or implying relative importance. The following description provides multiple embodiments of the present invention, and different embodiments can be replaced or combined in combination, so the present invention can also be considered to include all possible combinations of the same and / or different embodiments described. Thus, if one embodiment contains features A, B, C, and another embodiment contains features B, D, then the invention should also be considered to include all other possible combinations containing one or more of A, B, C, D Although this embodiment may not be clearly written in the following content.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a low power consumption key destroying device. The device includes a main board area, a power supply area, a key destroying module, an external power supply battery compartment, a front panel area, a rear panel area, a left cover opening key, a right cover opening key, A key-deleting button on the front panel and a water inlet sensor, the key-destroying button on the front panel is arranged on the front panel area, and the left cover opening key and the right cover opening key are respectively arranged on the front panel area and the rear panel The two sides of the cover plate between the areas; the key destroying module performs information interaction with the control board of the main board area through the interface; the key destroying module communicates with the left cover key and the right cover key respectively through GPIO pins 1. The key destroying button on the front panel is electrically connected to the water inflow sensor, so that the key destroying module performs the key destroying operation after receiving the switching value of the key destroying signal. The present invention realizes multiple key destruction trigger mechanisms under low power consumption, and realizes the key destruction function in different scenarios through the detection of the above-mentioned semaphore and the cooperation of the circuit.

Description

technical field [0001] The present application relates to the technical field of security equipment, in particular, to a low-power consumption key destruction device. Background technique [0002] At present, most of the security protection functions used by security devices on the market are directly implemented on the motherboard, and the modularization of security protection functions has not been realized. This makes the safety protection designs of many motherboards duplicated in actual use, which may conflict with each other in actual use. At the same time, since the security protection functions are all integrated on the main board, it is impossible to adjust the design for the relevant modules of the security protection function independently, so that the product has certain design defects in the low power consumption processing of the security protection and the multi-power switching processing, which seriously affects the User experience, because the integration w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G05B19/042H02J9/06
CPCY04S20/20Y02B70/30
Inventor 徐鹏飞周愚郭浩魏雯樊荣何裕舒罗永富杨军柯志雄邓晖吴怡张昕陈超峰黄灿汪微微
Owner 武汉船舶通信研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products