Software encryption device based on data acquisition

A technology of software encryption and data acquisition, applied in data recording, digital data protection, computer security devices, etc., can solve the problems of easy falling, no vibration reduction mechanism, mechanical structure lock easily damaged by external force, etc., and achieve good confidentiality performance , the effect of simple structure

Pending Publication Date: 2021-06-18
陕西紫光宏祥智能科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This new technology described for this purpose allows for better control over how sensitive digital files are stored inside storage media such as disks or tapes. It uses special hardware that helps protect against impacts caused by external shock waves without affecting its function itself. By adjustably changing passwords based upon factors like time-varyings (the frequency) and location where they were taken), these systems make storing and accessing them more securely. Overall, this technology improves protection measures while still maintaining their effectiveness at reducing harmful impacts during use.

Problems solved by technology

This patented technical solution describes how we can safely store and use digital files on small devices like smartphones while also being able to easily transport them around within their own enclosure for storage purposes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software encryption device based on data acquisition
  • Software encryption device based on data acquisition
  • Software encryption device based on data acquisition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A software encryption device based on data acquisition disclosed by the present invention comprises a box body, the top of the box body is movably connected with a box cover, the outer surface of the top of the box cover is fixedly provided with a grip, the outer side of the grip is fixedly sleeved with a hard plastic sleeve, and the front wall of the box body is fixedly provided with an electronic coded lock; a visual screen is embedded in the front wall of the electronic coded lock; a keyboard is arranged on the front wall of the electronic coded lock and located at the bottom of the visual screen. The electronic coded lock, the first lock catch, the second lock catch, the connecting rod, the first sliding block, the second sliding block, the reset spring and the like are arranged; the electronic coded lock can carry out operations such as password change through a computer terminal. Compared with a traditional mechanical lock, the invention is not prone to being damaged, and secrecy performance is better; after being opened, the first sliding block is directly driven by the reset spring to move forwards, the connecting rod is jacked up, and the second sliding block is jacked up, so that a supporting structure is formed, the hard disk is convenient to install and overhaul, and the invention is worthy of being vigorously popularized.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 陕西紫光宏祥智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products