Computer lock base on micro-electromechanical system information safety strong chain

A micro-electromechanical system and information security technology, applied in the information field, can solve problems such as password theft, and achieve the effect of preventing illegal use and being convenient to use

Inactive Publication Date: 2007-05-16
SHANGHAI JIAO TONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The protection function of the screen saver can be easily removed by restarting the computer. In the second method, the password may be stolen because the password is stored on the hard disk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer lock base on micro-electromechanical system information safety strong chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] As shown in Fig. 1, the present invention includes: USB interface, USB interface controller, micro control unit processor, MEMS micro motor driver and MEMS information security strong link. The USB interface is connected to the USB interface controller, the USB interface controller is connected to the MCU processor, the output of the MCU processor is connected to the MEMS micromotor driver, and the output of the MEMS micromotor driver is connected to the MEMS information The secure strong chain is connected, and the micro control unit processor receives the data signal from the computer from the USB interface controller, decrypts and outputs it to the micro electro mechanical system micro motor driver, and the micro electro mechanical system micro motor driver outputs to drive the micro electro mechanical motor System information security strong chain.

[0018] The USB interface connects the computer lock with the computer through the computer USB interface, and the USB...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention includes USB interface, USB interface controller, MCU processor, MEMS driver for micro motor, and MEMS information security strengthened chain. USB interface is connected to the USB interface controller, which is connected to MCU processor. Output of the MCU processor is connected to MEMS driver, whose output is connected to MEMS strengthened chain. MCU processor receives data signal forwarded by computer from USB interface controller, and decrypts the signal and outputs it to MEMS driver for micro motor. Output of the MEMS driver drives MEMS information security strengthened chain. The invention manages and controls safe starting for computer, and prevents computer from illegal use. Advantages are: computer hardware resources are not opened completely; the said strengthened chain restricts computer resources from use by illegal users; it is convenient to use through USB interface; it is useful for dedicated organizations to manage computers.

Description

technical field [0001] The invention relates to a device in the field of information technology, in particular to a computer lock based on a micro-electro-mechanical system information security strong chain. technical background [0002] With the widespread popularity of computers and the Internet in recent years, many users store private letters, personal photos, emails, credit card numbers, passbook passwords and other personal privacy information, as well as important business data such as government documents, business secrets, and technical secrets. In the computer, how to protect the stored information from being illegally obtained, embezzled, tampered with and destroyed, and to ensure data security has become the most concerned and urgent problem in the current IT industry. At present, the highest level of controlling the use of computers is to use the operating system's identification system to restrict illegal users from entering the operating system. Obviously, it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
Inventor 陈文元李胜勇张卫平
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products