Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Theftproof method using network isolation transformer characteristics in network equipment

A technology of network isolation and network equipment, applied to anti-theft alarms, instruments, alarms, etc., can solve the problems of no anti-theft methods, etc., and achieve the effect of solving anti-theft problems, convenient installation, and powerful anti-destructive functions

Inactive Publication Date: 2009-08-19
许勇
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to make up for the problem that the existing network equipment has no anti-theft method or has an anti-theft method but has defects, the present invention proposes a method for anti-theft using the characteristics of the network isolation transformer in the network equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Theftproof method using network isolation transformer characteristics in network equipment
  • Theftproof method using network isolation transformer characteristics in network equipment
  • Theftproof method using network isolation transformer characteristics in network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The specific implementation manner of the present invention will be described below in conjunction with the accompanying drawings.

[0020] Such as figure 1 As shown in , it is a schematic diagram of a network isolation transformer included in the network port, and the network isolation transformer contains a resistor network inside. J1, J2, J3, J4, J5, J6, J7, and J8 are the pins of the network port with network isolation transformer. The network isolation transformer is also called the network transformer. It is a magnetic component that connects the Ethernet chip (10 / 100 / 1000) and the terminal network port (RJ45). Its main functions are signal transmission, impedance matching, waveform repair, Clutter suppression and high voltage isolation. The network isolation transformer and the network port can be two independent components, or an integrated component with a network isolation transformer in the network port. The internal circuits of different types of network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of anti-theft technology, in particular to an anti-theft method by making use of the features of a network isolation transformer in network apparatus. The anti-theft method is realized by making use of the characteristics of resistance network and inductive choke of the internet isolation transformer. An anti-theft device designed by utilizing the method can solve the anti-theft problem of most network equipment. If being used for equipment such as a network switch or a hub and the like, the method has wider market prospect.

Description

Technical field [0001] The invention relates to the field of anti-theft technology, in particular to a method for anti-theft by utilizing the characteristics of a network isolation transformer in network equipment. Background technique [0002] There are network isolation transformers in network equipment. Network isolation transformers are also called network transformers. It is a magnetic component that connects the Ethernet chip (10 / 100 / 1000) and the terminal network port (RJ45). Its main function is to act as a signal Transmission, impedance matching, waveform repair, clutter suppression, and high voltage isolation. The network isolation transformer and the network port can be two independent components, or an integrated component with a network isolation transformer in the network port. The internal circuits of different types of network isolation transformers from different companies are different, but they all have one thing in common, that is, they contain inductanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G08B13/00
Inventor 许勇
Owner 许勇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products