Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wireless information security equipment system and security protection method

A technology for information security, wireless transceiver equipment, applied in the direction of program/content distribution protection, etc., can solve the problems of computer crash, stealing user privacy or other data information, data loss, etc., to achieve the effect of improving convenience

Active Publication Date: 2018-03-27
BEIJING SENSESHIELD TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. As a hardware device, the encryption lock may have static electricity when it is physically connected to the USB interface of the computer through the USB connector, which may cause the computer to crash and cause data loss
[0007] 2. When the user is using the encryption lock, if he forgets to unplug the encryption lock when he leaves temporarily for something, then the illegal person may take advantage of it and steal the user's privacy or other data information
[0008] 3. When people use the encryption lock, they may need to insert and remove the encryption lock frequently (such as the process of inserting and removing the lock when going to get off work, leaving work, leaving, etc. every day)
Especially in today's society that advocates convenience and high efficiency, such frequent and repetitive operations have brought great inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless information security equipment system and security protection method
  • A wireless information security equipment system and security protection method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0076] In this embodiment, the wireless transceiver device is a mini USB receiver similar to that used by a wireless mouse (hereinafter referred to as the receiver). It is connected with the computer, and the wireless communication module / unit in the wireless transceiver device and the information security device is Bluetooth (Bluetooth). It is assumed that the transmission distance is set to 3M in this embodiment.

[0077] There is software A on the host computer of the user. When using software A, the dongle needs to be called to return the data or command value required for operation. The user needs to carry the dongle with him (for example, it can be placed in a briefcase, pocket, key chain, etc.). According to an embodiment of the present invention, the specific implementation steps are:

[0078] 1. The receiver automatically detects whether there are other Bluetooth devices within its wireless signal coverage through the built-in Bluetooth communication module;

[0079]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for realizing wireless information security equipment, belonging to the field of information security. The system includes wireless transceiver equipment and information security equipment. The method includes: connecting the wireless transceiver device with the host through the host interface, the wireless transceiver device has a wireless communication module, and automatically detects surrounding wireless signals, and when the information security device enters the signal coverage of the wireless communication module, the wireless transceiver device and the information The security device is connected wirelessly, and the information security device performs identity authentication. After authentication, the data exchange between the host and the information security device is realized through the wireless transceiver device. When the information security device is out of the signal coverage of the wireless transceiver device, the wireless transceiver device is automatically disconnected. connect. Through the method provided by the invention, the information security equipment does not need to be plugged manually, and under the premise of safety, it brings convenience to users in use and has great practical value.

Description

technical field [0001] The invention relates to the field of information security, in particular to a wireless information security equipment system and a security protection method. Background technique [0002] With the progress of society and the improvement of people's living standards, computers have been used in various fields of society one after another, creating a lot of wealth for society and families. However, with the development of computers and the Internet, due to the inherent deficiencies of the Internet, some lawbreakers can take advantage of them. They use viruses, Trojan horses or other malicious programs to invade other people's computers, or intercept the data being transmitted by others at will, steal data information or Destruction caused great losses to users. In today's society, in order to ensure that the software or data information in the computer is not damaged, and to prevent their legitimate rights and interests from being stolen by others, mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
Inventor 不公告发明人
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products