CN110113159A - A kind of Internet of Things ciphering terminal - Google Patents
A kind of Internet of Things ciphering terminal Download PDFInfo
- Publication number
- CN110113159A CN110113159A CN201910373712.0A CN201910373712A CN110113159A CN 110113159 A CN110113159 A CN 110113159A CN 201910373712 A CN201910373712 A CN 201910373712A CN 110113159 A CN110113159 A CN 110113159A
- Authority
- CN
- China
- Prior art keywords
- outer cover
- interface
- internet
- things
- usb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 claims description 3
- 239000007787 solid Substances 0.000 claims 2
- 230000005611 electricity Effects 0.000 claims 1
- 238000003466 welding Methods 0.000 claims 1
- 230000017525 heat dissipation Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 206010039203 Road traffic accident Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to internet of things field more particularly to a kind of Internet of Things ciphering terminals.Including the end USB and key end, the end USB includes USB interface, outer cover, and the outer surface of outer cover is lock collar, and lock collar is divided into 3-6 fore shaft;A socket is equipped at each fore shaft, one of them or several sockets are connected with USB interface by route;The spigot not being connected with USB is equipped with locking mechanism, and the locking mechanism includes being located in the sliding slot of socket corresponding position with the worm screw in outer cover, worm screw, two sides are equipped with tooth, it is engaged respectively with the worm gear of two sides, worm gear is engaged with the tooth of briquetting, and worm gear center is fixed in outer cover by shaft;Key end is divided into interface, chip and shell.The present invention grasps tap position information and key end by special messenger, realizes encryption, and the information after avoiding key from losing is stolen, meanwhile, tap position is variable, and invalid socket has locking device, further improves level of encryption.
Description
Technical field
The present invention relates to internet of things field more particularly to a kind of Internet of Things ciphering terminals.
Background technique
Internet of Things (English: Internet of Things, abridge IoT) is the carrying of the information such as internet, conventional telecommunications net
Body allows all common objects that can exercise standalone feature to realize the network to interconnect.Internet of Things is generally wireless network, and due to
Equipment around everyone can achieve 1,000 to 5,000, so Internet of Things may include 500 million to one gigabit objects.
On Internet of Things, everyone can applying electronic label by true object surf the Internet be coupled, can be found on Internet of Things
Their specific location.Machine, equipment, personnel can be managed concentratedly with central computer, be controlled by Internet of Things,
Household equipment, automobile can be remotely controlled and searching position, prevent article stolen etc., similar automation control system, together
When through collect these minor matters data, can finally be gathered into big data, comprising redesign road to cut down traffic accidents, city
It updates, the great change of hazard prediction and crime prevention and cure, epidemic disease control etc. society, realizes that object and object are connected.
Internet of Things digitizes real world, and application range is very extensive.Internet of Things furthers the information of dispersion, unite whole object with
The digital information of object, the application field of Internet of Things mainly include following aspect: transport and logistics field, industry manufacture, health doctor
Treat territory, intelligent environment (family, office, factory) field, individual and social field etc., with very wide market and
Application prospect.
And the safety problem of Internet of Things is always current problem to be solved, once Internet of Things enters by external malice
Invade, unlocking information or unlock data be trapped in the case where, be very easy to security risk occur, cause in entire Internet of Things
There is data hidden danger, or even leakage user information in equipment;Traditional mode is to carry out safety by modes such as algorithm for encryption mostly
Protection, all has ignored the safety of terminal structure, certificate and key are once stolen, and the safety of information just will receive huge
It threatens.
Summary of the invention
It the technical problem to be solved by the present invention is to traditional mode is prevented safely by modes such as algorithm for encryption mostly
Shield, all has ignored the safety of terminal structure, certificate and key are once stolen, and the safety of information just will receive huge prestige
The side of body.
To achieve the above object, the application grasps tap position information and key end by special messenger, realizes encryption, avoids close
Information after key is lost is stolen, meanwhile, tap position is variable, and invalid socket has locking device, further improves encryption
Degree.
To solve the above problems, being encrypted transmission port, including USB the invention discloses a kind of Internet of Things ciphering terminal
End and key end, the end USB include USB interface, outer cover, and the inside of outer cover is equipped with USB interface, is connected with terminal interface,
When key is connected to correct socket, unlock is completed in route connection, and when being connected to the socket of mistake, route is not connected to, nothing
Method completes unlock;The forms such as outer cover is fixedly connected with terminal, and connection type is such as, but not limited to welded, locked, will
USB interface is enclosed in inside outer cover, prevents violence disassembly unlock;The outer surface of outer cover is lock collar, and lock collar is divided into 3-6 fore shaft, depending on
Depending on encryption level and key number, fore shaft is more, and encryption level is higher, and the key that can be set can also be more;Each fore shaft
Place is equipped with a socket, one of them or several sockets are connected with USB interface by route, can set only one and effectively insert
Mouthful, effective socket is the socket that can be connected to terminal after connecting, and the people for possessing key must remember the position of effective socket
It sets, key, which is inserted in effective socket just, can transmit certificate unlock, can also set multiple effective sockets, and more people possess key,
Remember that everyone effective tap position can unlock;The spigot not being connected with USB is equipped with locking mechanism, the locking mechanism
Including with the worm screw in outer cover, worm screw is located in the sliding slot of socket corresponding position, and two sides are equipped with tooth, and the worm gear with two sides is stung respectively
Close, worm gear be engaged with the tooth of briquetting, and worm gear center is fixed in outer cover by shaft, when the invalid socket of key insertion (i.e. not with
USB connected socket) when, it will push worm screw and inwardly move, drive worm gear rotation, briquetting is under the drive of worm gear to runner movement
Key is squeezed, is realized locked;Key end is divided into interface, chip and shell, interface and socket grafting, and chip is fixedly connected on shell
On interior circuit board, with certificate in chip, certificate only just can be read when chip is connect with terminal, realize solution
Lock.
Further, with different certificates in several key ends, all certificates are all inserted into interface and computer is whole
It can just be unlocked after the connection of end.At this point, can more people hold different keys, proprietary key is all inserted into read certificate after can just solve
Lock, security classification is higher, any one key missing can not all unlock.
Further, shell is equipped with several heat release holes, convenient for heat dissipation.
Further, grafting between the inner surface and the outer surface of outer cover is equipped with lock at interface.It is invalid slotting in key insertion
After mouth is locked, it can be unlocked by dismantling outer cover, be reused after unlock.
Further, it is connected between the USB interface and terminal by data line, data line is detachable, is convenient for
Replacement.
Further, key end is equipped with lid, with interface grafting.Interface is avoided to damage.
The beneficial effects of the present invention are:
1. being maintained secrecy by way of double-encryption, first is that the certificate in key, computer can just be decrypted by possessing certificate
Terminal;Second is that the position of effectively socket, it is necessary to, just can be complete when being inserted into certificate or more people in correct position while being inserted into certificate
At the connection of key, information leakage caused by due to key loses is avoided.
2. having locking mechanism, it can be locked when key is inserted into invalid socket, key can not take out, and then protect information peace
Entirely.
3. key flexible form is changeable, can more people hold same key, any individual can unlock, can also more people hold not
Same certificate, it is necessary to which more people unlock simultaneously.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described.It is clear that the accompanying drawings in the following description is of the invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other attached drawings.
Fig. 1 is decomposition texture schematic diagram of the invention;
Fig. 2 is the front elevation of outer cover;
Fig. 3 is the cross sectional view of locking mechanism;
Fig. 4 is the cross sectional view of locking state;
In figure, the end USB 1, usb 11, outer cover 12, key end 2, interface 21, shell 23, lid 24, lock collar 3, fore shaft 31,
Socket 32, briquetting 33, worm screw 34, worm gear 35.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.Obviously, described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Embodiment 1:
A kind of Internet of Things ciphering terminal is encrypted transmission port, including the end USB 1 and key end 2, the end USB include that USB connects
The inside of mouth 11, outer cover 12, outer cover is equipped with USB interface, is connected with terminal interface, when key is connected to correct socket
When, unlock is completed in route connection, and when being connected to the socket of mistake, route is not connected to, and is unable to complete unlock;Outer cover 12 and meter
The forms such as calculation machine terminal is fixedly connected, and connection type is such as, but not limited to welded, locked, USB interface is enclosed in inside outer cover,
Prevent violence disassembly unlock;The outer surface of outer cover is lock collar 3, and lock collar 3 is divided for 3-6 fore shaft 31, a depending on encryption level and key
Depending on number, fore shaft is more, and encryption level is higher, and the key that can be set can also be more;A socket 32 is equipped at each fore shaft,
One of them or several sockets are connected with USB interface by route, and the effective socket of only one can be set, and effective socket connects
The socket that can be connected to afterwards with terminal, the people for possessing key must remember the position of effective socket, key to be inserted in effectively
Certificate unlock can be just transmitted in socket, can also set multiple effective sockets, and more people possess key, remember that everyone effective inserts
Mouth position can all unlock;The spigot not being connected with USB is equipped with locking mechanism, and the locking mechanism includes and the worm screw in outer cover
34, worm screw is located in the sliding slot of socket corresponding position, and two sides are equipped with tooth, is engaged respectively with the worm gear 35 of two sides, worm gear and briquetting
33 tooth occlusion, worm gear center are fixed in outer cover by shaft, and when key is inserted into invalid socket, (what is be not connected with USB is inserted
Mouthful) when, it will push worm screw and inwardly move, drive worm gear rotation, briquetting squeezes key to runner movement under the drive of worm gear, real
Now lock;Key end 2 is divided for interface 21, chip and shell 23, and interface 21 and 32 grafting of socket, chip are fixedly connected on shell 23
On interior circuit board, with certificate in chip, certificate only just can be read when chip is connect with terminal, realize solution
Lock.
Embodiment 2:
With different certificates in several key ends, all certificates are all inserted into after interface is connect with terminal
It can unlock.At this point, can more people hold different keys, proprietary key is all inserted into read certificate after can just unlock, security classification
Higher, any one key missing can not all unlock.
Remaining is same as Example 1.
Embodiment 3:
Shell 23 is equipped with several heat release holes, convenient for heat dissipation.
Remaining is same as Example 1.
Embodiment 4:
Grafting between the inner surface and the outer surface of outer cover is equipped with lock at interface.Invalid socket is inserted into key to be locked
Afterwards, it can be unlocked by dismantling outer cover, be reused after unlock.
Remaining is same as Example 1.
Embodiment 5:
It is connected between the USB interface and terminal by data line, data line is detachable, is conveniently replaceable.
Key end is equipped with lid 24, with interface grafting.Interface is avoided to damage.
Remaining is same as Example 1.
Claims (6)
1. a kind of Internet of Things ciphering terminal, it is characterised in that: be encrypted transmission port, including the end USB and key end, the end USB packet
USB interface, outer cover are included, the inside of outer cover is equipped with USB interface, is connected with terminal interface;Outer cover and terminal are solid
Fixed connection, the forms such as connection type such as, but not limited to welding, locking;The outer surface of outer cover is lock collar, and lock collar is divided into 3-6
Fore shaft;A socket is equipped at each fore shaft, one of them or several sockets are connected with USB interface by route;Not with USB phase
Spigot even is equipped with locking mechanism, and the locking mechanism includes being located at socket corresponding position with the worm screw in outer cover, worm screw
In sliding slot, two sides are equipped with tooth, are engaged respectively with the worm gear of two sides, and worm gear is engaged with the tooth of briquetting, and worm gear center is solid by shaft
It is scheduled in outer cover;Key end is divided into interface, chip and shell, interface and socket grafting, and chip is fixedly connected on the intracorporal electricity of shell
On the plate of road.
2. Internet of Things ciphering terminal according to claim 1, it is characterised in that: with different cards in several key ends
Book, all certificates are all inserted into after interface is connect with terminal and can just unlock.
3. Internet of Things ciphering terminal according to claim 1, it is characterised in that: shell is equipped with several heat release holes.
4. Internet of Things ciphering terminal according to claim 1, it is characterised in that: the inner surface and the outer surface of outer cover interleaves
It connects, lock is equipped at interface.
5. Internet of Things ciphering terminal according to claim 1, it is characterised in that: the USB interface and terminal it
Between pass through data line connect.
6. Internet of Things ciphering terminal according to claim 1, it is characterised in that: key end is equipped with lid, with interface grafting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910373712.0A CN110113159B (en) | 2019-05-07 | 2019-05-07 | Internet of things encryption terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910373712.0A CN110113159B (en) | 2019-05-07 | 2019-05-07 | Internet of things encryption terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110113159A true CN110113159A (en) | 2019-08-09 |
CN110113159B CN110113159B (en) | 2020-01-10 |
Family
ID=67488440
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910373712.0A Expired - Fee Related CN110113159B (en) | 2019-05-07 | 2019-05-07 | Internet of things encryption terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113159B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955303A (en) * | 2019-11-14 | 2020-04-03 | 贵州电网有限责任公司 | USB port locking device |
CN113747387A (en) * | 2021-08-30 | 2021-12-03 | 国网山东省电力公司电力科学研究院 | Multi-mode input terminal based on Internet of things control and working method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100169660A1 (en) * | 2008-12-30 | 2010-07-01 | Motorola, Inc. | Public key infrastructure-based first inserted subscriber identity module subsidy lock |
CN101917275A (en) * | 2010-04-23 | 2010-12-15 | 南京邮电大学 | Safe and classified multiple locking method for wireless sensor nodes |
US8255697B2 (en) * | 2002-12-18 | 2012-08-28 | Bware As | Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks |
CN105275278A (en) * | 2015-08-27 | 2016-01-27 | 祁琳 | Intelligent lock based on storage cabinet of Internet of Things and operation method of intelligent lock |
WO2017101122A1 (en) * | 2015-12-18 | 2017-06-22 | 深圳市振华微电子有限公司 | Computer encryption lock having separating management and use |
CN107404484A (en) * | 2017-07-31 | 2017-11-28 | 上海爱优威软件开发有限公司 | A kind of method, apparatus and system of mechanical release authority |
CN109492370A (en) * | 2017-09-11 | 2019-03-19 | 华为技术有限公司 | Method for starting terminal, terminal and signature device |
-
2019
- 2019-05-07 CN CN201910373712.0A patent/CN110113159B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8255697B2 (en) * | 2002-12-18 | 2012-08-28 | Bware As | Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks |
US20100169660A1 (en) * | 2008-12-30 | 2010-07-01 | Motorola, Inc. | Public key infrastructure-based first inserted subscriber identity module subsidy lock |
CN101917275A (en) * | 2010-04-23 | 2010-12-15 | 南京邮电大学 | Safe and classified multiple locking method for wireless sensor nodes |
CN105275278A (en) * | 2015-08-27 | 2016-01-27 | 祁琳 | Intelligent lock based on storage cabinet of Internet of Things and operation method of intelligent lock |
WO2017101122A1 (en) * | 2015-12-18 | 2017-06-22 | 深圳市振华微电子有限公司 | Computer encryption lock having separating management and use |
CN107404484A (en) * | 2017-07-31 | 2017-11-28 | 上海爱优威软件开发有限公司 | A kind of method, apparatus and system of mechanical release authority |
CN109492370A (en) * | 2017-09-11 | 2019-03-19 | 华为技术有限公司 | Method for starting terminal, terminal and signature device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955303A (en) * | 2019-11-14 | 2020-04-03 | 贵州电网有限责任公司 | USB port locking device |
CN113747387A (en) * | 2021-08-30 | 2021-12-03 | 国网山东省电力公司电力科学研究院 | Multi-mode input terminal based on Internet of things control and working method |
Also Published As
Publication number | Publication date |
---|---|
CN110113159B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102016002792B4 (en) | Biometric secret binding scheme with enhanced privacy protection | |
CN110113159A (en) | A kind of Internet of Things ciphering terminal | |
DE102009061814B3 (en) | Method, transmitter, receiver and system for a link and lane level packetization scheme for coding in serial links | |
DE69218335T2 (en) | Method for identifying and exchanging cryptographic keys | |
DE69021936T2 (en) | Method and system for data transmission. | |
CN108012580A (en) | Electronic network device | |
CN106612220A (en) | Flexible Ethernet lane management method and apparatus | |
CN104468090A (en) | Chinese character password encoding method based on image pixel coordinates | |
CN110185338A (en) | A kind of Packaging Bottle electric lock | |
DE212010000037U1 (en) | MECHATRONIC LOCKING DEVICE | |
CN105976473A (en) | Photoelectric cloud lock system and unlocking method thereof | |
CN109191616A (en) | intelligent lock system | |
CN103281194A (en) | Safe and lightweight class RFID ownership transferring method based on bilinear pairings | |
CN107342854A (en) | The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information | |
CN109617875A (en) | A kind of the secure accessing platform and its implementation of terminal communication network | |
CN105808998A (en) | Fingerprint identification device | |
CN207553776U (en) | A kind of public affairs based on Internet of Things rent a house intelligent fingerprint identification door-locking system | |
CN102467774B (en) | There is the cryptographic system of anti-side recording function | |
Kishore et al. | Medical image watermarking: run through review | |
CN105336026B (en) | A kind of method and system for supporting multi-brand electronic password lock | |
Rajesh et al. | Secure communication across the internet by encrypting the data using cryptography and image steganography | |
CN105317294A (en) | Handcuffs | |
CN208669151U (en) | A kind of intelligence safe cabinet | |
CN104363098B (en) | A kind of distributed monitoring end message safety protecting method based on digital encryption | |
CN113850933A (en) | Storage cabinet system with cloud face recognition function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200110 |