CIPHER DATA BOX
First Claim
Patent Images
1. A cipher data box that can encrypt/decrypt the data of a storage device of a computer or equipment, comprising:
- a housing, having a space and at least one opening and a hole;
a printed circuit board, disposed in said space;
a first connector, disposed in said printed circuit board and exposed said opening, for connecting to a storage device;
a second connector, disposed in said printed circuit board and exposed said opening, for connecting to a storage device control circuit of said computer or equipment;
a controller, disposed in said printed circuit board and connecting to said first connector and second connector, respectively, for encrypting/decrypting data of said storage device then outputting, and having a unique first identification code;
a key seat, exposed said hole, and connecting to said controller via wires; and
a key, for inserting into said key seat, having a unique second identification code;
thereby, when said key is inserted into said key seat and said first identification code is same as said second identification code, said storage device can be accessed, and data of said storage device will be encrypted/decrypted.
0 Assignments
0 Petitions
Accused Products
Abstract
A cipher data box comprises: a housing; a printed circuit board; a first connector; a second connector; a controller, having a unique first identification code; a key seat; and a key, having a unique second identification code; therefore, when the key is inserted into the key seat and the first identification code is same as the second identification code, the storage device can be normally accessed, and the data therein will be encrypted/decrypted. Furthermore, for further enhancing the security function of the storage device, a plurality of cipher data boxes of the present invention can be cascade each other.
-
Citations
16 Claims
-
1. A cipher data box that can encrypt/decrypt the data of a storage device of a computer or equipment, comprising:
-
a housing, having a space and at least one opening and a hole; a printed circuit board, disposed in said space; a first connector, disposed in said printed circuit board and exposed said opening, for connecting to a storage device; a second connector, disposed in said printed circuit board and exposed said opening, for connecting to a storage device control circuit of said computer or equipment; a controller, disposed in said printed circuit board and connecting to said first connector and second connector, respectively, for encrypting/decrypting data of said storage device then outputting, and having a unique first identification code; a key seat, exposed said hole, and connecting to said controller via wires; and a key, for inserting into said key seat, having a unique second identification code; thereby, when said key is inserted into said key seat and said first identification code is same as said second identification code, said storage device can be accessed, and data of said storage device will be encrypted/decrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification