A security system based on usb-key and its application method
A security system and authentication module technology, applied in the Internet field, can solve problems such as system security and system resource waste, and achieve the effects of simplifying login steps, preventing troubles, and improving system resource utilization.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.
[0025] Described a kind of safety system based on USB-key and using method thereof, comprise embedded device and the USB-key inserted in the embedded device, described embedded device comprises display module, receiving module, authentication module and service module; The built-in mapping port of the receiving module accepts and processes the signal triggered by verifying that the USB-key is inserted into the embedded device, detects whether the hardware connected to the USB port is the corresponding USB-key type, and only responds to the required USB-key type. After detecting that the hardware connected to the USB port is not a USB-key (such as a U disk or other USB port hardware), or is not the type of USB-key used by this system (such as other types of USB-key), the display module will issue an unrecognized Reminder, when the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com