Data protection system of control supervisor data enter point
A data protection, entry point technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] see Figures 1A-1B , Figures 1A-1B It is a schematic diagram of the data protection system controlling the data entry point of the present invention. Such as Figure 1A As shown, the data protection system 5 for controlling data entry points in the present invention is mainly composed of a data protection device 10, a contactless card 14 belonging to the user, and a computing device 12 (such as a PDA that can store and process data).
[0027] In short, if the user needs to capture or write data from the data protection system 5, in addition to electrically connecting the computing device 12 to the bus 13 (such as USB, IDE, ATA, etc.) Only after unlocking through the contactless card 14 , which is legal as a key, can the user grab or write data from the data protection system 5 through the computing device 12 . In the system of the present invention, the identification code that can be stored in the RFID non-contact card 14 can replace the account number and password...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
