Method based on internet for protecting memory device
A storage device and Internet technology, applied in user identity/authority verification, equipment, digital data authentication, etc., to achieve the effects of security protection, protection of rights and interests, and protection of working status
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] The present invention will be further described below in combination with specific embodiments.
[0023] An Internet-based SSD protection method:
[0024] The client has the following steps in turn:
[0025] 1) Automatically run the network registration unit;
[0026] 2) Automatically read the SN and PN codes of the SSD, and the owner fills in the registration information and uploads it to the server;
[0027] 3) Fill in the owner protection password and other information to upload to the server, and apply for SNS protection to the server;
[0028] 4) Receive the confirmation registration success information downloaded from the server, and the owner who is confirmed as a legitimate user opens SNS, and uploads the owner information of the SSD to the server in real time;
[0029] 5) After receiving the security code comparison and identification results downloaded from the server in real time, once the SSD is found to be lost or stolen, or occupied by an illegal user, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com