Information safety equipment, control method and system
A technology of information security and control methods, applied in the fields of instruments, electrical digital data processing, etc., can solve the problems of inconvenient use of information security equipment, users cannot log in and use, and operations cannot continue, and achieve the effect of improving the convenience of use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0034] Reference figure 1 , The first embodiment of the present invention proposes a method for controlling information security equipment, including the steps:
[0035] S10. After the information security device is connected to the host and powered on, it receives the status query of the host and returns multiple status unsatisfactory instructions;
[0036] S11. Receive the interrupt signal sent by the host, and give the command to the host to stop the return status satisfying, so as to interrupt running the AUTORUN program; or, the return status satisfying command to the host to run the AUTORUN program.
[0037] The above-mentioned information security equipment may include: a USB (Universal Serial Bus) interface module, a SCSI (Small Computer System Interface, special interface for small computer system) protocol module, an automatic operation module, an information security module, and the like. The information security device can communicate with the host through a USB interface...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap