HID (human interface device)-based method for setting access rights of host machine
A technology of access rights and equipment, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of decreased utility ratio and increased cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] (1) When designing a HID device with a USB interface, it is necessary to realize the support of the HID device for necessary character string descriptor functions. A part of these descriptors is used for the function of the HID device itself, and another part is used for the security protection function of the BIOS and the operating system. There is no less than one string descriptor for security protection functions, and the device driver can set and read it.
[0020] (2) According to the use of the computer by the personnel, the personnel and the computer are combined, that is, which computers can be accessed by a certain person, and which personnel can access a certain computer. At the same time, the characteristics of the collected computer are associated with the personnel. For example, collect the MAC address of a computer and associate it with a person. Here is an example to illustrate:
[0021] Assuming that the company has three computers and two employees, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 