Internet-of-things key

A technology of the Internet of Things and Internet of Things chips, applied in the field of Internet of Things keys, can solve the problems of lost and difficult to retrieve common keys, and achieve the effect of protecting security and not easily damaged.

Inactive Publication Date: 2015-03-25
HEFEI CHENGTEK ELECTRONICS TECH
0 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] In order to solve the above-mentioned problem that common keys are difficult to find...
View more

Method used

[0012] The key body 1 is made of a hard material, which is not easily damaged, ...
View more

Abstract

The invention relates to an Internet-of-things key which comprises a key body, an Internet-of-things chip and a USB interface. The Internet-of-things chip is embedded into the key body, a positioning module and unique personal information are contained in the Internet-of-things chip, and the USB interface can be directly connected with a computer through a data line. After the USB interface is connected with the computer, the personal information contained in the Internet-of-things chip is changed. The key body is made of hard materials. According to the Internet-of-things key, the function of the Internet of Things is added, and the problem that keys cannot be found easily after being lost in daily life is solved.

Application Domain

Keys

Technology Topic

Internet of ThingsData lines +2

Image

  • Internet-of-things key

Examples

  • Experimental program(1)

Example Embodiment

[0010] In order to make the objectives, technical solutions, and advantages of the invention clearer, the following further describes the invention in detail with reference to the accompanying drawings and embodiments.
[0011] in figure 1 Among them, an Internet of Things key includes a key body 1, an Internet of Things chip 2 and a USB socket 3. The Internet of Things chip 2 is embedded in the key body 1 and contains a positioning module and personal unique information. The USB socket 3 It can be directly connected to the computer via a data cable.
[0012] The key body 1 is made of hard material, which is not easy to be damaged, and effectively protects the security of the internal IoT chip 2.
[0013] The key body 1 can be connected to the computer through the USB port 3, and the personal information in the built-in IoT chip 2 can be changed.
[0014] The above are only the preferred embodiments of the present invention and are not intended to limit the present invention. Any modification, equivalent replacement and improvement made within the spirit and principle of the present invention shall be included in the protection of the present invention. Within range.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Steeping device for ceramic tile laying and blistering preventing

InactiveCN108166722AConvenient to place materialsNot easy to break
Owner:ANHUI MEILIN BUILDING MATERIAL

Sliding gate mechanism for ladle casting, and assembling and using method thereof

InactiveCN106166608AEliminate shear forceNot easy to break
Owner:HANDAN TAIHE METALLURGICAL MACHINERY

Classification and recommendation of technical efficacy words

  • protection security
  • Not easy to break

Shell adding and removing method for Android platform application program protection

InactiveCN103530535Aprotect confidentialityprotection security
Owner:JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD

Blockchain data protection method, device, system and computer readable storage medium

PendingCN109690551Aprotection securityRich types of computing operations
Owner:BCM SOCIAL CORP +1

Industrial access control method and device

InactiveCN102377740AReduce the risk of attackprotection security
Owner:SIEMENS AG

Method and device for implementing graded display of privacy information

ActiveCN101917513Aprotection securityInformation management optimization
Owner:ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products