Encryption method and encryption device used for wearable device
A wearable device, encryption technology, applied in computer security devices, digital data protection, instruments, etc., to achieve the effect of simple structure, flexible password setting, and strong implementability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] refer to figure 2, install a security device on the wearable device. The security device includes a control module and two switches. Taking a normally open switch as an example, assuming that the two switches are the first switch S1 and the second switch S2 respectively, when the first switch S1 Or when the second switch S2 is closed, the control module will receive a corresponding closed conduction signal. Assume that the default security password of the wearable device set by the user is abcd, where a, b, c, and d are all positive integers, and the user uses this password to unlock the wearable device or enable the wearable device to complete a certain function / behavior (such as mobile payment function). The set security preset password is saved in the control module. The security verification process can perform the following actions in sequence: press the first switch S1, a times; press the second switch S2, b times; press the first switch S1, c times; press the ...
Embodiment 2
[0058] In one embodiment, the security device of the wearable device can use a combination of a control module and a multi-function switch, wherein the multi-function switch is an example of a double-action tact switch, and each double-action tact switch includes two independent switch path. Specifically, such as image 3 As shown, the double-action tact switch is provided with a fourth switch S4 and a fifth switch S5. One end of the fourth switch S4 is electrically connected to the first connection end 1 of the control module, one end of the fifth switch S5 is electrically connected to the fourth connection end 4 of the control module, and the other ends of the fourth switch S4 and the fifth switch S5 are respectively electrically connected to the control module. The second connection end 2 and the third connection end 3 of the module; the fifth connection end 5 and the sixth connection end 6 are all electrically connected to the common ground. Continue to refer to figure...
Embodiment 3
[0061] refer to Figure 4 In the shown embodiment, the security device of the wearable device includes a control module and a rotary switch, and the rotary switch is provided with a rotary button, a sixth switch S6 and a seventh switch S7. The rotary switch features three states to image 3 For example, when the rotary button of the rotary switch is in the middle position, the sixth switch S6 and the seventh switch S7 are in a non-conductive state; when the rotary button of the rotary switch is rotated to the left position, the sixth switch S6 is in a conductive state, and the seventh switch S6 is in a conductive state. The switch S7 is in a non-conducting state; when the rotary button of the rotary switch is rotated to the right position, the sixth switch S6 is in a non-conducting state, and the seventh switch S7 is in a conducting state. Similarly, for the security verification method of this embodiment, the description of Embodiment 1 may also be referred to.
[0062] In ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
