Trusted authentication method for image input equipment, and image input equipment thereof
A technology of image input device and authentication method, applied in the field of trusted authentication method and its image input device, capable of solving problems such as damage to the device, susceptibility to virus, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] In order to make the technical solutions and advantages of the embodiments of the present invention more clearly expressed, the technical solutions of the present invention will be further described in detail below through the accompanying drawings and embodiments.
[0043] figure 1 This is a schematic flowchart of a trusted authentication method for an image input device provided by an embodiment of the present invention, such as figure 1 As shown, the method may include the following steps.
[0044] Step 101: The image input device is connected to the host to obtain power. For example, the image input device is connected to the computer host through an interface such as USB, thereby obtaining power from the computer.
[0045] Step 102: The image input device performs a self-check on the device certificate of the image input device. For example, an image input device obtains a device certificate through a read-only memory (ROM, Read-OnlyMemory). The device certificate is a c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 