Peripheral device, authorized device, peripheral device management method and system

A technology for authorized equipment and peripheral management, applied in connection management, wireless communication, electrical components, etc., can solve problems such as inability to use, complicated use process, and no installation, and achieve the effect of reducing dependencies and steps.

Active Publication Date: 2019-08-13
战炜
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For usage scenarios often encountered in business scenarios, such as only allowing some files in the flash drive to be displayed, or permission control such as file modification and file copying is not allowed, it cannot be completed
[0009] 2) The physical keys of the flash disk must be operated when using it. If the flash disk is delivered to others for use, the user must physically touch the flash disk
[0012] 1) The computer using the IronKey peripheral must be connected to the Internet. If the computer is not connected to the Internet, the device cannot be authorized and managed
[0013] 2) The use of IronKey mobile storage requires installation of special drivers and applications on the computer that uses it, which not only brings barriers to system compatibility, but also complicates the user's use process. In order to use such external For example, in some strictly managed computer environments, users often do not install new devices or application permissions
This makes it necessary to log in to the management host to complete the management work. Therefore, if you cannot connect and log in to the management host, or the management host is offline, you cannot authorize and manage the device
[0015] 4) It is only applicable to the equipment of IronKey's own manufacturer, and cannot authorize and manage the equipment of other manufacturers, and does not have universal applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Peripheral device, authorized device, peripheral device management method and system
  • Peripheral device, authorized device, peripheral device management method and system
  • Peripheral device, authorized device, peripheral device management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended to limit the present invention.

[0046] The core idea of ​​the present invention is that, by adding special-purpose software or a combination of software and hardware for authorization on peripherals, and through various communication means (including but not limited to analog communication or data communication, such as cellular mobile network, Wifi, USB data connection) , Bluetooth, NFC, code generation, barcode or two-dimensional code scanning, photoelectric communication, etc.) for communication between software programs, through authorized devices (including but not limited to mobile phones, tablets, laptops, smart watches, etc.) to complete Device management such as device authorization, access control, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a peripheral device, an authorization device, a peripheral device management method and a system. The invention completes the functions of authorization and equipment management through the establishment of communication between the peripheral hardware and the authorized equipment. Wherein the authorization device is a device independent of the host computer using the peripheral device. The present invention can achieve the ability to manage the peripherals in short-distance and remote conditions without depending on the application environment and network environment of the host device using the peripherals. Thereby reducing the steps in the use scenario and reducing the dependence on the use environment, realizing plug-and-management-and-use of peripherals anytime and anywhere.

Description

technical field [0001] The present invention relates to a technology for managing peripherals, specifically, a peripheral, an authorized device, and a method and system for managing peripherals. Background technique [0002] With the full popularity of computers and other intelligent hardware in various industries, peripherals that can be used in computers and intelligent hardware, including but not limited to storage devices, input and output devices, electrical equipment (such as USB reading lights, USB fans, etc.), Display equipment, scanning equipment, printing equipment, network equipment, encryption equipment, etc. also showed explosive growth. With the increasing integration of computers and their peripheral devices, the portability of peripheral devices continues to increase, and the external dimensions continue to shrink, resulting in an increasing risk of peripheral devices being lost inadvertently. Common phenomena such as the U Inserting the disk into a temporar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W76/10H04W12/084
CPCH04W12/08H04W76/14
Inventor 战炜
Owner 战炜
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products