A keyboard with limited use authority and its limited method
A keyboard and permission technology, applied in the protection of internal/peripheral computer components, digital data authentication, etc., can solve problems such as hand joint injury, and achieve the effect of preventing hand joint strain, increasing security, and preventing addiction.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] A method for limiting a keyboard for limiting usage authority, comprising the following steps:
[0045] S1, the first processing system 10 requests an external connection;
[0046] An internal power supply is installed in the keyboard, which can be turned on without connecting an external power supply. When the keyboard is turned on, the first processing system 10 of the keyboard requests an external connection through Bluetooth or a USB interface.
[0047] S2, the first processing system 10 receives the connection request from the second processing system 20, and determines whether to establish a connection relationship with the terminal 2;
[0048] Preferably, in the step S2, the specific judgment method includes the following steps:
[0049] S20, after the keyboard receives the connection request from the second processing system 20, it is judged whether the keyboard is adapted to the terminal 2, and if it is judged that it is adapted, step S21 is performed;
[005...
Embodiment 2
[0069] S5. When the keyboard needs to enter the protection mode, the first processing system 10 confirms that the safety key 11 is pressed; after pressing the safety key 11, the connection signal between the keyboard and the terminal 2 is disconnected, and the second processing system 20 prompts the user to input keyboard password;
[0070] Preferably, in the step S5, the keyboard password is composed of letters, numbers and symbols.
[0071] Preferably, in the step S5, except for letter keys, numeric keys and symbol keys, other keys are in a disconnected state.
[0072] The button in the disconnected state will not input a symbol after being pressed, and the display screen 21 prompts the user to re-input.
[0073] S6. After the first processing system 10 successfully obtains the password of the protection mode, it sends the information that the password has been successfully received to the second processing system 20, and the second processing system 20 prompts the user to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


