Unlock instant, AI-driven research and patent intelligence for your innovation.
Multi-interface authentication terminal and using method thereof
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A multi-interface and interface technology, applied in the field of communication, can solve problems such as communication conflicts, achieve smooth communication, improve security, and improve authentication efficiency
Active Publication Date: 2020-07-28
北京汇量山河信息科技有限公司
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] The purpose of this application is to provide a multi-interface authentication terminal and its use method, which solves the problem of communication conflicts in the prior art when multiple interfaces are connected to external devices at the same time
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0047] Such as image 3 As shown, the present application provides a multi-interface authentication terminal 100, including an authentication chip 10 and at least two interfaces 20, and,
[0048] The working state judging module 30 is connected with the authentication chip 10 and is used for judging the working state of the authentication chip 10 . The authentication chip 10 is an existing chip, and the authentication chip 10 is used to authenticate authentication information sent by an external device. The authentication information may be fingerprint information or identity authentication information sent to the authentication terminal.
[0049] Specifically, the working state judging module 30 includes:
[0050] The monitoring unit 31 is used to monitor whether there is data transmission in the interface 20 in real time;
[0051] The judging module 32 judges whether the authentication chip 10 is in the working state according to the monitoring result; if the interface 20...
Embodiment 2
[0062] Such as figure 1 As shown, the present application provides a method for using a multi-interface authentication terminal, which includes the following steps:
[0063] Step S1, when at least two interfaces of the authentication terminal establish connections with external devices, determine whether the authentication chip is in a working state;
[0064] If it is in the working state, it means that an interface is being authenticated with an external device.
[0065] Such as figure 2 As shown, the method for judging whether the authentication chip is in working condition includes the following sub-steps:
[0066] Step S110, monitor in real time whether there is data output from the interface of the authentication terminal, and obtain the monitoring result.
[0067] Specifically, by connecting the input end of the working state judging unit with the interface, and connecting the output end of the working state judging unit with the authentication chip, according to whe...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a multi-interface authentication terminal and a using method thereof. The using method comprises the following steps that when at least two interfaces of the authentication terminal are connected with external equipment, whether an authenticationchip is in a working state or not is judged; if the authentication chip is in the working state, the I / O interface is preferentially allocated to the interface for authentication, and the authentication chip is forbidden to carry out authentication communication with external equipment through other interfaces; and if the authentication chip is in a non-working state, any unoccupied interface is allocated to communicate with the authentication chip so as to carry out authentication. The problem that in the prior art, communication conflicts occur when multiple interfaces are connected with external equipment at the same time is solved.
Description
technical field [0001] The present application relates to the field of communication technology, in particular to a multi-interface authentication terminal and a method for using the same. Background technique [0002] Existing terminals as identity authentication devices, such as USBKEY, use one interface to communicate with the authentication host, if multiple interfaces communicate with the authentication host (or external device) at the same time, there will be communication conflicts. [0003] Existing identity authentication devices often wish to use multiple interfaces to connect to the host (or external device) at the same time, for example, one interface communicates with the authentication host (or external device), and the other interface charges the identity authentication device. Contents of the invention [0004] The purpose of this application is to provide a multi-interface authentication terminal and its usage method, which solves the problem in the prior ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.