External terminal protection equipment and protection system comprising identity information verification
A technology of identity information and protective equipment, applied in the field of computer security, can solve problems such as damage, lack of security awareness, lack of identification ability, etc., to solve security risks, avoid illegal intrusion and theft, and reduce system security risks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0029] According to a preferred embodiment of the present invention, the file monitoring module includes:
[0030] An identity information storage unit, used to temporarily store the identity information of the user;
[0031] The identity identification unit is used for verifying whether the identity information of the user satisfies the preset access authority.
[0032] According to a preferred embodiment of the present invention, the identity information storage unit is further configured to pre-store the identity information of users who satisfy the access rights.
[0033] According to a preferred embodiment of the present invention, when the external interface is connected to an external device, the identity identification unit matches the identity information collected from the user with the pre-stored identity information of the user satisfying the access authority. If the match is successful, the user satisfies the access permission.
[0034] According to a preferred ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap