Equipment data security port identification system
A technology for port identification and device data, applied in the field of data security transmission, can solve problems such as security risks, and achieve the effect of protecting data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0023] Embodiment: a kind of device data security port identification system, such as figure 1 As shown, it includes a data transceiver port 1 and a data connector 2. An electromagnetic coil 3 capable of generating a magnetic field is arranged inside the data transceiver port, and a number of verification coils 22 with different turns are arranged on the data connector. Each verification coil potential The data is transmitted to the data transceiver port through the data connector. A number of magnets 21 are arranged on the data connector, and a number of feedback coils 12 are correspondingly arranged on the data receiving and receiving port, and the potential data of the feedback coil is transmitted to the data receiving and receiving port. The magnet is a secondary coil with different turns. The data connector is provided with an independent power supply, the positive pole of the independent power supply is connected to one end of the secondary coil, and the other end of th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
