×

可穿戴计算机中MCU扮演了什么样的角色

消耗积分:1 | 格式:rar | 大小:0.46 MB | 2017-09-15

分享资料个

  It is hard to recover a lost phone or tablet; and the consequences of a missing mobile device are substantial: So much information is stored in our mobile devices that we are at immediate risk of losing money, being burglarized, or even having our identities stolen. Think about it. Apart from having to re-create e-mail messages, change passwords and log-in names, recover pictures and secure financial accounts, online retailers like Amazon, eBay, and other click-and-buy services all assume it is you at the other end —even if it’s not.

  Our feeble attempts to create and remember passwords are all but nullified if we use the “remember me” or the “keep me logged-in” tab on our devices, and how many of us carry a hard copy of our logins and passwords? Cloud-based services are at risk for hackers as well, so putting your trust in a cloud-based data storage or password recovery system can be risky, as we have seen with celebrity accounts being hacked all the time.

  It was not such a problem when fixed-location computers were desktop and tower boxes, but now our computing devices are small and transportable, so they can be lost or stolen more easily. Wearable computers in particular must “know” who is wearing them to be safe and useful.

  This article looks at how biometrics can be combined with wearable technologies to help ensure that the person using the wearable computer is the one who is authorized to do so. This article examines some technologies that can verify a user’s identity and protect sensitive data, information, and control. All devices, datasheets, tutorials, and development systems referenced here can be found online on Digi-Key’s website.

  Issues and concerns

  Size is a problem when considering the use of biometrics in small, wearable computers. If your computer is the size of a postage stamp or smaller (and with wearable watch computers it is), how do you justify the size, weight, and power burden of a biometric reader that is larger than your wearable device?

  Placement is key as well. If a verification device is physically wired to the wearable computer in a permanent way, it is more secure than a plug-in or wirelessly linked connection. For example, fingerprint detectors and even retinal scanners can be a couple of square inches in area. These easily fit onto a laptop, tablet, or even a smartphone but are too large and bulky to fit into a stamp-sized device. The same may be true with facial recognition systems.

  If plug-in or wireless connection of a user verification system is to be employed, it is best to do so as a “tethered” peripheral. Here the independent-verification system can do the detection, processing, and verification without any intervention from a host. This allows the host to query the verification system

  

声明:本文内容及配图由入驻作者撰写或者入驻合作网站授权转载。文章观点仅代表作者本人,不代表电子发烧友网立场。文章及其配图仅供工程师学习之用,如有内容侵权或者其他违规问题,请联系本站处理。 举报投诉

评论(0)
发评论

下载排行榜

全部0条评论

快来发表一下你的评论吧 !