Current location - Quotes Website - Signature design - How to make USB hardware encryption dog?
How to make USB hardware encryption dog?
First of all, you have to understand the USB protocol (recommended HID protocol). In addition, you should also consider communication with PC, such as what kind of instructions to send, how much to read and where to read. There are also writing operations, preferably arithmetic operations.

Therefore, it is suggested to use HID protocol, because it can avoid developing USB driver and the security level of operating system is getting higher and higher. Some drivers that have not been digitally signed by Microsoft are sometimes killed as Trojans.