Cipher code controlled mouse and method of controlling computer by using the mouse
A technology for controlling computers and ciphers, applied to calculations, input/output processes of data processing, instruments, etc., which can solve problems such as inconvenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Please refer to FIG. 1 , which is a system block diagram of a password-controlled mouse and its control method system in the present invention. As shown in the figure, the password-controlled mouse 70 includes an input module 10, a control module 20, a timer module 30, and a password module. 40, and the output module 50, the operating relationship between the modules is described as follows:
[0030] The mouse 70 with password control includes an input module 10, and the input module 10 includes a group of input buttons, and the input buttons include a left button, a right button, and a middle button. Corresponding input signals can be generated by pressing the input button, including a left button signal, a right button signal, and a middle button signal, and then the input signal is transmitted to the control module 20 . But not all input keys are composed of left key, right key, and middle key. Some input keys only have two keys, left key and right key, and some also...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com