Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipher code controlled mouse and method of controlling computer by using the mouse

A technology for controlling computers and ciphers, applied to calculations, input/output processes of data processing, instruments, etc., which can solve problems such as inconvenience

Inactive Publication Date: 2007-11-07
INVENTEC CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is quite inconvenient to have to wait for a long computer boot time (depending on the computer grade, usually 1 or 2 minutes, or even longer) after shutdown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher code controlled mouse and method of controlling computer by using the mouse
  • Cipher code controlled mouse and method of controlling computer by using the mouse

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Please refer to FIG. 1 , which is a system block diagram of a password-controlled mouse and its control method system in the present invention. As shown in the figure, the password-controlled mouse 70 includes an input module 10, a control module 20, a timer module 30, and a password module. 40, and the output module 50, the operating relationship between the modules is described as follows:

[0030] The mouse 70 with password control includes an input module 10, and the input module 10 includes a group of input buttons, and the input buttons include a left button, a right button, and a middle button. Corresponding input signals can be generated by pressing the input button, including a left button signal, a right button signal, and a middle button signal, and then the input signal is transmitted to the control module 20 . But not all input keys are composed of left key, right key, and middle key. Some input keys only have two keys, left key and right key, and some also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a cypher-controlled mouse. Said mouse has safety cypher, and includes input module, control module, timer module, cypher module and output module. Said invention also provides the concrete action of the every module, and also provides the method for controlling computer by utilizing said mouse.

Description

technical field [0001] The invention relates to a safety mechanism related to a mouse, and relates to a technology that the mouse has a group of safety codes, and the computer can only be unlocked by inputting the correct safety codes through the keys of the mouse. Background technique [0002] There are a lot of data stored in the computer, some are valuable data, some are confidential data, and some are personal private data. Users are usually unwilling to disclose the above data. Therefore, appropriate protection must be adopted when the user leaves the computer. method to ensure that the data in the computer will not be easily used by others. [0003] One possible method is to shut down the computer, since a power-on password is required to gain access to the computer. However, it is quite inconvenient to have to wait for a long computer startup time (depending on the computer grade, usually needing 1 or 2 minutes, or even longer) after shutdown. Therefore, the present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F3/033G06F3/0354
Inventor 游巧毓
Owner INVENTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products