Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio recognizing computer security locking authentication system and method thereof

A computer security and radio frequency identification technology, applied in the field of security authentication, can solve the problems of inconvenient portability and inconvenience of use of locked devices, and achieve the effect of facilitating user management and improving security.

Active Publication Date: 2008-02-27
LENOVO (BEIJING) CO LTD
View PDF1 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The object of the present invention is to provide a computer security locking authentication system and method of radio frequency identification, which solves the problems of inconvenient portability and limited use of the locking device during the computer security locking process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio recognizing computer security locking authentication system and method thereof
  • Radio recognizing computer security locking authentication system and method thereof
  • Radio recognizing computer security locking authentication system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solution and advantages of the present invention clearer, the radio frequency identification computer security locking authentication system and method of the present invention will be further described in detail below in conjunction with the accompanying drawings 1-4 and the embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] In the radio frequency identification computer security locking authentication system and method of the present invention, in the case that the main device computer has a first radio frequency identification device and the slave device mobile terminal has a second radio frequency identification device, the first radio frequency identification device of the master device computer is passively It works in the active mode of the second radio frequency identification device of the mobile term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a kind of radio-frequency identifying computer security locking authentication system and method. The system includes host computer and sub active terminal, in which the host computer includes security locking controller and the first radio-frequency identifying device; the sub active terminal includes the second radio-frequency identifying device, the first radio-frequency identifying device including the first radio-frequency identifying security locking certification unit and connected with the security locking controller and used for interacting with the sub active terminal on the radio-frequency identifying link and carrying out the security locking certification with the sub active terminal by the host computer certificate; the second radio-frequency identifying device includes the second radio-frequency identifying security locking certification unit, used for interacting with the host computer on the radio-frequency identifying link and carrying out the security locking certification with the host computer by the sub active terminal certificate, controlling the security locking of the computer power disconnect switch when the switch is in resting state. It can carry out the computer security locking authentication.

Description

technical field [0001] The invention relates to safety authentication technology, in particular to a radio frequency identification non-contact computer safety locking authentication system and method. Background technique [0002] With the development of non-contact radio frequency identification technologies such as RFID (Radio Frequency Identification, radio frequency identification) and NFC (Near Field Communication, short-range radio frequency communication), more and more mobile devices have begun to add functions of non-contact chips to complete Functions such as shopping, electronic ticket purchase, small-amount electronic payment, data exchange between mobile terminals and access control. [0003] The non-contact radio frequency identification terminal makes it possible to exchange data between mobile terminals without any settings by the user. At this time, the user only needs to bring the two mobile terminals close together, and the terminal will automatically per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/34
Inventor 于辰涛
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products