Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Notebook computer with hardware safety protection

A notebook computer, hardware security technology, applied in computer security devices, internal/peripheral computer component protection, electrical digital data processing and other directions, can solve network camera protection measures, threats, dangers and other issues

Inactive Publication Date: 2010-06-09
ASUSTEK COMPUTER INC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, general notebook computers do not take any protective measures against the network camera, and the network camera is controlled by software, and the user cannot judge whether the network camera is on or off from the appearance. If the user ignores it, forget the network The camera is not turned off, it is very likely to mistransmit your personal or even private images to other people's computers, which can be said to be a major threat to the protection of personal privacy
[0004] Furthermore, network hackers and spyware such as Trojan horse programs are very popular in recent years, and because the network camera is controlled by software, if it is hacked or implanted with a Trojan horse program, the intruder can gain control of the network camera Right, in addition to the above-mentioned risks of personal privacy and private image leakage, if commercial laptops are attacked in video conferencing, it is very likely that commercial secrets will be stolen without knowing it
[0005] On the other hand, in order to facilitate the capture of images from the outside world, the network cameras of some notebook computers are designed as rotatable modules. Due to the design of the mechanism, the network camera can only rotate back and forth within the range of 180 degrees. Even if the lens can be rotated forward, up or down, so as to avoid the leakage of the user's own image, but the use environment such as a conference room , office, or your own images may still be leaked, and users will not turn the lens away in their usage habits, which is still not perfect for security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Notebook computer with hardware safety protection
  • Notebook computer with hardware safety protection
  • Notebook computer with hardware safety protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] According to the notebook computer with hardware safety protection disclosed by the present invention, please refer to figure 1 As shown, it is a schematic diagram of a notebook computer with hardware security protection according to the present invention.

[0025] The notebook computer with hardware security protection disclosed by the present invention includes a host 10, a display 20, an image capture module 30, and a cover 40. The host 10 has electronic components such as a motherboard, a central processing unit, a control chipset, and a hard disk. , and can perform calculations on electronic data, audio-visual data, etc., and there is a keyboard set 11 on the outside for the user to input various information or instructions; When the host 10 is turned over and closed or opened, as shown in the figure, it is in an open state.

[0026] The image capture module 30 is located on the display 20. As shown in the figure, it is located on the top of the display 20, which ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a notebook computer with hardware safety protection. An image acquisition module of the notebook computer is provided with a cover body; and the cover body can shield the image acquisition module to prevent images from being sent to other computers by mistake and prevent intruding and monitoring of hackers. The notebook computer with the hardware safety protection effectively achieves the safety protection by the hardware.

Description

technical field [0001] The invention relates to a notebook computer with hardware security protection, in particular to a notebook computer with hardware security protection which utilizes a physical cover to shield an image capture module. Background technique [0002] The current laptops are all equipped with web cameras. Generally speaking, they are probably installed on the panel of the laptop. You can point the web camera toward you to capture images, so that users can make video calls conveniently, so that the other party can use the Internet transmission while seeing the user's image. [0003] However, general notebook computers do not take any protective measures against the network camera, and the network camera is controlled by software, and the user cannot judge whether the network camera is on or off from the appearance. If the user ignores it, forget the network The camera is not turned off, and it is very possible to mistransmit your personal or even private i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/04G06F21/71
Inventor 黄志民陈易廷王丽燕
Owner ASUSTEK COMPUTER INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products