Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting electronic equipment from being stolen by adopting automatic locking

An electronic device, automatic locking technology, applied in the direction of electrical components, safety devices, wireless communication, etc., can solve problems such as inconvenient and inconvenient

Inactive Publication Date: 2016-02-03
黄金富
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of computer and electronic technology, electronic devices using these technologies are becoming more and more popular, such as mobile phones, PDAs, notebook computers, desktop computers, etc., which have become a necessity in many people's lives. Some personal data or confidential data of the user are stored, such as mobile phones, PDAs, etc. will store the user's phone book, e-mail, etc., and notebook computers, desktop computers, etc. may store some commercially confidential data, although it can be stored in Password protection is added to electronic devices to restrict access only to legitimate users, but this will make legitimate users have to enter passwords every time they operate electronic devices, which is very inconvenient
In addition, the staff of some financial institutions and government agencies often have to deal with some confidential information. Most of the time, the staff access the confidential information in the database through the computer. In a short period of time, the computer must log out of the logged-in database to prevent people from secretly viewing confidential information while away. When the staff returns to the computer to continue working, they must re-enter the password to log in to the database to access the confidential information in the database. , very inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting electronic equipment from being stolen by adopting automatic locking
  • Method for protecting electronic equipment from being stolen by adopting automatic locking
  • Method for protecting electronic equipment from being stolen by adopting automatic locking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The method of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0019] refer to figure 1 , figure 1 is a schematic illustration of the first embodiment of the present invention, figure 1 The shown includes an electronic device (1) and a wireless identification device (2), wherein the wireless identification device (2) is used as a legal user credential of the electronic device (1), and the electronic device (1) is provided with a The wireless communication device for communicating with the wireless identity recognition device (2), where identity information is stored in the wireless identity recognition device (2), and the identity information can be sent out through radio signals, and a monitoring program is set in the electronic device (1) , the monitoring program receives and monitors the identity information sent by the wireless identification device (2) through the wireless communication device. When...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preventing electronic equipment from being stolen by automatic locking, which is applicable to electronic equipment (1) such as a mobile phone, a personal digital assistant (PDA), a computer and a notebook computer. In the method, a wireless identification device (2) capable of sending identity information is used as an identifier of a legal user of the electronic equipment (1), a monitoring program is configured in the electronic equipment (1) for supervising the identity information sent by the wireless identification device (2), the monitoring program controls the electronic equipment (1) to enter a protected state and makes the electronic equipment (1) stop responding to operation that is only allowed to be performed by a legal user temporarily when failing to receive the identity information sent by the wireless identification device (2) for a certain continuous time period ( such as a certain time period of 5 seconds), and controls the electronic equipment (1) to restore to the original state from the protected state and makes the electronic equipment (1) restore response to the operation of the user when receiving the identity information sent by the wireless identification device (2) again.

Description

【Technical field】 [0001] The invention relates to a method for protecting electronic equipment from being stolen by adopting automatic locking. 【Background technique】 [0002] With the development of computer and electronic technology, electronic devices using these technologies are becoming more and more popular, such as mobile phones, PDAs, notebook computers, desktop computers, etc., which have become a necessity in many people's lives. Some personal data or confidential data of the user are stored, such as mobile phones, PDAs, etc. will store the user's phone book, e-mail, etc., and notebook computers, desktop computers, etc. may store some commercially confidential data, although it can be stored in Password protection is added to the electronic equipment to restrict access to only legitimate users, but this will make it very inconvenient for legitimate users to enter the password every time before operating the electronic equipment. In addition, the staff of some fina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/35H04W12/02
Inventor 黄金富
Owner 黄金富