Unlock instant, AI-driven research and patent intelligence for your innovation.

Projector and authentication method

A projector and portable technology, used in instruments, televisions, computer security devices, etc., can solve problems such as unsuitable authentication methods, and achieve the effect of reducing trouble

Active Publication Date: 2012-08-15
SEIKO EPSON CORP
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since one projector corresponds to only one recording medium, it is not an appropriate authentication method when security settings are made for multiple users or for each group.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Projector and authentication method
  • Projector and authentication method
  • Projector and authentication method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment

[0030] figure 1 It is a figure which shows the projection situation in 1st Example. The projector 100 includes a connection part 110 , a sound output part 180 , and the like, which are slidable relative to the main body to be accommodated in the main body or protrude from the main body. The user operates the remote controller 400 while inserting the terminal portion of the portable information terminal 200 , which is a type of portable terminal device, into the connector provided on the connection portion 110 , thereby using the projector 100 to project images based on images from the portable information terminal 200 . image 20 of the image signal, or the projector 100 is made to output sound based on the sound signal from the portable information terminal 200 .

[0031] The projector 100 of this embodiment has the following functions: under the state that portable information terminal 200 and projector 100 are connected, carry out authentication according to the identificat...

no. 2 Embodiment

[0051] The projector 100 registers the usable time in the usable time data 123, grasps the usable time for each portable information terminal 200 according to the connection status of the portable information terminal 200, and rejects the portable information terminal 200 when the usable time exceeds the usable time. By using the projector 100, the security of the projector 100 can be improved.

[0052] Figure 9 It is a flowchart showing the processing procedure from authentication to projection in the second embodiment. Description of the same processing as in the first embodiment is omitted. When the portable information terminal 200 is permitted to use the projector 100, the update unit 150 updates the usage time data 125 according to the connection duration time between the portable information terminal 200 and the connection unit 110 (step S21).

[0053] The judging unit 140 judges whether or not the total usage time of the connected portable information terminal 200 i...

no. 3 Embodiment

[0057] The projector 100 commonly sets the usable date and time (for example, a specific year, month, day, usable period, usable time zone, usable week number, etc.) for all portable information terminals 200 as usable date and time data. 124, or set different usable date and time for each portable information terminal 200 as the usable date and time data 124, grasp the use date and time of the portable information terminal 200 according to the connection status of the portable information terminal 200, at the use date and time When the usable date and time do not match, the security of the projector 100 can be improved by denying the portable information terminal 200 to use the projector 100 .

[0058] Figure 10 It is a flowchart showing the processing procedure from authentication to projection in the third embodiment. The description of the same processing as in the first embodiment is omitted. When the portable information terminal 200 is permitted to use the projector ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A projector includes a connection unit to which a portable terminal device is connected, a memory unit configured to store identification data of the portable terminal device to be permitted or denied, and a determination unit configured to determine whether to permit or deny use of the projector based on identification information of the portable terminal device received from the portable terminal device connected to the connection unit and the identification data.

Description

technical field [0001] The invention relates to a projector and an authentication method. Background technique [0002] For example, as described in Japanese Patent Application Laid-Open No. 2009-21743, there is provided a projector that performs authentication based on key operations using a remote controller (remote controller). Such a projector can be used by inputting a password or the like using a remote controller or the like at startup. [0003] [Patent Document 1] Japanese Unexamined Patent Publication No. 2009-21743 [0004] However, with regard to authentication methods such as inputting passwords, there are problems such as legitimate users being unable to use due to forgetting passwords, leakage of passwords, etc., and troublesome problems of periodically changing passwords to improve security. In addition, a biometric authentication method is provided as an authentication method capable of reducing the user's troubles and improving the security level. However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G03B21/00G03B21/14H04N5/74G06F21/00
CPCH04N5/7475H04N9/3179H04N21/4122H04N21/441H04N21/8355H04N21/41407H04N21/42684H04N21/4751H04N21/4882H04N5/44H04N5/445
Inventor 熊本修
Owner SEIKO EPSON CORP