Projector and authentication method
A projector and portable technology, used in instruments, televisions, computer security devices, etc., can solve problems such as unsuitable authentication methods, and achieve the effect of reducing trouble
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 Embodiment
[0030] figure 1 It is a figure which shows the projection situation in 1st Example. The projector 100 includes a connection part 110 , a sound output part 180 , and the like, which are slidable relative to the main body to be accommodated in the main body or protrude from the main body. The user operates the remote controller 400 while inserting the terminal portion of the portable information terminal 200 , which is a type of portable terminal device, into the connector provided on the connection portion 110 , thereby using the projector 100 to project images based on images from the portable information terminal 200 . image 20 of the image signal, or the projector 100 is made to output sound based on the sound signal from the portable information terminal 200 .
[0031] The projector 100 of this embodiment has the following functions: under the state that portable information terminal 200 and projector 100 are connected, carry out authentication according to the identificat...
no. 2 Embodiment
[0051] The projector 100 registers the usable time in the usable time data 123, grasps the usable time for each portable information terminal 200 according to the connection status of the portable information terminal 200, and rejects the portable information terminal 200 when the usable time exceeds the usable time. By using the projector 100, the security of the projector 100 can be improved.
[0052] Figure 9 It is a flowchart showing the processing procedure from authentication to projection in the second embodiment. Description of the same processing as in the first embodiment is omitted. When the portable information terminal 200 is permitted to use the projector 100, the update unit 150 updates the usage time data 125 according to the connection duration time between the portable information terminal 200 and the connection unit 110 (step S21).
[0053] The judging unit 140 judges whether or not the total usage time of the connected portable information terminal 200 i...
no. 3 Embodiment
[0057] The projector 100 commonly sets the usable date and time (for example, a specific year, month, day, usable period, usable time zone, usable week number, etc.) for all portable information terminals 200 as usable date and time data. 124, or set different usable date and time for each portable information terminal 200 as the usable date and time data 124, grasp the use date and time of the portable information terminal 200 according to the connection status of the portable information terminal 200, at the use date and time When the usable date and time do not match, the security of the projector 100 can be improved by denying the portable information terminal 200 to use the projector 100 .
[0058] Figure 10 It is a flowchart showing the processing procedure from authentication to projection in the third embodiment. The description of the same processing as in the first embodiment is omitted. When the portable information terminal 200 is permitted to use the projector ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 