Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety mechanism adopting mouse

A security mechanism, mouse technology, applied in the protection of internal/peripheral computer components, etc., can solve problems such as inconvenience and achieve the effect of protecting security

Inactive Publication Date: 2016-02-10
XIAN SIKUN ELECTRONICS SCI & TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is quite inconvenient to have to wait for a long time to turn on the computer (depending on the computer grade, usually 1 or 2 minutes, or even longer) after shutting down

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety mechanism adopting mouse
  • Safety mechanism adopting mouse

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to further illustrate the present invention, further describe below in conjunction with accompanying drawing:

[0015] see figure 1 , for the mouse 70 of tool password control in the present invention comprises input module 10, control module 20, timer module 30, password module 40 and output module 50, the operation relation between each module is described as follows respectively below:

[0016] The mouse 70 with password control includes an input module 10, and the input module 10 includes a group of input buttons, and the input buttons include a left button, a right button, and a middle button. Corresponding input signals can be generated by pressing the input button, including a left button signal, a right button signal, and a middle button signal, and then the input signal is transmitted to the control module 20 . But not all input keys are composed of left key, right key, and middle key. Some input keys only have two keys, left key and right key, and so...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety mechanism adopting a mouse. The safety mechanism comprises the mouse with a safety password, an input module, a control module, a timer module, a cryptographic module and an output module and is characterized in that the input module is used for receiving an input signal; the control module can be in a closed state or an open state and is used for receiving the input signal and determining whether to transmit the input signal according to the state; the timer module is used for keeping preset time, producing a locking command and switching the control module to an open state; the cryptographic module is used for releasing the locking command when detecting that the input signal is the safety password or a specific signal is the safety password, switching the control module to a closed state, detecting the specific signal and detecting the input signal again. The safety mechanism can prevent other people from operating a started computer at will and protect safety of data stored in the computer.

Description

technical field [0001] The invention relates to a safety mechanism related to a mouse. Background technique [0002] There are a lot of data stored in the computer, some are valuable data, some are confidential data, and some are personal private data. Users are usually unwilling to disclose the above data. Therefore, appropriate protection must be adopted when the user leaves the computer. method to ensure that the data in the computer will not be easily used by others. [0003] One possible method is to shut down the computer, since a power-on password is required to gain access to the computer. However, it is quite inconvenient to have to wait for a long computer startup time (depending on the computer grade, usually needing 1 or 2 minutes, or even longer) after shutdown. Therefore, the present common computer security method is to utilize the function of locking the computer provided by the operating system, as long as the password is input, the computer can be used im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/83
Inventor 袁博冯永强
Owner XIAN SIKUN ELECTRONICS SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products