Keyboard with one-key screen locking function
A keyboard and key lock technology, applied in the input/output process of data processing, the input/output of user/computer interaction, instruments, etc., can solve the problems of others peeping, and achieve the effect of preventing data leakage
Inactive Publication Date: 2018-08-28
XIANGYANG NO 42 MIDDLE SCHOOL
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention provides a keyboard with a one-key screen locking function. A control switch is arranged on the side of a keyboard body, so that during use of a computer, a screen locking key can be pressed if a person is discovered to be on the side, and a display screen can be turned off immediately to avoid peep of the person, so that data leakage can be prevented.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Remote access method, computing device and readable storage medium
PendingCN114756317AAvoid visitingPrevent Data LeakageDigital data protectionExecution for user interfacesComputer securityEngineering
Owner:UNIONTECH SOFTWARE TECH CO LTD
User plane function information reporting method, access network equipment and core network equipment
PendingCN114071791APrevent Data LeakageAssess restrictionConnection managementReal-time computingCore network
Owner:BAICELLS TECH CO LTD
Decentralization-based mobile hard disk encryption and decryption method and system
ActiveCN106980580APrevent Data LeakageUnauthorized memory use protectionDigital data authenticationDisk encryptionDisk loading
Owner:宁夏凯速德科技有限公司
Data transmission method and system, data sending device and data receiving device
InactiveCN109547172APrevent data leakageIntegrity guaranteedError prevention/detection by using return channelData switching networksData transmissionData information
Owner:DONGGUAN JIANDA INFORMATION TECH CO LTD
UEFI (Unified Extensible Firmware Interface)-based backup and one-key startup item guiding method
PendingCN114168207APrevent Data LeakageEasy to operateBootstrappingProgram loading/initiatingKey recoveryUnified Extensible Firmware Interface
Owner:成都傲梅科技有限公司
Classification and recommendation of technical efficacy words
- Prevent Data Leakage
Method and apparatus for dynamically regulating visual angle of screen
ActiveCN101488326APrevent Data LeakageImprove convenienceCathode-ray tube indicatorsInstrumental componentsVisual rangeScreen viewing
Owner:HTC CORP
General database transparent encryption system
ActiveCN106934298APrevent Data LeakageImprove versatilityEncryption apparatus with shift registers/memoriesDigital data protectionDatabase encryptionUser-defined function
Owner:戴林
Secure storage device
ActiveCN104239820AAchieve securityPrevent Data LeakageInternal/peripheral component protectionLocal machineComputer hardware
Owner:POTEVIO INFORMATION TECH
Protection method and device for executable programs
ActiveCN103488919APrevent memory dumpsPrevent Data LeakageProgram/content distribution protectionData informationExecutable
Owner:BEIJING SENSESHIELD TECH
Data protection method and data protection device of movable storage equipment and movable storage equipment
InactiveCN101634972APrevent Data LeakageEnsure safetyUnauthorized memory use protectionStorage cellEngineering
Owner:HUAWEI DIGITAL TECH (CHENGDU) CO LTD