Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer lock system and computer lock system operation method

A technology for locking systems and computers, applied in computing, electromagnetic radiation induction, instruments, etc., can solve problems such as invalid data input

Pending Publication Date: 2021-05-25
ACT INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a specific user carries a mobile information terminal away from the computer and becomes unable to communicate with each other, invalidate the data input of the keyboard and / or mouse, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer lock system and computer lock system operation method
  • Computer lock system and computer lock system operation method
  • Computer lock system and computer lock system operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0052]

[0053] Such as figure 1 As shown, the computer locking system is realized by a computer main body 0100 and a wireless communication device 0101 externally connected to the computer main body 0100 . For example, the following system is constituted, that is, when the user ( figure 1 left picture of ) automatically locks the computer interface (monitor interface, etc.) when leaving the seat ( figure 1 ) and when the unlock ID included in the wireless signal from the wireless communication device 0101 is received while the user is returning to the seat and approaching, the lock is automatically unlocked. exist figure 1 In the figure, as other hardware, a display 0102 and a keyboard 0103 used by the user in work are shown. figure 1 The monitor screen on the left of the figure shows the screen in operation, figure 1 The monitor screen in the figure on the right shows the computer lock screen. In addition, as the unlocking ID, an RFID device held by the user may be us...

Embodiment approach 2

[0105]

[0106] Embodiment 2 is a modification of Embodiment 1, and is characterized in that it is configured as follows: during the operation of the computer body 0200, the signal acquisition part 0201, the signal strength judgment part 0202, the ID judgment part 0203, and the usable state information of the computer body 0200 are kept. Section 0204, usable section 0205, unusable section 0206 and control section 0207 are always in working state.

[0107]

[0108] Such as figure 2As shown, the computer lock system according to Embodiment 2 is a computer lock system including, for example, a computer main body 0200 and a wireless communication device 0210 . The wireless communication device 0110 includes, for example, a signal receiving unit 0211 and a signal output unit 0212, and the computer main body 0200 includes, for example, a signal acquiring unit 0201, a signal strength judging unit 0202, an ID judging unit 0203, an usable state information holding unit 0204, and a...

Embodiment approach 3

[0115]

[0116] Embodiment 3 is a modification of Embodiment 1 and / or Embodiment 2, and has the following characteristics: when the display interface is normally in an unusable state (computer locked state), even if the acquisition signal does not include Even in the case of unlocking the ID, when the correct password is received, the usable state information is fixed in the usable state.

[0117]

[0118] Such as Figure 10 As shown, the computer locking system according to Embodiment 3 is a computer locking system including, for example, a computer main body 1000 and a wireless communication device 1020 . The wireless communication device 1020 includes, for example, a signal receiving unit 1021 and a signal output unit 1022 . The computer body 1000 includes, for example, a signal acquisition unit 1001 , a signal strength determination unit 1002 , an ID determination unit 1003 , an availability status information storage unit 1004 , an availability unit 1005 , an unusabi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a computer lock system provided with a wireless communication device connected to a computer body. The wireless communication device is provided with a wireless signal receiving unit and a wireless signal output unit. The computer body is provided with: a wireless signal acquisition unit; a signal strength determination unit which determines whether or not the signal strength of an acquired wireless signal is greater than or equal to a prescribed value; an ID determination unit which determines whether or not an unlock ID is included in an acquired signal from the wireless signal acquisition unit; an availability status information holding unit which holds availability status information indicating whether or not to make normally available a display interface of the computer body determined on the basis of the acquisition signal; and a control unit which controls the display interface on the basis of the availability status information.

Description

technical field [0001] The present invention relates to a computer locking system, and relates to the computer locking system realized by a computer main body and a wireless communication device connected with the computer main body. Background technique [0002] Conventionally, there is known a processing device control method or device for disabling data input by a keyboard and / or mouse when a specific user temporarily leaves while operating a computer. As an example of this, for example, Japanese Unexamined Patent Application Publication No. 2001-268655 (Patent Document 1) is cited. This Patent Document 1 discloses a configuration including a computer equipped with an antenna, a mobile information terminal (PDA), a mouse, and the like, and is connected to a mobile computer through an antenna connected to a short-range wireless communication interface built in the computer. The information terminals communicate with each other. If a specific user carries a mobile informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/35G06F1/16G06F21/31G06K7/10
CPCG06K7/10G06F21/35G06F1/16G06F21/31
Inventor 石原健一
Owner ACT INC