Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer, computer security setting method, and program

A technology of computer security, computer device, applied in the field of portable computer device, can solve problems such as network connection failure, security breach

Inactive Publication Date: 2005-07-27
LENOVO (SINGAPORE) PTE LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, if a user selects the wrong setting, such as a setting for home at their office, for example, the network connection fails
Furthermore, even if the PC can connect to the network, another serious problem may arise: if the user is actually on the road with a higher security level that should be set for a "mobile" environment, while still using a security level with a lower security level for "home" Security settings using a PC may lead to potential security breaches

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer, computer security setting method, and program
  • Computer, computer security setting method, and program
  • Computer, computer security setting method, and program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The invention is described in detail below with respect to the embodiments shown in the drawings.

[0034] FIG. 1 is a diagram for explaining the device configuration of a notebook PC (computer device) 10 according to this embodiment.

[0035] As shown in FIG. 1, a PC 10 includes a CPU 11 for executing a process according to a given control program, a memory 12 for storing data to be processed, such as RAM (random access memory), and a display unit (LCD) for controlling 13 graphics on the graphics chip 14, these are connected to the chipset 15.

[0036] The chipset 15 is connected to a bridge circuit 16 . HDD 18 is connected to bridge circuit 16 through IDE channel 17 . Also connected to the bridge circuit 16 are a controller 20 that inputs and outputs events according to signals from pointing devices such as a keyboard 19 and a mouse (not shown), and an EEPROM (Electrically Erasable Programmable ROM) 21. The BIOS controls the components of the PC 10 according to in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A technique for reliably changing settings according to the usage environment to increasingly ensure a high-security network connection environment. A PC judges the usage environment of the PC by searching for addresses of nearby devices such as Bluetooth devices and, depending on the usage environment, automatically changes the security level setting. Even when the PC is in a usage environment in which the security level should be "home" or "office" but any devices that should be in that usage environment are not detected during usage environment judgment processing, the level is set to the "mobile" security level at which high security is ensured.

Description

technical field [0001] The present invention relates to portable computer devices and techniques suitable for setting such as security settings. Background technique [0002] Today, portable "mobile devices" such as notebook PCs and PDAs (Personal Digital Assistants) are widely used. [0003] For example, a user of a notebook PC (hereinafter simply referred to as PC) connected to the network through a wireless LAN in his office can take the PC home and connect it to the network through a modem and an analog telephone line or connect to the network through his mobile phone on the go. network. [0004] Recently, wireless LAN environments have been provided in specific areas of stations and business districts. In these areas, it is possible to connect to the Internet via the provided wireless LAN. [0005] In addition, short-range wireless communication technologies such as Bluetooth are becoming popular. People can use bluetooth to carry on data communication with LAN acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31H04L12/28H04L29/06H04L29/08H04W12/00H04W48/16H04W52/02H04W84/10
CPCH04L63/20H04W64/00H04W12/08H04W28/18H04W4/02H04L63/107H04L29/08072H04W12/00H04L69/329H04L29/08657H04L67/18H04L29/06H04W84/12H04W84/18H04W4/029H04W12/67H04W12/63H04L67/52G06F15/00G06F1/00G06F13/00H04L9/40
Inventor 尾家正树
Owner LENOVO (SINGAPORE) PTE LTD