CN101241529A - Method for blocking computer input device and its device - Google Patents

Method for blocking computer input device and its device Download PDF

Info

Publication number
CN101241529A
CN101241529A CNA2007100062188A CN200710006218A CN101241529A CN 101241529 A CN101241529 A CN 101241529A CN A2007100062188 A CNA2007100062188 A CN A2007100062188A CN 200710006218 A CN200710006218 A CN 200710006218A CN 101241529 A CN101241529 A CN 101241529A
Authority
CN
China
Prior art keywords
input media
program
blockade
computing machine
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100062188A
Other languages
Chinese (zh)
Inventor
钟启能
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHUANGHONG SCIENCE AND TECHNOLOGY Co Ltd
Seco Tech Co Ltd
Original Assignee
CHUANGHONG SCIENCE AND TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHUANGHONG SCIENCE AND TECHNOLOGY Co Ltd filed Critical CHUANGHONG SCIENCE AND TECHNOLOGY Co Ltd
Priority to CNA2007100062188A priority Critical patent/CN101241529A/en
Publication of CN101241529A publication Critical patent/CN101241529A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a method of blockading the first input device of computer and its device, the blockading method includes following steps: utilizing the first input device set locking command and reliving command, touching the locking command to lock the first input device, displaying upper image to cover previous image, electric connecting the second input device and the computer, and input the reliving command on the second input device to relive the lock of the first input device. The invention overcomes the problem of interferential the keyboard having bias circuit, and making the management of keyboard more easily.

Description

The method of blocking computer input device and device thereof
Technical field
The present invention is a kind of method and device thereof of blocking computer input device, refers to a kind of management method that locks first input media in advance and then utilize second input media to be unlocked especially.
Background technology
The user of general computing machine can use the action that a keyboard is done input, in order to prevent that uncommitted personage from appropriating this computing machine, this keyboard is carried out appropriate keyholed back plate operation, be necessary, (application number of TaiWan, China is 95206257 to " with the device of password wireless remote control restricted information transmission " that proposes on April 13rd, 2006 as the applicant, call this first case in the following text), and " apparatus and method of concentrating limiting and managing computer and external data to transmit with cipher remote control " that propose on August 28th, 2006 subsequently (application number of TaiWan, China is 95131642, call this second case in the following text, itself and this first case is merged into " apparatus and method of limiting and managing computer information transmission " patent case on September 18th, 2006, and application number is 200610153470.7) etc., all can disturb the running of this keyboard effectively, reach the purpose that prevents that this keyboard from normally being used, and can keep this computing machine simultaneously and continue to carry out the work of finishing of having set.It blocks the handling of computing machine, and is outstanding more many than the simple login password of form (Windows) software, the computing machine during quick lock in uses when being highly suitable for the place of business of many people's turnover or doctor and disseating temporarily.
Yet these two patents all need use the setting of a kind of " bias circuit ", can influence the technology of existing hardware unavoidably, perhaps need to make a new hardware in addition and do control, it obviously can improve or increase the manufacturing cost of hardware, therefore its control model to keyboard and mouse obviously still has sizable room for improvement to exist.
Therefore, the keyboard that how to improve supervisory computer all needs to be provided with the problem of bias circuit, after the inventor is devoted to experiment, test and research, finally obtain a kind of method and device thereof of first input media of supervisory computer, except the shortcoming of effective solution prior art, can also obtain the convenience that the management of keyboard can be more prone to.Be how problem to be solved by this invention is for overcoming the problem that the device that disturbs keyboard all need use bias circuit, simultaneously can make the management of keyboard convenient, and how about the operation that how to cooperate related hardware makes related hardware have problem of indispensable indispensability etc. to finish the problem of authentication.
Summary of the invention
The present invention is a kind of method of blocking first input media of computing machine, its step comprises utilizes this first input media to set lock instruction and to remove instruction, this lock instruction of triggering by the user is to lock this first input media, and show than the upper strata picture, covered the picture in original use.
Preferably, the blockade program that provides also is provided this method, discerning this lock instruction and then to lock this first input media, should remove instruction when errorless and block procedure identification in this, just removes and is somebody's turn to do than the upper strata picture.
Certainly, this method can also comprise and is electrically connected second input media and this computing machine, and should the blockade program promptly discerns the built-in identification code of this second input media, and it blocks procedure identification when errorless through this, begins to finish the startup of this blockade program.
Preferably, this method also is contained on this second input media this releasings instruction of input, and removes instruction when all errorless through this blockade program in this built-in identification code of this second input media of identification and this, the locking of releasing to this first input media of beginning.
Certainly, each shows the little image (Icon) of " closing PS/2 " to blockade program in the method on the notification area of the desktop of this computing machine and taskbar, has started this blockade program to inform this computing machine of this user.
Preferably, the blockade program display of this method goes out on-screen keyboard (On Screen Keyboard, OSK), it is positioned at this than on the picture of upper strata, clicks this releasing instruction for this second input media.
Certainly, the blockade program of this method can receive the message of the inspection hardware state that Windows provides, to lock this first input media.
Preferably, this method also is included in this computing machine and shows the input password window, it is positioned at this than on the picture of upper strata, and this user must install remote control procedure at remote computer, import this releasing instruction to utilize this remote computer, and by network to transmit this releasing instruction to this computing machine, to remove the locking of this first input media.
In addition, viewpoint according to major technique, the present invention is a kind of device that blocks computing machine, it is electrically connected to this computing machine, wherein this computing machine has the blockade program and first input media, this first input media is in order to set lock instruction and to remove instruction, and utilize this first input media to trigger this lock instruction by the user, to lock this first input media, this blockade program display than the upper strata picture to cover the picture in original use, wherein this sealing pack comprises second input media, instruct in order to import this releasing, and built-in identification code (ID), block the identification of program for this, and when identification was errorless, the beginning was accepted this releasing instruction, and then removed the locking to this first input media.
Certainly, this device can be USB keyboard or USB mouse, and PS/2 keyboard that this first input media is this computing machine or PS/2 mouse, and this built-in identification code is the hardware identification code (Hardware ID) of this USB keyboard or this USB mouse.
Preferably, this device is for the USB wireless mouse, and the hardware identification code of this built-in identification code ridge (Dongle) that is this wireless mouse or the hardware identification code of digital music player (MP3).
Preferably, second input media of this device is the external network interface card of this computing machine, and utilizes the mouse of remote computer or keyboard to instruct to import this releasing.
Certainly, the releasing of this device instruction can be instructed to this computing machine to transmit this releasings by network, and this built-in identification code hardware identification code that is this network interface card.
Certainly, the lock instruction of this device can be set at " Ctrl " key and add " 1 " key, be hot key (Hot Key) and should remove instruction, and this hot key is set to " Ctrl " key, " Alt " key adds " 8 " key.
If from another feasible angle, the present invention is a kind of computing machine with lock-out facility, it comprises first input media, in order to set lock instruction and to remove instruction, and the blockade program, in order to discerning this lock instruction, and then lock this first input media, and show than the upper strata picture, covered the picture in original use.
Preferably, this computing machine more comprises second input media, it is electrically connected to this computing machine, and this second input media has built-in identification code, remove this than the upper strata picture for the identification of this blockade program, this second input media is in order to import this releasing instruction, send the releasing instruction for the identification of this blockade program, PS/2 keyboard that this first input media is this computing machine or PS/2 mouse, this second input media is USB keyboard or USB mouse, and this built-in identification code is the hardware identification code of this USB keyboard or this USB mouse.
Preferably, second input media of this computing machine utilize this computing machine external docking station (Docking Station) to import this releasing instruction.
Certainly, this computing machine can also comprise the 3rd input media, and it is electrically connected to this docking station, and the 3rd input media is specific USB keyboard or specific USB mouse, and should the blockade program promptly discerns the hardware identification code of this specific USB keyboard or this specific USB mouse.
Preferably, second input media of this computing machine is the USB mouse, and this built-in identification code hardware identification code that is this mouse.
Certainly, second input media of this computing machine can be the external network interface card of this computing machine, and utilizes the mouse of remote computer or keyboard to instruct to import this releasing.
Certainly, the releasing of this computing machine instruction can be instructed to this computing machine to transmit this releasings by network, and this built-in identification code hardware identification code that is this network interface card.
Preferably, the lock instruction of this computing machine is set at " Ctrl " key and adds " 1 " key, be hot key and should remove instruction, and this hot key is set to " Ctrl " key, " Alt " key adds " 8 " key.
Preferably, this computing machine also comprises second input media, and it is a kind of device of concentrating limiting and managing computer and external data to transmit in the cipher remote control mode, to disturb the running of this second input media.
Certainly, second input media of this computing machine can be PS/2 keyboard or PS/2 mouse, and utilizes PS/2 to change the converter of USB, is USB keyboard or USB mouse and this PS/2 keyboard or this PS/2 mouse are become.
Certainly, this computing machine can have the data bus that uses 32 or 64 sizes CPU and ALU and the operating system as the basis.
Preferably, the registration table (Registration) of the blockade routine change operating system of this computing machine makes this computing machine after starting shooting again, and this blockade program promptly automatically performs and still keeps this related setting before starting shooting again.
The present invention also provides a kind of method of blocking first input media of computing machine, and its step comprises: utilize the blockade program to detect existing of second input media; Remove this second input media; And utilize this blockade program to show than the upper strata picture, covered non-" beginning " menu that this first input media triggered and the picture of non-hot key changeover program table.
The present invention also provides a kind of method of blocking first input media of computing machine, and its step comprises: utilize the blockade program to set lock instruction and to remove instruction; And trigger this lock instruction to lock this first input media.
The present invention also provides a kind of method of blocking the use of computing machine, and its step comprises: utilize the blockade program to discern the built-in identification code of second input media; And utilize this blockade program to show than the upper strata picture, covered non-" beginning " menu that first input media triggered and the picture of non-hot key changeover program table.
The present invention also provides a kind of method of blocking the use of computing machine, is applied to close first application program, and its step comprises: utilize the blockade program to detect second input media; Remove this second input media; And utilize this blockade program to close this first application program, limit the use of this first application program.
The present invention also provides a kind of method of blocking the use of computing machine, and its step comprises: utilize the blockade program to monitor second input media; And utilize this blockade program to show than the upper strata picture, covered non-" beginning " menu that first input media triggered and the picture of non-hot key changeover program table.
The present invention also provides a kind of method of blocking the use of computing machine, and its step comprises: utilize the blockade program with monitoring module; And by this blockade program to show than the upper strata picture, covered non-" beginning " menu that first input media triggered and the picture of non-hot key changeover program table.
The present invention also provides a kind of method of blocking first input media of computing machine, and its step comprises: utilize the blockade program with monitoring module; And by this blockade program to detect being removed of this module, promptly lock this first input media.
The device that the present invention can overcome the interference keyboard all need use the problem of bias circuit, and the management of keyboard is more prone to.
Through above-mentioned explanation, the method and the device thereof of first input media of the blockade computing machine that the present invention as can be seen used, can utilize this first input media to set lock instruction, this releasing instruction of input on this second input media then, and have the built-in identification code of this second input media of identification, and when identification is errorless, just accept the characteristic of this releasing instruction.In order to be easy to explanation, the present invention obtains more understandings by following preferred embodiments and drawings.
Description of drawings
Fig. 1 is the process flow diagram of preferred embodiment of method of first input media of blockade computing machine of the present invention;
Fig. 2 is the process flow diagram of the Starting mode preferred embodiment of blockade program of the present invention;
Fig. 3 is the process flow diagram that unlocks and have the preferred embodiment of a kind of " computer lock " function of the present invention;
Fig. 4 is the part process flow diagram of another preferred embodiment of method of first input media of blockade computing machine of the present invention;
Fig. 5 is the part process flow diagram of another preferred embodiment of method of first input media of blockade computing machine of the present invention;
Fig. 6 is the schematic representation of apparatus that cooperates the cipher remote control mode of method of first input media of blockade computing machine of the present invention to concentrate limiting and managing computer and external data to transmit; And
Fig. 7 is the process flow diagram of another preferred embodiment of the using method of blockade computing machine of the present invention.
Wherein, description of reference numerals is as follows:
10: computing machine
101: the first input medias
102: the second input media/hardware
20: built-in identification code
501: remote computer
53: network interface card
The device of 60: the second input medias/concentrate limiting and managing computer and external data to transmit in the cipher remote control mode
601: telepilot
602: conversion IC
701: execute lock
Embodiment
See also Fig. 1, (for example: a method keyboard) demonstrate a kind of first input media 101 that blocks computing machine 10, its step comprises utilizes first input media 101 to set lock instruction and to remove instruction (step 11) earlier, its hot key that is set usually (Hot Key) or password, via this lock instruction of triggering (step 12a) of user to lock first input media 101 (step 13a), and show than the upper strata picture, the picture (step 13b) that is covered in original use (also can be described as " ejecting the tablecloth covering function ", and should can implement in the mode of a kind of " customization " than the upper strata picture, for example: choose the Logo figure of an optimal photo or company, transfer to blockade program 17 again and read and use).
And, this is only second to " beginning " menu picture that the window key of Microsoft is started than the upper strata picture, and therefore " the superiors' picture " in computing machine 10 should be " beginning " menu picture that " window " key (being sphere of movements for the elephants shape key) of this Microsoft is started.When first input media 101 (for example: a PS/2 mouse) be blocked after, no matter use any input media (for example: PS/2 keyboard or USB keyboard), all only there is this " window " key to work, it can only make the picture of this " beginning " menu occur, and select other buttons of first input media 101, will be like water off a duck's back, the usable range of limit first input media 101 significantly thus.Even the user wants by the USB keyboard still can be covered than the upper strata picture by this, and to be subjected to identical restriction with input information.
The blockade program 17 that provides also is provided this method, and to discern this lock instruction (step 12b) and then to lock first input media 101, this method (for example: a USB keyboard) with computing machine 10 (step 14) can also comprise electrical connection second input media 102.See also Fig. 2, whether the built-in identification code 20 that blockade program 17 is promptly discerned second input media 102 correct (step 21), it is when 17 identifications of blockade program are errorless, beginning is finished the startup (step 22) of this blockade program, this user could utilize first input media 101 to set this lock instruction then, use with this USB keyboard of guaranteeing authenticated mandate, if it is wrong through 17 identifications of blockade program, then do not finish the startup (step 23) of blockade program 17, to avoid any one USB keyboard can both be used for starting (that is to say that employed second input media 102 is not the legal authorization product of its authentication of process of being admitted of blockade program 17).If blockade program 17 is modified to and does not lock first input media 101, and have only demonstration also can obtain the function that prevents that other people from using than the upper strata picture.
In addition, each shows the little image (Icon) (step 24) of " closing PS/2 " to blockade program 17 on the notification area of the desktop of computing machine 10 and taskbar, has started blockade program 17 to inform this user's computing machine 10.Though and blockade program 17 has recognized the built-in identification code 20 of second input media 102 and finished startup, do not remove this picture this moment yet than the upper strata.See also Fig. 3, demonstrate first embodiment that unlocks of this method, when second input media 102 is pulled out or user when triggering this lock instruction (step 30a), blockade program 17 can receive the message of pulling out of second input media 102, computing machine 10 promptly locks first input media 101 and shows than upper strata picture (step 30b), thus, can make this second input media 102 have the function of saving (Security) product from damage (or be called the lock-out facility of a kind of " hot plug ", the blockade program 17 of this moment promptly is equivalent to the detecting device (On System Detector) in a kind of system) of a kind of " computer lock ".
When wanting to remove at this moment, the user is somebody's turn to do than the upper strata picture, then must on second input media 102, import this and remove instruction (step 31), it is after blockade program 17 is finished startup and begun to carry out, with regard to hot key (Hot Key) or the password that has configured, and through this releasing instruction that blockade program 17 is discerned second input media 102 again whether all after correct (step 32), beginning is removed synchronously this than the upper strata picture and remove locking (step 33) to first input media 101, instructs (step 34) otherwise will refuse to accept this releasings.Certainly, blockade program 17 also may be required in when unlocking, must discern this built-in identification code, just for fear of second input media, 102 faults, the awkward situation that causes a legal user all can't remove, can discern this built-in identification code so just set the locking of removing first input media 101, be comparatively loose to the restriction of removing.
Hence one can see that, and blockade program 17 is in identification when wrong, then blocks program 17 and will refuse to accept this releasings and instruct, and will still keep the state to the locking of this first input media do not removed as yet of computing machine 10.Certainly, blockade program 17 of the present invention also can be done the design of reprogramming slightly, this is than the upper strata picture and to the locking of first input media 101, also can make all need not discern the built-in identification code 20 of second input media 102 into, and this removes instruction when errorless in blockade program 17 identification, promptly removes this simultaneously than the upper strata picture and remove locking to first input media 101.
Please consult Fig. 3 again, the blockade program 17 of this method is except receiving second input media 102 by the device message of pulling out, device message (the Device Message of other that can also receive that Microsoft's Window (Windows) provided, it checks the message of the hardware state of computing machine 10 peripheries for Windows, it comprises the device change message that second input media 102 is pulled out, and the user is in print data, online, when using Outlook Express to send and receive e-mail, at any time might send this device message), use the hardware of different identification codes as the user, though can temporarily remove the blockade (step 35) of computing machine 10, but when the user is using a computer 10 the time, blockade program 17 will receive the message (step 36) of the inspection hardware state that Windows provides, and will get back to locking first input media 101 this moment and show should be than situation of upper strata picture (step 30b).
In addition, blockade program 17 can also setting computer 10 user mode be: when (for example: 5 minutes) detects built-in identification code less than second input media 102 when at set intervals (step 37), promptly get back to locking first input media 101 and demonstrate this than upper strata picture (step 30b).And the device message that Microsoft's Window provided still comprises message and other message relevant with hardware of the Email that detection is newly received, unless therefore the user has only the software of use and does not relate to hardware, otherwise its first input media 101 at any time all might be locked.
And make the network interface card that connects in a kind of into when second input media 102; when the USB expansion board of PCI or internal connecting type usb hub; usually can use a kind of program of not supporting the lock-out facility of " hot plug "; it takes start to detect the pattern of (Boot Detector); just can not have the function of detecting device in this kind system (OnSystem Detector); the start again if user removes second input media 102; blockade program 17 this occurs than the upper strata picture with regard to not restarting; in order to avoid when second input media, 102 faults, cover window in the use again, cause the minus effect of the normal functions of use of excessive interference computing machine 10.Certainly, the PCI USB expansion board that connects in this also can be used a kind of blockade program 17 that detecting device on the back-up system (On System Detector) arranged instead.
See also Fig. 4, demonstrate second embodiment that unlocks of this method, the blockade program 17 of this method is locking first input media (under the situation of step 13), promptly demonstrate on-screen keyboard (step 41), it is positioned at this than on the picture of upper strata, for second input media 102 (for example: a USB mouse) click or import this releasing instruction (step 42), and should remove instruction and be hot key (Hot Key) or password.
See also Fig. 5; demonstrate the 3rd embodiment of this method; this method is locking first input media (under the situation of step 13); what also be included in computing machine 10 should import password window (step 50) than showing on the picture of upper strata; and this user must install remote control procedure (step 502) at remote computer 501; and also controlled program must be installed at near-end computing machine 10; to utilize this releasing instruction (step 51) of remote computer 501 inputs; and by network to transmit this releasing instruction (step 52) to computing machine 10; to remove the locking of first input media 101; this lock mode is suitable for use in a station server (Server); can make this server under the situation that does not influence normal operation; make its keyboard and mouse all temporarily lose function; so can avoid by one non-through authorizing in addition operation arbitrarily of personage, obtain very rigorous protection effect.If the user is the operating system that adopts Windows XP, (Remote Desktop Protocol is RDP) to replace this remote control procedure and controlled program also can to use remote desktop communication protocol instead.
The present invention can use this blockade program 17 respectively by two users on same computing machine 10, if directly publish after entering operating system, then the front and back user will influence each other whether blockade PS/2 is arranged.If the Thin Client (Thin Client) of the succession program of the agreement of use RDP, and after client terminal machine (Terminal) starts blockade program 17, and the screen of the PS/2 interface of meeting closing server terminating machine and covering client terminal machine, and can not close the PS/2 interface of client terminal machine, also can not cover the screen of server terminal machine, so blockade program 17 is fit to be used on the station server terminating machine very much.But the user is when second input media of pulling out on the server terminal machine 102, and blockade program 17 will cover the screen of server terminal machine and client terminal machine simultaneously.
In addition, viewpoint according to major technique, the present invention is a kind of device that blocks computing machine 10, it is electrically connected to computing machine 10, wherein computing machine 10 has the blockade program 17 and first input media 101, first input media 101 is in order to set lock instruction and to remove instruction, and utilize first input media 101 to trigger this lock instruction by the user, to lock first input media 101, blockade program 17 shows than the upper strata picture to cover the picture in original use, wherein this sealing pack comprises second input media 102, instruct in order to import this releasing, and built-in identification code (ID) 20, identification for blockade program 17, and when identification was errorless, the beginning was accepted this releasing instruction, and then removed the locking to first input media 101.
This sealing pack can be USB keyboard or USB mouse (with it as second input media 102 among Fig. 1), and first input media 101 is the PS/2 keyboard or the PS/2 mouse of computing machine 10, and built-in identification code 20 is the hardware identification code of this USB keyboard or this USB mouse.Certainly, this sealing pack can change USB wireless mouse (with it as second input media 102 among Fig. 1) into, and 20 of built-in identification codes are the hardware identification code of the ridge (Dongle) of this wireless mouse, or the hardware identification code of USB wireless network card, walkman, digital music player (MP3) etc., blockade program 17 also can have only locking PS/2 mouse, just can make things convenient for the user to utilize the PS/2 keyboard to come release, so this Dongle that easily carries can be utilized in a library, with the user of limiting computer 10.
Please consult Fig. 5 again, second input media 102 of this sealing pack can change into computing machine 10 external network interface card 53, and utilize the mouse of remote computer 501 or keyboard to import this releasing instruction.This releasing instruction of this sealing pack can be instructed to computing machine 10 to transmit this releasing by network, and built-in identification code 20 is the hardware identification code of network interface card 43, certainly, before using network interface card 43 of the present invention, must close earlier former computing machine 10 built-in network interface card, and network interface card 43 can also change a kind of external wireless network card into.This lock instruction of this sealing pack can be set at " Ctrl " key and add " 1 " key (or the key combination that changes other types into also can, be not only to be limited to this " Ctrl " key and to be somebody's turn to do " 1 " key), be hot key (Hot Key) and should remove instruction, and this hot key is set to " Ctrl " key, " Alt " key adds " 8 " key (certainly, it can also make the key combination of other types into, must not be limited to this " Ctrl " key, be somebody's turn to do " Alt " key and be somebody's turn to do " 8 " key, to finish the setting program of this hot key).
Certainly, with regard to the practical application of this product on the table with regard to the situation of type computing machine, can be with the key mouse group of a PS/2 mouse of a USB keyboard collocation, or with the key mouse group of a USB mouse of PS/2 keyboard collocation, so promptly can lock PS/2 input media wherein, and utilize the input media of another USB to unlock.As for this product if when being applied to mobile computer, advise that then the consumer need only buy a USB mouse, can utilize with the appended blockade program of giving of this USB mouse, to carry out locking and releasing the built-in PS/2 keyboard and the PS/2 touch-control dish (Touch Pad) of this mobile computer.
If from another feasible angle, the present invention is a kind of computing machine 10 with lock-out facility, it comprises first input media 101, in order to set lock instruction and to remove instruction, and blockade program 17, in order to discerning this lock instruction, and then lock first input media 101, and show than the upper strata picture, covered the picture in original use.Certainly, the computing machine 10 of this moment can also comprise second input media 102, it is electrically connected to computing machine 10, and second input media 102 has built-in identification code 20, remove this than the upper strata picture for the identification of blockade program 17, second input media 102 sends for the identification of blockade program 17 and removes instruction in order to import this releasing instruction, and then removes the locking to first input media 101.First input media 101 can be the PS/2 keyboard of computing machine 10, and second input media 102 is the USB keyboard, and this built-in identification code hardware identification code that is this USB keyboard.Second input media 102 of computing machine 10 utilize computing machine 10 external docking station (DockingStation, not shown) to import this releasing instruction.Computing machine 10 can also comprise the 3rd input media (not shown), it is electrically connected to this docking station, the 3rd input media is specific USB keyboard or specific USB mouse, and blockade program 17 is promptly discerned the hardware identification code of this specific USB keyboard or this specific USB mouse, and making the present invention have the function of " multiple hardware identification ", it also is unlikely to be limited at and can only uses a kind of second input media 102.As for other detail sections relevant of this computing machine 10 embodiment with second input media 102, as in the previous paragraph, so repeat no more.
See also Fig. 6, computing machine 10 also comprises second input media 60, it concentrates the device 60 that limiting and managing computer and external data transmit (being that the present invention can number be that 95131642 patent of invention or application number are that 200610153470.7 invention is used with applicant's TaiWan, China application case) for a kind of in the cipher remote control mode, it can utilize telepilot 601 to disturb the running of second input media 102, because centralized management device 60 is a kind of built-in PCI interfaces (Peripheral ComponentInterconnect, PCI) card, if therefore it is removed in main frame, then blocking program 17 will can not start, and for built-in pci card 60, in case be removed, blockade program 17 can't be discerned its identification code, so, just can not occur this again than the upper strata picture as long as the user starts shooting again.
When the user disturbs second input media 602 with telepilot 601, promptly can obtain to be equivalent to pull out the effect (also can be called " simulation hot plug ") of second input media.Second input media 102 of computing machine 10 can be PS/2 keyboard Q1 or PS/2 mouse Q2, and centralized management device 60 has the converter ic (IC) 602 that PS/2 changes USB, and make this PS/2 keyboard or this PS/2 mouse be equivalent to USB keyboard or USB mouse, so can be connected with computing machine 10.Certainly, blockade program 17 also can this built-in pci card 60 of nonrecognition, and PS/2 wherein changes the conversion IC 602 of USB, also can be made into the pattern of the Dongle of a kind of external USB.
Computing machine 10 can have the data bus that uses 32 or 64 sizes CPU and the ALU (not shown) as the basis.The blockade program 17 of computing machine 10 changes the registration table (Registration) of operating systems, makes computing machine 10 after starting shooting again, and blockade program 17 promptly automatically performs and still keeps this related setting before starting shooting again.
If viewpoint from another enforcement, the present invention is a kind of method of blocking first input media 101 of computing machine 10, its step comprises utilizes blockade program 17 to detect existing of second input media 102, remove second input media 102, and utilize blockade program 17 to show than the upper strata picture, covered non-" beginning " menu that first input media 101 triggered and the picture of non-hot key changeover program table, so can be considered as a kind of computer lock to second input media 102, but not necessarily will discern hardware identification code.So, the picture of " beginning " menu in Windows, be to add " Esc " key and get by triggering the window key or triggering " Ctrl " key simultaneously, and the picture of hot key changeover program table is can add " Tab " key by triggering " Alt " key to get.Certainly, first input media 101 in the method can be the PS/2 keyboard, and 102 of second input medias are the ridge (Dongle) that is connected on the USB slot.
If from another feasible angle, the present invention is a kind of method of blocking first input media 101 of computing machine 10, its step comprises utilizes blockade program 17 to set lock instruction and to remove instruction, and trigger this lock instruction to lock this first input media 101, so promptly utilize this blockade program 17 as a kind of computer lock, and not necessarily will discern hardware identification code and show than the upper strata picture.Certainly, first input media 101 in the method can be the PS/2 keyboard, and should the releasing instruction be hot key or password.This blockade program 17 can provide the input password window as previously mentioned, for this password of input of user or use this hot key and unlock.
If level from another kind of technology, the present invention is a kind of method of blocking the use of computing machine 10, its step comprises utilizes blockade program 17 to discern the built-in identification code of second input media 102, and utilize this blockade program 17 to show than the upper strata picture, covered non-" beginning " menu that first input media 101 triggered and the picture of non-hot key changeover program table, so can be considered as a kind of computer lock to second input media 102, and must discern hardware identification code.Certainly, second input media 102 in the method can be the USB mouse.
If pattern from another utilization, the present invention is a kind of method of blocking the use of computing machine 10, be applied to close first application program (for example: " Word "), its step comprises utilizes blockade program 17 to detect second input media 102, remove second input media 102, and utilize blockade program 17 to close this first application program, limit the use of this first application program, so can be considered as a kind of software locks to second input media 102, but not necessarily will discern hardware identification code.Certainly, first application program in the method can be the application program of " Word ", this blockade program 17 promptly according to the window item name (Class Name) and the window title title (Windows Caption Name) of this first application program that the user confirmed, is closed this first application program according to this.
If the practice from the another kind trial, the present invention is a kind of using method of blocking computing machine 10, its step comprises utilizes blockade program 17 to monitor second input media 102, and utilize blockade program 17 to show than the upper strata picture, covered non-" beginning " menu that first input media 101 triggered and the picture of non-hot key changeover program table, so can be considered as a kind of software locks to second input media 102, but not necessarily want detection hardware and identification hardware identification code, certainly, this blockade program 17 also can cover non-" beginning " menu that second input media 102 triggered and the picture of non-hot key changeover program table.That is to say that the blockade program 17 in the method can detect second input media 102 and whether be removed, should be to show than the upper strata picture.Or change this built-in identification code of discerning second input media 102 by blockade program 17, should be to show than the upper strata picture.
Perhaps, can also change second input media 102 into the USB mouse, and via user's triggering lock instruction to lock first input media 101.And in order to bring into play the maximum effect that this " shows and be somebody's turn to do than the upper strata picture ", blockade program 17 changes task manager's reading of data of the registration table of operating systems, closes blockade program 17 to prevent the user from starting the Windows task manager.Blockade program 17 can also change the reading of data of the safe mode of this registration table, enters safe mode and accessing file to prevent this user.And blockade program 17 can also change the reading of data of the login edit routine of this registration table, alters this registration table to prevent this user from starting the login edit routine, thus, promptly can give play to maximum defencive function.In addition, blockade program 17 of the present invention can be set and remove password, and removes password to remove this blockade program by inputing this.
If from the feasible practice of another kind, the present invention is a kind of method of blocking the use of computing machine 10, its step comprises utilizes blockade program 17 to receive or pick-up unit message, and by blockade program 17 to show than the upper strata picture, covered non-" beginning " menu that first input media 101 triggered and the picture of non-hot key changeover program table.Certainly, the device message in the method can be checked the message of hardware state for Windows, or other message relevant with hardware.Same, the blockade program 17 of this moment can also setting computer 10 user mode be: (for example: per 5 minutes) detection is less than this device message (being similar to the step 37 among Fig. 3) when at set intervals, promptly get back to this state (being similar to the step 30b among Fig. 3) that demonstrates than the upper strata picture, so will allow the user of a piracy can't successfully use the software of copy, disturb and abandon use because of can't bear it eventually.
If from the feasible practice of another kind, the present invention is a kind of using method of blocking computing machine 10, its step comprises utilizes blockade program 17 with monitoring module (for example: the program of stocking up or second input media 102), and by blockade program 17 to show than the upper strata picture, covered non-" beginning " menu that first input media 101 triggered and the picture of non-hot key changeover program table.Certainly, module in the method is software or hardware, this software is specific application program, for example: one stock up, the program of sales, stock, or Word, Outlook Express, web browser (InternetExplorer) etc. all can, to disturb the execution of other non-designated software, for example: signaling unit of Microsoft's network (MSN Messenger) or games etc., make blockade program 17 have the function of a kind of " compulsory execution software locks " 701 as shown in Figure 7, and this hardware can be second input media 102.
The user can this specific application program of mouse drag be listed as with " startup " that is set to Windows " beginning " menu, or directly choose the function of " start automatically performs " that this specific application program itself provided, and by " compulsory execution software locks " of the present invention to carry out the maximization of this specific application program, when the user closes this specific application program, and be set at simultaneously when no longer being re-executed, blockade program 17 can recognize second input media 102 at this moment and be removed (as step 30a), and demonstration should be than upper strata picture (as step 30b).See also Fig. 7, when setting this application specific software program, the user is closed the condition that covers lock-out facility into opening, then block window item name and window title title that program 17 will be discerned this specific application software, the effect of the title of this specific application software at this moment promptly is similar to the hardware identification code of second input media 102, blockade program 17 promptly can be closed the function that starts covering because of this specific application software, when not requiring that as the user picture of this application-specific becomes the picture of a kind of " the superiors' demonstration " (Always On Top), promptly formed the notion of multiple module, it is after the user closes this specific application program (step 70), promptly set blockade program 17 meetings being closed because of this application-specific, and show than upper strata picture (step 71), should can be a photo that the user selectes this moment than the upper strata picture, to warn the people that must use this application specific software, this application-specific must not be pent arbitrarily, so that computing machine 10 becomes this application-specific " special machine ".As for other and the similar behavior of identification hardware 102, will repeat no more in this.
Setting as the user that this application-specific is closed not is when opening the condition of covering function, this blockade program 17 promptly must not be discerned the window item name and the window title title of this specific application software, this application-specific is promptly irrelevant with the function of " whether opening covering ", " compulsory execution software locks " of the present invention can just belong to a kind of additional function of second input media 102, the picture that can require user at this moment to set this application-specific must become the picture of a kind of " the superiors' demonstration ", and utilize this blockade program 17 and the user mode of setting computer 10 is: when blockade program 17 when (for example: every 1 second or 2 seconds) detects this specific application program and do not use maximized picture or this specific application program to be closed at set intervals (step 72), promptly automatically perform this specific application program and keep and show that this application-specific is a maximized picture (step 73), so with avoid detection time in 17 liang of seconds of blockade program at interval in, carried out other application program by the third party, the important monitored picture that can take precautions against simultaneously the application program that a kind of personnel of supervision pass in and out is changed its due maximized picture mala fide, even and consumer or third party's attempt will minimize this specially appointed application program, this blockade program 17 still can re-execute this specially appointed application program more automatically, be returned to and be shown as a maximized picture, so it can really be called " lock of executing software program ", simultaneously by the picture of this application-specific constantly occurring, can disturb the execution of other software, also can make computing machine 10 become " special machine " of this application-specific.Certainly,, then block program 17 and also can be shown as, to carry out the function that covers than upper strata picture (step 71) if the user pulls out second input media 102 (step 74) at this moment.And monitoring that should blockade program 17 can comprise the insertion that detects second input media 102, and promptly showing should be than the upper strata picture to cover.
Please consult Fig. 7 again, setting as the user that this application-specific is closed not is the condition of opening covering function again, when the picture that does not but require this application-specific must become the picture of a kind of " the superiors' demonstration ", although the user has and uses this and execute lock 701 to automatically perform this specific application program, but, still can't stop the execution of other application program because of this specific application program is not the superiors' picture displayed.Certainly, should can be pulled out (step 74) because of second input media 102, promptly be shown, to obtain not allow other people re-use the effect of this computing machine 10 than upper strata picture (step 71) than the upper strata picture.When the user will block being somebody's turn to do than the upper strata picture of program 17, when being set at the picture of carrying out this application-specific (step 75), then when the user pulls out second input media 102, the picture (step 76) that promptly can show this application-specific, so can obtain in that the user is busy when leaving, can limit the third party can only continue to use this application-specific on computing machine 10 effect by pulling out second input media 102.Certainly, whether blockade this moment program 17 also can detect this specific application program at set intervals has the maximized picture of use or this specific application program to be closed (step 72), promptly automatically performs this specific application program and keep to show that this application-specific is a maximized picture (step 73).
Certainly, whether blockade program 17 can change the program that detects this hardware identification code and/or this appointment at set intervals into and be unlocked, to obtain identification software and hardware or the independent separately effect of discerning together.In addition, blockade program 17 is after carrying out blockade behavior (for example: startup is than the upper strata picture and close PS/2), (for example: alarm song), note or Email to be to inform that the user (for example: a possessor who uses the computing machine peripheral equipment of dongle or USB interface) blocked success promptly send the prompting sound, wherein sending sound prompting is the use that can make things convenient for a blind hole people, or when being used for preventing that other people from taking advantage of the user and do not note, the behavior of stealing.
But the user who considers consumption has the demand of maintenance calculations machine, when if the consumer wants to operate other programs, for example: when the demand of maintenance calculations machine is arranged, the consumer can revise and force the maximized time interval (for example being extended for every 60 minutes), after this moment, the user minimized this designated program, will just can be forced maximized picture again in 60 minutes, as long as change is returned after maintenance.And want to change interval time of this detection, and also need authentication password (step 31 among similar Fig. 3), so can execute a certain specific application program and take into account the demand of maintenance.
If aspect from the another kind application, the present invention is a kind of method of blocking first input media 101 of computing machine 10, its step comprises utilizes blockade program 17 with monitoring module (for example: a network interface card), and by blockade program 17 to detect being removed of this module, promptly lock first input media 101.First input media 101 in the method can be network interface card, and this module can be the USB mouse, and the reading of data of startup first input media of blockade program 17 change registration tablies, opens first input media 101 again to prevent the user.
In sum, the present invention really can be with a kind of design of novelty, by utilizing this first input media to set lock instruction, must change this releasing instruction of input on this second input media then into, and the built-in identification code of this second input media of the identification of being used, must when identification is errorless, just accept this releasing instruction.So all those skilled in the art, can make various modifications and variations to the present invention, but it is claimed not break away from claims.

Claims (21)

1. method of blocking first input media of computing machine, its step comprises:
Utilize this first input media to set lock instruction and to remove instruction;
This lock instruction of triggering by the user is to lock this first input media; And
Demonstration is covered the picture in original use than the upper strata picture.
2. the method for claim 1 also comprises:
The blockade program is provided, discerning this lock instruction and then to lock this first input media, should removes instruction when errorless and block procedure identification at this, promptly removing should be than the upper strata picture; And
Be electrically connected second input media and this computing machine, and the built-in identification code of should the blockade program promptly discerning this second input media, it is when this blockade procedure identification is errorless, just finish the startup of this blockade program, wherein: each shows the little image of " closing PS/2 " to this blockade program on the notification area of the desktop of this computing machine and taskbar, has started this blockade program to inform this computing machine of this user;
This method also is included on this second input media this releasings instruction of input, and blocks this built-in identification code of this second input media of procedure identification and this through this and remove and instruct when all errorless, and just releasing is to the locking of this first input media;
This blockade program display goes out on-screen keyboard, and it is positioned at this than on the picture of upper strata, instructs for this releasing that clicks or import of this second input media, and should the releasing instruction be hot key or password; And/or
This blockade program receives the message of the inspection hardware state that form provided, to lock this first input media.
3. the method for claim 1, also be included in this computing machine and show the input password window, it is positioned at this than on the picture of upper strata, and this user must install remote control procedure at remote computer, import this releasing instruction to utilize this remote computer, and by network to transmit this releasing instruction to this computing machine, to remove the locking of this first input media.
4. device that blocks computing machine, it is electrically connected to this computing machine, wherein this computing machine has the blockade program and first input media, this first input media is in order to set lock instruction and to remove instruction, and utilize this first input media to trigger this lock instruction by the user, to lock this first input media, to cover the picture in original use, wherein this sealing pack comprises than the upper strata picture in this blockade program display:
Second input media is in order to import this releasing instruction; And
Built-in identification code is blocked the identification of program for this, and when identification is errorless, just accepts this releasing instruction, and then removes the locking to this first input media.
5. device as claimed in claim 4, wherein:
This device is USB keyboard or USB mouse, and PS/2 keyboard or PS/2 mouse that this first input media is this computing machine, and this built-in identification code is the hardware identification code of this USB keyboard or this USB mouse;
This device is for the USB wireless mouse, and the hardware identification code of this built-in identification code ridge that is this wireless mouse or the hardware identification code of digital music player;
This second input media comprise this computing machine external network interface card, and utilize the mouse of remote computer or keyboard to instruct to import this releasing, and this releasing instruction is instructed to this computing machine to transmit this releasings by network, and this built-in identification code hardware identification code that is this network interface card; Or
This lock instruction is set at " Ctrl " key and adds " 1 " key, be hot key and should remove instruction, and this hot key is set to " Ctrl " key, " Alt " key adds " 8 " key.
6. computing machine with lock-out facility, it comprises:
First input media is in order to set lock instruction and to remove instruction; And
The blockade program in order to discerning this lock instruction, and then locks this first input media, and shows than the upper strata picture, is covered the picture in original use.
7. computing machine as claimed in claim 6, wherein:
This device also comprises second input media, it is electrically connected to this computing machine, and this second input media has built-in identification code, remove this than the upper strata picture for the identification of this blockade program, this second input media is in order to import this releasing instruction, send the releasing instruction for the identification of this blockade program, PS/2 keyboard that this first input media is this computing machine or PS/2 mouse, this second input media is USB keyboard or USB mouse, and this built-in identification code is the hardware identification code of this USB keyboard or this USB mouse, and this second input media utilize this computing machine external docking station to import this releasing instruction, and this computing machine also comprises the 3rd input media, it is electrically connected to this docking station, the 3rd input media is specific USB keyboard or specific USB mouse, and should the blockade program promptly discerns the hardware identification code of this specific USB keyboard or this specific USB mouse;
This second input media is the USB mouse, and this built-in identification code hardware identification code that is this mouse;
This second input media is the external network interface card of this computing machine, and utilize the mouse of remote computer or keyboard to instruct to import this releasing, and this releasing instruction is instructed to this computing machine to transmit this releasings by network, and this built-in identification code hardware identification code that is this network interface card;
This lock instruction is set at " Ctrl " key and adds " 1 " key, be hot key and should remove instruction, and this hot key is set to " Ctrl " key, " Alt " key adds " 8 " key;
This computing machine also comprises second input media, and it utilizes a kind of device of concentrating limiting and managing computer and external data to transmit in the cipher remote control mode, to disturb the running of this second input media;
This second input media is PS/2 keyboard or PS/2 mouse, and utilizes PS/2 to change the converter of USB, is USB keyboard or USB mouse and this PS/2 keyboard or this PS/2 mouse are become;
This computing machine has the data bus that uses 32 or 64 sizes CPU and ALU and the operating system as the basis; Or
The registration table that this blocks routine change operating system makes this computing machine after starting shooting again, and this blockade program promptly automatically performs and still keeps this related setting before starting shooting again.
8. method of blocking first input media of computing machine, its step comprises:
Utilize the blockade program to detect existing of second input media;
Remove this second input media; And
Utilize this blockade program to show, covered non-" beginning " menu that this first input media triggered and the picture of non-hot key changeover program table than the upper strata picture.
9. method as claimed in claim 8, wherein this first input media is the PS/2 keyboard, this second input media is the ridge that is connected on the USB slot.
10. method of blocking first input media of computing machine, its step comprises:
Utilize the blockade program to set lock instruction and to remove instruction; And
Trigger this lock instruction to lock this first input media.
11. method as claimed in claim 10, wherein this first input media is the PS/2 keyboard, and should remove instruction and be hot key or password, and should the blockade program provide the input password window, for this password of input of user or use this hot key and unlock.
12. a method of blocking the use of computing machine, its step comprises:
Utilize the blockade program to discern the built-in identification code of second input media; And
Utilize this blockade program to show, covered non-" beginning " menu that first input media triggered and the picture of non-hot key changeover program table than the upper strata picture.
13. method as claimed in claim 12, wherein this second input media is the USB mouse.
14. a method of blocking the use of computing machine is applied to close first application program, its step comprises:
Utilize the blockade program to detect second input media;
Remove this second input media; And
Utilize this blockade program to close this first application program, limit the use of this first application program.
15. method as claimed in claim 14, wherein this first application program application program that is " Word ".
16. a method of blocking the use of computing machine, its step comprises:
Utilize the blockade program to monitor second input media; And
Utilize this blockade program to show, covered non-" beginning " menu that first input media triggered and the picture of non-hot key changeover program table than the upper strata picture.
17. method as claimed in claim 16, wherein:
This blockade program detects being removed of this second input media, should be than the upper strata picture to show;
This blocks this built-in identification code of this second input media of procedure identification, should be than the upper strata picture to show;
This second input media is the USB mouse, and via user's triggering lock instruction to lock this first input media;
This blocks task manager's reading of data of the registration table of routine change operating system, close this blockade program to prevent the user from starting the window banging keeper, wherein should block the reading of data of the safe mode of this registration table of routine change, to prevent that this user from entering safe mode and accessing file, maybe should block the reading of data of the login edit routine of this registration table of routine change, alter this registration table to prevent this user from starting the login edit routine;
This blockade program setting removes password, and removes password to remove this blockade program by inputing this; Or
When this blockade program detects built-in identification code less than this second input media at set intervals, promptly demonstrate this than the upper strata picture.
18. a method of blocking the use of computing machine, its step comprises:
Utilize the blockade program with monitoring module; And
To show, covered non-" beginning " menu that first input media triggered and the picture of non-hot key changeover program table by this blockade program than the upper strata picture.
19. method as claimed in claim 18, wherein this module is software or hardware, and this software is a specific application program, and this hardware is second input media, wherein:
This blockade program is carried out this specific application program, and discern being removed of this second input media, and demonstration should be than the upper strata picture, and setting this specific application program, the user becomes the superiors' picture displayed, and when this blockade program detects this specific application program at set intervals and do not use maximized picture or this specific application program to be closed, promptly automatically perform this specific application program and be shown as this maximized picture;
This blocks the window item name and the window title title of this specific application program of procedure identification, and shows that because of this specific application program is closed this is than the upper strata picture; Or
This blocks being somebody's turn to do than the upper strata picture of program, be the picture of carrying out this application-specific.
20. a method of blocking first input media of computing machine, its step comprises:
Utilize the blockade program with monitoring module; And
To detect being removed of this module, promptly lock this first input media by this blockade program.
21. method as claimed in claim 20, wherein this first input media is a network interface card, and this module is the USB mouse, and should block the reading of data of startup first input media of routine change registration table, opens this first input media again to prevent the user.
CNA2007100062188A 2007-02-07 2007-02-07 Method for blocking computer input device and its device Pending CN101241529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100062188A CN101241529A (en) 2007-02-07 2007-02-07 Method for blocking computer input device and its device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100062188A CN101241529A (en) 2007-02-07 2007-02-07 Method for blocking computer input device and its device

Publications (1)

Publication Number Publication Date
CN101241529A true CN101241529A (en) 2008-08-13

Family

ID=39933056

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100062188A Pending CN101241529A (en) 2007-02-07 2007-02-07 Method for blocking computer input device and its device

Country Status (1)

Country Link
CN (1) CN101241529A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102460365A (en) * 2009-06-09 2012-05-16 三星电子株式会社 Method for providing a ui, and display device adopting same
CN102768719A (en) * 2012-06-29 2012-11-07 广州视睿电子科技有限公司 Locking method and locking device for input peripheral
CN103123463A (en) * 2011-11-21 2013-05-29 联想(北京)有限公司 Method and device for controlling states of system
CN103513972A (en) * 2012-06-25 2014-01-15 联想(北京)有限公司 Display method and electronic equipment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102460365A (en) * 2009-06-09 2012-05-16 三星电子株式会社 Method for providing a ui, and display device adopting same
CN102460365B (en) * 2009-06-09 2014-05-07 三星电子株式会社 Method for providing a ui, and display device adopting same
US9389783B2 (en) 2009-06-09 2016-07-12 Samsung Electronics Co., Ltd Method for associating an onscreen keyboard with a displayed application window and display apparatus applying the same
CN103123463A (en) * 2011-11-21 2013-05-29 联想(北京)有限公司 Method and device for controlling states of system
CN103123463B (en) * 2011-11-21 2016-08-17 联想(北京)有限公司 A kind of method and device of control system state
CN103513972A (en) * 2012-06-25 2014-01-15 联想(北京)有限公司 Display method and electronic equipment
CN103513972B (en) * 2012-06-25 2017-06-27 联想(北京)有限公司 Display methods and electronic equipment
CN102768719A (en) * 2012-06-29 2012-11-07 广州视睿电子科技有限公司 Locking method and locking device for input peripheral

Similar Documents

Publication Publication Date Title
CN101436247B (en) Biological personal identification method and system based on UEFI
CN107450839B (en) Control method and device based on black screen gesture, storage medium and mobile terminal
US20090222908A1 (en) Device for Transmission of Stored Password Information Through a Standard Computer Input Interface
WO2016177000A1 (en) Method for entering operating system desktop and mobile intelligent terminal
CN101667234A (en) Locking state conversion method, electronic device and computer program product
US20080178275A1 (en) Method For Locking Computer And Device For The Same
CN101727281A (en) System and method for one-key locking of computer monitor
US8364138B2 (en) Remote locking arrangements for electronic devices
CN105224194B (en) A kind of data processing method and terminal
EP4137974A1 (en) Method for unlocking terminal device by wearable device and communication system
US6865629B2 (en) RSM-resident program pair initiation sequence
CN101241529A (en) Method for blocking computer input device and its device
US8726184B2 (en) Systems, apparatus and methods for a messaging system
US20200334356A1 (en) Apparatus and method for monitoring use history
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN102156826A (en) Provider management method and system
EP3719688B1 (en) Operation authentication relay device, method, and program
CN103377056A (en) Program executing method and mobile terminal
CN102650924B (en) Unlocking method, device and terminal
CN105335631A (en) Method and device for configuring login information, and mobile terminal
JP2011108183A (en) Communication control system, central device, terminal device, and computer program
CN106161481A (en) A kind of mobile terminal physical button isolation safe module takes precautions against the device of security risk
CN106445382A (en) Method and system of utilizing gestures to achieve child lock
CN104281797A (en) Application program execution system and method
JP5302712B2 (en) Client terminal, user management method, terminal management processor, program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080813