CN1206989A - Method for identifying user - Google Patents

Method for identifying user Download PDF

Info

Publication number
CN1206989A
CN1206989A CN 97123498 CN97123498A CN1206989A CN 1206989 A CN1206989 A CN 1206989A CN 97123498 CN97123498 CN 97123498 CN 97123498 A CN97123498 A CN 97123498A CN 1206989 A CN1206989 A CN 1206989A
Authority
CN
China
Prior art keywords
user
controller
personal information
built
described user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 97123498
Other languages
Chinese (zh)
Inventor
高祯完
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to CN 97123498 priority Critical patent/CN1206989A/en
Publication of CN1206989A publication Critical patent/CN1206989A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for identifying users of electric and electronic apparatuses in order to allow only authorized users to operate them is characterized in that the users are identified by checking the personal information recorded in the users' electronic identification cards. The electronic identification cards contain built-in chips to record the users' personal information.

Description

Be used to discern user's method
The present invention relates to a kind of be used for limited subscriber use the home video player for example VCR (video cassette recorder) or DVD (digital video disk) with the method for the video product avoiding the minor to watch forbidding, particularly a kind of by electronic recognition card (electronic identification card) rather than discern user's method by traditional password.
Describe traditional being used to below in conjunction with accompanying drawing and control the method that pupillary home video is play.With reference to Fig. 1, traditional home video playing device such as VCR or DVD comprise controller 12, keyboard 10, memory 16 and data reproduction unit 14.In conventional method, adult such as pupillary father and mother are by the particular password of keyboard 10 setting devices, and the minor uses the video product of forbidding with restriction.Such password is checked by controller 12, and is stored in the memory 16.
After password stores in the memory 16 during the displaying video product, controller 12 is according to the predetermined restriction to the particular video frequency product, or, show the message that a request user enters password on the display screen (not shown) according to having no truck with, limit the pre-provisioning request that the minor uses video product.Thus, when the user entered password, controller 12 was relatively entered password and is stored in password in the memory 16, only carries out replay operations when two passwords are consistent, otherwise the cancellation replay operations.
Except top method, can adopt more traditional method, wherein video play device is provided with special physical locks device, and device only could be operated when this physical locks is opened by user's physics key thus.
Under the situation of simple challenge, the fail safe of this traditional method is vulnerable, and its shortcoming is, as user when for example adult or pupillary father and mother forget password, this device can not use, and when the solution of password offers the user, the validity of the safety function of this device will reduce.Another shortcoming is the problem of losing the such physics key of the possibility of such physics key and safekeeping, and this is causing fault sometimes.
Therefore, the purpose of this invention is to provide a kind of video product that limited subscriber such as minor can only watch permission, a kind of method that can eliminate the aforementioned scarce limit of prior art of being used for.
Another object of the present invention provides a kind of method of coming restricting unauthorized use video product or video play device by accurate identification user.
According to the present invention, provide the electric or electronic installation of a kind of identification so that only allow authorized user to its method of operating, wherein discern the user by the personal information of detection record on the user's electronic identification card.The electronic recognition card comprises built-in chip, the personal information that is recorded with record.
Describe the present invention in detail only as the preferred embodiment of example, wherein below in conjunction with accompanying drawing:
Fig. 1 is the calcspar that prior art is used to control the conventional apparatus that pupillary home video plays;
Fig. 2 is used to explain that the restriction minor who adopts the inventive method can only watch the calcspar of equipment of the video product of permission;
Fig. 3 is a control flow chart of according to one preferred embodiment of the present invention minor being watched the controller that restriction is set; With
Fig. 4 is a control flow chart of controlling the controller of above-mentioned restriction operation according to one embodiment of the invention.
Referring to Fig. 2, the restriction minor of the preferred embodiment of the present invention can only watch the inventive method of the video product of permission to illustrate below at the VCR or the DVD that comprise controller 12, keyboard 10, memory 16 and data reproduction unit 14.
Be the identification user, the present invention adopts the electronic recognition card, and this electronic recognition card comprises various personal information, is recorded in the built-in chip, is read by specific card reader.
This device is provided with card reader 18, is used for reading relevant information from electronic recognition card 19.Controller 12 is provided with and utilizes the personal information that is recorded in the above-mentioned card to discern user's program, so that limit the operation that pupillary unauthorized is watched.
Attempt to limit user such as adult and the pupillary father and mother that minor's unauthorized is watched video product, by the keyboard 10 of said apparatus of structure according to a preferred embodiment of the invention, the information of the relevant restriction of input is to controller 12.In addition, details about this user and his or her mandate are read from electronic recognition card 19 by card reader 18, controller 12 is relatively by electronic recognition card 19 information of reading and the information that is stored in the memory 16 thus, if and can accept, new state of a control is set, and in memory 16, stores necessary information.After this, controller 12 is exported various control signals and is given data reproduction unit 14, thereby control suitably operating data regeneration unit 14 based on newly-installed state of a control.
Referring to Fig. 3, controller 12 checks in step 20 whether current state is reset mode.Reset mode can be keyed in a particular key by user's (being called " authorized user " later on) that restriction is set such as adult and such the attempting of pupillary father and mother and carry out on keyboard 10.If current state is a reset mode, controller 12 proceeds to step 22, whether carries out initial setting to check.Initial setting can carry out during the initial start of the device that is used to be provided with the restriction that unauthorized plays, thereby authorized user is by manufacturer or supplier's registration.
If also do not carry out initial setting, controller 12 proceeds to step 34, to read personally identifiable information's (being called " ID " later on) of user from electronic recognition card 19 (hereinafter referred to as " card ") by card reader 18.Then in step 36, controller 12 is relatively from blocking 19 ID that read and the default value that is stored in the memory 16, and check in step 38 whether ID can accept, if ID is unacceptable, controller 12 proceeds to step 32 stopping/finishing setting operation, and if ID is acceptable, then proceed to step 40, so that in memory 16, store ID, and further proceed to step 42.
In addition, if initial setting carries out, controller 12 proceeds to step 24 by step 22, reading ID by card reader 18 from blocking 19, and further proceeds to step 26, is stored in ID in the memory 16 with retrieval, proceeds to step 28 then, with mutual relatively ID.In step 30, controller 12 checks whether can accept from blocking 19 user ID of reading, if unacceptable, proceed to step 32 after this, stopping/finishing setting operation, and if can accept, then proceed to step 42.
In step 42, controller 12 beginning setting operations show setup menu simultaneously on the display window (not shown).Then, in step 44, controller 12 responses are carried out setting operation or are changed various control datas by handling the key data that keyboard 10 produces.Control data comprises the various restricting datas (for example age limit) of control minor video-see or watches irrelevant control data with limiting minor's video frequency program that the latter is used to set a forced process, checks ID when the displaying video product.
Referring to Fig. 4, the control procedure of restriction operation is described in detail as follows.In step 50, controller 12 checks whether current state is beholder's unrestricted model of setting shown in Figure 3 during setting up procedure.If current state is not beholder's definition mode, controller 12 proceeds to step 52, so that in statu quo program for playback is a video product; And if current state is beholder's unrestricted model, handle proceeding to step 54, whether be in unidentified state to check card 19.Above-mentioned steps also can be carried out during setting up procedure as shown in Figure 3.
If blocking 19 is to be in not identify other state, controller 12 proceeds to step 56, so that for the program that will be played, analyzes and watches the information of restriction about the minor, thereby check whether this program is set at the state that the minor watches restriction.As a result of, if program is not set to the minor and watches restriction state, controller 12 proceeds to step 52 to play this program, if and program is set to the minor and watches restriction state, then controller 12 proceeds to step 58, whether begin to check the ID of card 19, be authorized user to judge the user.
In addition, be in status recognition if block 19 in step 54, controller 12 proceeds to step 58 similarly, and the ID of beginning test card 19 reads ID by card reader 18 from blocking 19.In step 60, controller 12 retrievals are stored in the ID reference data in the memory 16, to discern the user in step 62 then.
Then, in step 64, controller 12 checks whether the user is a unauthorized user, if and user ID is acceptable, controller 12 proceeds to step 52 to play corresponding video frequency program, if and user ID is unacceptable, controller 12 proceeds to step 66 stopping current operation, and presses pre-determined number and repeat ID and check, and further proceed to step 68, if it is acceptable that user ID is proved to be, controller 12 proceeds to step 52, to play the associated video program, if it is and unacceptable, then proceed to step 70, to store top unacceptable ID in memory 16, so that can check the tabulation of unauthorized user ID after the authorized user.Controller 12 proceeds to step 72 then, with the power supply of shutoff device, and finishes current operation.As mentioned above, finish the restriction minor and use the process of forbidding video product.
Except the top example of restriction minor unauthorized video playback, above the inventive method can discern the user by checking such as complete personal information such as user name, age, sex and residences number, and correspondingly authorized user can be restricted to minority adult such as pupillary father and mother, and be registered in the memory 16, use this device to avoid minor and other human factor error.
Although the present invention illustrates in conjunction with VCR and DVD, method of the present invention suitably can be applied in the safety system of personal computer by adopting Fig. 3 and operational processes shown in Figure 4.
As mentioned above, the present invention has the advantage that can correctly be identified by electronic identification card the user, thereby not Only can identify the unauthorized user of attempting wrong operative installations, and be convenient to the identification of unauthorized user, with Its operative installations and video product are applied restriction, and the method for foregoing invention is than the tradition that adopts password Method is more convenient.

Claims (6)

1. one kind is used to discern the user of Electrical and Electronic device so that only allow authorized user to its method of operating, it is characterized in that, discerns described user by the personal information of inspection record in described user's electronic recognition card.
2. identification user's as claimed in claim 1 method, wherein said electronic recognition card comprises the built-in chip of the personal information that writes down the described user who is recorded.
3. identification user's as claimed in claim 2 method, wherein said Electrical and Electronic device is provided with the card reader with described built-in chip interface, discerns described user with the personal information that is stored in the described user in the described built-in chip by inspection.
4. the user of replay device who discerns the regeneration video frequency program is characterized in that so that only allow authorized user to watch the method for described video frequency program, discerns described user by the personal information of inspection record in described user's electronic recognition card.
5. identification user's as claimed in claim 4 method, wherein said electronic recognition card comprises the built-in chip of the personal information that writes down described user.
6. identification as claimed in claim 5 user's method, wherein said Electrical and Electronic device is provided with the card reader with described built-in chip interface, so that the personal information that is stored in the described user in the described built-in chip by inspection is discerned described user.
CN 97123498 1997-07-26 1997-12-30 Method for identifying user Pending CN1206989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 97123498 CN1206989A (en) 1997-07-26 1997-12-30 Method for identifying user

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR35377/97 1997-07-26
CN 97123498 CN1206989A (en) 1997-07-26 1997-12-30 Method for identifying user

Publications (1)

Publication Number Publication Date
CN1206989A true CN1206989A (en) 1999-02-03

Family

ID=5177178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 97123498 Pending CN1206989A (en) 1997-07-26 1997-12-30 Method for identifying user

Country Status (1)

Country Link
CN (1) CN1206989A (en)

Similar Documents

Publication Publication Date Title
US8107627B2 (en) Temporal proximity to verify physical proximity
KR100292547B1 (en) Personal Identification Device and Access Control System
CN105261105B (en) Safety door inhibition method
US6519412B1 (en) Apparatus and method for changing viewing restriction level in a parental control system for digital versatile disc player
EP2732399B1 (en) Method and apparatus for using non-volatile storage device
EP2074545A1 (en) Security system for external data storage apparatus and control method thereof
KR100281872B1 (en) A password processing method
EP0893752A1 (en) Method for identifying users
CN1206989A (en) Method for identifying user
EP0973118A2 (en) Fingerprint checking system, fingerprint checking method and memory card used for the same
KR20060009353A (en) Controlling access to a data medium
KR100786266B1 (en) Biometric access control system and method
JPS58178456A (en) Magnetic disk controller
CN110795320A (en) User behavior recording and tracing management method, device, electronic equipment and system
WO2006133076A2 (en) System to ensure that all audio-visual optical disc types are properly screened for watermarks
KR100261807B1 (en) Method and apparatus for preventing piracy of program
US7623418B2 (en) Reproducing apparatus having an opening operation
CN1357839A (en) Computer safety system and its initiate method
JPH10143471A (en) Device and method for protect
JPH07134785A (en) Id discrimination device
KR0177234B1 (en) Device for limiting the users of a tape recorder
JPH01286095A (en) Automatic teller machine
KR19990041141U (en) Information inquiry terminal with fingerprint recognition function
JPS61155578A (en) Unlocking apparatus
KR0155683B1 (en) Recording method for cassette tape

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication