CN1332279C - Warning function operating method for portable computer - Google Patents
Warning function operating method for portable computer Download PDFInfo
- Publication number
- CN1332279C CN1332279C CNB2004100150518A CN200410015051A CN1332279C CN 1332279 C CN1332279 C CN 1332279C CN B2004100150518 A CNB2004100150518 A CN B2004100150518A CN 200410015051 A CN200410015051 A CN 200410015051A CN 1332279 C CN1332279 C CN 1332279C
- Authority
- CN
- China
- Prior art keywords
- portable computer
- alarm function
- works
- controller
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Input From Keyboards Or The Like (AREA)
- Emergency Alarm Devices (AREA)
- Calculators And Similar Devices (AREA)
Abstract
The present invention relates to a warning function operating method for a portable computer. An external device or a component or a function of portable computer inside is used to undertake key work, and then signals are generated by relative circuits of a key so as to cause an inbuilt controller to know the portable computer is locked or not. When the inbuilt controller knows the portable computer is locked, the external inbreak mechanism is started by the inbuilt controller. In addition, when the external try / broken is discovered, a warning/ alarm function is started, and relative subsequent movements are also started. Thus, the portable computer is caused to have the guard mechanism of the warning function by the present invention so as to achieve the aim of security information protection in the portable computer.
Description
Technical field
The present invention relates to a kind of portable computer, and particularly related to a kind of How It Works of alarm function of portable computer.
Background technology
At present, portable computer (for example being notebook computer) is more and more general, in the future the stage of more possible every one can have a machine.Yet, because carry-on data transmission science and technology makes rapid progress especially, the situation that may have confidential data to leak then.Because present portable computer does not have the mechanism of any defence, so as long as several minutes other people just can take the data of classified papers away and not be found.Therefore, how to make portable computer have the mechanism of defence, steal confidential data wherein, just become one of researchist's urgent problem to prevent other people.
Summary of the invention
The present invention proposes a kind of How It Works of alarm function of portable computer, be the embedding controller (embeddedcontroller that cooperates in the present portable computer, abbreviation EC) function, utilize the input of keyboard, mouse interface or even power switch all necessary through embedding the characteristic of controller, add the cooperation of some switches, reach and make portable computer have the mechanism of the strick precaution of alarm function.
The How It Works of the alarm function of portable computer of the present invention, this portable computer have one and embed controller, and this embedding controller has one and takes precautions against outside invasion mechanism, and described How It Works comprises the following steps:
1) provide a key, a signal that sends by this key, and make this embedding controller learn whether lock;
2) when this embedding controller being learnt lock, this embedding controller can start this strick precaution outside invasion mechanism;
3) judge whether to suffer outside attempt/the invasion; And
4) when suffering outside trial the/when invading, can start caution/alarm function.
The present invention utilizes assembly or the function in external device (ED) or the portable computer inside to serve as " key (key) " work, the signal that produces of the interlock circuit by key then embeds controller and learns whether portable computer locks and make.When the embedding controller learns that portable computer is locked, embed controller and can start the outside invasion mechanism of taking precautions against.Moreover, if find to suffer outside trial the/when invading, can start caution/alarm function, and the subsequent action of being correlated with.Therefore, the present invention can make portable computer have the strick precaution mechanism of alarm function, and reaches the purpose of the confidential data in the protection portable computer.
Description of drawings
Fig. 1 is the synoptic diagram of the portable computer of a preferred embodiment of the present invention.
Fig. 2's is the process flow diagram of How It Works of alarm function of the portable computer of a preferred embodiment of the present invention.
Embodiment
As Fig. 1 is the synoptic diagram of the portable computer 10 of a preferred embodiment of the present invention.As shown in Figure 1, portable computer 10 comprises embedding controller 102, computer system 104, other related system 106, supply unit 108 and key (key) 110.Wherein, embedding controller 102 is the runnings in order to control computer system 104 and other related system 106, and it has the outside invasion of strick precaution mechanism.And key 110 is the signals by the interlock circuit generation of key 110 in the portable computer 10, and makes embedding controller 102 learn whether portable computer 10 locks.Wherein, key 110 can for example be assembly or the function in portable computer 10 inside.For example, key 110 can be a button in the portable computer 10, when pressing this button, can make to embed controller 102 and learn that portable computer 10 locked.Or key 110 is assembly or the function in the external device (ED).For example, key 110 can be a button on the infrared remote controller, and when pressing this button, the infrared ray of being launched can be received by portable computer 10, embeds controller 102 and learns that portable computer 10 locked and make.Be the process flow diagram of How It Works of alarm function of the portable computer of a preferred embodiment of the present invention as shown in Figure 2.In this How It Works, the work that at first can utilize assembly in external device (ED) or portable computer 10 inside or function to serve as key 10, the signal that produces by key 110 interlock circuits in the portable computer 10 then embeds controller 102 and learns portable computer 10 whether lock (as step S202) and make.Learn that portable computer 10 is unlocked if embed controller 102, then can continue normal operation (as step S204).If learn when portable computer 10 is locked, then embed controller 102 and can start the outside invasion mechanism (as step S206) of taking precautions against and embed controller 102.Wherein, take precautions against outside invasion mechanism and comprise and prevent to make portable computer 10 starts, prevent to make the keyboard input/use in the portable computer 10, use keyboard input to prevent other people; Prevent to make the mouse input/use in the portable computer 10, use mouse input to prevent other people; Basic input input-output system (BIOS) in the notice portable computer 10 carries out the precautionary measures, is revised to prevent BIOS; And other the precautionary measures.Then, embed controller 102 and can judge whether portable computer 10 suffers outside attempt/ invade (as step S208).Judge that portable computer 10 does not suffer outside attempt/the invasion, then can return step S202 if embed controller 102.If judge that portable computer 10 has suffered outside attempt/the invasion, then can start caution/alarm function (as step S210) and embed controller 102.Afterwards, can carry out relevant subsequent step (as step S212).And the relevant subsequent step comprises and makes portable computer 10 shutdown, closes the screen of portable computer shutdown 10 or carry out certain specific program.Furthermore, the relevant subsequent step more comprises the action of attack or even self-destruction.
In preferred embodiment of the present invention, key 110 is to be coupled to a pin that embeds controller 102.And the signal that the interlock circuit of key 110 produces can be a calibration signal, but not as limit.
In sum, the present invention utilizes assembly or function in external device (ED) or the portable computer inside to serve as " key (key) " work, make by interlock circuit then to embed controller and learn whether portable computer locks.When the embedding controller learns that portable computer is locked, embed controller and can start the outside invasion mechanism of taking precautions against.Moreover, if find to suffer outside trial the/when invading, can start caution/alarm function, and the subsequent action of being correlated with.Therefore, the present invention can make portable computer have the strick precaution mechanism of alarm function, and reaches the purpose of the confidential data in the protection portable computer.
Claims (8)
1. the How It Works of the alarm function of a portable computer, this portable computer have one and embed controller, and this embeddings controller has a strick precaution outside invasion mechanism, it is characterized in that described How It Works comprises the following steps:
1) provide a key, this key is the assembly in this portable computer, is coupled to a pin that embeds controller, a signal that sends by this key, and make this embedding controller learn whether lock;
2) when this embedding controller being learnt lock, this embedding controller can start this strick precaution outside invasion mechanism;
3) judge whether to suffer outside attempt/the invasion; And
4) when suffering outside trial the/when invading, can start caution/alarm function.
2. the How It Works of the alarm function of portable computer as claimed in claim 1 is characterized in that: described strick precaution outside invasion mechanism is to prevent to make this portable computer start.
3. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described strick precaution outside invasion mechanism is a keyboard input/use that prevents to make in this portable computer.
4. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described strick precaution outside invasion mechanism is a mouse input/use that prevents to make in this portable computer.
5. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described strick precaution outside invasion mechanism is to notify the Basic Input or Output System (BIOS) in this portable computer to carry out the precautionary measures.
6. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described signal is a calibration signal.
7. the How It Works of the alarm function of portable computer as claimed in claim 1 is characterized in that: behind the described startup caution/alarm function, can carry out a relevant subsequent step.
8. the How It Works of the alarm function of portable computer as claimed in claim 7 is characterized in that: described relevant subsequent step is to make this portable computer shutdown or close the screen of this portable computer shutdown or carry out a specific program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100150518A CN1332279C (en) | 2004-01-09 | 2004-01-09 | Warning function operating method for portable computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100150518A CN1332279C (en) | 2004-01-09 | 2004-01-09 | Warning function operating method for portable computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1641518A CN1641518A (en) | 2005-07-20 |
CN1332279C true CN1332279C (en) | 2007-08-15 |
Family
ID=34867889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100150518A Expired - Fee Related CN1332279C (en) | 2004-01-09 | 2004-01-09 | Warning function operating method for portable computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1332279C (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1079939A (en) * | 1993-03-20 | 1993-12-29 | 张金镛 | Full-function remote-control automotive anti-theft device |
US5757616A (en) * | 1996-10-31 | 1998-05-26 | Hewlett-Packard Company | Physical security system for portable computer |
US5941618A (en) * | 1997-03-11 | 1999-08-24 | Mustek Corporation | Integrated point-of-sale cabinet system with removable covers |
GB2360618A (en) * | 2000-03-20 | 2001-09-26 | Hou Chien Tzu | Fingerprint reader and method of identification |
-
2004
- 2004-01-09 CN CNB2004100150518A patent/CN1332279C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1079939A (en) * | 1993-03-20 | 1993-12-29 | 张金镛 | Full-function remote-control automotive anti-theft device |
US5757616A (en) * | 1996-10-31 | 1998-05-26 | Hewlett-Packard Company | Physical security system for portable computer |
US5941618A (en) * | 1997-03-11 | 1999-08-24 | Mustek Corporation | Integrated point-of-sale cabinet system with removable covers |
GB2360618A (en) * | 2000-03-20 | 2001-09-26 | Hou Chien Tzu | Fingerprint reader and method of identification |
Also Published As
Publication number | Publication date |
---|---|
CN1641518A (en) | 2005-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9947154B2 (en) | Retrofitted keypad and method | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
CN103020553B (en) | A kind of guarding against theft for mobile terminal guard method | |
CN102855428B (en) | A kind of method of controlling security of computing machine and this computing machine | |
CN102882679A (en) | Unlocking method and unlocking device for electronic equipment | |
CN106250747A (en) | A kind of information processing method and electronic equipment | |
CN101063991A (en) | Data protective system and method | |
CN101154254B (en) | Computer automatic protection system, method and computer | |
CN1332279C (en) | Warning function operating method for portable computer | |
CN103679017B (en) | Prevent the device and method that user interface is held as a hostage | |
CN103745509A (en) | Electronic lock system | |
CN110032251A (en) | Host system and its electronic lock unlocking method | |
KR20080030221A (en) | Method and system for informing battery change period of digital doorlock by using power isolation function | |
CN109284246B (en) | USB data reading system | |
US20080191872A1 (en) | Method and apparatus for securing an electronic device | |
CN203894767U (en) | Mobile terminal | |
CN102884556A (en) | Burglar alarm arrangement | |
CN103310520A (en) | Intelligent electronic coded lock | |
CN110362983B (en) | Method and device for ensuring consistency of dual-domain system and electronic equipment | |
TW202331081A (en) | Electronic lock device and operation method of the same | |
CN110888751B (en) | Computer and automatic protection method thereof | |
KR101820603B1 (en) | IoT Server interworking With Door Lock and Method Thereof | |
CN106846587A (en) | A kind of wireless split intelligent invisible safety-protection system and its implementation | |
KR101045103B1 (en) | Digital door lock with enhanced security and method of releasing the same | |
CN108596592A (en) | A kind of triggering lock machine method of intelligent terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070815 Termination date: 20120109 |