CN1332279C - Warning function operating method for portable computer - Google Patents

Warning function operating method for portable computer Download PDF

Info

Publication number
CN1332279C
CN1332279C CNB2004100150518A CN200410015051A CN1332279C CN 1332279 C CN1332279 C CN 1332279C CN B2004100150518 A CNB2004100150518 A CN B2004100150518A CN 200410015051 A CN200410015051 A CN 200410015051A CN 1332279 C CN1332279 C CN 1332279C
Authority
CN
China
Prior art keywords
portable computer
alarm function
works
controller
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100150518A
Other languages
Chinese (zh)
Other versions
CN1641518A (en
Inventor
李荣钟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitac Computer Shunde Ltd
Getac Technology Corp
Original Assignee
Mitac Computer Shunde Ltd
Mitac Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitac Computer Shunde Ltd, Mitac Technology Corp filed Critical Mitac Computer Shunde Ltd
Priority to CNB2004100150518A priority Critical patent/CN1332279C/en
Publication of CN1641518A publication Critical patent/CN1641518A/en
Application granted granted Critical
Publication of CN1332279C publication Critical patent/CN1332279C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)
  • Emergency Alarm Devices (AREA)
  • Calculators And Similar Devices (AREA)

Abstract

The present invention relates to a warning function operating method for a portable computer. An external device or a component or a function of portable computer inside is used to undertake key work, and then signals are generated by relative circuits of a key so as to cause an inbuilt controller to know the portable computer is locked or not. When the inbuilt controller knows the portable computer is locked, the external inbreak mechanism is started by the inbuilt controller. In addition, when the external try / broken is discovered, a warning/ alarm function is started, and relative subsequent movements are also started. Thus, the portable computer is caused to have the guard mechanism of the warning function by the present invention so as to achieve the aim of security information protection in the portable computer.

Description

The How It Works of the alarm function of portable computer
Technical field
The present invention relates to a kind of portable computer, and particularly related to a kind of How It Works of alarm function of portable computer.
Background technology
At present, portable computer (for example being notebook computer) is more and more general, in the future the stage of more possible every one can have a machine.Yet, because carry-on data transmission science and technology makes rapid progress especially, the situation that may have confidential data to leak then.Because present portable computer does not have the mechanism of any defence, so as long as several minutes other people just can take the data of classified papers away and not be found.Therefore, how to make portable computer have the mechanism of defence, steal confidential data wherein, just become one of researchist's urgent problem to prevent other people.
Summary of the invention
The present invention proposes a kind of How It Works of alarm function of portable computer, be the embedding controller (embeddedcontroller that cooperates in the present portable computer, abbreviation EC) function, utilize the input of keyboard, mouse interface or even power switch all necessary through embedding the characteristic of controller, add the cooperation of some switches, reach and make portable computer have the mechanism of the strick precaution of alarm function.
The How It Works of the alarm function of portable computer of the present invention, this portable computer have one and embed controller, and this embedding controller has one and takes precautions against outside invasion mechanism, and described How It Works comprises the following steps:
1) provide a key, a signal that sends by this key, and make this embedding controller learn whether lock;
2) when this embedding controller being learnt lock, this embedding controller can start this strick precaution outside invasion mechanism;
3) judge whether to suffer outside attempt/the invasion; And
4) when suffering outside trial the/when invading, can start caution/alarm function.
The present invention utilizes assembly or the function in external device (ED) or the portable computer inside to serve as " key (key) " work, the signal that produces of the interlock circuit by key then embeds controller and learns whether portable computer locks and make.When the embedding controller learns that portable computer is locked, embed controller and can start the outside invasion mechanism of taking precautions against.Moreover, if find to suffer outside trial the/when invading, can start caution/alarm function, and the subsequent action of being correlated with.Therefore, the present invention can make portable computer have the strick precaution mechanism of alarm function, and reaches the purpose of the confidential data in the protection portable computer.
Description of drawings
Fig. 1 is the synoptic diagram of the portable computer of a preferred embodiment of the present invention.
Fig. 2's is the process flow diagram of How It Works of alarm function of the portable computer of a preferred embodiment of the present invention.
Embodiment
As Fig. 1 is the synoptic diagram of the portable computer 10 of a preferred embodiment of the present invention.As shown in Figure 1, portable computer 10 comprises embedding controller 102, computer system 104, other related system 106, supply unit 108 and key (key) 110.Wherein, embedding controller 102 is the runnings in order to control computer system 104 and other related system 106, and it has the outside invasion of strick precaution mechanism.And key 110 is the signals by the interlock circuit generation of key 110 in the portable computer 10, and makes embedding controller 102 learn whether portable computer 10 locks.Wherein, key 110 can for example be assembly or the function in portable computer 10 inside.For example, key 110 can be a button in the portable computer 10, when pressing this button, can make to embed controller 102 and learn that portable computer 10 locked.Or key 110 is assembly or the function in the external device (ED).For example, key 110 can be a button on the infrared remote controller, and when pressing this button, the infrared ray of being launched can be received by portable computer 10, embeds controller 102 and learns that portable computer 10 locked and make.Be the process flow diagram of How It Works of alarm function of the portable computer of a preferred embodiment of the present invention as shown in Figure 2.In this How It Works, the work that at first can utilize assembly in external device (ED) or portable computer 10 inside or function to serve as key 10, the signal that produces by key 110 interlock circuits in the portable computer 10 then embeds controller 102 and learns portable computer 10 whether lock (as step S202) and make.Learn that portable computer 10 is unlocked if embed controller 102, then can continue normal operation (as step S204).If learn when portable computer 10 is locked, then embed controller 102 and can start the outside invasion mechanism (as step S206) of taking precautions against and embed controller 102.Wherein, take precautions against outside invasion mechanism and comprise and prevent to make portable computer 10 starts, prevent to make the keyboard input/use in the portable computer 10, use keyboard input to prevent other people; Prevent to make the mouse input/use in the portable computer 10, use mouse input to prevent other people; Basic input input-output system (BIOS) in the notice portable computer 10 carries out the precautionary measures, is revised to prevent BIOS; And other the precautionary measures.Then, embed controller 102 and can judge whether portable computer 10 suffers outside attempt/ invade (as step S208).Judge that portable computer 10 does not suffer outside attempt/the invasion, then can return step S202 if embed controller 102.If judge that portable computer 10 has suffered outside attempt/the invasion, then can start caution/alarm function (as step S210) and embed controller 102.Afterwards, can carry out relevant subsequent step (as step S212).And the relevant subsequent step comprises and makes portable computer 10 shutdown, closes the screen of portable computer shutdown 10 or carry out certain specific program.Furthermore, the relevant subsequent step more comprises the action of attack or even self-destruction.
In preferred embodiment of the present invention, key 110 is to be coupled to a pin that embeds controller 102.And the signal that the interlock circuit of key 110 produces can be a calibration signal, but not as limit.
In sum, the present invention utilizes assembly or function in external device (ED) or the portable computer inside to serve as " key (key) " work, make by interlock circuit then to embed controller and learn whether portable computer locks.When the embedding controller learns that portable computer is locked, embed controller and can start the outside invasion mechanism of taking precautions against.Moreover, if find to suffer outside trial the/when invading, can start caution/alarm function, and the subsequent action of being correlated with.Therefore, the present invention can make portable computer have the strick precaution mechanism of alarm function, and reaches the purpose of the confidential data in the protection portable computer.

Claims (8)

1. the How It Works of the alarm function of a portable computer, this portable computer have one and embed controller, and this embeddings controller has a strick precaution outside invasion mechanism, it is characterized in that described How It Works comprises the following steps:
1) provide a key, this key is the assembly in this portable computer, is coupled to a pin that embeds controller, a signal that sends by this key, and make this embedding controller learn whether lock;
2) when this embedding controller being learnt lock, this embedding controller can start this strick precaution outside invasion mechanism;
3) judge whether to suffer outside attempt/the invasion; And
4) when suffering outside trial the/when invading, can start caution/alarm function.
2. the How It Works of the alarm function of portable computer as claimed in claim 1 is characterized in that: described strick precaution outside invasion mechanism is to prevent to make this portable computer start.
3. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described strick precaution outside invasion mechanism is a keyboard input/use that prevents to make in this portable computer.
4. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described strick precaution outside invasion mechanism is a mouse input/use that prevents to make in this portable computer.
5. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described strick precaution outside invasion mechanism is to notify the Basic Input or Output System (BIOS) in this portable computer to carry out the precautionary measures.
6. the How It Works of the alarm function of portable computer as claimed in claim 1, it is characterized in that: described signal is a calibration signal.
7. the How It Works of the alarm function of portable computer as claimed in claim 1 is characterized in that: behind the described startup caution/alarm function, can carry out a relevant subsequent step.
8. the How It Works of the alarm function of portable computer as claimed in claim 7 is characterized in that: described relevant subsequent step is to make this portable computer shutdown or close the screen of this portable computer shutdown or carry out a specific program.
CNB2004100150518A 2004-01-09 2004-01-09 Warning function operating method for portable computer Expired - Fee Related CN1332279C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100150518A CN1332279C (en) 2004-01-09 2004-01-09 Warning function operating method for portable computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100150518A CN1332279C (en) 2004-01-09 2004-01-09 Warning function operating method for portable computer

Publications (2)

Publication Number Publication Date
CN1641518A CN1641518A (en) 2005-07-20
CN1332279C true CN1332279C (en) 2007-08-15

Family

ID=34867889

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100150518A Expired - Fee Related CN1332279C (en) 2004-01-09 2004-01-09 Warning function operating method for portable computer

Country Status (1)

Country Link
CN (1) CN1332279C (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1079939A (en) * 1993-03-20 1993-12-29 张金镛 Full-function remote-control automotive anti-theft device
US5757616A (en) * 1996-10-31 1998-05-26 Hewlett-Packard Company Physical security system for portable computer
US5941618A (en) * 1997-03-11 1999-08-24 Mustek Corporation Integrated point-of-sale cabinet system with removable covers
GB2360618A (en) * 2000-03-20 2001-09-26 Hou Chien Tzu Fingerprint reader and method of identification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1079939A (en) * 1993-03-20 1993-12-29 张金镛 Full-function remote-control automotive anti-theft device
US5757616A (en) * 1996-10-31 1998-05-26 Hewlett-Packard Company Physical security system for portable computer
US5941618A (en) * 1997-03-11 1999-08-24 Mustek Corporation Integrated point-of-sale cabinet system with removable covers
GB2360618A (en) * 2000-03-20 2001-09-26 Hou Chien Tzu Fingerprint reader and method of identification

Also Published As

Publication number Publication date
CN1641518A (en) 2005-07-20

Similar Documents

Publication Publication Date Title
US9947154B2 (en) Retrofitted keypad and method
CN103370717A (en) Always-available embedded theft reaction subsystem
CN103020553B (en) A kind of guarding against theft for mobile terminal guard method
CN102855428B (en) A kind of method of controlling security of computing machine and this computing machine
CN102882679A (en) Unlocking method and unlocking device for electronic equipment
CN106250747A (en) A kind of information processing method and electronic equipment
CN101063991A (en) Data protective system and method
CN101154254B (en) Computer automatic protection system, method and computer
CN1332279C (en) Warning function operating method for portable computer
CN103679017B (en) Prevent the device and method that user interface is held as a hostage
CN103745509A (en) Electronic lock system
CN110032251A (en) Host system and its electronic lock unlocking method
KR20080030221A (en) Method and system for informing battery change period of digital doorlock by using power isolation function
CN109284246B (en) USB data reading system
US20080191872A1 (en) Method and apparatus for securing an electronic device
CN203894767U (en) Mobile terminal
CN102884556A (en) Burglar alarm arrangement
CN103310520A (en) Intelligent electronic coded lock
CN110362983B (en) Method and device for ensuring consistency of dual-domain system and electronic equipment
TW202331081A (en) Electronic lock device and operation method of the same
CN110888751B (en) Computer and automatic protection method thereof
KR101820603B1 (en) IoT Server interworking With Door Lock and Method Thereof
CN106846587A (en) A kind of wireless split intelligent invisible safety-protection system and its implementation
KR101045103B1 (en) Digital door lock with enhanced security and method of releasing the same
CN108596592A (en) A kind of triggering lock machine method of intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070815

Termination date: 20120109