CN217880284U - Notebook computer - Google Patents
Notebook computer Download PDFInfo
- Publication number
- CN217880284U CN217880284U CN202221251801.1U CN202221251801U CN217880284U CN 217880284 U CN217880284 U CN 217880284U CN 202221251801 U CN202221251801 U CN 202221251801U CN 217880284 U CN217880284 U CN 217880284U
- Authority
- CN
- China
- Prior art keywords
- camera
- user
- notebook computer
- processing unit
- central processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The utility model provides a notebook computer, which comprises a host and a display module arranged on the host, wherein the host comprises a shell and a mainboard arranged inside the shell, and the mainboard is provided with a central processing unit and a face recognition processor electrically connected with the central processing unit; the display module comprises a rear shell, a display screen arranged on the rear shell, a camera module arranged on the rear shell and a front frame surrounding the periphery of the display screen; the camera module comprises a base body, and a camera, a function key and an infrared inductor which are arranged on the base body; the camera, the function keys and the infrared sensor are all electrically connected with the central processing unit, the function keys are used for starting a preset monitoring mode, the camera is used for shooting images, the infrared sensor is used for detecting whether a user is in a use position, and the face recognition processor is used for carrying out face recognition on the images shot by the camera. The utility model discloses whether be legal user or illegal user at the user position of use and user according to the user for notebook computer is in corresponding operating condition, satisfies the requirement of secret security protection and low-power consumption.
Description
Technical Field
The utility model relates to a notebook computer field especially relates to a notebook computer.
Background
With the continuous development of the biometric technology, such as face recognition, is applied to more and more electronic devices, the face image of a user is acquired through a camera in the face recognition, and then the electronic devices can determine whether the user has the authority to enter the system of the electronic devices according to the face image of the user. Therefore, the user can be identified by the electronic equipment only by exposing the face of the user in front of the camera, and the password input method is more convenient compared with the password input method.
The computer is very important office software, modern enterprises can not leave the computer at work, and in order to be convenient to carry, a plurality of people can use the notebook computer to work. At present, in the office environment of the workplace, various materials recording the confidential contents of businesses are collectively called as confidential documents. The management of the confidential documents comprises three links of receiving and sending documents and daily management. For electronic confidential documents, the existing security measures are to set a document password to prevent a third person who is not an internal employee from opening the document, but the encryption method can affect the working efficiency of the employee himself, and the password may be leaked in the process of manually inputting the password, so that effective confidentiality cannot be realized. Moreover, when the confidential document is opened by inputting the document password, if the employee temporarily leaves the computer, the confidential document is easily checked, copied or otherwise operated by a person with a heart, which causes secret leakage and loss to enterprises. In addition to the confidential documents, there may be other data that is not desired to be known by others in the notebook computer, and therefore, how to monitor the notebook computer to protect the privacy of the user is a problem that needs to be solved urgently.
SUMMERY OF THE UTILITY MODEL
An object of the utility model is to provide a notebook computer can judge whether the user is the legal user at the user position and whether the user satisfies the requirement of secret security protection.
In order to achieve the above object, the present invention provides a notebook computer, comprising a host and a display module disposed on the host, wherein the host comprises a housing and a main board disposed inside the housing, and the main board is provided with a central processing unit and a face recognition processor electrically connected to the central processing unit; the display module comprises a rear shell, a display screen arranged on the rear shell, a camera module arranged on the rear shell and a front frame surrounding the periphery of the display screen;
the camera module comprises a base body, and a camera, a function key and an infrared inductor which are arranged on the base body;
the camera, the function keys and the infrared sensor are electrically connected with the central processing unit, the function keys are used for starting a preset monitoring mode, the camera is used for shooting images, the infrared sensor is used for detecting whether a user is at a use position, and the face recognition processor is used for carrying out face recognition on the images shot by the camera;
the central processing unit is used for controlling the camera to shoot images when the infrared sensor detects that a user is at a use position, controlling the notebook computer to wake up and enter a normal working state when the face recognition processor performs face recognition on the images shot by the camera to obtain a legal user, and controlling the notebook computer to keep dormant or record according to the setting of the legal user when the face recognition processor performs face recognition on the images shot by the camera to obtain an illegal user;
the central processing unit is also used for controlling the notebook computer to keep turning off the screen and sleeping or entering a monitoring state according to the setting of a legal user when the infrared sensor detects that the user is not at the use position; after the camera enters the monitoring state, when the infrared sensor detects that the user appears at the use position, the camera is controlled to shoot images, and the face recognition processor controls the camera to record videos when the result of face recognition of the images shot by the camera is an illegal user.
The camera module further comprises a microphone arranged on the base body, and the microphone is electrically connected with the central processing unit; the central processing unit controls the camera to record video and controls the microphone to record sound.
And the front frame is provided with a key switch corresponding to the function keys, and the key switch is used for controlling the function keys.
The camera is positioned in the middle of the substrate; the number of the microphones is two, and the microphones are respectively positioned at two ends of the base body.
A camera hole is formed in the front frame corresponding to the camera so as to expose the camera; the front frame is provided with an inductor hole corresponding to the infrared inductor, so that infrared induction is facilitated.
The front frame is provided with a mounting hole for mounting and exposing the key switch; a user starts a preset monitoring mode by pressing a key switch to start a function key; the key switch is pressed again to turn off the function key, thereby turning off the preset monitoring mode.
The utility model has the advantages that: the utility model discloses can judge whether the user is legal user or illegal user at the service position and user to whether be legal user according to whether the user is at the service position and whether the user is legal user, make notebook computer be in corresponding operating condition, satisfy the requirement of secret security protection and low-power consumption.
Drawings
For a better understanding of the features and technical content of the present invention, reference should be made to the following detailed description of the present invention and accompanying drawings, which are provided for the purpose of illustration and description and are not intended to limit the present invention.
In the drawings, there is shown in the drawings,
fig. 1 is a perspective view of a notebook computer of the present invention;
FIG. 2 is a partially exploded enlarged view of the notebook computer of the present invention;
fig. 3 is a perspective view of the camera module of the present invention;
fig. 4 is a schematic view of the main board of the present invention;
fig. 5 is a schematic diagram of a module of the present invention, in which the cpu, the face recognition processor, the camera, the microphone, the function button, and the infrared sensor are electrically connected;
fig. 6 is a schematic view of the notebook computer in a screen-off and sleeping state or in a monitoring state according to the present invention;
fig. 7 is a schematic view of the notebook computer of the present invention in a normal operating state;
fig. 8 is a schematic view of the notebook computer of the present invention in a monitoring state and an illegal user appears.
Detailed Description
To further illustrate the technical means and effects of the present invention, the following detailed description is given with reference to the preferred embodiments of the present invention and the accompanying drawings.
As shown in fig. 1, fig. 2 and fig. 4, the present invention provides a notebook computer, which includes a host 1 and a display module 2 disposed on the host 1. The host 1 includes a housing 11 and a motherboard 12 disposed inside the housing 11, wherein the motherboard 12 is provided with a Central Processing Unit (CPU) 122 and a face recognition processor 121 electrically connected to the CPU 122. The display module 2 comprises a rear shell 21, a display screen 22 arranged on the rear shell 21, a camera module 23 arranged on the rear shell 21, and a front frame 24 surrounding the periphery of the display screen 22.
As shown in fig. 3, the camera module 23 includes a base 231, and a camera 232, a function button 233 and an infrared sensor 235 disposed on the base 231.
As shown in fig. 5, the camera 232, the function buttons 233 and the infrared sensor 235 are electrically connected to the central processor 122. The function button 233 is used for starting a preset monitoring mode, the camera 232 is used for shooting images, the infrared sensor 235 is used for detecting whether a user is at a use position, and the face recognition processor 121 is used for carrying out face recognition on the images shot by the camera 232.
The central processing unit 122 is configured to control the camera 232 to shoot an image when the infrared sensor 235 detects that the user is at a use position, control the notebook computer to wake up and enter a normal working state when the result obtained by the face recognition processor 121 performing face recognition on the image shot by the camera 232 is a legal user, and control the notebook computer to keep sleeping or record a video according to the setting of the legal user when the result obtained by the face recognition processor 121 performing face recognition on the image shot by the camera 232 is an illegal user;
the central processing unit 122 is further configured to control the notebook computer to keep turning off the screen and sleeping or entering a monitoring state according to the setting of a legal user when the infrared sensor 235 detects that the user is not at the use position; after entering the monitoring state, when infrared inductor 235 detects that the user appears in the user position, control camera 232 and shoot the image, and face identification processor 121 carries out face identification to the image that camera 232 shot after the result is illegal user, control camera 232 and record a video.
Specifically, the camera module 23 further includes a microphone 234 disposed on the base 231, and the microphone 234 is electrically connected to the central processing unit 122. The central processing unit 122 controls the camera 232 to record video and also controls the microphone 234 to record audio.
Specifically, a key switch 241 is disposed on the front frame 24 corresponding to the function key 233, and the key switch 241 is used for operating the function key 233.
Specifically, the camera 232 is located in the middle of the base 231; the number of the microphones 234 is two, and the microphones are respectively located at two ends of the base 231.
Specifically, a camera hole 242 is formed in the front frame 24 corresponding to the camera 232 to expose the camera 232. The front frame 24 is provided with an inductor hole 244 corresponding to the infrared inductor 235, so as to facilitate infrared induction.
Specifically, the front frame 24 is provided with a mounting hole 243 for mounting and exposing the key switch 241.
Alternatively, the user starts the preset monitoring mode by pressing the key switch 241 to turn on the function key 233; the key switch 241 is pressed again to turn off the function key 233, thereby turning off the preset monitoring mode.
It should be noted that, as shown in fig. 6 (in fig. 6, B represents a notebook computer), it is a schematic diagram of a position where a legal user is not in use, where the notebook computer is in a screen-off and sleep state or in a monitoring state.
As shown in fig. 7 (in fig. 7, a represents a legal user, and B represents a notebook computer), which is a schematic diagram of the notebook computer in a normal working state, if the notebook computer is in a screen-off and sleep state before, when the infrared sensor 235 detects that the user is present at the use position, the central processing unit 122 controls the camera 232 to start immediately to shoot an image, and then the face recognition processor 121 performs face recognition on the image shot by the camera 232, and the recognized face information belongs to the legal user, the notebook computer enters the normal working state. If the notebook computer was in the monitor state before that time, then the legitimate user may also close function button 233 to exit the monitor state.
As shown in fig. 8 (in fig. 8, C indicates an illegal user, and B indicates a notebook computer), the monitoring mode is a schematic diagram when the notebook computer is in a monitoring state (the monitoring mode is started when the legal user leaves) and the illegal user appears.
It should be noted that the legal user refers to a legal user of the notebook computer or a user authorized by the legal user, and the illegal user refers to a user not authorized by the legal user.
The utility model discloses a notebook computer's working method, including following step:
judging whether the user is at the use position;
if the user is at the using position, judging whether the user is a legal user or an illegal user;
if the user is a legal user, the notebook computer is awakened and enters a normal working state;
if the user is an illegal user, the notebook computer keeps dormant or records according to the setting of the legal user;
if the user is not at the use position, the notebook computer keeps off the screen and sleeps or enters a monitoring state according to the setting of a legal user, and after the notebook computer enters the monitoring state, when an illegal user appears at the use position, the notebook computer records the video.
Specifically, the notebook computer records videos and records sounds at the same time.
Specifically, the notebook computer has an infrared sensing function and a face recognition function, judges whether a user is at a use position through infrared sensing, and judges whether the user is a legal user or an illegal user through face recognition of the user.
To sum up, the utility model provides a notebook computer can judge whether the user is legal user or illegal user at the user position and user to whether be legal user at the user position and user according to the user, make notebook computer be in corresponding operating condition, satisfy the requirement of secret security protection and low-power consumption.
From the above, it is obvious to those skilled in the art that various other changes and modifications can be made according to the technical solution and the technical idea of the present invention, and all such changes and modifications should fall within the protective scope of the appended claims.
Claims (6)
1. A notebook computer is characterized by comprising a host (1) and a display module (2) arranged on the host (1), wherein the host (1) comprises a shell (11) and a mainboard (12) arranged inside the shell (11), and the mainboard (12) is provided with a central processing unit (122) and a face recognition processor (121) electrically connected with the central processing unit (122); the display module (2) comprises a rear shell (21), a display screen (22) arranged on the rear shell (21), a camera module (23) arranged on the rear shell (21) and a front frame (24) surrounding the periphery of the display screen (22);
the camera module (23) comprises a base body (231), a camera (232) arranged on the base body (231), a function key (233) and an infrared sensor (235);
camera (232), function button (233) and infrared inductor (235) all with central processing unit (122) electric connection, function button (233) are used for starting the predetermined monitor mode, camera (232) are used for shooing the image, infrared inductor (235) are used for surveying whether the user is in the position of use, face identification treater (121) are used for carrying out face identification to the image that camera (232) were shot.
2. The notebook computer as claimed in claim 1, wherein the camera module (23) further comprises a microphone (234) disposed on the base (231), the microphone (234) being electrically connected to the cpu (122); the central processing unit (122) controls the camera (232) to record video and also controls the microphone (234) to record sound.
3. The notebook computer as claimed in claim 1, wherein a key switch (241) is provided on the front frame (24) corresponding to the function key (233), and the key switch (241) is used for operating the function key (233).
4. The notebook computer of claim 2, wherein the camera (232) is located in the middle of the base (231); the number of the microphones (234) is two, and the microphones are respectively positioned at two ends of the base body (231).
5. The notebook computer of claim 1, wherein the front frame (24) is provided with a camera hole (242) corresponding to the camera (232) to expose the camera (232); the front frame (24) is provided with an inductor hole (244) corresponding to the infrared inductor (235) so as to facilitate infrared induction.
6. The notebook computer as claimed in claim 3, wherein the front frame (24) is provided with a mounting hole (243) for mounting and exposing the key switch (241); the user starts the preset monitoring mode by pressing the key switch (241) to start the function key (233); the key switch (241) is pressed again to turn off the function key (233), thereby turning off the preset monitoring mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202221251801.1U CN217880284U (en) | 2022-05-23 | 2022-05-23 | Notebook computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202221251801.1U CN217880284U (en) | 2022-05-23 | 2022-05-23 | Notebook computer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN217880284U true CN217880284U (en) | 2022-11-22 |
Family
ID=84090884
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202221251801.1U Active CN217880284U (en) | 2022-05-23 | 2022-05-23 | Notebook computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN217880284U (en) |
-
2022
- 2022-05-23 CN CN202221251801.1U patent/CN217880284U/en active Active
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10606988B2 (en) | Security device, methods, and systems for continuous authentication | |
US9047464B2 (en) | Continuous monitoring of computer user and computer activities | |
US5987155A (en) | Biometric input device with peripheral port | |
KR200184982Y1 (en) | Fingerprint recognition having a display apparatus | |
US20140282965A1 (en) | Ongoing Authentication and Access Control with Network Access Device | |
CN107066862B (en) | Embedded verification system in electronic device | |
JP3305737B2 (en) | Confidential information management method for information processing equipment | |
CN203276357U (en) | Attendance access all-in-one machine based on Internet of Things | |
US20060066438A1 (en) | Method and system for controllably and selectively securing a portable computing device to a physical holding device | |
CN105095847A (en) | Iris identification method and apparatus for mobile terminal | |
TW530202B (en) | Computer peripheral equipment monitor and computer system equipped with the monitor | |
JP2006259930A (en) | Display device and its control method, electronic device equipped with display device, display device control program, and recording medium recording program | |
US20070022478A1 (en) | Information processing apparatus and method of ensuring security thereof | |
CN208456421U (en) | A kind of security device based on Internet of Things | |
US20040123161A1 (en) | Portable information processing apparatus and system lock program | |
EP1657645A1 (en) | Electronic data management device, control program, and data management method | |
US20140270417A1 (en) | Portable fingerprint device with enhanced security | |
CN101436239A (en) | Personal computer with handwriting recognition identification affirmation function and implementing method thereof | |
JP2001092554A (en) | Information processor | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
CN108229171A (en) | Driver processing method, device and storage medium | |
CN217880284U (en) | Notebook computer | |
CN110390193A (en) | A kind of personal computer system and control method with portrait dynamic rights authentication function | |
US11301118B2 (en) | Method for disguising a computer system's login interface | |
CN109918944A (en) | A kind of information protecting method, device, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |