TW200406656A - Locking device for electronic equipment - Google Patents

Locking device for electronic equipment Download PDF

Info

Publication number
TW200406656A
TW200406656A TW92103630A TW92103630A TW200406656A TW 200406656 A TW200406656 A TW 200406656A TW 92103630 A TW92103630 A TW 92103630A TW 92103630 A TW92103630 A TW 92103630A TW 200406656 A TW200406656 A TW 200406656A
Authority
TW
Taiwan
Prior art keywords
programmable
user
control system
feature
patent application
Prior art date
Application number
TW92103630A
Other languages
Chinese (zh)
Other versions
TWI240155B (en
Inventor
Darren J Kady
Deborah A Kady
Original Assignee
Darren J Kady
Deborah A Kady
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/273,819 external-priority patent/US20030043016A1/en
Priority claimed from US10/339,711 external-priority patent/US7394347B2/en
Application filed by Darren J Kady, Deborah A Kady filed Critical Darren J Kady
Publication of TW200406656A publication Critical patent/TW200406656A/en
Application granted granted Critical
Publication of TWI240155B publication Critical patent/TWI240155B/en

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The operating control system can be use on electronic equipment, such as cell phones, computers, engine analyzers, etc. An input device enables the input of user access data and a readout panel monitors the equipment status. A programmable feature selection member enables the user to select at least one programmable feature and respective activation time period. An internal member controls operation of the equipment by controlling access to one or more said programmable features based upon user selection, to enable full or partial activation of the device. A user is able to program specific events, such as TV shows, to be activated at specific times with controlled access by secondary access codes.

Description

200406656 玖、發明說明 袓關申請案之交互參照 本申請案係於西元2002年10月18日提出的申請案序 號10/273,819之一件部分接續案,申請案序號10/273,819 係於西元2002年10月22日頒佈的美國專利第6,469,615號 之一件部分接續案,美國專利第6,469,615號係於西元1997 年10月27日提出的臨時申請案序號60/065941之一件部分 接續案,所有內容係以整體列舉方式而納入本文。 【發明所屬之技術領域】 該種裝置係關於一種安全及保全裝置,其一旦爲致動 係允許電子設備以執行於一段預先程式規劃週期。於某些 實施例,該種裝置係運用作爲一反偷竊裝置,若無密碼 (code)時,該裝置之使用係禁止,以防止受保護的設備之偷 竊及轉售。 【先前技術】 電子裝置係提供對於竊賊之誘惑,由於其歸因於缺乏 獨特的特徵而爲易於轉售。雖然人們將標示其電子裝置, 諸如:手機、電腦、…等等,除非遭竊的裝置係透過合法 的販售者所轉售,並不具有找回之希望。 【發明內容】 所揭示之一種鎖定裝置係供運用於諸如電腦、照相機 、手機、VCR、DVD、…等等之電子產品、機械設備、工 具、重型設備與機械裝置、氣體驅動式載具(vehicle)、以及 種種其他的輪轉式載具。該種裝置係提供選項以允許設備 200406656 爲可操作或不可操作於一預定的時間週期,選取特定的可 操作特徵,或者爲全然關閉而具有僅有透過密碼輸入所允 許之操作。 關連於一未鎖定及計時操作,於該種裝置內之電子電 路係要求的是,該設備係在使用之前爲未鎖定。對於操作 之一時間週期係可爲程式規劃於設備,在該時間之後,單 元係關掉;或者,反之,該設備係可關閉於一特定時間週 期而且自動重新致動。此舉係減少偷竊情形而且防止該物 品之未經授權的使用。 操作控制裝置係供運用於其具有一外殼、一電源、一 輸入裝置、至少一個致動構件、與一控制構件之設備。諸 如分離的晶片或程式規劃爲嵌入於現存的晶片之控制構件 係均爲具有其本身的輸入裝置以致使能夠輸入使用者存取 密碼,或者運用其固有於設備中之一輸入裝置,諸如於手 機上的按鈕。於較佳實施例,諸如手機、電腦、或照相機 螢幕之一讀出面板係運用以監視該設備之狀態。讀出者係 亦可爲一音訊輸出。控制構件係連通於輸入裝置、讀出面 板、電源、與致動構件。控制構件係防止設備之操作,藉 著防止於不具有一使用者密碼之輸入時而存取於致動構件 。控制構件係亦可爲程式規劃以控制電子裝置之內部功能 ’諸如:允許於一預定時間期間內而觀看於電視上的某些 頻道,且於其他的時間期間內而爲其他的頻道。輔助的存 取密碼係允許系統爲程式規劃以允許該裝置之致動爲僅有 藉著其含有輔助密碼者。該裝置係亦可允許手機於設定的 200406656 時間週期內撥出通話而非爲撥入通話,或者反之亦然。具 有電子構件之任何設備係可倂入於所揭示的裝置,以提供 能力而選擇性決定哪些特徵爲作用於特定時間週期。於諸 如照相機、攝錄影機(camcorder)、…等等之數位設備,能 力係歸因於數位技術之多樣性而提高,且應注意的是,本 文揭示之關於一個數位裝置的能力之任一者係可爲倂入於 其他的數位裝置。 該控制裝置包括一可程式規劃計時器,以連通於控制 構件,藉以致使能夠於輸入裝置所輸入之預定時間週期而 存取至選取的特徵。較佳而言,於所有的實施例之記憶體 係非依電性(nonvolatile),藉以防止於電力喪失時之設定値 的喪失。一時鐘構件(若非爲已經固有於裝置時)係可附加以 基於使用者輸入而追蹤時間、致動、以及解除致動該計時 器。於手機、電腦、照相機、…等等,設備之操作係取決 於微晶片、或微處理器,而且將可能不需要一動力工具之 接線、或者其他之非爲基於處理器的設備。如於共同審理 中的專利申請案SN 09/178,837號所揭示,鎖定裝置之多樣 性係致使其能夠運用於諸如手工具、電子產品、或輪轉式 載具、以及手機、數位與非數位式的照相機…等等之設備 〇 【實施方式】 本文揭示之本發明係關於一種可程式規劃裝置,具有 :多個可程式規劃的特徵,包括(但不限於)限制對於該裝置 之特定部分的可存取能力;以及,一編碼鎖定機構,其阻 200406656 止偷竊且限制或免除於一預定時間框期間之使用。除了透 過如所揭示之鎖定裝置而得到的固有優點,進一步之安全 性的優點係純然由於其存在而達到。對於購買其含有鎖定 裝置的一物品之任何人係將爲顯明的是,除非銷售者具有 密碼,該物品係就像是已遭竊。所揭示的鎖定裝置係控制 該物品之致動,防止不具有使用者密碼之輸入時的致動。 若不具有對於密碼之存取,該物品係無用而且無法銷售。 諸如手機、掌上型領航器(pUot)與其他手持式資料存取 裝置、照相機、電腦、VCR、電視、MP3播放器、…等等 之電子裝置係均爲歸屬於其具有高轉售價値之易於偷竊的 類別。然而,可程式規劃的晶片之其運用係使得此等値錢 的裝置爲易於修改以納入本文揭示的系統之優點。或者, 於諸如VCR或電視之裝置,該裝置係可爲倒退裝配至電源 ,諸如電源線或插頭。然而,微晶片、微處理器、或類比 技術之運用係允許種種的功能爲監視,諸如調度服務,基 於使用時間或一物品已經使用之時數。 鎖定機構係較佳爲一種型式,其無需一鏡匙或其他裝 置之使用,藉以避免另一個物品之遺失或攜帶。透過鍵墊 (keypad)或者其他的鎖定機構之存取係可運用,諸如··磁卡 讀取器、指紋或網膜辨識、標準按鍵、電話訊號、或任何 可應用之無線技術、…等等。程式規劃該裝置之方法係取 決於裝置之型式、尺寸、…等等。舉例而言,觸碰式按鍵 掃描、或具有靜態資料的傳輸之其他方法係可爲易於納入 至裝置,藉以允許追蹤關於物品之資料。 10 200406656 本文揭示的技術係提供裨益於實驗室或是於設備爲集 中化且移除以供使用之其他設定環境。各個雇員係將具有 個人化的碰觸式鑰匙、或是其他無線或非爲無線的存取機 構,其將記錄該雇員姓名、致動時間、以及雇主所要求之 任何其他資訊。於保全或訓練階層爲要求運用某一裝置之 情形,個人化的存取裝置係亦載有其致使能夠運用該裝置 之ID密碼,因而防止由未經授權的人員之使用。 當該裝置係無法使用其針對裝置(諸如數位相機或手機) 之運用而固有系統以程式規劃,可運用其含有靜態資料之 替代的程式規劃“鍵(key)” ,諸如一碰觸式按鍵(touch key) 。本文揭示的技術係提供優點在於,雇主或家長係可程式 規劃該碰觸式按鍵以具有包括致動時間之適當資料,且在 於該資料係無法改變,除非是由其具有頂級程式規劃權利 之人士所改變。此係有利於運用其必須在特定使用週期後 而關閉之設備,由於預先程式規劃的時間係解除該使用者 觀看時鐘之責任。雖然關閉係亦可透過其他方法而得到, 本文揭示之系統係提供如於本文所述之另外的優點,因而 強化系統。 當裝設於電腦時,本文揭示之裝置係可爲直接連接至 電源供應器,或程式規劃至晶片、硬碟機、或其他儲存/記 憶體裝置;允許其販售電腦時間之業者以自動關閉電腦, 除非已購買另外的時間。於家庭使用,該裝置係允許家長 控制於電腦或諸如TV之其他電子裝置其可由兒童所使用的 時間量、或特定時間週期。因此,電腦、VCR或TV係僅 200406656 可在家庭作業時間過後而致動,諸如此類。電腦係特別可 適用於裝置之鍵盤程式規劃,雖然一鍵盤介面係可包括具 有任何已經揭示的鎖定裝置。嵌入於該裝置之微晶片及/或 硬碟機的一程式係可允許簡單之計時器設定,其係透過於 鍵盤的ί女鍵輸入而致動。作爲一個選項,直接編碼按鍵係 可納入於鍵盤,以自動存取程式且允許致動、設定改變、 …等等。雖然電腦關閉(lock out)程式係習知於此技藝,其 以一種全有或全無(all or nothing)方法而整體關閉電腦之使 用。本文揭示的裝置係允許存取電腦於一預定時間週期, 可選用爲以隨機方式或者於一特定計劃時間內,以延長運 用裝置之時間量而不中斷。舉例而言,系統係可設定以致 使電腦能夠開機於一預定時間,運用一特定時間週期,然 後該電腦係無法運用而直到預先程式規劃的致動時間。此 係使得家長能夠在程式規劃電腦、或其他的電子裝置或設 備之後而離開住家,以致動於晚間六點而直到晚間十點, 然後解除致動而直到隔天的晚間六點,或是回應於其他的 程式規劃。輸入時間限制之使用者係將可藉著一使用者密 碼而建立一個程式,以防止對於該程式之未經授權的變更 〇 本文揭示之可程式規劃的特徵之一者係部分致動特徵 ,如同關於手機而詳細描述於下文。運用此特徵,使用者 係可限制電子設備之部分使用,舉例而言,一電腦係可程 式規劃以於特定時間週期而限制諸如網頁存取之某些程式 。舉例而言,將防止兒童瀏覽網頁,除非於特定時間週期 12 200406656 。或者,電腦遊戲係將僅可爲存取於一限定時間,然而, 該電腦係將可運用於文字處理或是其他的家庭作業有關活 動。此特徵係致使電腦能夠爲基於使用者程式規劃以一種 限制方式而作運用。另外,子使用者(sub-user)之ID係可運 用以允許個別的存取至一電子裝置。此係有利於其具有不 同年齡限制之兒童,藉著允許年紀較大的兒童以存取程式 、打長途電話、…等等,其爲年紀較小的兒童所不能爲。 本文揭示的鎖定裝置係亦爲有利於租借設備,諸如發 電機、壓縮機、VCR、…等等,於其,所租借的設備係可 程式規劃於一特定時間週期,且在該時間點之後而自動解 除致動。此舉係阻止租借設備之偷竊,因而降低保險與負 擔額,由於其藉著防止未經授權的使用,尤其當運用結合 於較大設備時之保險費率係將可能爲降低。 於諸如其含有紅外線遙控器之TV、VCR的電子設備, 計時致動裝置係可透過遙控器而致動。一旦爲致動時,程 式係將出現於螢幕上,且利用現有或特定的按鍵以設定關 閉時間、使用者時間週期、或延長時間週期、…等等。此 舉係將可爲一種不昂貴的附加至控制器,且提高使用者方 便性。或者,控制器本身係可運用以設定使用時間,而無 需於螢幕上的設定程式之出現。 所應注意的是,用於一個特定實施例之本文揭示的類 比、按鍵掃描器、紅外線、指紋或網膜辨識、…等等之運 用係不限於該實施例。本文揭示之鎖定裝置的各個實施例 係可納入相關於任何其他實施例之如本文所述的電子電路 13 200406656 、記憶體、…等等。 如於第一與二圖所示,一手鑽孔機係運用以說明本文 ' 揭示的機構,其使用以限制使用者時間,然而,此係僅爲 一個實例而無意以限制本發明。電力工具1〇係說明於第一 圖,其爲備妥以供使用,且納入一數字鍵墊12以作爲鎖定 機構’且其他的致動機構係對於熟悉此技藝人士而將爲顯 明。 時間係可透過任何機構而設定,以適於所運用的設備 φ 以及最終運用。舉例而言,時間係可爲透過反覆碰觸一特 定鍵而設定,且以預定的增量而跳躍時間。或者,一 “輸 入(enter)”鍵係可設置,其允許未鎖定的密碼之輸入以及一 預定時間週期之後續的輸入。較佳而言,全時間的鎖定裝 置係設有非依電性的記憶體,以防止當物品的電池爲耗盡 或移除時之程式規劃指令的喪失。此係更爲重要於可充電 式的手工具,於其,全然放電該電池係有時爲需要以完全 充電。 φ 微晶片之納入以暫存該等鎖定密碼及程式規劃該致動 時間係進而提供附加的能力,以監視種種其他的工具功能 。舉例而言,第一圖之LED顯示器14係可納入,其指出所 剩的致動時間以及(若期望時)工具之目前狀態。舉例而言, 狀態可包括:目前的電池電力(於充電及放電期間)、當空氣 工具爲運用時所剩的壓力、rpm與鑽孔的方向、…等等。此 係最佳運用於監視可充電式的電池之狀態。由於諸多可充 電式的電池係未完全充電,除非其在充電之前而爲全然放 14 200406656 電,電池監視式的裝置係允許該電池之最佳運用與管理。 亦應注意的是,一 LED係將可設置於充電裝置以監視該電 池充電,因而作爲對於所充電之裝置上的LED之雙重檢查 〇 於第二圖,內部致動單元40之一種設計係顯示。鎖定 臂48係支撐於上殼側42與下殼側44之間。張力彈簧50 係設計以當鎖定臂48爲於使用期間拉回時而置放螺線管接 點56爲與螺線管52於實際接觸。一旦該鎖定臂48係釋放 時,螺線管接點56係移除於螺線管52之接觸。螺線管52 係透過控制器80而接收來自電池108 (第五圖)的電力,控 制器之一個實例係較爲詳細說明於第三圖。如第四圖之實 例示意圖所可看出,控制器80係作爲中央處理區域,且具 有通過控制器80之所有的輸入與輸出。控制器80係透過 鍵墊線路100而直接連接至諸如數値鍵墊12之鎖定機構。 電池線路102與馬達線路104係亦爲饋送至控制器80。一 旦諸如數値鍵墊12之鎖定機構係致動時,所有的接線係作 成,且電力係自由以送至其爲特定於電力工具10之驅動器 。線路之確實圖式係無關緊要,由於其重要性係落在於鎖 定機構與控制器80之間的相互作用(互動)。如於第五圖所 顯示,手工具10之內部係以傳統方式而分隔,且控制器80 係位在於握把區域內。於此實施例中,種種的連接線路100 、102、與104係露出,且於遭竊之時,外殼係將被打開而 且線路係被切斷以旁路該控制器80。爲了防止一竊賊打開 外殼而且旁路該控制器80,外殼係設有一安全鎖匙,其具 15 200406656 有多個不同的實施例。一個實施例係欲納入一鎖定構件, 其透過鎖定線路156而接線至控制器,且係由一鎖定密碼 、鑰匙、或是其他可相容的方法而解除致動。控制器80係 可程式規劃以允許外殻爲釋放,例如透過所輸入之一單獨 的密碼,或是藉著保持現有密碼之最後數目爲持續一預定 時間週期。一單獨的密碼係較佳爲在於,其防止任何未經 授權的存取至外殻之內部。 於安全鎖匙之另一個實施例,如於第六圖所示,螺線 管126與線路122係封入於如圖所指出之區域128的環氧 基樹脂(epoxy)。藉著封入線路122於環氧基樹脂,則爲不 可能重新接線該單元且旁路該控制器124。習知於此技藝之 其他材料係可運用以取代環氧基樹脂。欲有利於環氧基樹 脂區域128之置放,來自馬達120之線路122係離開馬達 外殼以接近控制器124,其係已經置放爲儘可能靠近螺線管 126。此種修改式置放係降低所欲保護之面積,因而降低材 料與人工成本。修改電池130之置放係困難,於某些情形 時係防止電池線路132爲覆蓋。然而,若將控制器124與 螺線管126均爲封入於環氧基樹脂,則切斷電池線路132 係將爲毫無價値,由於將不存在任何可達到的電源連接。 於第七圖,鎖定裝置係說明爲運用於一空氣(air)工具 200,雖然應注意的是,該裝置係亦可運用於丙烷(propane) 、瓦斯(gas)、與柴油(dksd)工具以及設備。如圖所示,控 制器單元202係位於空氣工具之握把204。如於第四圖(電 池)與第八圖(空氣工具)之實例示意圖可看出的是,於二者 16 200406656 之線路係存在小的差異。如上所述,於第四圖之示意圖, 按鍵線路100係行進至控制器80,電池線路102與馬達線 路104亦然。於空氣工具,或者是移除電源之其他者,按 鍵線路150與螺線管154之線路係饋送至控制器152及於 驅動器上,電池與馬達接線係免除。 如前文所述,所揭示的裝置係可爲易於納入至電子設 備。設備之程式規劃係可爲透過多種方法,另外的方法係 將成爲顯著以作爲技術變化並且係將對於熟悉此技藝人士 而爲顯明。 重新寫入竊取(swipe)卡係取得流行性,且可爲易於納 入於本文揭示之裝置。該等卡係可運用電腦或者諸如掌上 型或遙控式之其他可應用的裝置而重新寫入以新的密碼。 舉例而言,一電腦程式係可含有可應用的編碼,以針對其 納入本文揭示的技術之所有電子裝置。使用者係可選取欲 納入於各個裝置之功能,且將其寫入至卡。使用者係接著 可運用相同的竊取卡以程式規劃可利用的各個電子裝置, 由於各個裝置係將辨識其密碼而且忽視對於其他裝置之程 式規劃。或者,諸如運用於數位相機之小型硬碟機係可使 用以程式規劃種種的電子裝置。 第十五圖之示意圖係其爲納入一電腦、VCR、電視、 …等等之一裝置的電子電路之實例。如可看出,反偷竊裝 置之基本作用係同於其爲運用於一電池操作、空氣或電氣 工具、或其他裝置者。如同於前文揭示的示意圖,按鍵線 路302係饋送至控制器304。然而,於此實施例,電氣線路 17 200406656 306係透過閂鎖電驛線路308而連接至控制器304。第十六 圖之不意圖係提供其爲揭示於第十五圖之電子電路佈局, 透過類比線路350以納入類比功能於裝置。 如前文所述,手機係一種小尺寸、高價位的竊盜物品 ,其爲難以防範。多數的人們係將其手機保留爲一直開機 ,使得一種通/斷(on/off)致動式鎖定之實施係將無法防止竊 盜;由於手機係多半於遭竊時爲開機,而竊賊將僅是保留 S亥手機爲開機。納入本文揭示之系統,竊賊將會知道的是 ,絕對無法阻止該手機爲於一預先指定時間而關閉,且一 旦該日寸間已經期滿’手機係將爲無法使用。運用本文揭示 之系統,使用者係可程式規劃該手機以於一預定時間之期 滿時或者在一預先設定時間而永久關掉。舉例而言,此係 將使得使用者能夠告知系統其應該於晚間九點、或者一旦 當計時器到達起自程式規劃時間之三個小時而關掉。一旦 爲關掉時’裝置係將要求存取密碼之重新輸入。本文揭示 之系統係進而使得使用者能夠設定手機爲關掉於一預定時 間週期,且具有於該時間週期結束時之自動的重新致動。 關掉手機於一預定時間週期且在其後爲自動重新致動之能 力係有利於人們以參加會議、看電影、或者參與其要求關 掉手機之其他活動。由於手機係將自動重新致動,使用者 係無須擔心於將手機恢復開機。於較佳實施例,手機係亦 可設定爲接聽電話或者撥出電話、以及標準的進/出特徵。 因此,若手機係爲借出,且手機之主人係不想要其通話爲 由另外任何人所接聽,則手機係可設定以將該手機主人之 18 200406656 所有的撥入電話均爲轉至其語音信箱或其他的通話轉接位 置,而且仍然允許握有該手機之人士係可向外撥出電話。 於相反之模式,握有該手機之人士係可接聽電話而無法使 用該手機以撥出。 應注意的是,針對最大之保全性,致能本文揭示的程 式規劃之密碼係較佳爲於電話、或其他設備之諸如硬碟機 的永久記憶體裝置、微晶片、…等等,而不僅僅爲取決於 任何的暫時軟體、電話卡或其他之可抽取式系統。 一延遲致動係亦可爲程式規劃於任何裝置,以致使能 夠致動於一特定時間或者在某個時間量已經過去之後。因 此,於諸如其運用於建築用地的電氣工具之應用,領班係 可程式規劃該工具以於三十分鐘內而致動且保持致動爲於 另外的八個小時。 於任何的電子裝置,命令係可透過種種方法而設定。 於諸如數位相機或手機之其具有一內建式螢幕的設備,螢 幕係可運用以監視現存的設定而且程式規劃新的設定。於 其不具有螢幕之裝置,則係可納入一外部的LED顯示器、 聲音致動、或形成於裝置與使用者之間的通訊之某些其他 機構。現存的命令或程式規劃按鈕係可運用以程式規劃該 裝置’或者另外的按鈕係可在製造時而爲納入於設計。此 外,遠端、紅外線、藍芽(Bluetooth)、或是其他有線或無線 裝置係可運用作爲一程式規劃工具。 供使用者於程式規劃手機時遵循的順序之一實例係說 明於第十八圖。一旦該裝置係致動(於步驟600),系統係詢 19 200406656 問使用者是否想要致動鎖定系統(於步驟602),或若是已經 致動時而解除致動系統(於步驟701),藉以關掉該裝置。 角军除致重力(deactivation) 若使用者係選擇以解除致動系統(於步驟603或701), 其簡單輸入個人密碼(於步驟605或703)且系統係返回至標 準作業於製造者設定的一時間週期。然而,若使用者係已 經改變主意或是作出不正確的選擇,其指出爲“否(no)” , 且程式規劃的特徵係保持爲目前設定者。應注意的是,本 文揭示之安全議題係將遭否定,若使用者係無法簡單關掉 鎖定系統。因此,於較佳實施例,製造者係設定該手機可 爲連續致動之一最大時間量,在其之後,手機係自動關閉 。此最大的操作週期係較佳爲可應用至不僅是手機而且是 其運用本文揭示的鎖定系統之所有裝置。或者是,最大時 間係可由使用者運用自標準程式規劃之單一或多重用途的 一個單獨密碼所設定。於第二十圖,重設該系統之另外的 選項係加入,使得使用者能夠解除致動或重設該系統(於步 驟803)。若系統係解除致動,使用者係輸入其個人密碼(於 步驟812),且選擇其是否欲解除致動(於步驟812)或重設(於 步驟814)。若解除致動(於步驟812)係選擇,系統係進入正 常操作(於步驟810),同樣爲納入一最大時間量之較佳限制 。若使用者係選擇以重設於步驟(814),系統係接著進行至 計時操作之順序(於步驟816),該系統係持續遵循箭號 A1000與A1002,如同於第十八圖所述者。所應注意的是, 箭號A1004係作爲於可程式規劃選項的結束時之來自“否 20 200406656 (no)”選擇的返回。 致重力(activation) 若使用者係對於致動鎖定系統(於步驟602)而答覆爲“ 否(no)” ,如於第十八圖所示,系統係進行以要求個人密碼 (於步驟604),然後,若密碼係正確,則進入正常操作(於步 驟610),同樣於最大操作週期。然而,若使用者係答覆爲 “是(yes)” ,系統係要求輸入個人密碼(於步驟604),若正 確,則使用者係呈現有將作選擇之數種模式。此等模式係 可藉著捲動(scrolling)而觀視,或視螢幕之尺寸而定,均爲 顯示具有其致能選取之箭頭按鍵。應注意的是,關於此圖 之本文所論的順序係無意以任何方式而限制本發明,且不 同的順序、替代的作用、…等等係可均爲納入。 計時操作模式(於步驟614)係提供使用者能力以關閉裝 置之操作,藉著時鐘設定(於步驟636)或分鐘數目(於步驟 640)。於選擇時鐘設定(於步驟636)之情形,使用者係接著 輸入該裝置爲關閉之日的時間(於步驟638)。若選擇分鐘模 組(於步驟640),在關閉前之分鐘的數目係要求(於步驟642) 。較佳而言,一預先設定的最大操作時間係將仍爲奏效, 其後,一密碼係將需要以重新致動。作爲一個回應之“否 (no)”的選取係帶至睡眠模式操作(於步驟620),若爲通過 ,其使得使用者能夠設定該裝置於其爲不可操作之一起始 時間(於步驟644)與一結束時間(於步驟646)。“否(no),,係 同樣爲旁路該睡眠模式(於步驟620)至延遲起始模式(於步驟 626) ’其使得使用者能夠設定該起始時間之開端於其較晚 21 200406656 於輸入時間的一時間(於步驟648)。結束時間(於步驟650)係 類似於睡眠模式之結束時間(於步驟646)。部分操作模式(於 步驟634)係使得使用者對於裝置具有能力以打電話(於步驟 652)及接電話(於步驟654)。當選擇打電話(於步驟652)之操 作,使用者係輸入於其可達成通話之起始時間(於步驟656) 與結束時間(於步驟658)。接電話(於步驟654)係亦允許輸入 起始時間(於步驟660)與結束時間(於步驟662)。於使用者並 未選擇任一個模組之情形時,系統係返回至該致動鎖定系 統模式(於步驟602)。 視最後成本而定,該裝置係可程式規劃以接受多個不 同命令,諸如:一睡眠模式(於步驟620),其自起始時間(於 步驟644)至結束時間(於步驟646)係並未操作;以及,一計 時操作(於步驟614),於其,裝置係在晚間八點而關閉(於步 驟 638)。 延長時間 如於第二十圖所示,該等裝置係可設有一延長時間特 徵(於步驟822),且應注意的是,雖然該等裝置係可設有此 特徵,如同前文所指出,其無法允許無盡延長的時間’由 於其將排除保全槪念。於此實施例中’使用者係致動該裝 置(於步驟802),選擇以解除致動/重設該系統(於步驟803) ,並且輸入個人密碼(於步驟812) ’延長時間之選項(於步驟 822)係呈現。於延長時間之選項(於步驟822),使用者係可 延長目前程式規劃的時間爲等於或者小於原始的程式週期 。供延長之時間量係可由製造者所決定,且係將不可由使 22 200406656 用者所變更。舉例而言,手機係可關閉於一預先程式規劃 的最大操作週期之期滿時或在一預先設定數目的延長(於步 驟822)之後。 於第十九圖,並非爲輸入一特定的起始時間(如於則圖 所述者),一預設時間係已經輸入。因此,一旦該使用者致 動該裝置(於步驟700),必然響應以致動該鎖定系統(於步驟 702)且輸入個人密碼(於步驟704)。於選擇計時操作模式(於 步驟706),預設的起始時間(於步驟708)係顯示,給予使用 者機會以增加(於步驟710)或減少(於步驟718)時間爲分鐘( 於步驟712)或小時(於步驟714)。應注意的是,分鐘與小時 之使用係僅爲舉例,且時間之分類係可爲製造者所選擇之 曰數、週數、或任何增量。預設的結束時間(於步驟716)係 以相同方式而調整。於此圖中之各個模式係提供預設的時 間選項,然而,所應注意的是,於第十九圖所示之預設的 模式係亦可納入爲關連於第十八圖所示之計時器設定模式 。或者,使用者係可爲提供是否選取預設或計時器設定之 選擇。 第十九圖係將較爲適用於照相機、TV、電腦、與其僅 具有一種型式的操作之其他裝置。換言之,其不具有雙工 操作,如同一手機所爲之傳送及接收,或是如同VCR所爲 之錄影及播放。應注意的是,如於第十九圖所揭示之系統 係以如同於第十八圖所解說之相同方式而解除致動。 於第二圖之實施例,使用者係能夠程式規劃一或 多個特定事件及其播放時間。如於本文所運用,一事件係 23 200406656 包括電腦程式、電視節目、廣播電台節目、或任何其他特 定事件,其係透過電子裝置而觀看或收聽。舉例而言,介 於晚間七點與就寢時間之間,年齡十二歲者係僅可觀看特 定節目且於就寢時間,TV將不再爲可取用。欲達成此舉, 使用者係致動該裝置(於步驟900),且係詢問其是否爲程式 規劃(於步驟932)或觀看(於步驟934)。程式規劃(於步驟 932)之輸入係查詢使用者是否欲致動該鎖定系統(於步驟 902)或是解除致動該系統(於步驟903)。如同於先前的實施 例,若使用者係決定不致動該系統,個人密碼係要求(於步 驟904)且裝置係進入正常操作(於步驟910),同樣爲具有最 大執行週期。若使用者係欲進入一程式規劃的操作(於步驟 914),其輸入起始時間(於步驟940)、結束時間(於步驟942) 、使用者密碼(於步驟946)、與程式密碼(於步驟952)。此係 告知該系統的是,於起始時間(於步驟940),符合使用者密 碼(於步驟946)之使用者係可觀看其輸入於程式密碼(於步驟 952)之程式。欲爲有利於程式規劃,多個使用者密碼(於步 驟946)係可輸入,或是查訖於一表列。一旦程式密碼(於步 驟952)係輸入,使用者係可反覆(於步驟948)該程式規劃事 件(於步驟914)或結束(於步驟950)該事件。當返回至程式規 劃事件(於步驟914),使用者係可程式規劃另一個事件或持 續於該裝置所含有之其他的事件,諸如於第十九圖所示者 。或者,下一模式(於步驟954)係可爲由程式密碼(於步驟 952)模組所直接存取。 若使用者係欲觀看(於步驟934),使用者密碼係輸入(於 24 200406656 步驟930),且系統係允許預先程式規劃的事件之觀看。此 系統係主要爲運用於TV與電腦,然而,其他的應用係將對 於熟悉此技藝人士而爲顯明。 本文揭示的本發明之一個用途係於商用產業,工作者 係運用公司擁有的工具與設備、電腦、汽車旅館TV與 VCR、…等等。該等工具、或其他設備係致動於早晨以執 行於整個執勤時間,於該時間點,其係關閉。此舉係防止 來自外界以及雇員之偷竊。另外,藉著於每個早晨而重新 致動該等工具,一 “安全檢查”係可爲納入於致動以防止 使用故障的設備。 鎖定裝置係可進而運用於腳踏車、購物手推車、輪椅 、…等等。然而,應注意的是,由於本文揭示之鎖定裝置 係藉著停止腳踏板之移動而操作於腳踏車,此裝置係不建 議爲用於腳踏車、或者其具有腳刹車之其他物品。於該裝 置爲致動於使用期間內之情形,使用者係將無法致動該刹 車。運用於本文之實例係一腳踏車,然而,本文揭示之裝 置係可爲亦於適用於種種其他的輪動式裝置。供運用於腳 踏車、或者其他適用的裝置之鎖定裝置係較佳爲具有大約 —磅或更少之重量。 第九、十與十一圖係說明供運用於輪動式載具之鎖定 裝置200的一個手動版本且爲說明於一腳踏車。於該鎖定 裝置內之鎖定機構係位於一保護外殻202之內’以防止擅 改。外殼202係焊接至前框230與後框232,如於此技藝之 目前所爲而取代於前與後支撐架的接合處的標準接合點。 25 200406656 外殼202係稍微較大於標準外殼,以容納該鎖定裝置200。 踏板軸204係通過外殼202且係附接至踏板236,如於此技 藝所習知者。嚙合碟208係具有一個置於中央的收納孔220 ,其允許該碟208爲安裝於軸204。碟208係焊接至軸204 ,以致使該碟208係隨著腳踏車爲腳踏時而旋轉於軸204。 碟208係含有繞於其週邊之一組的收納孔222。收納孔222 係尺寸大小爲收納鎖定桿210,其係已經封入於鎖定支柱 216。鎖定支柱216係固定於外殼202,以防止該桿210的 移動且因此一旦該桿210爲於鎖定位置時之踏板236的移 動。當爲於未鎖定的位置時,鎖定桿210係拉引至鎖定支 柱216。一旦爲置放於鎖定的位置,桿210係嚙合該碟208 之收納孔222,且防止踏板236之轉動。鎖定支柱216係必 須堅固地固定至外殻202以防止該支柱216爲移出,當使 用者係企圖於鎖定模式期間而腳踏時。另外,鎖定桿210 係必須具有充分的強度以防止該桿210爲折斷或彎曲。於 第九圖之實施例,桿210係藉著一鍵鎖206或其他機械操 作裝置而置放於已鎖定或未鎖定之位置。響應於鍵鎖206 而移動該鎖定桿210之內部機構係類似於鎖死式門栓,且 其他方法係將爲熟悉此技藝人士所習知。 欲提供能力以於一問題發生時而修理該鎖定裝置,一 底板214係納入於鎖定裝置200。如圖所示之底板214係具 有一旋轉鎖212,其爲固定至一鎖定板220。凸緣218係延 伸至外殼202之打開區域,且提供對於鎖定板220之支撐 ,當其旋轉至鎖定位置時。旋轉鎖212之旋轉係移動該鎖 26 200406656 定板220至一位置以通過該等凸緣,藉以允許底板214之 移除。用於底板之鎖定機構係供鎖定底板於外殼之一種方 式的一個實例,且習知於此技藝之其他的方式係均可運用 〇 運用於腳踏車之鎖定機構的一自動式實施例係說明於 第十二至十四圖。嚙合碟308係焊接至踏板軸324,如同於 前文所述。不同於第九圖之手動式鎖定,互動的鎖定桿326 係由一電池驅動式的螺線管304而操作。螺線管304係透 過殼體306之運用而維持於定位,殼體306係堅固地固定 至外殼302。如前文所述,鎖定桿326係必須能夠承受其爲 由企圖踩動該腳踏車之某人所加諸的壓力。欲驅動該螺線 管304之電池340係可爲容納於前支架342或便利於製造 之其他的位置。電池驅動式的螺線管之運用係亦允許一計 時器之使用,如同供運用於第一圖之手工具而揭示者。類 比的計時器係有利於公司以小時或日數而租借腳踏車,由 於計時器係可致動於該腳踏車爲移出自商店時而且時間係 讀取及計算於歸還時。計時器讀數、輸入方式、…等等係 可納入於前支架342或後支架344。 底板312係運用對於第九圖的實施例之另一種設計。 於此實施例中,底板312係設有一鍵鎖314,其爲附接至雙 旋轉桿320與322。外殻302之側邊係設有凸緣對318與 316,其係尺寸大小爲互動於旋轉桿320與322。因此,隨 著該鍵鎖314係轉動,桿320與322係移出其與凸緣對318 及316之互動,因而釋放該底板312。 200406656 由於其改變以配合特定操作需求與環境之其他的修改 與變化係均將爲熟悉此技藝之人士所明瞭,本發明係非視 爲受限於針對揭示之目的而選定之實例,且涵蓋其並未構 成偏離本發明的真正精神與範疇之所有的變化與修改。 【圖式簡單說明】 (一)圖式部分 本發明揭示內容之優點係以說明書與圖式解讀時而將 更爲顯明,其中: 第一圖係其納入鎖定裝置之一個實例的手工具之側視 圖; 第二圖係本發明之鎖定臂與螺線管的內部之部分切除 圖, 第三圖係一個實例的控制器架構之俯視圖; 第四圖係用於手工具的鎖定裝置之一個實例的接線示 意圖; 第五圖係第一圖之手工具的內部之部分切除側視圖; 第六圖係利用所揭示的鎖定裝置之手工具的另一個實 施例之部分切除側視圖; 第七圖係用於空氣工具系統之本發明的裝置之側視圖 j 第八圖係用於空氣工具之鎖定裝置的接線示意圖; 第九圖係用於電子裝置的的接線示意圖; 第十圖係用於納入類比功能之鎖定裝置的接線示意圖 28 200406656 第十一圖係供程式規劃一個多作業裝置之流程圖; 第十二圖係供程式規劃一個單作業裝置之流程圖; 第十三圖係供程式規劃其包括一個重置選項的電子裝 置之流程圖;及 第十四圖係供程式規劃其指定特定事件、時間與使用 者的電子裝置之流程圖。200406656 玖, Description of the Invention Cross Reference of Tongguan Application This application is filed under the serial number 10/273 of October 18, 2002. 819 a continuation case, Application Serial No. 10/273, 819 is U.S. Patent No. 6, issued on October 22, 2002. 469, No. 615 is a partial continuation case, U.S. Patent No. 6, 469, No. 615 is a partial continuation of the provisional application serial number 60/065941 filed on October 27, 1997. All content is incorporated herein as a whole.  [Technical field to which the invention belongs] The device relates to a safety and security device, Once actuated, it allows the electronic device to execute in a pre-programmed cycle. In some embodiments, This device is used as an anti-theft device, Without a code, The use of this device is prohibited, To prevent theft and resale of protected equipment.  [Prior art] Electronic devices provide the temptation to thieves, It is easy to resell due to its lack of unique characteristics. Although people will label their electronic devices,  Such as: Cell phone, computer, …and many more, Unless the stolen device was resold by a legitimate seller, There is no hope of recovery.  SUMMARY OF THE INVENTION A disclosed locking device is used for applications such as computers, Camera, Cell phone, VCR, DVD, ... and so on electronics, Equipment, Tools, Heavy equipment and machinery, Gas-driven vehicles, And various other rotary vehicles. This device provides options to allow the device 200406656 to be operational or inoperable for a predetermined period of time, Select specific operable features, Or to completely shut down with operations that are only allowed through password entry.  Related to an unlocked and timed operation, What the electronic circuit in such a device requires is that The device is unlocked before use. For operation, a time period can be programmed in the equipment, After that time, Unit is switched off; or, on the contrary, The device can be shut down for a specific period of time and automatically reactivated. This will reduce theft and prevent unauthorized use of the item.  The operation control device is provided for use with a housing, One power supply, An input device, At least one actuating member, Equipment with a control component. Control elements such as separate chips or programs planned to be embedded in existing chips are all having their own input devices to enable the user access password to be entered, Or using one of its input devices, Such as buttons on a mobile phone. In the preferred embodiment, Such as mobile phones, computer, Or a readout panel on the camera screen is used to monitor the status of the device. The reader is also an audio output. The control component is connected to the input device, Readout panel, power supply, With actuation member. The control component prevents the operation of the equipment, By preventing access to the actuating member when there is no input with a user password. The control component can also be programmed to control the internal functions of the electronic device, such as: Allow certain channels on television to be watched for a predetermined period of time, And for other channels during other time periods. The auxiliary access code allows the system to program for allowing the device to be actuated only if it contains the auxiliary code. The device also allows the phone to make outgoing calls instead of incoming calls within the set 200406656 time period. Or vice versa. Any device with electronic components may be incorporated into the disclosed device, The ability to selectively determine which features act on a given period of time by providing capabilities. Yu Zhu such as camera, Camcorder, … Wait for the digital device, Capabilities are increased due to the diversity of digital technologies, It should be noted that Any of the capabilities disclosed herein with respect to a digital device may be incorporated into other digital devices.  The control device includes a programmable timer, To communicate with the control component, Thereby, the selected feature can be accessed at a predetermined time period input by the input device. More preferably, In all embodiments, the memory is nonvolatile, This prevents the loss of the setting 値 when power is lost. A clock component (if not already inherent to the device) can be added to track time based on user input, Actuate, And deactivate the timer. On mobile phones, computer, camera, …and many more, The operation of the device depends on the microchip, Or microprocessor, And it will probably not require the wiring of a power tool, Or something other than a processor-based device. As in the case of co-trial patent application SN 09/178, Revealed by 837, The variety of locking devices makes them useful for applications such as hand tools, electronic product, Or carousel, As well as mobile phones, Digital and non-digital cameras ... etc. [Embodiment] The invention disclosed herein relates to a programmable planning device, Has: Programmable features, Including (but not limited to) restricting access to specific parts of the device; as well as, A coded locking mechanism, It blocks 200406656 from theft and restricts or exempts use during a predetermined time frame. In addition to the inherent advantages obtained through the locking device as disclosed, Further security advantages are achieved purely because of their presence. It will be apparent to anyone who purchases an item that contains a locking device, Unless the seller has a password, The item appears to have been stolen. The disclosed locking device controls the actuation of the item, Prevents activation when no user password is entered.  Without access to the password, This item is useless and cannot be sold.  Such as mobile phones, Palm Pilot (pUot) and other handheld data access devices, camera, computer, VCR, TV, MP3 player, … And so on are all electronic devices that fall into the category of easy theft with high resale prices. however, The use of programmable chips makes these cost-effective devices easy to modify to incorporate the advantages of the system disclosed herein. or,  On devices such as VCR or TV, The device can be retrofitted to a power source, Such as a power cord or plug. however, Microchip, microprocessor, Or the use of analog technology allows various functions to be monitored, Such as scheduling services, Based on the time of use or the number of hours an item has been used.  The locking mechanism is preferably a type, It does not require the use of a mirror or other device, To avoid the loss or carrying of another item. Access via keypad or other locking mechanism is available, Such as magnetic card reader, Fingerprint or omentum identification, Standard buttons, Phone signal, Or any applicable wireless technology, …and many more. The method of programming the device depends on the type of device, size, …and many more. For example, Touch button scan, Or other methods with transmission of static data can be easily incorporated into the device, This allows tracking of information about the item.  10 200406656 The technology disclosed in this article provides benefits to the laboratory or other set-up environments where equipment is centralized and removed for use. Each employee will have a personalized touch key, Or other wireless or non-wireless access agencies, It will record the employee's name, Actuation time, And any other information requested by the employer. In situations where a device is required for security or training, Personalized access devices also contain ID passwords that enable them to be used, It is thus prevented from being used by unauthorized persons.  When the device is not programmatically designed for use with a device such as a digital camera or cell phone, Alternative programming "keys" with static data, Such as a touch key. The technology department disclosed herein provides advantages in that: The employer or parent can program the touch button to have appropriate information including the actuation time, And that information cannot be changed, Unless changed by someone with top programming rights. This facilitates the use of equipment that must be shut down after a specific life cycle, Because the pre-programmed time releases the user from watching the clock. Although the closure can also be obtained by other methods,  The systems disclosed herein provide additional advantages as described herein, Thus strengthening the system.  When installed on a computer, The device disclosed herein can be directly connected to a power supply, Or programming to the chip, Hard drive, Or other storage / memory devices; Companies that allow them to sell computer time to automatically shut down their computers,  Unless you have purchased another time. For home use, The device allows parents to control the amount of time a computer or other electronic device, such as a TV, can be used by children, Or a specific time period. therefore, computer, VCR or TV only 200406656 can be activated after homework time, And so on. The computer system is particularly suitable for keyboard programming of the device. Although a keyboard interface may include any locking device that has been disclosed. A program embedded in the microchip and / or hard drive of the device allows simple timer settings, It is actuated by the female key input on the keyboard. As an option, Direct coding key system can be incorporated into the keyboard, To automatically access programs and allow actuation, Settings change,  …and many more. Although computer lock out programs are familiar with this technique, It uses an all or nothing method to turn off the computer as a whole. The device disclosed herein allows access to a computer for a predetermined period of time.  It can be used randomly or within a specific schedule, To extend the amount of time the device is used without interruption. For example, The system can be set so that the computer can be turned on for a predetermined time. Using a specific time period, The computer was then unavailable until a preprogrammed actuation time. This enables parents to program computers, Or other electronic devices or equipment To be activated at six in the evening until ten in the evening,  Then deactivated until six o'clock in the evening, Or respond to other programming. A user entering a time limit will be able to create a program with a user password, In order to prevent unauthorized changes to the program, one of the programmable features disclosed in this article is a partially actuated feature It is described in detail below as for the mobile phone. Using this feature, Users may restrict the use of certain electronic devices, For example, A computer can be programmed to restrict certain programs, such as web page access, at specific time periods. For example, Will prevent children from browsing the web, Unless in a specific time period 12 200406656. or, Computer games will only be accessible for a limited time, however,  The computer will be used for word processing or other homework related activities. This feature enables the computer to be used in a restricted manner for user program-based planning. In addition, The sub-user ID can be used to allow individual access to an electronic device. This is good for children with different age restrictions, By allowing older children to access programs, Make long distance calls, …and many more, It cannot be done by younger children.  The locking device disclosed in this article is also useful for renting equipment. Such as generators, compressor, VCR, …and many more, Yu Qi, The leased equipment is programmable at a specific time period. And after this time point, the actuation is automatically released. This is to prevent theft of rental equipment, Thus reducing insurance and burdens, Since it prevents unauthorized use, In particular, premium rates may be reduced when used in conjunction with larger equipment.  For TVs that include an infrared remote control, VCR electronics,  The timing actuation device can be actuated via a remote control. Once activated, The program will appear on the screen. And use existing or specific keys to set the off time, User time period, Or extend the time period, …and many more. This will be an inexpensive add-on to the controller, And improve user convenience. or, The controller itself can be used to set the use time, There is no need for a setup program to appear on the screen.  It should be noted that The analogy disclosed herein for a particular embodiment, Key scanner, infrared, Fingerprint or omentum identification, ... and the like are not limited to this embodiment. Various embodiments of the locking device disclosed herein may incorporate electronic circuits as described herein related to any other embodiment 13 200406656, Memory, …and many more.  As shown in the first and second figures, A primary drilling machine is used to illustrate the mechanism disclosed in this article, Its use to limit user time, however, This is only an example and is not intended to limit the invention. The power tool 10 is illustrated in the first figure. It is ready for use, A number pad 12 is incorporated as a lock mechanism 'and other actuation mechanisms will be apparent to those skilled in the art.  Time can be set by any organization. To suit the equipment used φ and the final application. For example, The time series can be set by repeatedly touching a specific key, And jump time in a predetermined increment. or, One "enter" key system can be set, It allows entry of unlocked passwords and subsequent entry for a predetermined period of time. More preferably, The all-time locking device is equipped with non-electrical memory. To prevent the loss of programming instructions when the battery of an item is exhausted or removed. This is more important than rechargeable hand tools, Yu Qi, Fully discharging the battery is sometimes necessary to fully charge it.  The inclusion of φ microchips to temporarily store these lock passwords and program the actuation time in order to provide additional capabilities, To monitor various other tool functions. For example, The LED display 14 of the first picture can be included. It indicates the remaining actuation time and, if desired, the current state of the tool. For example,  Status can include: Current battery power (during charging and discharging), The pressure left when the air tool is in use, rpm and drilling direction, …and many more. This is best used to monitor the status of rechargeable batteries. Because many rechargeable batteries are not fully charged, Unless it is fully discharged before charging 14 200406656, The battery-monitoring device allows the best use and management of the battery.  It should also be noted that An LED system can be installed in the charging device to monitor the battery charging. Therefore, as a double inspection of the LED on the charged device, as shown in the second figure, One design of the internal actuation unit 40 is shown. The locking arm 48 is supported between the upper case side 42 and the lower case side 44. The tension spring 50 is designed so that when the lock arm 48 is pulled back during use, the solenoid contact 56 is placed in actual contact with the solenoid 52. Once the locking arm 48 is released, The solenoid contact 56 is removed from the contact of the solenoid 52. The solenoid 52 receives power from the battery 108 (fifth figure) through the controller 80, An example of the controller is illustrated in more detail in the third figure. As you can see from the example diagram in Figure 4, The controller 80 serves as a central processing area. It also has all the inputs and outputs through the controller 80. The controller 80 is directly connected to a locking mechanism such as a digital keypad 12 through the keypad circuit 100.  The battery circuit 102 and the motor circuit 104 are also fed to the controller 80. Once a locking mechanism such as the keypad 12 is actuated, All wiring systems are made, And the power is free to be sent to it as a drive specific to the power tool 10. The exact scheme of the line is irrelevant, Because of its importance lies in the interaction (interaction) between the locking mechanism and the controller 80. As shown in Figure 5, The interior of the hand tool 10 is separated in a conventional manner, And the controller 80 is located in the grip area. In this embodiment, Various connection lines 100, 102, Exposed with the 104 series, And at the time of the theft, The casing will be opened and the wiring will be cut to bypass the controller 80. To prevent a thief from opening the housing and bypassing the controller 80, The shell is equipped with a security key, It has 15 200406656 with many different embodiments. One embodiment is to incorporate a locking member,  It is wired to the controller via the lock line 156, And is based on a lock password, key, Or other compatible methods. The controller 80 is programmable to allow the housing to be released. For example, by entering a separate password, Or by keeping the last number of existing passwords for a predetermined period of time. A separate cipher is preferably that It prevents any unauthorized access to the inside of the enclosure.  In another embodiment of the security key, As shown in Figure 6, The solenoid 126 and the wiring 122 are epoxy-based resins enclosed in a region 128 as indicated. By sealing the line 122 in epoxy resin, It is then impossible to rewire the unit and bypass the controller 124. Other materials known in the art can be used in place of epoxy resins. To facilitate the placement of the epoxy resin region 128, The line 122 from the motor 120 leaves the motor housing to access the controller 124, It has been placed as close to solenoid 126 as possible. This modified placement reduces the area to be protected, This reduces material and labor costs. It is difficult to modify the placement of the battery 130, In some cases, the battery circuit 132 is prevented from being covered. however, If both the controller 124 and the solenoid 126 are enclosed in epoxy resin, It would be priceless to cut the battery line 132, Since there will not be any accessible power connections.  In the seventh picture, The locking device is described as being applied to an air tool 200, Although it should be noted that This device is also applicable to propane, Gas, With diesel (dksd) tools and equipment. as the picture shows, The controller unit 202 is located on the grip 204 of the air tool. As can be seen from the example diagrams of the fourth picture (battery) and the eighth picture (air tool) There is a small difference in the line system between the two. As mentioned above, In the schematic diagram of the fourth figure,  The key line 100 goes to the controller 80, The same applies to the battery circuit 102 and the motor circuit 104. For air tools, Or someone else who removed the power supply, The circuit of the key line 150 and the solenoid 154 is fed to the controller 152 and on the driver. The battery and motor wiring are exempt.  as described above, The disclosed device may be easily incorporated into an electronic device. The programming of equipment can be achieved through a variety of methods. Additional methods will become significant as a technological change and will be apparent to those skilled in the art.  Rewriting the swipe card has gained popularity, It may be a device that is easily incorporated into the disclosure. These cards can be rewritten with a new password using a computer or other applicable device such as a palm or remote control.  For example, A computer program may contain applicable codes. To target all electronic devices that incorporate the technology disclosed herein. Users can choose which features to include in each device. And write it to the card. The user can then use the same steal card to program the various electronic devices available,  Because each device will recognize its password and ignore program planning for other devices. or, Small hard drives, such as those used in digital cameras, can be used to program a variety of electronic devices.  The schematic diagram in Figure 15 is for incorporating a computer, VCR, TV,  … And an example of the electronic circuit of one of the devices. As can be seen, The basic function of the anti-theft device is the same as it is applied to a battery operation, Air or electrical tools, Or other devices. As in the schematics disclosed earlier, The key line 302 is fed to the controller 304. however, In this embodiment, The electrical circuit 17 200406656 306 is connected to the controller 304 through the latching relay circuit 308. The sixteenth figure is not intended to provide the electronic circuit layout disclosed in the fifteenth figure,  Through the analog line 350 to incorporate analog functions into the device.  as described above, Phone is a small size, High-priced theft It is difficult to prevent. Most people keep their phones on all the time, The implementation of an on / off actuated lock will not prevent theft; Since mobile phones are mostly turned on when stolen, The thief will just keep the Shai phone turned on. Incorporating the systems disclosed in this article, What a thief will know is There is absolutely no way to prevent the phone from turning off for a pre-designated time, And once the day has expired, the mobile phone system will be unavailable. Using the system revealed in this article, The user can program the mobile phone to be turned off permanently at the expiration of a predetermined time or at a preset time. For example, This system will enable users to inform the system that it should be at 9pm, Or turn off once the timer reaches three hours from the programmed time. Once turned off, the device will require a re-entry of the access code. The system disclosed herein further enables the user to set the phone to be turned off for a predetermined period of time. It also has automatic re-activation at the end of the time period.  The ability to turn off the phone for a predetermined period of time and then automatically reactivate it afterwards helps people to attend meetings, watch movie, Or participate in other activities that require them to turn off their phones. Since the phone will automatically reactivate, The user need not worry about turning the phone back on. In the preferred embodiment, The phone system can also be set to answer or make calls, And standard in / out features.  therefore, If the phone is on loan, And the owner of the phone does n’t want the call to be answered by anyone else, The mobile phone can be set to transfer all incoming calls to the owner of the phone to its voicemail or other call forwarding location. And still allows the person holding the phone to make outgoing calls.  In the opposite mode, The person holding the phone can answer the call but cannot use the phone to dial out.  It should be noted that For maximum security, The password that enables the program planning disclosed in this article is preferably on the phone, Or other devices such as hard drives, permanent memory devices, Microchip, …and many more, Not just for any temporary software, Phone cards or other removable systems.  A delayed actuation system can also be programmed for any device, So that it can be activated at a specific time or after a certain amount of time has elapsed. Therefore, For applications such as electrical tools used on construction sites, The foreman can programmatically program the tool to actuate within 30 minutes and remain activated for an additional eight hours.  On any electronic device, The command system can be set through various methods.  On devices such as digital cameras or mobile phones with a built-in screen, The screen can be used to monitor existing settings and program new settings. For devices without a screen, Can be incorporated into an external LED display,  Sound actuated, Or some other mechanism for communication between the device and the user. Existing command or programming buttons can be used to program the device 'or additional buttons can be incorporated into the design at the time of manufacture. In addition, remote, infrared, Bluetooth, Or other wired or wireless devices can be used as a programming tool.  An example of the sequence for users to follow when programming a mobile phone is illustrated in Figure 18. Once the device is activated (at step 600), System Inquiry 19 200406656 asks the user if he wants to activate the locking system (at step 602), Or if the actuation system is deactivated (at step 701), Turn off the device.  Angle Army Deactivation If the user chooses to deactivate the system (at step 603 or 701),  It simply enters the personal password (at step 605 or 703) and the system returns to the standard operation at a time period set by the manufacturer. however, If the user has changed his mind or made an incorrect choice, It states "no",  And the characteristics of the program plan remain the current setter. It should be noted that The security issues disclosed in this article will be denied, If the user cannot simply turn off the locking system. therefore, In the preferred embodiment, The manufacturer set the phone to be one of the maximum amounts of time for continuous activation, After that, The phone is automatically turned off. This maximum operating cycle is preferably applicable to all devices, not only mobile phones, but also the locking systems disclosed herein. or, The maximum time can be set by the user using a single password for single or multiple purposes planned from the standard program. In Figure 20, Another option to reset the system was added, Enables the user to deactivate or reset the system (at step 803). If the system is deactivated, The user enters his or her personal password (at step 812). And choose whether it wants to deactivate (at step 812) or reset (at step 814). If deactivation (at step 812) is selected, The system enters normal operation (at step 810), It is also a better limit to include a maximum amount of time. If the user chooses to reset at step (814), The system then proceeds to the sequence of timing operations (at step 816). The system follows the arrows A1000 and A1002 continuously, As described in Figure 18. It should be noted that  Arrow A1004 is the return from the "No 20 200406656 (no)" selection at the end of the programmable option.  Activation If the user responds "no" to the activation of the locking system (at step 602), As shown in Figure 18, The system proceeds to request a personal password (at step 604). then, If the password is correct, Then enter normal operation (at step 610), Same as maximum operating cycle. however, If the user responds with "yes", The system requires a personal password (at step 604). If true, The user is presented with several modes to choose from. These modes can be viewed by scrolling, Or depending on the size of the screen, Both display the arrow keys with their enabled selections. It should be noted that The order discussed in this article with respect to this figure is not intended to limit the invention in any way, In a different order, The role of substitution, … And so on are all included.  The timing operation mode (at step 614) is to provide the user with the ability to shut down the operation of the device. Set by the clock (at step 636) or the number of minutes (at step 640). When the clock setting is selected (at step 636), The user then enters the time when the device was off (at step 638). If a minute module is selected (at step 640), The number of minutes before closing is required (at step 642). More preferably, A preset maximum operating time will still work,  Since then, A cryptosystem will be needed to reactivate. As a response, the selection of "no" is brought to sleep mode operation (at step 620), If passed, It enables the user to set a start time (at step 644) and an end time (at step 646) when the device is inoperable. "No, , It also bypasses the sleep mode (at step 620) to the delayed start mode (at step 626). 'This enables the user to set the start of the start time at a later time 21 200406656 at a time of input time (at Step 648). The end time (at step 650) is similar to the end time of the sleep mode (at step 646). Part of the operating mode (at step 634) is to enable the user to have the ability to make calls (at step 652) and answer the phone (at step 654). When you choose to make a call (at step 652), The user enters the start time (at step 656) and the end time (at step 658) at which the call can be reached. Answering a call (at step 654) also allows entering the start time (at step 660) and end time (at step 662). When the user does not choose any module, The system returns to the actuation lock system mode (at step 602).  Depending on the final cost, The device is programmable to accept multiple different commands. Such as: A sleep mode (at step 620), It has not been operated from the start time (at step 644) to the end time (at step 646); as well as, One hour operation (at step 614), Yu Qi, The unit shuts down at eight in the evening (at step 638).  Extended time As shown in Figure 20, These devices may be provided with an extended time feature (at step 822), It should be noted that Although these devices may be provided with this feature, As noted earlier, It ca n’t allow for an endless extension of time ’because it will rule out security concerns. In this embodiment, the user activates the device (at step 802), Select to deactivate / reset the system (at step 803), And enter the personal password (at step 812) 'the option of extending the time (at step 822) is presented. For the extended time option (at step 822), The user can extend the current programming time to be equal to or less than the original programming cycle. The amount of time for extension can be determined by the manufacturer, And the system cannot be changed by the user. For example, The handset can be turned off at the expiration of a preprogrammed maximum operating cycle or after a pre-set number of extensions (after step 822).  In Figure 19, Not for entering a specific start time (as described in the diagram), A preset time has been entered. therefore, Once the user activates the device (at step 700), A definite response is required to activate the locking system (at step 702) and enter a personal password (at step 704). After selecting the timing operation mode (at step 706), The preset start time (at step 708) is displayed. The user is given the opportunity to increase (at step 710) or decrease (at step 718) the time to minutes (at step 712) or hours (at step 714). It should be noted that The use of minutes and hours is for example only. And the classification of time can be selected by the manufacturer. Weeks, Or any increment. The preset end time (at step 716) is adjusted in the same way. Each mode in this picture provides preset time options. however, It should be noted that The preset mode shown in Figure 19 can also be incorporated into the timer setting mode shown in Figure 18. or, The user can choose whether to select a preset or timer setting.  The nineteenth picture will be more suitable for cameras, TV, computer, Instead of other devices that have only one type of operation. In other words, It does not have duplex operation, As transmitted and received by the same phone, Or record and play like VCR does. It should be noted that The system as shown in Figure 19 is deactivated in the same way as explained in Figure 18.  In the embodiment of the second figure, The user is able to program one or more specific events and their playing time. As used in this article, An event system 23 200406656 includes computer programs, TV show, Radio station programs, Or any other specific event, It is viewed or heard through an electronic device. For example, Between seven in the evening and bedtime, Twelve-year-olds are only allowed to watch certain shows and at bedtime, TV will no longer be available. To do this,  The user activates the device (at step 900), And it is asked whether it is program planning (at step 932) or viewing (at step 934). The input of the program planning (at step 932) is to query whether the user wants to activate the locking system (at step 902) or deactivate the system (at step 903). As in the previous embodiment, If the user decides not to activate the system, The personal password is required (at step 904) and the device enters normal operation (at step 910), It also has the maximum execution cycle. If the user wants to enter a program operation (at step 914), Its input start time (at step 940), End time (at step 942), User password (at step 946), And program password (at step 952). What this system tells the system is, At the start time (at step 940), Users who meet the user password (at step 946) can view the program that they entered in the program password (at step 952). To facilitate programming, Multiple user passwords (at step 946) can be entered. Or check it in a list. Once the program password (at step 952) is entered, The user can repeat (at step 948) the programming event (at step 914) or end (at step 950) the event. When returning to the program planning event (at step 914), The user can program another event or continue to other events contained in the device, Such as shown in Figure 19. or, The next mode (at step 954) is directly accessible by the program password (at step 952) module.  If the user wants to watch (at step 934), The user password is entered (at 24 200406656 step 930), And the system allows viewing of pre-programmed events. This system is mainly used for TV and computer. however, Other applications will be apparent to those skilled in the art.  One use of the invention disclosed herein is in the commercial industry, Workers use tools and equipment owned by the company, computer, Motel TV and VCR, …and many more. Such tools, Or other equipment that is actuated in the morning to perform the entire duty period, At that point in time, It is closed. This is to prevent theft from outsiders and employees. In addition, By reactivating the tools every morning, A “safety check” is equipment that can be incorporated into actuation to prevent malfunction.  The locking device can be further applied to bicycles, Shopping trolley, Wheelchair …and many more. however, It should be noted that Since the locking device disclosed herein is operated on the bicycle by stopping the movement of the pedal, This device is not recommended for bicycles, Or other things with foot brakes. Where the device is activated during use, The user will not be able to actuate the brake. The example used in this article is a bicycle, however, The devices disclosed herein may be applicable to a variety of other wheeled devices. For use on treadmills, Alternatively, the locking device of other suitable devices preferably has a weight of about -pounds or less.  ninth, The ten and eleven figures illustrate a manual version of the locking device 200 for a wheeled vehicle and are illustrated on a bicycle. The locking mechanism inside the locking device is located inside a protective casing 202 'to prevent tampering. The housing 202 is welded to the front frame 230 and the rear frame 232. Instead of the standard joints at the joints of the front and rear supports, as is currently the case for this technique.  25 200406656 Housing 202 is slightly larger than the standard housing, To accommodate the locking device 200.  The pedal shaft 204 passes through the housing 202 and is attached to the pedal 236, As known in this technology. The engaging disk 208 has a receiving hole 220 in the center, It allows the dish 208 to be mounted on the shaft 204. The dish 208 is welded to the shaft 204, So that the dish 208 is rotated on the shaft 204 when the bicycle is pedaled.  The dish 208 includes a set of receiving holes 222 around its periphery. The receiving hole 222 is sized to receive the locking lever 210, It has been enclosed in a lock post 216. The locking post 216 is fixed to the housing 202, This prevents movement of the lever 210 and therefore movement of the pedal 236 once the lever 210 is in the locked position. When in an unlocked position, The lock lever 210 is pulled to the lock post 216. Once placed in a locked position, The rod 210 is engaged with the receiving hole 222 of the dish 208, And prevent the pedal 236 from rotating. The locking post 216 must be firmly secured to the housing 202 to prevent the post 216 from being removed, When the user attempts to pedal during the lock mode. In addition, The locking lever 210 must have sufficient strength to prevent the lever 210 from breaking or bending. In the embodiment of the ninth figure, The lever 210 is placed in a locked or unlocked position by a key lock 206 or other mechanical operating device. The internal mechanism of moving the lock lever 210 in response to the key lock 206 is similar to a deadbolt, And other methods will be familiar to those skilled in the art.  To provide the ability to repair the locking device when a problem occurs, A bottom plate 214 is incorporated in the locking device 200. The bottom plate 214 shown in the figure is provided with a rotation lock 212, It is fixed to a locking plate 220. The flange 218 extends to the open area of the housing 202, And provide support for the locking plate 220, When it is rotated to the locked position. The rotation of the rotary lock 212 moves the lock 26 200406656 fixed plate 220 to a position to pass the flanges, This allows the bottom plate 214 to be removed. The locking mechanism for the bottom plate is an example of a method for locking the bottom plate to the housing, And other methods known to this art can be applied. An automatic embodiment of the locking mechanism applied to the bicycle is illustrated in Figures 12 to 14. The engaging disc 308 is welded to the pedal shaft 324, As mentioned before. Unlike the manual lock in the ninth picture, The interactive lock lever 326 is operated by a battery-powered solenoid 304. The solenoid 304 is maintained in position through the use of the housing 306, The housing 306 is firmly fixed to the housing 302. as described above, The lock lever 326 must be able to withstand the pressure imposed by someone attempting to step on the bicycle. The battery 340 to drive the solenoid 304 may be housed in the front bracket 342 or other location convenient for manufacturing. The use of battery-operated solenoids also allows the use of a timer, Revealed as a hand tool for the first picture. An analog timer is useful for companies renting bicycles in hours or days. Since the timer can be activated when the bicycle is removed from the store and the time is read and calculated at the time of return. Timer readings, input method, ... and so on can be included in the front bracket 342 or the rear bracket 344.  The bottom plate 312 uses another design for the embodiment of the ninth figure.  In this embodiment, The bottom plate 312 is provided with a key lock 314, It is attached to the double rotation levers 320 and 322. The sides of the casing 302 are provided with flange pairs 318 and 316, The size is interactive with the rotating rods 320 and 322. therefore, With the key lock 314 turning, Rods 320 and 322 are removed from their interaction with flange pairs 318 and 316, The base plate 312 is thus released.  200406656 As other modifications and changes that change to match specific operating needs and circumstances will be apparent to those skilled in the art, The invention is not considered to be limited to the examples selected for the purpose of disclosure, It is intended to cover all changes and modifications which do not constitute a departure from the true spirit and scope of the invention.  [Schematic description] (A) Schematic part The advantages of the disclosure of the present invention will be more apparent when the description and drawings are interpreted. among them:  The first figure is a side view of a hand tool incorporating an example of a locking device;  The second figure is a partially cutaway view of the interior of the lock arm and the solenoid of the present invention,  The third figure is a top view of an example controller architecture;  The fourth diagram is a wiring diagram of an example of a locking device for a hand tool;  The fifth figure is a partially cutaway side view of the interior of the hand tool of the first figure;  The sixth figure is a partially cutaway side view of another embodiment of a hand tool using the disclosed locking device;  The seventh diagram is a side view of the device of the present invention for an air tool system. The eighth diagram is a wiring diagram of a locking device for an air tool;  The ninth figure is a wiring diagram for an electronic device;  The tenth diagram is the wiring diagram of the locking device for incorporating analog functions. 28 200406656 The eleventh diagram is a flowchart for programming a multi-operation device.  The twelfth figure is a flowchart for programming a single operation device;  The thirteenth figure is a flowchart for programming the electronic device including a reset option; And the fourteenth figure is for the program to plan its designated specific event, Flow chart of time and user's electronic device.

(二)元件代表符號 10 手工具 12 數字鍵墊 14 LED顯示器 40 內部致動單元 42 上殻側 44 下殼側 46 接收閂鎖 48 鎖定臂(II) Symbols for components 10 Hand tools 12 Numeric key pads 14 LED display 40 Internal actuation unit 42 Upper case side 44 Lower case side 46 Receiving latch 48 Locking arm

50 張力彈簧 52 螺線管 54 線路 56 螺線管接點 80 控制器 100 連接線路(按鍵線路) 102 連接線路(電池線路) 104 連接線路(馬達線路) 108 電池 29 200406656 120 馬達 122 線路 124 控制器 126 螺線管 128 環氧基樹脂區域 130 電池 132 電池線路 150 按鍵線路 152 控制器 154 螺線管 156 鎖定線路 200 空氣工具 202 控制器單元 204 握把 302 按鍵線路 304 控制器 306 電氣線路 308 閂鎖電驛線路 350 類比線路 600-664 第十一圖之流程圖的步驟 700-718 第十二圖之流程圖的步驟 800-822 第十三圖之流程圖的步驟 900-954 第十四圖之流程圖的步驟50 tension spring 52 solenoid 54 line 56 solenoid contact 80 controller 100 connection line (button line) 102 connection line (battery line) 104 connection line (motor line) 108 battery 29 200406656 120 motor 122 line 124 controller 126 Solenoid 128 Epoxy resin area 130 Battery 132 Battery line 150 Button line 152 Controller 154 Solenoid 156 Lock line 200 Air tool 202 Controller unit 204 Grip 302 Button line 304 Controller 306 Electrical line 308 Latch Relay line 350 Analog line 600-664 Step 11 of the flowchart of the eleventh figure 700-718 Step 12 of the flowchart of the twelfth figure 800-822 Step 13 of the flowchart of the thirteenth figure 900-954 Step 14 of the flowchart of the 14th figure Flowchart steps

3030

Claims (1)

200406656 拾、申請專利範圍 1. 一種操作控制系統,用於其具有一外殻、一電源、與 一內部特徵致動構件之設備,該控制系統具有: 至少一個主要使用者存取密碼; 一可程式規劃特徵選取構件,該可程式規劃特徵選取 構件係致使至少一個可程式規劃特徵能夠由使用者所選取 y 至少一個可程式規劃特徵致動時間週期,該可程式規 劃特徵致動時間週期係由使用者所設定,針對該至少一個 可程式規劃特徵之各者; 輸入裝置,用於設定該可程式規劃特徵選取與該可程 式規劃特徵致動時間週期; 使用者識別(ID)機構,以接收預定的使用者存取密碼; 一讀出面板,該讀出面板係提供該操作控制系統之一 狀態報告; 一內部控制構件,該控制構件係與該輸入裝置、該電 源、可程式規劃特徵致動時間週期、與可程式規劃特徵選 取構件爲直接連通; 其中,該內部控制構件係控制該設備之操作,藉著控 制對於一或多個該可程式規劃特徵之存取,基於該可程式 規劃特徵與可程式規劃特徵致動時間週期之使用者選取。 2. 如申請專利範圍第1項之控制系統,其中,該設備係 手機。 3. 如申請專利範圍第2項之控制系統,其中,該可程式 31 200406656 規劃特徵包括:正常操作、定時操作、睡眠模式、延遲起 始與部分操作之群組的至少一者。 4. 如申請專利範圍第3項之控制系統,其中,該部分操 作包括:針對一預先程式規劃的時間週期,達成向外的通 話而且阻斷向內的通話。 5. 如申請專利範圍第3項之控制系統,其中,該部分操 作包括:針對一預先程式規劃的時間週期,接收向內的通 話而且阻斷向外的通話。 6. 如申請專利範圍第1項之控制系統,更包含:至少一 個輔助存取密碼,該輔助存取密碼係致使能夠存取至僅有 其爲由一使用者藉著該至少一個輔助存取密碼所輸入之該 至少一個可程式規劃特徵。 7. 如申請專利範圍第6項之控制系統,其中,該設備係 電視機(TV)。 8. 如申請專利範圍第7項之控制系統,其中,該至少一 個可程式規劃特徵之一者係其選取電台以觀視節目之電台 選取,且該至少一個可程式規劃特徵致動時間週期之一者 係該電台選取可觀視之時間。 9·如申請專利範圍第6項之控制系統,其中,該設備係 電腦。 10·如申請專利範圍第9項之控制系統,其中,該至少 一個可程式規劃特徵之一者係其爲允許以作存取的一特定 電腦程式之選取,且該至少一個可程式規劃特徵致動時間 週期之一者係該特定電腦程式可作致動之時間。 32 200406656 11·如申請專利範圍第1項之控制系統,其中,該設備 係數位相機。 12.如申g靑專利範圍第1項之控制系統,其中,該使用 者ID機構係可抽取自該設備。 13·如申請專利範圍第1項之控制系統,其中,該預定 使用者存取密碼、可程式規劃特徵選取構件、與可程式規 劃特徵致動時間週期係藉著一遠端構件而程式規劃於該電 子設備。 14·如申請專利範圍第1項之控制系統,其中,該預定 使用者存取密碼、可程式規劃特徵選取構件、與可程式規 劃特徵致動時間週期係藉著一可抽取式構件而程式規劃於 該電子設備。 15 ·如申g靑專利範圍第1項之控制系統,更包含:一^最 大操作時間,該最大操作時間係該電子設備可作致動之連 續時間週期的最大長度。 16.如申請專利範圍第13項之控制系統,其中,該最大 操作時間係非爲一使用者所可改變。 17·如申請專利範圍第1項之控制系統,其中,該讀出 面板係遠離該電子設備。 18·如申請專利範圍第1項之控制系統,更包含:一時 間延長模式,該時間延長模式係以一預先程式規劃的時間 週期而延長目前的程式規劃。 19· 一種使用鎖定系統以控制電子設備之運用的方法, ,包含步驟: 33 200406656 a. 致動該電子設備; b. 選取一致動模式; c. 輸入一使用者密碼; d. 選取至少一個可程式規劃特徵; e. 選取一可程式規劃特徵致動時間週期;及 f. 儲存該可程式規劃特徵與可程式規劃特徵致動時間週 期於該鎖定系統記憶體。 20. 如申請專利範圍第19項之方法,更包含步驟:重複 步驟c-f而直到所有意欲的可程式規劃特徵係選取。 21. 如申請專利範圍第19項之方法,更包含步驟:選取 其致能定時操作之可程式規劃特徵。 22. 如申請專利範圍第21項之方法,更包含步驟:藉著 時鐘設定而選出以設定該定時操作。 23. 如申請專利範圍第21項之方法,更包含步驟:基於 自一輸入的起始時間之操作時間的長度而選出以設定該定 時操作。 24. 如申請專利範圍第19項之方法,更包含步驟:選取 其致能睡眠模式之可程式規劃特徵。 25. 如申請專利範圍第24項之方法,更包含步驟:程式 規劃對於該睡眠模式之一起始時間與一結束時間。 26. 如申請專利範圍第25項之方法,更包含步驟:選取 其致能延遲起始模式之可程式規劃特徵。 27. 如申請專利範圍第26項之方法,更包含步驟:程式 規劃對於該延遲起始模式之一起始時間與一結束時間。 34 200406656 28. 如申請專利範圍第19項之方法,更包含步驟:選取 其致能部分操作模式之可程式規劃特徵。 29. 如申請專利範圍第28項之方法,更包含步驟:針對 一預定、可程式規劃的時間週期,選出以允許外出的通話 而且阻斷入內的通話。 30. 如申請專利範圍第28項之方法,更包含步驟:針對 一預定、可程式規劃的時間週期,選出以允許入內的通話 而且阻斷外出的通話。 31. —種操作控制系統,用於其具有一外殻、一電源、 與一內部特徵致動構件之設備,該控制系統具有: 至少一個主要存取密碼; 一可程式規劃特徵選取構件,該可程式規劃特徵選取 構件係致使至少一個可程式規劃特徵能夠由使用者所選取 ,該等可程式規劃特徵包括來自以下的群組之至少一者: 正常操作; 定時操作,該定時操作係操作該設備於由使用者設定 之一預定時間週期; 睡眠模式,該睡眠模式係防止該設備之操作於一使用 者選取的時間週期,且在該使用者選取的時間週期之期滿 時而返回操作; 延遲起始,該延遲起始係防止操作而直到一使用者送 出時間;與 部分操作,該部分操作係致使一使用者能夠選取該設 備的一或多個功能以供操作,而且選取該設備的一或多個 35 200406656 功能以供不操作, 至少一個可程式規劃特徵致動時間週期,該可程式規 / 劃特徵致動時間週期係由使用者所設定,針對該至少一個 可程式規劃特徵之各者; 一輸入裝置,該輸入裝置係允許該預定的使用者存取 密碼、該可程式規劃特徵選取、與該可程式規劃特徵致動 時間週期之輸入; 一讀出面板,該讀出面板係提供該操作控制系統之一 φ 狀態報告; 一內部控制構件,該控制構件係與該輸入裝置、該電 源、可程式規劃特徵致動時間週期、與可程式規劃特徵選 取構件爲直接連通; 其中,該內部控制構件係控制該設備之操作,藉著控 制對於一或多個該可程式規劃特徵之存取,基於該可程式 規劃特徵與可程式規劃特徵致動時間週期之使用者選取。 32.如申請專利範圍第31項之操作控制系統,更包含: φ 一電池電源,該電池電源之狀態係由該操作控制系統所監 視0 拾壹、圖式 如次頁 36200406656 Patent application scope 1. An operation control system for a device having a housing, a power source, and an internal feature actuating member, the control system has: at least one main user access code; Programmable feature selection component, the programmable feature selection component enables at least one programmable feature to be selected by the user, and at least one programmable feature activation time period. Set by the user, for each of the at least one programmable feature; an input device for setting the programmable feature selection and the programmable feature activation time period; a user identification (ID) mechanism to receive A predetermined user access password; a readout panel, which provides a status report of the operation control system; an internal control component, the control component is related to the input device, the power supply, and programmable features The dynamic time period is directly connected to the programmable components. The system control means controls the internal operation of the equipment, or by a plurality of control for the programming of the programmable features of the access plan based on the programmable features programmable user characteristics and planning the actuation time of the selected period. 2. For the control system of item 1 of the patent application scope, in which the device is a mobile phone. 3. For example, the control system of the second scope of the patent application, wherein the programmable features include at least one of normal operation, timing operation, sleep mode, delayed start and partial operation. 4. If the control system of the scope of patent application No. 3, the part of the operation includes: for a pre-programmed time period, to achieve an outbound call and block the inbound call. 5. For example, the control system of the scope of patent application No. 3, wherein the part of the operation includes: receiving a call inward and blocking an outgoing call for a pre-programmed time period. 6. If the control system of the scope of patent application item 1 further includes: at least one auxiliary access password, the auxiliary access password enables access to only the user by the at least one auxiliary access The at least one programmable feature entered in the password. 7. The control system of item 6 in the scope of patent application, wherein the device is a television. 8. If the control system according to item 7 of the patent application scope, wherein one of the at least one programmable feature is a station selected by the station to watch the program, and the at least one programmable feature is activated during the time period. One is when the station chooses to watch. 9. The control system according to item 6 of the patent application scope, wherein the device is a computer. 10. The control system according to item 9 of the scope of patent application, wherein one of the at least one programmable feature is a selection of a specific computer program that is permitted for access, and the at least one programmable feature is One of the activation time periods is the time during which the particular computer program can actuate. 32 200406656 11. The control system according to item 1 of the patent application scope, wherein the device is a camera. 12. The control system of claim 1 in the patent scope, wherein the user ID mechanism can be extracted from the device. 13. The control system according to item 1 of the scope of patent application, wherein the predetermined user access password, the programmable feature selection component, and the programmable feature activation time period are programmed by a remote component. The electronic device. 14. The control system according to item 1 of the scope of patent application, wherein the predetermined user access password, programmable feature selection component, and programmable feature activation time period are programmed by a removable component. To the electronic device. 15 · The control system of item 1 of the patent scope includes: a maximum operating time, which is the maximum length of the continuous time period during which the electronic device can be actuated. 16. The control system according to item 13 of the patent application scope, wherein the maximum operation time is not changeable by a user. 17. The control system according to item 1 of the patent application scope, wherein the readout panel is remote from the electronic device. 18. The control system of item 1 of the patent application scope further includes: a time extension mode, which extends the current program planning with a pre-programmed time period. 19. A method of using a locking system to control the use of an electronic device, comprising the steps: 33 200406656 a. Actuating the electronic device; b. Selecting a consistent mode; c. Entering a user password; d. Selecting at least one Program planning features; e. Selecting a programmable planning feature activation time period; and f. Storing the programmable planning feature and the programmable planning feature activation time period in the lock system memory. 20. The method of claim 19, further comprising the steps of repeating steps c-f until all desired programmable features are selected. 21. If the method of claim 19 of the scope of patent application, it further comprises the step of: selecting a programmable feature that enables timing operation. 22. The method of claim 21 in the scope of patent application further includes the step of selecting by clock setting to set the timing operation. 23. The method according to item 21 of the scope of patent application, further comprising the step of selecting based on the length of the operation time from an input starting time to set the timing operation. 24. The method of claim 19 in the scope of patent application further includes the step of selecting a programmable feature that enables the sleep mode. 25. If the method of claim 24 is applied, the method further includes the step of: programming a start time and an end time for the sleep mode. 26. If the method of the scope of application for patent No. 25, further includes the step of: selecting a programmable feature that enables the delayed start mode. 27. The method according to item 26 of the patent application, further comprising the step of: programming a start time and an end time for the delayed start mode. 34 200406656 28. If the method in the 19th scope of the patent application, the method further includes the step of selecting the programmable features that enable some of its operating modes. 29. The method according to item 28 of the scope of patent application, further comprising the steps of: for a predetermined, programmable time period, selecting to allow outgoing calls and block incoming calls. 30. The method according to item 28 of the scope of patent application, further comprising the step of selecting for a predetermined and programmable time period to allow incoming calls and block outgoing calls. 31. An operation control system for a device having a housing, a power source, and an internal feature actuating member, the control system having: at least one main access code; a programmable feature selection member, the The programmable planning feature selection component is such that at least one programmable planning feature can be selected by a user. The programmable planning features include at least one of the following groups: normal operation; timing operation, the timing operation is to operate the The device is at a predetermined time period set by the user; Sleep mode, which prevents the device from operating at a time period selected by the user and returns to operation when the time period selected by the user expires; Delayed start, which prevents operation until a user sends out time; and partial operation, which enables a user to select one or more functions of the device for operation, and select the device's One or more 35 200406656 functions for non-operation when at least one programmable feature is activated Cycle, the time period of the programmable programming / planning feature actuation is set by the user for each of the at least one programmable planning feature; an input device that allows the predetermined user to access the password, Selection of the programmable planning feature and input of the time period of actuation of the programmable planning feature; a readout panel that provides a φ status report of the operation control system; an internal control component, the control component system It is in direct communication with the input device, the power source, the programmable planning feature actuation time period, and the programmable planning feature selection component; wherein the internal control component controls the operation of the device, and controls one or more Access to the programmable features based on the programmable features and the user-selectable actuation time period. 32. The operation control system of item 31 in the scope of patent application, further includes: φ a battery power source, the state of the battery power source is monitored by the operation control system.
TW92103630A 2002-10-18 2003-02-21 Locking device for electronic equipment TWI240155B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/273,819 US20030043016A1 (en) 1998-10-26 2002-10-18 Locking device for electronic equipment
US10/339,711 US7394347B2 (en) 1997-10-27 2003-01-09 Locking device for electronic equipment

Publications (2)

Publication Number Publication Date
TW200406656A true TW200406656A (en) 2004-05-01
TWI240155B TWI240155B (en) 2005-09-21

Family

ID=37007676

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92103630A TWI240155B (en) 2002-10-18 2003-02-21 Locking device for electronic equipment

Country Status (1)

Country Link
TW (1) TWI240155B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI467352B (en) * 2012-05-16 2015-01-01 Oriental Inst Technology Intelligent comfort sleep system

Also Published As

Publication number Publication date
TWI240155B (en) 2005-09-21

Similar Documents

Publication Publication Date Title
US7394347B2 (en) Locking device for electronic equipment
US8289132B2 (en) Locking system for electronic equipment
ZA200503096B (en) Locking device for electronic equipment
US8963681B2 (en) Operating control system for electronic equipment
US11636721B2 (en) Access management and reporting technology
US20030179075A1 (en) Property access system
CA2306783C (en) Locking device for tools and equipment
US9196101B2 (en) Automated control system for multi-level authority to operate electronic and electrical devices
US6748536B1 (en) Key security system for vehicle-based information node
TWI336030B (en) Memory lock system
CN107251105A (en) Motor vehicle security protection and vehicle security system
CN102436568B (en) Computer external encryption device with storage function and encryption and decryption method utilizing same
EP1884109A1 (en) Remote storage of pictures and other data through a mobile telephone network
JP3597143B2 (en) Car lock management system
WO2004088070A1 (en) Device for giving information to vehicle, vehicle and method for giving information to vehicle
JP2004088339A (en) Identification code distribution system, identification code distribution method, and identification code distribution program
TW200406656A (en) Locking device for electronic equipment
WO2003021933A2 (en) Personal video recorder with secure recording, storage and playback control
CN1596018A (en) Method and apparatus for preventing mobile terminal from being illegally used
CN1641174A (en) Lock control system for electronic device and its anti theft method
KR101348196B1 (en) Computer security device linked with mobile phone
JP4144853B2 (en) Unlocking device and security system using the same
KR101331671B1 (en) Computer security and use control system linked to mobile phone and its method
JPH10334355A (en) Recording/reproducing device having robbery preventing function