TWI307843B - System and method for preventing an instance of stealing a portable computer - Google Patents

System and method for preventing an instance of stealing a portable computer Download PDF

Info

Publication number
TWI307843B
TWI307843B TW94140644A TW94140644A TWI307843B TW I307843 B TWI307843 B TW I307843B TW 94140644 A TW94140644 A TW 94140644A TW 94140644 A TW94140644 A TW 94140644A TW I307843 B TWI307843 B TW I307843B
Authority
TW
Taiwan
Prior art keywords
theft
portable computer
verification password
sensor
alarm
Prior art date
Application number
TW94140644A
Other languages
Chinese (zh)
Other versions
TW200720972A (en
Inventor
Chao-Dong Peng
Original Assignee
Hon Hai Prec Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Prec Ind Co Ltd filed Critical Hon Hai Prec Ind Co Ltd
Priority to TW94140644A priority Critical patent/TWI307843B/en
Publication of TW200720972A publication Critical patent/TW200720972A/en
Application granted granted Critical
Publication of TWI307843B publication Critical patent/TWI307843B/en

Links

Description

1307843 九、發明說明: 【發明所屬之技術領域】 本發明涉及-種電腦防盜系統及方 腦防盜系統及方法。 特別疋涉及一種攜可型電 【先前技術】 目前’爲了增加搞帶型電腦的安全係數 採用的方式是於攜帶型電腦上加裝防次 广页 ' 、吊 鎖是由_和τ型鎖頭組成,τ型鎖頭 :二孔^常= , ^ Kensmgt^^ ;==Γ:則繞在難以移動的物體上,讓盜竊者在不借助 強硬外力的情況下,無法移走鎖住的攜帶型電腦。 然而’於攜帶型電腦上加裝防盜裝置,需要佔用額外的空間,給 構可和使用帶來不便,同時,合声爲冰士成Ρ , 寻田延又外力破壞時,加裝的防盜裝置亦 難以產生防止攜π型電腦被盜竊的作用。 避免不%制地攜帶及有效地保賴㈣電腦,有助於避免搞帶 型4腦使用的繁瑣和使用者財産的損失。 【發明内容】 ' 容,有必要提供—種攜帶型電腦防盜系統及方法以便 於使用者攜π和使用,且能保護使用者自身的利益。 -旅山,统’該系統透過—中央處理器接收一感測 二型電腦防盜系統的防盜功能生效的標識信號後,透 =中央一器控制-報警裝置以發出防盜警報。該系統包括…設 =組’進行參_設定;—輸人/輸出·,祕保存設定的參 數,接收戎感測器發出的標識信號,及接收防盜驗證密碼;一判斷模 組’用於满是硕收顺·發出的有效錢,觸是否需要審查 ΐ用者設f的,盜驗證密碼,及满#前使用者輸人的密瑪是否正 報警ί置發m歸在接收職感黯糾的有贿號後引導該 5 進一步地’所述的參數設定包括設定該攜帶型電腦的防盜驗證密 碼,設定一觸發該感測器發出一有效信號的界定值,設定一鍵盤熱鍵 以開啓或關閉該攜帶型電腦的防盜功能,及設定該攜帶型電腦的報警 狀態。 一種搞帶型電腦防么方法’該方法透過一中央處理器接收一感測 器發出的讓防盜功能生效的標識信號後,透過該中央處理器控制一報 警裝置以發出防盜警報’該方法包括如下步驟:(a)進行參數的設定 及保存;(b)等待接收該感測器發出的有效信號;(c)若接收到該感 測器發出的有效信號,則引導該報警裝置發出警報;(d)對該攜帶型 電腦的防盜驗證密碼進行驗證。 進一步地,所述的進行今數的設定及保'各的步驟包括··(al)設定 該攜帶型電腦的防盜驗證密碼,及設定一觸發該感測器發出一有效信 號的界定值;U2)設定一鍵盤熱鍵以開啓或關閉該攜帶型電腦的防盜 功能;(a3)設定该攜帶型電腦的報警狀態,並保存設定的參數。 進一步地,所述的對該攜帶型電腦的防盜驗證密碼進行驗證的步 驟包括:(dl)判斷是否需要審查該攜帶型電腦的防盜驗證密碼;⑽) 若需要審查該攜帶墊電腦的防盜驗證密碼,則鎖住鍵盤熱鍵及滑鼠, 且接收輸人的1¾•盜驗、碼;㈤)若接㈣防盜驗證密碼與設定的防 盜驗證密瑪相匹配,則解除與報雜置的引導_,且對鎖住的鍵盤 熱鍵及滑鼠進行解鎖。 相較習知技術,所述的齡型電腦防盜祕及方法,充分考量了 .攜帶型電誠帶的便利性及使㈣安全性,避免了麟型電腦使用的 繁瑣和使用者財産的損失。 【實施方式】 參閱第-®所示’縣發賴帶型電腦防盜魏較佳實施方式的 硬體架構圖。該攜帶«腦防盜系統10是運行於一攜帶型電腦i中, 於該攜帶型電腦1中,該攜帶型電腦防盜系統1G與-CPU (Central ^央處理器)12相連,且該CPU12亦與—震動感測 益 S丨6相連。該攜帶型電腦防盜系統10透過該CPU 12 1307843 =震動感測器14發出的讓該攜帶型電腦防盜系統ι〇的防盜功能 ^的標識信號,且在該咖12接收到該震動感測器Μ發出標識信 篮攜帶型電腦防盜系,统1〇透過該CPU 12控制該報警裝置16以 j崔《二報。本實補中’所述的攜帶型電腦1可以是任意適合的易於 備,例如:筆記型電腦及平板型電腦等。所述的震動感 以讀意適合的感應裝置,例如:壓力感測11或加速度感測 It述的報警裝置16可以是發聲魏警11'發光龍警器及聲光 •,.°s尘報警器,該聲光結合型報警器既可以發聲,亦可以發光。1307843 IX. Description of the Invention: [Technical Field of the Invention] The present invention relates to a computer theft prevention system and a square anti-theft system and method. In particular, it involves a type of portable power. [Prior Art] At present, the method used to increase the safety factor of the built-in computer is to install a multi-page anti-page on the portable computer. The lock is made of _ and τ type locks. Composition, τ-type lock: two holes ^ often = , ^ Kensmgt ^ ^ ; == Γ: then around the difficult to move the object, so that the thief can not remove the locked carry without the use of strong external force Computer. However, adding an anti-theft device to a portable computer requires additional space, which is inconvenient for the structure and use. At the same time, the sound is added to the ice, and when the field is damaged and the external force is destroyed, the anti-theft device is installed. It is also difficult to prevent theft of a π-type computer. Avoid carrying and effectively protecting the computer (4), which helps to avoid the cumbersome use of the brain and the loss of user property. SUMMARY OF THE INVENTION It is necessary to provide a portable computer anti-theft system and method for the user to carry π and use, and to protect the user's own interests. - The system of the mountain, through the central processing unit, receives a signal indicating that the anti-theft function of the second type of computer anti-theft system is effective, and then transmits a burglar alarm. The system includes: set = group 'to carry out _ setting; - input / output ·, secret save set parameters, receive the identification signal sent by the sensor, and receive the anti-theft verification password; a judgment module 'for full It is the effective money issued by Shuo Shushun. If you need to review the user's settings, the password is stolen, and the password of the user who lost the user before ## is alarming. After the bribe is followed, the parameter setting includes: setting the anti-theft verification password of the portable computer, setting a defined value that triggers the sensor to send a valid signal, setting a keyboard hot key to open or Turn off the anti-theft function of the portable computer and set the alarm status of the portable computer. A method for preventing the use of a type of computer. The method receives an identification signal issued by a sensor for the anti-theft function to be activated by a central processing unit, and then controls an alarm device to issue an anti-theft alarm through the central processor. The method includes the following Steps: (a) setting and saving parameters; (b) waiting to receive a valid signal from the sensor; (c) if receiving a valid signal from the sensor, directing the alarm device to issue an alarm; d) Verify the anti-theft verification password of the portable computer. Further, the step of setting and maintaining the current number includes: (al) setting an anti-theft verification password of the portable computer, and setting a defined value that triggers the sensor to send a valid signal; U2 Setting a keyboard hotkey to turn on or off the anti-theft function of the portable computer; (a3) setting the alarm state of the portable computer and saving the set parameters. Further, the step of verifying the anti-theft verification password of the portable computer includes: (dl) determining whether it is necessary to review the anti-theft verification password of the portable computer; (10)) if it is necessary to review the anti-theft verification password of the portable pad computer , then lock the keyboard hotkey and mouse, and receive the input of the 13⁄4 • piracy, code; (5)) If the (four) anti-theft verification password and the set of anti-theft verification Mi Ma match, then release and report the miscellaneous _ And unlock the locked keyboard hotkey and mouse. Compared with the prior art, the age-type computer anti-theft secret method and the method are fully considered. The convenience of the portable electric belt and the safety of (4) avoid the cumbersome use of the lining computer and the loss of the user property. [Embodiment] Refer to the hardware architecture diagram of the preferred embodiment of the 'Decoration of the County'. The portable brain anti-theft system 10 is operated in a portable computer i. In the portable computer 1, the portable computer anti-theft system 1G is connected to a CPU (Central CPU) 12, and the CPU 12 is also associated with - The vibration sense is connected to the S丨6. The portable computer anti-theft system 10 transmits the identification signal sent by the vibration sensor 14 to the anti-theft function of the portable computer anti-theft system through the CPU 12 1307843, and the vibration sensor is received at the coffee machine Μ The identification letter basket carrying type computer anti-theft system is issued, and the alarm device 16 is controlled by the CPU 12 to refer to the second report. The portable computer 1 described in the present invention can be any suitable and easy to prepare, for example, a notebook computer and a tablet computer. The vibration sense is read by a suitable sensing device, for example, the pressure sensing 11 or the acceleration sensing device described in the alarm device 16 may be an audible alarm 12' illuminating dragon alarm and sound and light •, .°s dust alarm The sound and light combined type alarm can emit sound or emit light.

f閱第二_示,係、本發明攜帶型電·盜系贿佳^施方式的 功此杈組圖。該攜帶型電腦防盜系統1Q包籍 輸出模組102、一判_且104及一執行模組106。、、. 00輸入/f read the second _ shows, the system of the present invention, the type of electric and pirate bribery. The portable computer anti-theft system 1Q package output module 102, a judgment_and 104 and an execution module 106. ,,. 00 input /

一該設定模組100,用於設定該揭帶型電腦i的防盜驗證密碼,設定 一觸發震_測|| 14發出-有效信號的界定值,設定_鍵盤續(例 如:“Esc”鍵)以開啓或關閉該攜帶型電腦}的防盜功能,及 =型電腦1的報警狀態,即設定報警裝置16的連接導通狀態或關閉 所相界定值是界定震誠· 14是否發出—有效信號的特定 、、大小並不固定,例如:當所應用的震動感測器14是將感應到的 類比值轉化成電壓值時,可賴界紐設爲㈣伏特,界定值設定的 大小’決定著該攜帶型f腦防盜系統丨㈣$敏度,但#設定的界定值 ,小時,使用者正常使用時亦容易觸發該攜帶型電腦防盜系統1〇的防 盜功能’給用戶帶來不便;當設定的界定值過大時,絲者亦不易觸 亥攜帶型電麟爲統1G的防盜魏,給用戶帶來損失。所述的防 盜驗證密碼的設定,既可以驗證當前使用者的身份,亦可以在該攜帶 型電腦1被盜取後,防止重要資料的洩密,即作爲—種救濟措施。 該輸入/輸出模組102 ’用於保存設定的參數,輸入使用者記住的 防盜驗證密碼’ _該攜帶型電腦丨的擁有者的基本資訊及接收震動 感測器14發dj的有效信號。所述的擁有者的基本資訊是財者在該摞 帶型電腦1中保存的自身的有效資tfl (例如:姓名、性別 '年齡及身 向等)。所述的輸入使用者記住的防盜驗證密碼可以是運用vis似1匸++ 7 1307843 6見〇對妨塊m迴圈程式方法或運㈣統鉤子⑽〇k)的方法來實 該判斷模組104,用於判斷是否接收到震動感測器14發出的有效 '· 信號,__是^需要«使用者設定的防盜驗證密碼,及_當前使 用者輪入的密碼是否正確。所述的有效信號是震動感測器Μ根據設定 =界定值對感應到的類比值進行自處理後,發出的讓_帶型電腦防 盜系統10的防盜功能生效的標識信號。 魏行模組106 ’用於在輸入/輸出模組1〇2接收到震動感測器14 發出的有效信號後引導報警裝置16發出警報,鎖住鍵盤熱鍵及滑鼠, φ 及在使用者輸入的密碼與設定的防盜驗證#碼相匹配後解除報警裝置 16發出的警報,並對鎖住的鍵盤熱鍵及滑鼠進行解鎖。所述的鍵盤執 鍵不包括鍵盤上的“字母鍵”、“數位鍵,,及“Emer鍵”。孤… 對運用該攜帶型電腦防盜系統1〇以防止一越權人盜竊該攜帶型電 腦1的步驟,進行如下闡述。 首先,使用者透過設定模組1〇〇和輸入/輸出模組1〇2對該攜帶型 電腦1的防盜功能參數進行設定。 間 接著’當使用者按下令該攜帶型電腦丨的防盜功能開啓的熱鍵且 於報警裝置16處於連接導通狀態時,令輸入/輸出模組1()2等待接收震 動感測g 14發出的有效信號’且在輸輸出模组1〇2接收到震動感測 馨 H U發出的有效信號時’令執行模組1〇6引導報警裝置16發出警報。 之後,進行防盜驗證密碼的審查,具體而言,令判斷模組判 斷疋否而要審查使用者設定的防盜驗證密碼,即彈出一驗證密碼的對 話方塊以接受制者的選擇,及在者選擇審查防錄證密媽,且 執行模組106鎖住鍵盤熱鍵及滑鼠後,判斷模組1〇4判斷輸入/輸出模 组102接收的密碼與預先設定的防盜驗證密碼是否相匹配,在輸入/輸 出模組102接收的密碼與預先設定的防盜驗證密碼相匹配時,執行模 組106解除報警裝置16發出的警報’並對鎖住的鍵餘鍵及滑鼠進行 解鎖。 參閱第三®所示’係本發簡㈣電贿盜功能啓用前的參數設 8 1307843 定流紅圖。首先,使用者透過設定模組100設定該攜帶型電腦1的防 盗驗證密碼’設定一觸發震動感測器14發出一有效信號的界定值(步 驟S20 >然後’使用者透過設定模組100設定一鍵盤熱鍵(例如:“Esc” 鍵)以開啓或關閉該攜帶型電腦丨的防盜功能,於該步驟中,使用者 可以根據環境的安全性選擇是否啓用攜帶型電腦1的防盜功能,例如: 使用者在公共場合’且需要離開帶型電腦卜個較長的距離(例 如_· 20 f ),该使用者離開時只需按下該設定的鍵盤熱鍵就能便捷的啓 用該攜π型電腦1的防盜功能,該鍵盤熱鍵是使用者根據個人喜好來 f擇的般使帛者會選擇—個不常使㈣鍵盤熱鍵崎免誤操作或 …鍵衝大(步驟S22)。之後,使用者透過敌定模組觸設定報警裝置 :6的連,導通狀恕或關閉狀態,且輸入/輸出模組保存設定的參 鮮驟’使用者可以根據自己的實際需要來選擇是否需要報 ^ 發出警報’例如:t制者f 帶_帶型制1乘坐交 ^ 例如.公父汽車)時,如果使用者將報馨裝置16役定爲遠接 導通狀態,則該攜糾心”力⑼心 我置°又疋爲連接 具體ΐ=:所;先:腦防盜方法較佳實施方式的 Γ的卩_能參缝行設纽按下設定_熱鍵 效伸了牛二=輸出她102等待接收震動感測器14發出的有 =^ 細組1G4雜^料‘ 到該震動L 14發出的有效信號(步 =操收 脱已接收到該震動感測器14發出的 )模組 1此時有被絲的危險,爲了鏡 ;^職明_,型電腦 於連接導舰態,職報特置 二驟_ ’右報钱置I6處 報右報警4置16處於關閉狀態,則該報 ^貧發出警 引導時就不會發出警報(步驟S3〇)。 ^置16被執行模组106 爲了防止該攜帶型電腦丨被盜竊後,触於該攜帶型電腦工中的 9The setting module 100 is configured to set the anti-theft verification password of the strip-type computer i, set a trigger-signal_test||14-issued value of the valid signal, and set the keyboard to continue (for example, "Esc" key) In order to turn on or off the anti-theft function of the portable computer, and the alarm state of the computer 1, that is, to set the connection state of the alarm device 16 or to turn off the defined value is to define whether the Zhencheng 14 is issued - a valid signal specific The size is not fixed. For example, when the applied vibration sensor 14 converts the sensed analog value into a voltage value, the threshold can be set to (four) volts, and the size set by the defined value determines the carrying Type f brain anti-theft system 四 (4) $min, but the set value of #, hour, the user can easily trigger the anti-theft function of the portable computer anti-theft system when the user is in normal use. 'Inconvenience to the user; when the setting is defined When the value is too large, it is not easy for the silk to carry the type of electric cymbal as the anti-theft of the 1G, which will bring losses to the user. The anti-theft verification password can be used to verify the identity of the current user, and can prevent the leakage of important data after the portable computer 1 is stolen, that is, as a relief measure. The input/output module 102' is used to store the set parameters, input the anti-theft verification password remembered by the user, the basic information of the owner of the portable computer, and the effective signal of the dj received by the vibration sensor 14. The basic information of the owner is the self-paying tfl (for example, name, gender 'age and orientation, etc.) that the rich person saves in the portable computer 1. The anti-theft verification password remembered by the input user may be a method using vis like 1匸++ 7 1307843 6 see 〇 m m 回 程式 或 或 or ( (4) 钩 ( (10) 〇 k) The group 104 is configured to determine whether a valid '· signal sent by the vibration sensor 14 is received, __ is a user-set anti-theft verification password, and _ the current user-entered password is correct. The effective signal is an identification signal sent by the vibration sensor 自 after the self-processing of the sensed analog value according to the setting = defined value, and the anti-theft function of the _ band type computer anti-theft system 10 is activated. The Wei line module 106' is used to guide the alarm device 16 to issue an alarm after the input/output module 1〇2 receives the valid signal from the vibration sensor 14, lock the keyboard hotkey and the mouse, φ and input by the user. After the password is matched with the set anti-theft verification # code, the alarm issued by the alarm device 16 is released, and the locked keyboard hotkey and the mouse are unlocked. The keyboard key does not include the "letter key", "digital key", and "Emer key" on the keyboard. Orphan ... to use the portable computer security system 1〇 to prevent an unauthorized person from stealing the portable computer 1 The steps are as follows: First, the user sets the anti-theft function parameters of the portable computer 1 through the setting module 1〇〇 and the input/output module 1〇2. The hotkey of the anti-theft function of the computer is turned on, and when the alarm device 16 is in the connected conduction state, the input/output module 1()2 waits to receive the valid signal from the vibration sensing g14' and is in the output module 1 When receiving the valid signal from the vibration sensing sensible HU, the 执行2 causes the execution module 1〇6 to direct the alarm device 16 to issue an alarm. Thereafter, the tamper verification password is checked, specifically, the determination module determines whether or not To review the anti-theft verification password set by the user, a dialog box for verifying the password is popped up to accept the maker's selection, and the person chooses to review the anti-recording certificate, and the execution module 106 locks the keyboard hotkey and slides. After the mouse, the determination module 1〇4 determines whether the password received by the input/output module 102 matches the preset anti-theft verification password, and when the password received by the input/output module 102 matches the preset anti-theft verification password. The execution module 106 cancels the alarm issued by the alarm device 16 and unlocks the locked key button and the mouse. Refer to the third® shown in the section '4'. The parameter before the activation of the electric bribery function is set to 8 1307843 First, the user sets the anti-theft verification password of the portable computer 1 through the setting module 100 to set a triggering vibration sensor 14 to issue a defined value of a valid signal (step S20 > then 'user through The setting module 100 sets a keyboard hot key (for example, "Esc" key) to turn on or off the anti-theft function of the portable computer. In this step, the user can select whether to enable the portable computer according to the security of the environment. Anti-theft function, for example: the user is in public 'and needs to leave the computer for a long distance (eg _· 20 f ), the user only needs to press the setting when leaving The hotkey can easily enable the anti-theft function of the π-type computer 1. The hotkey of the keyboard is selected by the user according to personal preference, so that the user will select one (four) keyboard hotkey and avoid misoperation. Or... the key is large (step S22). After that, the user touches the setting of the alarm device through the enemy module: 6 connected, turned on or off, and the input/output module saves the set parameter According to your actual needs, you can choose whether you need to report the alarm. For example: t system f belt _ belt type system 1 ride intersection ^ for example, male father car, if the user will report the vengeful device 16 as far Connected to the conduction state, then the burden of reluctance (9) heart I set ° and then connected to the specific ΐ =:; first: the brain anti-theft method is better than the 实施 能 能 参 参 设 设 设 设 设 按下 按下 按下 按下 按下 按下 按下 按下 按下The hot key effect extends the cow two = output her 102 waiting to receive the vibration sensor 14 issued = ^ fine group 1G4 miscellaneous material 'to the vibration L 14 issued a valid signal (step = the operation has received the vibration The module 1 emitted by the sensor 14 has a danger of being sifted at the time, for the mirror; The computer is connected to the navigation state, and the service report is specially set to two times _ 'Right report to the I6 to report the right alarm 4 to 16 is in the closed state, then the alarm will not be issued when the police report is sent (step S3〇) . The set 16 is executed by the module 106. In order to prevent the portable computer from being stolen, it is touched by the portable computer.

在步驟S32中,若不需要審查該攜帶型 則轉入執行步驟S30。 1307843 重要資料的丢失或演密,於下面步驟S32、步驟S34、步驟伽 S38及步驟S40情該攜帶型電腦}的防盜驗證密碼進行驗證,具體而 言’判斷模組104判斷是否需要審查該攜帶型電滕i的防盜驗證密碼, 即弹出-驗證密碼的對話方塊以接受使用者的選擇(步驟如)。若 =查型如的防盜驗證密碼,即使用者選擇審查防盜驗證 馬貝J執订拉,、且106鎖住鍵盤熱鍵及滑鼠,輸入/輸出模会且1〇2彈出 -密碼輸入框以接收使用者輸入的密瑪(步驟_。判斷模組腦 斷輸入的防盜驗證密礙否正確,即判斷輸人的防盜驗證密碼盘設定 的防盜驗證密碼是否相匹配(步驟S36)。若輸入的防盜驗證密碼正確, =解Ϊ與報警裝置16㈣_,並對鎖住_熱鍵 及滑進彳丁解鎖(步驟S38 )。 在步驟S28巾,右該輸入/輸出模組1〇2沒有接 Μ發出的有效«,職_攜帶型電腦丨還沒有超出賴帶^電^ 1的合去擁有者設定的安全範圍,轉入執行步驟幻6。 電腦1的防盜驗證密碼, 在ν驟S36申,若輸入的]5方盜驗證密碼不正確,則該執行模袓1〇6 與報警裝置16㈣導_不會被解除,住的鍵他鍵和滑鼠亦不 會被解除鎖定’同時輸入/輸出模組脱於顯示屏幕上顯示該擴帶型電 腦1的擁有者的基本資訊(步驟S4〇)。 本發明攜帶型電腦防盜系統及方法,雖以較佳實施方式揭露如 上,然其並義錄定本發明,何熟悉此項技藝之人士,在不脫離 本發明之精神和範圍内,當可做更動朗飾,@此本發明之保護範圍 t視後附之申請專利範圍所界定者為準。 【圖式簡單說明】 第一圖係本發明攜帶型電腦防盜系統較佳實施方式的硬體架構 第二圖係本發明攜帶型電職鮮、統難實财式的功能模組 10 1307843 第三圖係本發明攜帶型電腦防盜功能啓用前的參數設定流程圖。 第四圖係本發明攜帶型電腦防盜方法較佳實施方式的具體實施流 程圖。 【主要元件符號說明】 攜帶型電腦 1 攜帶型電腦防盜系統 10 中央處理器 12 震動感測器 14 報警裝置 16 設定模組 ' 100 輸入/輸出模組 102 判斷模組 104 執行模組 106 11In step S32, if it is not necessary to review the portable type, the process proceeds to step S30. 1307843 The loss or the decryption of the important data is verified by the anti-theft verification password of the portable computer} in the following steps S32, S34, step S38 and step S40. Specifically, the determination module 104 determines whether the carrier needs to be reviewed. The anti-theft verification password of the type of electricity, that is, the dialog box of the pop-up verification password to accept the user's selection (steps). If the type of anti-theft verification password is checked, that is, the user chooses to review the anti-theft verification Mabe J to pull, and 106 locks the keyboard hotkey and mouse, the input/output mode will be 1〇2 pop-up password input box In order to receive the user's input MU (step _. Determine whether the tamper-proof verification of the brain-breaking input of the module is correct, that is, whether the anti-theft verification password set by the intrusion verification password disk of the input is matched (step S36). The anti-theft verification password is correct, = unlocking and alarming device 16 (4) _, and unlocking the _ hotkey and sliding into the shackle (step S38). In step S28, the right input/output module 1〇2 is not connected. The effective «, _ carry-on computer 丨 has not exceeded the security range set by the owner of the ^ ^ ^ ^ ^ ^, and transferred to the execution step illusion 6. The password of the anti-theft verification of the computer 1, in the S36, If the entered 5 pirate verification password is incorrect, the execution module 1 〇 6 and the alarm device 16 (4) _ will not be released, and the live key and the mouse will not be unlocked 'simultaneous input/output The module is off the display screen to display the expansion type computer 1 Basic information of the person (step S4〇). The portable computer anti-theft system and method of the present invention, although disclosed in the preferred embodiment, is the same as the above, and the person who is familiar with the art does not deviate from the present invention. In the spirit and scope of the invention, the scope of protection of the present invention is defined by the scope of the patent application appended hereto. [Simplified description of the drawings] The first figure is a portable computer of the present invention. The second embodiment of the hardware structure of the preferred embodiment of the present invention is a portable module of the present invention. The third embodiment is a parameter setting process before the activation of the portable computer anti-theft function of the present invention. The fourth figure is a flow chart of a specific implementation of the preferred embodiment of the portable computer anti-theft method of the present invention. [Main component symbol description] Portable computer 1 Portable computer anti-theft system 10 Central processing unit 12 Vibration sensor 14 Alarm device 16 Setting Module '100 Input/Output Module 102 Judging Module 104 Executing Module 106 11

Claims (1)

1307843 峨霁).- 太 十、申請專利範圍: 發出型電腦防盜系統,其透過—中央處理器接收一感測器 該攜㈣魏防録_防盜功能纽的標識信號後,透過 該中控制-報警震置發出防錢報,該系統包括: '目卜。找又疋模且用於進行參數的設定,設定的參數包括一觸發該感 測益發出一有效信號的界定值; 輸人/輸出換組’用於保存設定的參數,接收該感測器發出的標 識饧號,及接收防盜驗證密碼; 判斷模組’用於判斷是否接收到感測器發出的有效信號,判斷 要審查使用者設定的|5方盜驗證密碼 ,及判斷當前使用者輸入的 费碼是否正確;及 執订模組’用於在接收到該感測器 效信號後引導練 警裝置發出警報。 2. 如巾晴專概圍第〗項所述的攜帶型電腦防盜系統,其中該參 ^定包括:設定該攜帶型電腦的防盜驗證密碼,設定—鍵盤熱鍵以 :或關閉該攜帶型電腦的防盜功能,及設定該 的連接 狀態或關閉狀態。 3. 如申明專利細第i撕述賴帶型電腦防盜祕,其中該輸 入/輸出模組亦用於顯示該攜帶型_的擁有者的基本資訊。 > 4.如中明專利範圍第2項所述的攜帶型電腦防盜系統,其中該執 订模組亦用於鎖住鍵盤熱鍵及滑鼠,解除與該報警裝置的引導關係, 及對鎖住的鍵盤熱鍵及滑鼠進行解鎖。 5.-種攜帶型電腦防盜方法,其透過—中央處理器接收—感測器 發出的防盜功能生效的標識信號後,透過該中央處理器控制一報警裝 置發出防盜警報’該方法包括如下步驟: 進行參數的設定及保存,設定的參數包括—觸發該制器發 有效信號的界定值; 荨待接收該感測器發出的有效信號; 若接收到該感測器發&的有效信號,㈣丨導該報警裝置發出擎 12 1307843 報;及 對該攜帶型電腦的防盜驗證密碼進行驗證。 —6·如巾4專利棚第5項所述的攜帶型電腦防盜方法,其中該進 行參數设定及保存的步驟包括: 設定該攜帶型電腦的防盜驗證密碼; 設定-鍵盤熱鍵以開啓或關閉該攜帶型電腦的防盜功能;及 設定該報警裝置的連接導通狀態或關狀態,並保存設定的參數。 7. 如申晴專利細第6項所述的鮮型電腦防盜方法,其中該對 該攜帶型電腦的防盜驗證密碼進行驗證的步驟包括: 、 判斷是否需要審查該攜帶型電腦的防盜驗證密碼; 右需要審查該攜帶型電腦的防盜驗證密碼,觸住鍵盤熱鍵及滑 鼠’且接收輸入的防盜驗證密碼;及 若接收的防盜驗證密碼與設定的防盜驗證密碼相匹配,則解除與 報警裝置的引導隱,且對鎖住的鍵盤熱鍵及滑鼠進行解鎖。 8. 如申請專利範圍第7項所述的攜帶型電麻盜方法,其中若接 收的防盜驗證密碼與設定的防盜驗證密碼不匹配,則不解除與報警裝 置的引導關係,且不解除鍵盤熱鍵和滑鼠的鎖定,同時於顯示屏幕上 顯示該攜帶型電腦的擁有者的基本資訊。 9. 如申請專利範圍第7項所述的攜帶型電腦防盜方法,其中若判 斷是否需要審查該攜帶型電腦的防盜驗證密碼的結果爲否,則轉入引 導該報警裝置發出警報的步驟。 10. 如申請專利範圍第5項所述的攜帶型電腦防盜方法,其中該方 法還包括步驟:若沒有接收到該感測器發出的有效信號,則轉入等待 接收該感測器發出的有效信號的步驟。 131307843 峨霁).-Ten 10, the scope of application for patents: issued computer anti-theft system, through the central processor to receive a sensor to carry (four) Wei anti-recording _ anti-theft function New Zealand identification signal, through the control - The alarm is shocked and an anti-money report is issued. The system includes: 'The target. Finding a model and using for parameter setting, the set parameter includes a defined value that triggers the sensed benefit to issue a valid signal; the input/output swap group is used to save the set parameter, and the receiving sensor sends out The identification nickname, and receiving the anti-theft verification password; the judging module 'is used to determine whether a valid signal sent by the sensor is received, judging to review the |5 thief verification password set by the user, and judging the current user input Whether the fee code is correct; and the binding module 'is used to guide the training device to issue an alarm after receiving the sensor effect signal. 2. The portable computer anti-theft system as described in the item of the general term, which includes: setting the anti-theft verification password of the portable computer, setting the keyboard hot key to: or turning off the portable computer Anti-theft function, and set the connection status or shutdown status. 3. If the patent is stipulated, the input/output module is also used to display the basic information of the owner of the portable type. < 4. The portable computer anti-theft system according to the second aspect of the invention, wherein the binding module is also used for locking the keyboard hotkey and the mouse, releasing the guiding relationship with the alarm device, and The locked keyboard hotkey and mouse are unlocked. 5. A portable computer anti-theft method, which receives an identification signal of an anti-theft function issued by a sensor through a central processor, and then controls an alarm device to issue an anti-theft alarm through the central processor. The method comprises the following steps: Parameter setting and saving, the set parameters include: triggering the defined value of the valid signal generated by the controller; waiting for receiving the valid signal sent by the sensor; if receiving the valid signal of the sensor and (4) The alarm device sends out the engine 12 1307843 report; and verifies the anti-theft verification password of the portable computer. -6. The portable computer anti-theft method according to item 5 of the towel 4 patent shed, wherein the step of setting and saving the parameter comprises: setting an anti-theft verification password of the portable computer; setting a keyboard hot key to open or Turn off the anti-theft function of the portable computer; and set the connection conduction state or off state of the alarm device, and save the set parameters. 7. The fresh computer anti-theft method according to the sixth item of Shen Qing Patent, wherein the step of verifying the anti-theft verification password of the portable computer comprises: determining whether it is necessary to review the anti-theft verification password of the portable computer; Right, you need to review the anti-theft verification password of the portable computer, touch the keyboard hotkey and the mouse' and receive the input anti-theft verification password; and if the received anti-theft verification password matches the set anti-theft verification password, the release and alarm device The guidance is hidden, and the locked keyboard hotkey and mouse are unlocked. 8. The portable electric cyber hacking method according to claim 7, wherein if the received anti-theft verification password does not match the set anti-theft verification password, the guiding relationship with the alarm device is not released, and the keyboard heat is not released. The key and the mouse are locked, and the basic information of the owner of the portable computer is displayed on the display screen. 9. The portable computer anti-theft method according to claim 7, wherein if it is determined whether the result of reviewing the anti-theft verification password of the portable computer is negative, the step of guiding the alarm device to issue an alarm is transferred. 10. The portable computer anti-theft method according to claim 5, wherein the method further comprises the step of: if the valid signal from the sensor is not received, then waiting to receive the valid signal from the sensor. The steps of the signal. 13
TW94140644A 2005-11-18 2005-11-18 System and method for preventing an instance of stealing a portable computer TWI307843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94140644A TWI307843B (en) 2005-11-18 2005-11-18 System and method for preventing an instance of stealing a portable computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94140644A TWI307843B (en) 2005-11-18 2005-11-18 System and method for preventing an instance of stealing a portable computer

Publications (2)

Publication Number Publication Date
TW200720972A TW200720972A (en) 2007-06-01
TWI307843B true TWI307843B (en) 2009-03-21

Family

ID=45071680

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94140644A TWI307843B (en) 2005-11-18 2005-11-18 System and method for preventing an instance of stealing a portable computer

Country Status (1)

Country Link
TW (1) TWI307843B (en)

Also Published As

Publication number Publication date
TW200720972A (en) 2007-06-01

Similar Documents

Publication Publication Date Title
CN105378741B (en) Continuous number content protecting
US7882361B2 (en) Method and system for accepting a pass code
US8634808B1 (en) Mobile device loss prevention
US20070030257A1 (en) Locking digital pen
KR100665641B1 (en) Personal authentication apparatus and personal authentication method
JP4656458B1 (en) Handy terminal and payment method by handy terminal
WO2003048907A2 (en) Protection device for portable computers
TW200919196A (en) Memory protection for embedded controllers
CN107533624B (en) Detecting and preventing illegal use of devices
TW200949542A (en) Computer system, method for data protection in a computer system and machine readable medium
JP4931543B2 (en) Information device and computer program
US20190228189A1 (en) Anti-theft device
TW200915183A (en) Portable USB device that boots a computer as a server with security measure
US7085933B2 (en) Computer system apparatus and method for improved assurance of authentication
JP2000155876A (en) Burglarproof device
TWI307843B (en) System and method for preventing an instance of stealing a portable computer
US10409974B2 (en) Technologies for authorizing a user to a protected system
TWI296780B (en) Hard disk apparatus with a biometrics sensor and method of protecting data therein
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal
JP2007172294A (en) Information processor with user authentication function
US20070113277A1 (en) Computer data security method, system and computer utilized thereof
JP2008171161A (en) Computer system
JP5847531B2 (en) Management storage device for portable storage media
JP2003327055A (en) Portable information terminal, on-vehicle equipment and antitheft method and program for on-vehicle equipment
JP2010237940A (en) Personal identification device, personal identification method, program, and recording medium

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees