TWI727522B - Electronic device and locking method thereof - Google Patents
Electronic device and locking method thereof Download PDFInfo
- Publication number
- TWI727522B TWI727522B TW108143518A TW108143518A TWI727522B TW I727522 B TWI727522 B TW I727522B TW 108143518 A TW108143518 A TW 108143518A TW 108143518 A TW108143518 A TW 108143518A TW I727522 B TWI727522 B TW I727522B
- Authority
- TW
- Taiwan
- Prior art keywords
- wireless
- receiver
- transmitter
- electronic device
- distance
- Prior art date
Links
Images
Abstract
Description
本發明是有關於一種裝置與方法,且特別是有關於一種電子裝置及其上鎖方法。The present invention relates to a device and method, and more particularly to an electronic device and a locking method thereof.
現有市售電子產品如筆記型電腦,提供使用者透過手機或智能手環等裝置進行配對,讓其靠近筆記型電腦後自動登入解鎖。由於筆記型電腦較屬於個人隱私產品,因此以解鎖功能來說,仍偏向使用者於個人電腦面前後再進行解鎖功能。Existing commercially available electronic products, such as laptops, provide users with pairing through devices such as mobile phones or smart bracelets, allowing them to automatically log in and unlock when they are close to the laptop. Since notebook computers are more personal privacy products, in terms of unlocking function, it is still preferred for users to unlock the function after they are in front of the personal computer.
而以現有安全上鎖機制來說,僅有讓使用者設定待機時間來達到螢幕鎖屏的功能,卻沒有讓使用者能透過遠離電腦的距離設定鎖屏時機,造成使用者在離開電腦後到螢幕自動鎖屏之間,有個人隱私資訊容易曝露而無被保護的風險,是目前筆記型電腦普遍存在的痛點。With the existing security lock mechanism, it only allows the user to set the standby time to achieve the screen lock function, but does not allow the user to set the lock screen timing by a distance away from the computer, causing the user to arrive after leaving the computer. When the screen is automatically locked, there is a risk that personal privacy information is easily exposed without being protected, which is a common pain point in current notebook computers.
本發明提出一種電子裝置及其上鎖方法,改善先前技術的問題。The present invention provides an electronic device and a locking method thereof to improve the problems of the prior art.
在本發明的一實施例中,本發明所提出的電子裝置,其包含無線接收器以及處理器,處理器電性連接無線接收器。無線接收器與無線發射器建立無線通訊,當無線發射器與無線接收器之間的距離超出無線通訊的有效範圍時,處理器執行安全上鎖程序。In an embodiment of the present invention, the electronic device provided by the present invention includes a wireless receiver and a processor, and the processor is electrically connected to the wireless receiver. The wireless receiver and the wireless transmitter establish wireless communication. When the distance between the wireless transmitter and the wireless receiver exceeds the effective range of the wireless communication, the processor executes a security lockout procedure.
在本發明的一實施例中,當無線發射器與無線接收器之間的距離在無線通訊的有效範圍之內時,無線發射器發送上鎖指令給無線接收器,使處理器執行安全上鎖程序。In an embodiment of the present invention, when the distance between the wireless transmitter and the wireless receiver is within the effective range of wireless communication, the wireless transmitter sends a lock command to the wireless receiver to make the processor perform a safe lock program.
在本發明的一實施例中,當無線發射器與無線接收器之間的距離在無線通訊的有效範圍之內但超出預設距離時,處理器自動執行安全上鎖程序。In an embodiment of the present invention, when the distance between the wireless transmitter and the wireless receiver is within the effective range of wireless communication but exceeds the preset distance, the processor automatically executes the security lock procedure.
在本發明的一實施例中,無線接收器為藍芽接收器。In an embodiment of the present invention, the wireless receiver is a Bluetooth receiver.
在本發明的一實施例中,無線發射器為藍芽發射器。In an embodiment of the present invention, the wireless transmitter is a Bluetooth transmitter.
在本發明的一實施例中,本發明所提出的電子裝置的上鎖方法包含以下步驟。透過電子裝置的無線接收器與無線發射器建立無線通訊;當無線發射器與無線接收器之間的距離超出無線通訊的有效範圍時,執行安全上鎖程序。In an embodiment of the present invention, the method for locking an electronic device provided by the present invention includes the following steps. Establish wireless communication through the wireless receiver of the electronic device and the wireless transmitter; when the distance between the wireless transmitter and the wireless receiver exceeds the effective range of wireless communication, the security lock procedure is executed.
在本發明的一實施例中,上鎖方法更包含:當無線發射器與無線接收器之間的距離在無線通訊的有效範圍之內時,透過無線發射器發送一上鎖指令給無線接收器,以執行安全上鎖程序。In an embodiment of the present invention, the locking method further includes: when the distance between the wireless transmitter and the wireless receiver is within the effective range of wireless communication, sending a lock command to the wireless receiver through the wireless transmitter , In order to execute the safety lockout procedure.
在本發明的一實施例中,上鎖方法更包含:當無線發射器與無線接收器之間的距離在無線通訊的有效範圍之內但超出預設距離時,自動執行安全上鎖程序。In an embodiment of the present invention, the locking method further includes: when the distance between the wireless transmitter and the wireless receiver is within the effective range of wireless communication but exceeds the preset distance, automatically executing a safe locking procedure.
在本發明的一實施例中,無線接收器為藍芽接收器。In an embodiment of the present invention, the wireless receiver is a Bluetooth receiver.
在本發明的一實施例中,無線發射器為藍芽發射器。In an embodiment of the present invention, the wireless transmitter is a Bluetooth transmitter.
綜上所述,本發明之技術方案與現有技術相比具有明顯的優點和有益效果。藉由本發明的技術方案,在於使用者離開電子裝置(如:筆記型電腦)後,可透過身上持有的無線發射器(如:手機/智能手環…等),在已配對連結的前提下,以自動/主動方式觸發個人裝置的安全上鎖機制,來保護個人資訊的隱私安全,並讓使用者能夠自行設定保護機制的安全距離,加強使用者對電子裝置隱私安全的掌握度。In summary, the technical solution of the present invention has obvious advantages and beneficial effects compared with the prior art. With the technical solution of the present invention, after the user leaves the electronic device (e.g. laptop), he can use the wireless transmitter (e.g. mobile phone/smart bracelet... etc.) he holds on his body under the premise of pairing and connection. , To automatically/actively trigger the security lock mechanism of personal devices to protect the privacy and security of personal information, and allow users to set the security distance of the protection mechanism by themselves, and strengthen the user's grasp of the privacy and security of electronic devices.
以下將以實施方式對上述之說明作詳細的描述,並對本發明之技術方案提供更進一步的解釋。Hereinafter, the above description will be described in detail by way of implementation, and a further explanation will be provided for the technical solution of the present invention.
為了使本發明之敘述更加詳盡與完備,可參照所附之圖式及以下所述各種實施例,圖式中相同之號碼代表相同或相似之元件。另一方面,眾所週知的元件與步驟並未描述於實施例中,以避免對本發明造成不必要的限制。In order to make the description of the present invention more detailed and complete, please refer to the attached drawings and the various embodiments described below. The same numbers in the drawings represent the same or similar elements. On the other hand, well-known elements and steps are not described in the embodiments to avoid unnecessary limitations on the present invention.
於實施方式與申請專利範圍中,涉及『連接』之描述,其可泛指一元件透過其他元件而間接耦合至另一元件,或是一元件無須透過其他元件而直接連結至另一元件。In the embodiments and the scope of patent application, the description of "connection" can generally refer to a component that is indirectly coupled to another component through other components, or that one component is directly connected to another component without going through other components.
於實施方式與申請專利範圍中,涉及『連線』之描述,其可泛指一元件透過其他元件而間接與另一元件進行有線與/或無線通訊,或是一元件無須透過其他元件而實體連接至另一元件。In the implementation and the scope of patent application, the description of "connection" can generally refer to a component that communicates with another component indirectly through wired and/or wireless communication through other components, or that a component does not need to be physically connected through other components. Connect to another component.
於實施方式與申請專利範圍中,除非內文中對於冠詞有所特別限定,否則『一』與『該』可泛指單一個或複數個。In the implementation mode and the scope of the patent application, unless the article is specifically limited in the context, "一" and "the" can generally refer to a single or plural.
本文中所使用之『約』、『大約』或『大致』係用以修飾任何可些微變化的數量,但這種些微變化並不會改變其本質。於實施方式中若無特別說明,則代表以『約』、『大約』或『大致』所修飾之數值的誤差範圍一般是容許在百分之二十以內,較佳地是於百分之十以內,而更佳地則是於百分之五以內。The "about", "approximately" or "approximately" used in this article are used to modify any amount that can be changed slightly, but such slight changes will not change its essence. If there is no special description in the embodiment, it means that the error range of the value modified with "about", "approximately" or "approximately" is generally allowed within 20%, preferably less than 10%. Within, and preferably within 5%.
第1圖是依照本發明一實施例之一種電子裝置100的方塊圖。如第1圖所示,電子裝置100至少包含無線接收器110以及處理器120。在架構上,處理器120電性連接無線接收器110。FIG. 1 is a block diagram of an
舉例而言,電子裝置100可為筆記型電腦、桌上型電腦或類似裝置,無線接收器110為藍芽接收器,處理器120可為中央處理器、控制器或其他電路。For example, the
於使用時,無線接收器110與無線發射器170建立無線通訊。舉例而言,無線發射器170可為藍芽發射器。實作上,無線發射器170可為獨立的無線傳輸裝置或是整合於行動裝置或穿戴式裝置中(如:手機/智能手環…等)。When in use, the
在本發明的一實施例中,當無線發射器170與無線接收器110之間的距離超出無線通訊的有效範圍時,處理器120執行安全上鎖程序。舉例而言,安全上鎖程序例如可為螢幕鎖屏或其他鎖定動作。藉此,當無線發射器170與無線接收器110之間斷訊時,電子裝置100自動執行安全上鎖程序。In an embodiment of the present invention, when the distance between the
在本發明的另一實施例中,當無線發射器170與無線接收器110之間的距離在無線通訊的有效範圍之內時,無線發射器170發送上鎖指令給無線接收器110,使處理器120執行安全上鎖程序。藉此,使用者可透過無線發射器170主動對電子裝置100啟用安全上鎖程序。In another embodiment of the present invention, when the distance between the
在本發明的又一實施例中,當無線發射器170與無線接收器110之間的距離在無線通訊的有效範圍之內但超出預設距離時,處理器120自動執行安全上鎖程序。舉例而言,預設距離可為使用者透過電子裝置100預先設定。實作上,處理器120可依據無線接收器110鎖接收到的訊號強弱來估算無線發射器170與無線接收器110之間的距離。藉此,使用者可彈性設定安全上鎖程序被觸發的時機。In another embodiment of the present invention, when the distance between the
為了對上述電子裝置100的上鎖方法做更進一步的闡述,請同時參照第1~2圖,第2圖是依照本發明一實施例之一種電子裝置100的上鎖方法200的流程圖。如第2圖所示,機台管理方法200包含步驟S201、S202(應瞭解到,在本實施例中所提及的步驟,除特別敘明其順序者外,均可依實際需要調整其前後順序,甚至可同時或部分同時執行)。In order to further explain the locking method of the
於步驟S201,透過電子裝置100的無線接收器110與無線發射器170建立無線通訊。當無線發射器170與無線接收器110之間的距離超出無線通訊的有效範圍時,於步驟S202,執行安全上鎖程序。藉此,當無線發射器170與無線接收器110之間斷訊時,電子裝置100自動執行安全上鎖程序。In step S201, wireless communication is established through the
於上鎖方法200中,當無線發射器170與無線接收器110之間的距離未超出無線通訊的有效範圍時,透過無線發射器170發送上鎖指令給無線接收器110,以執行安全上鎖程序。藉此,使用者可透過無線發射器170主動對電子裝置100啟用安全上鎖程序。In the
於上鎖方法200中,當無線發射器170與無線接收器110之間的距離在無線通訊的有效範圍之內但超出預設距離時,自動執行安全上鎖程序。舉例而言,預設距離可為使用者透過電子裝置100預先設定。In the
綜上所述,本發明之技術方案與現有技術相比具有明顯的優點和有益效果。藉由本發明的技術方案,在於使用者離開電子裝置(如:筆記型電腦)後,可透過身上持有的無線發射器(如:手機/智能手環…等),在已配對連結的前提下,以自動/主動方式觸發個人裝置的安全上鎖機制,來保護個人資訊的隱私安全,並讓使用者能夠自行設定保護機制的安全距離,加強使用者對電子裝置隱私安全的掌握度。In summary, the technical solution of the present invention has obvious advantages and beneficial effects compared with the prior art. With the technical solution of the present invention, after the user leaves the electronic device (e.g. laptop), he can use the wireless transmitter (e.g. mobile phone/smart bracelet... etc.) he holds on his body under the premise of pairing and connection. , To automatically/actively trigger the security lock mechanism of personal devices to protect the privacy and security of personal information, and allow users to set the security distance of the protection mechanism by themselves, and strengthen the user's grasp of the privacy and security of electronic devices.
雖然本發明已以實施方式揭露如上,然其並非用以限定本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the present invention has been disclosed in the above embodiments, it is not intended to limit the present invention. Anyone who is familiar with the art can make various changes and modifications without departing from the spirit and scope of the present invention. Therefore, the protection of the present invention The scope shall be subject to the definition of the attached patent application scope.
為讓本發明之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附符號之說明如下: 100:電子裝置 110:無線接收器 120:處理器 170:無線發射器 200:上鎖方法 S201、S202:步驟 In order to make the above and other objects, features, advantages and embodiments of the present invention more comprehensible, the description of the attached symbols is as follows: 100: electronic device 110: wireless receiver 120: processor 170: wireless transmitter 200: Locking method S201, S202: steps
為讓本發明之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下: 第1圖是依照本發明一實施例之一種電子裝置的方塊圖;以及 第2圖是依照本發明一實施例之一種電子裝置的上鎖方法的流程圖。 In order to make the above and other objectives, features, advantages and embodiments of the present invention more comprehensible, the description of the accompanying drawings is as follows: Figure 1 is a block diagram of an electronic device according to an embodiment of the present invention; and FIG. 2 is a flowchart of a method for locking an electronic device according to an embodiment of the invention.
100:電子裝置 100: electronic device
110:無線接收器 110: wireless receiver
120:處理器 120: processor
170:無線發射器 170: wireless transmitter
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW108143518A TWI727522B (en) | 2019-11-28 | 2019-11-28 | Electronic device and locking method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW108143518A TWI727522B (en) | 2019-11-28 | 2019-11-28 | Electronic device and locking method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI727522B true TWI727522B (en) | 2021-05-11 |
TW202121122A TW202121122A (en) | 2021-06-01 |
Family
ID=77036240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW108143518A TWI727522B (en) | 2019-11-28 | 2019-11-28 | Electronic device and locking method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI727522B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200300028A (en) * | 2002-11-26 | 2003-05-01 | Eden Jung-Yu Chen | Key-lock switch system |
CN100375103C (en) * | 2005-09-12 | 2008-03-12 | 全观友 | Monitoring method of device having electronic label |
CN103853328A (en) * | 2012-12-03 | 2014-06-11 | 三星电子株式会社 | Method and mobile terminal for controlling screen lock |
CN104361657A (en) * | 2014-09-22 | 2015-02-18 | 三星电子(中国)研发中心 | Intelligent lock and application method of intelligent lock |
CN106469480A (en) * | 2015-08-14 | 2017-03-01 | 陈昱年 | Control system, control device and mobile device of carrier |
TW201800653A (en) * | 2016-06-24 | 2018-01-01 | 系微股份有限公司 | Bluetooth door lock system with emergency reporting function and method for operating the same capable of correctly and instantly reporting emergency conditions |
-
2019
- 2019-11-28 TW TW108143518A patent/TWI727522B/en active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200300028A (en) * | 2002-11-26 | 2003-05-01 | Eden Jung-Yu Chen | Key-lock switch system |
CN100375103C (en) * | 2005-09-12 | 2008-03-12 | 全观友 | Monitoring method of device having electronic label |
CN103853328A (en) * | 2012-12-03 | 2014-06-11 | 三星电子株式会社 | Method and mobile terminal for controlling screen lock |
CN104361657A (en) * | 2014-09-22 | 2015-02-18 | 三星电子(中国)研发中心 | Intelligent lock and application method of intelligent lock |
CN106469480A (en) * | 2015-08-14 | 2017-03-01 | 陈昱年 | Control system, control device and mobile device of carrier |
TW201800653A (en) * | 2016-06-24 | 2018-01-01 | 系微股份有限公司 | Bluetooth door lock system with emergency reporting function and method for operating the same capable of correctly and instantly reporting emergency conditions |
Also Published As
Publication number | Publication date |
---|---|
TW202121122A (en) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9264421B2 (en) | Accessing a primary device using a wearable device and a wireless link | |
US11216549B2 (en) | Security verification method and device | |
JP6063859B2 (en) | Portable key device and device control method | |
US10375081B2 (en) | Techniques and system for extended authentication | |
US10212586B2 (en) | Mobile terminal and control method thereof | |
US20150082422A1 (en) | Security switch | |
US20160286587A1 (en) | Pairing Consumer Electronic Devices Using a Cross-Body Communications Protocol | |
US11704400B2 (en) | Authentication method, wearable device and mobile device | |
CN106663162A (en) | Securely pairing computing devices | |
CN103944615A (en) | Method and system for achieving near field unlocking according to electrocardiogram | |
US20030093693A1 (en) | System and method for providing secured access to mobile devices | |
EP1749261A2 (en) | Multi-factor security system with portable devices and security kernels | |
JP2004220402A (en) | E-commerce authentication system and method | |
KR102294211B1 (en) | Central and delegate security processors for computing devices | |
US20180227754A1 (en) | Wearable data device with deactivation security feature | |
CN105321238B (en) | Solution locking method, device and a kind of intelligent wearable device of intelligent wearable device | |
JP4191737B2 (en) | Mobile storage device and mobile storage system | |
US10548015B2 (en) | Mobile device security lock | |
TWI727522B (en) | Electronic device and locking method thereof | |
US10313028B2 (en) | Human body communication device, human body communication method, and program | |
US11219713B2 (en) | Delivery safety ensuring method and wearable medical system using the method | |
WO2010145339A1 (en) | Mainboard, and method and mobile terminal for realizing network locking/card locking function | |
EP3135065B1 (en) | Adaptive transmit power adjustment for phone in hand detection using wearable device | |
US10275588B2 (en) | Providing multi-factor security for electronic devices through body area network and radiofrequency network communications | |
CN112818298A (en) | Electronic device and locking method thereof |