TWM427595U - Protective device for electric equipment - Google Patents

Protective device for electric equipment Download PDF

Info

Publication number
TWM427595U
TWM427595U TW100213140U TW100213140U TWM427595U TW M427595 U TWM427595 U TW M427595U TW 100213140 U TW100213140 U TW 100213140U TW 100213140 U TW100213140 U TW 100213140U TW M427595 U TWM427595 U TW M427595U
Authority
TW
Taiwan
Prior art keywords
electronic device
wireless transceiver
transceiver module
protector
verification
Prior art date
Application number
TW100213140U
Other languages
Chinese (zh)
Inventor
Jian-Xing Li
Di Qiu
Original Assignee
Jian-Xing Li
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jian-Xing Li filed Critical Jian-Xing Li
Priority to TW100213140U priority Critical patent/TWM427595U/en
Publication of TWM427595U publication Critical patent/TWM427595U/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

M427595 五、新型說明: 【新型所屬之技術領域】 本創作係關於-種防護裝置,特別是配置於使用者與電子 設備,並且藉由適當的識別機制,使得在正確的匹配狀態時, 使用者可以操作使用電子設備,而在非正確的匹配狀態時,電 子設備自動形成關機狀態或不可使用的狀態。所述的電子設備 包含桌上型電腦、筆記型電腦、平板電腦或智慧型手機。 Φ 【先前技術】 -般而言,電子設備(如各式電腦與各式手機)在開機時, 可藉由密碼幻旨_絲防止不正_使崎餅啟動該電 子設備;而開機後-段時間不操作該電子設備,則該電子設備 可進入休眠狀態,然後再藉輸入密碼或解除按鍵鎖的方式來再 啟動該電子設備。然而這些方式都沒有達到真正的防護效果。 _ 舉例而言,電_缺_科產生誤判錢辨識不良的 _ ’而且指紋辨識只能用於電腦開機的時機;在開機後,若 原制者_電腦,則任何人者都可贿麟電腦,甚至將其 取走,故對於資料保護而言,指紋辨識根本沒有保護效果。再 者’電腦被竊後,偷竊者可以藉由作業系統重新安裝 使原先的防護措施失效。 ' 再以手m例,如果手機被竊,在沒有失去電力的情況 下,偷竊者可以不斷的使用該手機;若更換客戶識別模組(即 遍卡),_手射被不_制者制。除料機主人通 知運營商停止手機號碼及内碼之使用權。 此外,亦有利用鎖具與電腦結合,當鎖具與電腦分開時可 產生聲響作為警示,藉此達到防護的效果;然而此種方式僅能 提供警示’並不能限制電腦的使用狀態;換言之,電腦被竊後, 該電腦仍可被不同的使用者使用。 關於台灣專利1342520中揭示「用於一電腦系統中提升資 訊t全的方法及其相關裝置」,其在基本輸入輸出系統(BI〇s) 運作前,輸入一輸入訊號與一密碼進行比對並產生結果,然後 再以該結果㈣BIGS的運作。鱗顺_技術雛仍是密 瑪的比對’雖可以達觸機時的防護’但無法在開機後仍以相 同的方式進行設備與資料的防護。 【新型内容】 本創作的目_'在提供—_於電子設備_護裝置,j 有能鈞隨_證使时射績電子設備的匹配關係M427595 V. New description: [New technical field] This creation is about a kind of protection device, especially for users and electronic devices, and with proper recognition mechanism, the user is in the correct matching state. The electronic device can be operated, and in an incorrect matching state, the electronic device automatically forms a shutdown state or an unusable state. The electronic device includes a desktop computer, a notebook computer, a tablet computer or a smart phone. Φ [Prior Art] - In general, electronic devices (such as various computers and various mobile phones) can be activated by the password phantom _ wire to enable the electronic device to be activated when the device is turned on; If the electronic device is not operated at the time, the electronic device can enter a sleep state, and then restart the electronic device by inputting a password or releasing the key lock. However, these methods have not achieved true protection. _ For example, the electricity _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Even taking it away, fingerprint identification has no protective effect for data protection. Furthermore, after the computer was stolen, the thief could reinstall the operating system to invalidate the original protective measures. 'With the hand m example, if the mobile phone is stolen, the thief can continue to use the mobile phone without losing power; if the customer identification module is replaced (ie, the card is over), the _ hand is not made by the system. . The feeder owner informs the operator to stop the use of the mobile number and the internal code. In addition, there is also the use of a lock to be combined with a computer. When the lock is separated from the computer, an audible sound can be generated as a warning to achieve the effect of protection; however, this method can only provide a warning 'and does not limit the state of use of the computer; in other words, the computer is After theft, the computer can still be used by different users. Regarding the method and related device for improving information in a computer system disclosed in Taiwan Patent No. 1,342,520, an input signal is compared with a password before the basic input/output system (BI〇s) operates. Produce the results and then use the results (IV) BIGS to operate. The scales are still the same as the Mimar's comparison, although they can be used to protect the equipment, but they cannot be protected in the same way after the machine is turned on. [New content] The purpose of this creation is to provide a matching relationship between the electronic devices and the electronic devices.

,在匹配JE 確的情況下,電子設備可以正f運作;而匹配錯誤或無匹配惰 =時,該電子設備將自動關機且無法再啟動;如此可以達到隨 、防護設備與資料的效果。即使設儀被取 啟動該設冑。 在冉 根據上述的目的與功效,本創作包含一之第一防護器 :使用f购配置給電侧卜驗 線通訊信號,且周期性的行 亍…、 M ^ J仃進於第—防護器與第二防護器之 曰I並使料-防難朗二轉紅減行身份比對。 M427595 、中第—Ρϋϋ具備—電子開_電子設備的電力裝置 電氣特性連接,·當第-防_與第二防龍的身佩對正確, 則電子m形錢路,使得電子設制各裝置,例如指定裝 f ’可以接受電力而正常運作;而第—防護器與第二防護器的 對不正確’職娜_麵路,辦電子設備不論是 正要開機或是使财,皆會自動斷電而不能使用;即使電子設 備被惡意取走,該電子關也不會軸齡,故f子設備仍處 在不能使用的狀態。 此外,第二防護器另具有-控制程式。該控制程式可建立 於=一防δ蒦器内或建立在基本輸入輸出系統(b⑽)。當第一防 護器與第二_||的身份比對正確,職控制程式可讓Bi〇s 正常運作,進而使電子設備正常運作;若第一防護器與第二防 護器的身份比對不正確,則控制程式要求BI0S中斷運作,特 別疋讓電力形成關閉狀態’藉此電子設備不論是正要開機或是 使用中,皆會自動斷電而不能使用;即使電子設備被惡意取 走,該BIOS也會處在不能正常運作的狀態,使得該電子設備 不能使用。 以下即本創作的目的、功效及結構組態,舉出較佳實施例 並配合圖式詳細說明。 【實施方式】 請參閱第卜圖中揭示一第一防護器10,將配置給一使用 者(未顯示)’且第一防護器10為可隨身攜帶的器件。 5 該第一防護II 10包含-第一無線收發模組12電氣特性連 接-電力元件Μ;此外該第—防脑1G也可視實際需求而選 擇配置-啟動關16。且啟動_ 16係電氣特性連接該電力 元件14及該第一無線收發模組12。 β該第一無線收發模組12可以是Zigbee模組、藍芽模組, 或是其他的射麵組;電力元件14為電池,其魏特性連接 該第一無線收發模組12。 本創作還包含-第二防護器20配置在子設備3〇内。 第防》蒦器20包含一第二無線收發模组22及一電子開關冰 該電子開關24係電氣特性連接該第二無線收發模組22及電子 設備30的電力裝置32。 -人電子设備30可具有一指定裝置34,且當電力輸入 才曰疋裝置34後’該指定裝置34可以正常運作,進而使得電子 設備30處在正常運作狀態。所述的指定裝置34可以是-存取 裝置,但並不以此為限。 上述的第二無線收發模組22可以是Zigbee模組、藍芽模 組或其他的射麵組;電子設·備3G可以是桌上型魏、平板 電腦、筆記型電腦,或是各式手機。 一驗證信號4G伽X無線傳輸方式倾於n線收發模 組12與第二無線收發模組22之間;特別的是驗證信號4〇 在第-無線收發模組12及第二無雜發模組22開啟的狀態 下依預。又的時間間隔不斷地傳遞於第一無線收發模組12與 第…、線收發板組22之間;是以驗證信號4〇以周期性方式行 進於第-無發做12 魏發模組22。 舉例而言’當電子設備_啟時,第二防護器2〇可被同 時激活’然後第一防護器1〇與第二防護器2〇藉驗證信號4〇 進行彼此的身份驗證。 在不使用電子設備3G時可使得該啟動關16形成斷路, 如此第一防護器10可以免除電力的耗損。 。月參閱第2圖’驗證信號4〇是具有識別功能的信號。具 體而。’驗證域40可以具有一身份識棚42、一設備識別 欄44及-區域識別欄46。對應每一搁位所記錄的數字或符 就’則為相應之識別代碼。此外各識別攔的順序沒有固定,且 識別棚位及代碼也可視實際需求而增加。圖中所示的順序與欄 位内谷僅肋作為本實施例之朗,並非以此為限。 再者’設備識別搁44的識別代碼可用以區分同一品牌的 不同產品’·區域識別攔46中的代碼可用以區分國家、域市, 或是工作場所中的不同區域。 請參閱第3圖,在步驟S52中,本創作的第一無線收發模 組與第二無·發模組各自處在工錢態;其巾第二防護器的 第;二無線收發模组可在電子設備被啟動時自動被激活,而第一 防護器的第—無線收發模組具有電力支援。 *在步驟S54中,-驗證信號周期性的傳遞於第一無線收發 模組與第二無線收發模組;舉例而言,第一無線收發模組每隔 M427595 二十秒發出一道驗證信號,且第二無線收發模組依序接收該驗 證信號。反之,也可由第二無線收發模組發出驗證信號給第一 無線收發模組。 步驟S56係查核該驗證信號是否正雄。舉例而言,在此步 驟中’第二無線收發模組收到驗證信號後,即可根據驗證信號 中所記錄贼用者身份識職碼、賴代碼及區域代碼與第二 防濩器中所記錄的各對應的識別代碼進行比對。 第一防6蒦器中所記錄的各識別代碼可以儲存在一個屬於 第-防4器的6己憶體内(未顯示),或是儲存於第二無線收發模 組内。 步驟S58係顯示’在驗證信號正確的條件下,電子開關呈 現通路’使電力要進人適當的指定裝置㈣制啟動電子設備 的目的,或是使電子設備呈現可操作的狀態;舉例而言,電力 可以進入存取裝置(例如電腦的硬碟或記憶體),進而使得電 子設備可以正常運作。 步驟S62顯示在驗證信號不正確的條件下,電子開關呈現 斷路’此時電力無法進人指定的H因此電子設備不能使使 正常運作或關機。 值付庄思的是’驗域是不斷地自H躲發模組傳 送到第一無線收發模組,所以步驟S56所揭示的查核驗證信號 的動作是胁_進行,或是配合健祕於休眠(或節能)之 重新啟動時進行查驗。 8 M427595In the case of matching JE, the electronic device can operate positively; when the matching error or no matching idleness =, the electronic device will automatically shut down and can no longer be started; thus, the effect of the protection device and the data can be achieved. Even if the instrument is set to start the setting. According to the above purpose and effect, the creation includes a first protector: using the f purchase configuration to the electric side inspection line communication signal, and the periodic operation..., M ^ J into the first - protector and The second protector is 曰I and the material-proofing is changed to red and the identity is compared. M427595, the middle of the Ρϋϋ Ρϋϋ 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子 电子For example, it is specified that f' can accept electric power and operate normally; and the first-protector and the second protector are incorrectly 'professional', and the electronic equipment will be automatically turned off whether it is starting up or making money. The electric device cannot be used; even if the electronic device is taken away maliciously, the electronic device will not be in the axial age, so the f sub-device is still in an unusable state. In addition, the second protector has a - control program. The control program can be built in a = anti-delta device or built into the basic input and output system (b (10)). When the identity of the first protector and the second _|| are correctly matched, the job control program allows the Bi〇s to operate normally, thereby enabling the electronic device to operate normally; if the identity of the first protector and the second protector are not Correctly, the control program requires the BI0S to be interrupted, especially to turn off the power. This allows the electronic device to automatically power off and not be used whether it is being turned on or in use; even if the electronic device is maliciously removed, the BIOS It is also in a state of being inoperable, making the electronic device unusable. The following is the purpose, function and structural configuration of the present invention, and the preferred embodiments are described in detail with reference to the drawings. [Embodiment] Referring to Fig. 1, a first protector 10 is disclosed, which is disposed to a user (not shown) and the first protector 10 is a portable device. 5 The first protection II 10 includes - the first wireless transceiver module 12 electrical characteristic connection - the power component Μ; in addition, the first - anti-brain 1G can also select the configuration - start off 16 depending on actual needs. And the _16-series electrical characteristics connect the power component 14 and the first wireless transceiver module 12. The first wireless transceiver module 12 can be a Zigbee module, a Bluetooth module, or other face group; the power component 14 is a battery, and the Wei feature is connected to the first wireless transceiver module 12. The creation also includes that the second protector 20 is disposed within the sub-device 3A. The first protection device 20 includes a second wireless transceiver module 22 and an electronic switch module. The electronic switch 24 is electrically connected to the second wireless transceiver module 22 and the power device 32 of the electronic device 30. The human electronic device 30 can have a designation device 34, and when the power is input to the device 34, the designation device 34 can operate normally, thereby causing the electronic device 30 to be in a normal operating state. The specifying device 34 may be an access device, but is not limited thereto. The second wireless transceiver module 22 may be a Zigbee module, a Bluetooth module or other surface group; the electronic device 3G may be a desktop Wei, a tablet computer, a notebook computer, or various mobile phones. . A verification signal 4G gamma X wireless transmission mode is between the n-line transceiver module 12 and the second wireless transceiver module 22; in particular, the verification signal 4 〇 is in the first wireless transceiver module 12 and the second no-microphone module When group 22 is turned on, it is pre-emptive. The time interval is continuously transmitted between the first wireless transceiver module 12 and the ..., the line transceiver group 22; and the verification signal 4 is periodically performed in the first-to-be-made 12-way module 22. For example, 'when the electronic device _ is turned on, the second protector 2 〇 can be activated at the same time' and then the first protector 1 〇 and the second protector 2 〇 authenticate the signal 4 进行 to authenticate each other. When the electronic device 3G is not used, the startup switch 16 can be made to be broken, so that the first protector 10 can be free from power consumption. . Referring to Figure 2, the verification signal 4 is a signal having an identification function. Specifically. The verification field 40 can have an identity identification 42, a device identification field 44, and an area identification field 46. The number or symbol recorded for each position is the corresponding identification code. In addition, the order of each identification block is not fixed, and the identification of the booth and the code can also be increased according to actual needs. The order shown in the figure and the ribs in the column are the ribs of the present embodiment, and are not limited thereto. Further, the identification code of the device identification shelf 44 can be used to distinguish different products of the same brand. The code in the zone identification block 46 can be used to distinguish between countries, regions, or different regions in the workplace. Referring to FIG. 3, in step S52, the first wireless transceiver module and the second wireless transceiver module of the present invention are each in a state of money; the second wireless transceiver module of the second protection device can be The electronic device is automatically activated when it is activated, and the first wireless transceiver module of the first protector has power support. In step S54, the verification signal is periodically transmitted to the first wireless transceiver module and the second wireless transceiver module; for example, the first wireless transceiver module sends a verification signal every 20 seconds of M427595, and The second wireless transceiver module sequentially receives the verification signal. Conversely, the second wireless transceiver module can also send a verification signal to the first wireless transceiver module. Step S56 checks whether the verification signal is positive or not. For example, in this step, after the second wireless transceiver module receives the verification signal, it can be based on the identification of the thief user identification code, the code and the area code, and the second tamper in the verification signal. The corresponding identification codes of the records are compared. The identification codes recorded in the first anti-smasher can be stored in a 6-remembered body (not shown) belonging to the first anti-four device or stored in the second wireless transceiving module. Step S58 is to display 'the electronic switch presents the path under the condition that the verification signal is correct', so that the power is required to enter the appropriate designated device (4) to activate the electronic device, or to make the electronic device assume an operable state; for example, Power can enter an access device (such as a computer's hard drive or memory), which in turn allows the electronic device to function properly. Step S62 shows that the electronic switch exhibits an open circuit under the condition that the verification signal is incorrect. At this time, the power cannot enter the designated H, so the electronic device cannot make it operate normally or shut down. The value of Zhuangsi is that the 'inspection field is continuously transmitted from the H evasive module to the first wireless transceiver module, so the action of checking the verification signal disclosed in step S56 is threatening or performing secret sleep. (or energy saving) is checked when restarting. 8 M427595

/吏用者離開電子設備一段距離,使得驗證錢無法到達 〜線收發模組,則步驟S56的查核結果為「無信號」,此 時等同於信號錯誤,故電子開關會自動形成斷路,而電子設備 ::立即產生關機的狀態;即使重新開機,電子開關仍為二 〜電力無法進入指定裝置,故電子設備無法正常開機。 根據以上峨明’若岭正確的制者相啟電子設備, 因查核驗證信號的步驟無法達成「正確」的結果,故電子 無法完成若電子設備賊,廳人在·f子設備^, ^驗證信義步輝無錢」的結果,故無糾啟電子設備,· 疋以本創作具有防止他人惡意朗及齡朗的效果。/ The user leaves the electronic device for a distance, so that the verification money cannot reach the line transceiver module, and the check result of step S56 is "no signal", which is equivalent to a signal error, so the electronic switch automatically forms an open circuit, and the electronic Equipment:: Immediately generates a shutdown state; even if the power is turned back on, the electronic switch is still two. The power cannot enter the designated device, so the electronic device cannot be turned on normally. According to the above '明's correct manufacturer's electronic device, the procedure for checking the verification signal cannot achieve the "correct" result, so the electronic can not be completed. If the electronic device thief, the hall person is in the ... As a result of Xinyi Buhui's lack of money, there is no entanglement of electronic equipment, and this creation has the effect of preventing others from being malicious and aging.

可理解的是,第二無線收發模組在收到驗證信號且查核 P第二無線收發模組可傳送—個回覆信號給第—無線收發模 組’右信號正確,觸-防護柯|ί燈細示結果;若浅不 正破,則第—防護器及第二防彻均可崎出聲響作鱗示。 請參閱第4圖,圖中顯示本創作具有一第一防護器⑺斑 一第二防護器2〇。第一防護器10的構造與前-實施例相同, 第二防護器20配置在-電子設備3〇。第二防護器2〇可以是 内建於電子設備3〇内,也可以製作_立性的齡,再藉由 _方式纟嫌㈣Μ 插件。 9 M427595 件32且控制指定裝置34的運作。 第-防《4器20除具傷第二無線收發模組22外,還具備一 控制程式26。該控制程式26可以控制基本輸入輸出系㈣ 的運作,特別是控制電力的管理。 該控制程式26可儲存於第二防護器2〇的記憶體或第二無 線收發模組22。又控制程序26也可以被寫入基本輸入輸出系 統36内。 驗證信號4G係觸性的行進於第―無線收發模組12與第 ^無線«做22之間;修第—無魏賴組12發出驗證 L號40,第一無線收發模組22接收驗證信號奶。再者第二無 線收發模組22可赠出—喊雜(未顯示),且第—無線收 發模組12接收該回覆信號。 "月參閱第5圖’其中步驟S52、步驟S54及步驟S56所執 行的内容與前一實施例相同,故不重覆說明。 步驟S64顯示在驗證信號正確的條件下,控制程式使基本 輸入輸出系統正常運作’進而電子設備可以正常運作。 步驟S66顯示在驗證信號不正確的條件下,控制程式使基 本輸入輸出系統無法正常運作’例如使電力中斷,使得電力無 法進入指定裝置,進而促使電子設備不能正常運作。 值得注意的是,步驟S56所揭示的查核驗證信號的動作是 周期性的進行,因此一旦驗證信號被查核為「正確」,則基本 輪入輪出系統與電子設備可以立即正常運作。 10 若電子設備被竊走’竊用者身上沒有正確的第一防護器用 以發出正4的驗證信號’故竊用者無法啟動電子設備。σ 在上述的實施例中指出驗證信號是由第—無線收發模也 發出’及第二無線收發模組接收驗證信號;‘然而驗證信號的發 出端可以是第二無線收發模組,而接收端為第—無線收發模 組。 、 然而,上述實施例僅為例示性說明本創作之技術及其功 效,而非用於限制本創作。任何熟於此項技術人士均可在不違 背本創作之技術及精神的航下,對上騎施例進行修^ 及變化,因此本創作之權利保護範圍應如後所述之申請專利 圍所列。 ^ 【圖式簡單說明】 第1圖係本創作的第一實施例結構示意圖; 第2圖係本創作的驗證信號欄位配置示意圖; 第3圖係本創作第一實施例的運作流程圖; 第4圖係本創作第二實施例的結構示意圖; 第5圖係本創作第二實施例的運作流程圖。 【主要元件符號說明】 1〇第一防護器 12第一無線收發模組 Η電力元件 16啟動開關 20第二防護器 22第二無線收發模組 24電子開關 26控制程式 M427595 30電子設備 32電力裝置 34指定裝置 36基本輸入輸出系統 40驗證信號 42身份識別攔 46區域識別欄 44設備識別欄 12It can be understood that the second wireless transceiver module receives the verification signal and checks that the second wireless transceiver module can transmit a reply signal to the first wireless transceiver module. The right signal is correct, and the touch-protection Ke | The results are shown in detail; if the shallow is not broken, the first - protector and the second guard can be sounded as a scale. Please refer to Fig. 4, which shows that the creation has a first protector (7) spot and a second protector 2". The configuration of the first barrier 10 is the same as that of the previous embodiment, and the second barrier 20 is disposed at the -electronic device 3A. The second protector 2 can be built into the electronic device 3 ,, or can be made _ standing age, and then by the _ way ( ( (4) 插件 plug-in. 9 M427595 32 and controls the operation of the designated device 34. The first-defense "4 device 20 has a control program 26 in addition to the second wireless transceiver module 22. The control program 26 can control the operation of the basic input/output system (4), particularly the management of power. The control program 26 can be stored in the memory of the second barrier 2 or the second wireless transceiver module 22. Further, the control program 26 can also be written into the basic input/output system 36. The verification signal 4G tactilely travels between the first wireless transceiver module 12 and the second wireless «do 22; the repair-no Weilai group 12 issues a verification L number 40, and the first wireless transceiver module 22 receives the verification signal. milk. Furthermore, the second wireless transceiver module 22 can give out a call (not shown), and the first wireless transceiver module 12 receives the reply signal. "Monthly Referring to Fig. 5', the contents of steps S52, S54, and S56 are the same as those of the previous embodiment, and therefore will not be repeated. Step S64 shows that under the condition that the verification signal is correct, the control program causes the basic input/output system to operate normally' and the electronic device can operate normally. Step S66 shows that under the condition that the verification signal is incorrect, the control program makes the basic input/output system unable to operate normally, for example, the power is interrupted, so that the power cannot enter the designated device, thereby causing the electronic device to malfunction. It should be noted that the action of checking the verification signal disclosed in step S56 is performed periodically, so that once the verification signal is checked as "correct", the basic wheel-in and turn-out system and the electronic device can operate normally. 10 If the electronic device is stolen, the thief does not have the correct first protector to issue a positive 4 verification signal, so the thief cannot activate the electronic device. In the above embodiment, it is pointed out that the verification signal is sent by the first wireless transceiver module and the second wireless transceiver module receives the verification signal; however, the originating end of the verification signal may be the second wireless transceiver module, and the receiving end It is the first wireless transceiver module. However, the above-described embodiments are merely illustrative of the techniques of the present invention and their effects, and are not intended to limit the present invention. Anyone who is familiar with this technology can modify and change the riding procedure without violating the technology and spirit of this creation. Therefore, the scope of protection of this creation should be as follows. Column. ^ [Simple description of the drawing] Fig. 1 is a schematic structural view of the first embodiment of the present invention; Fig. 2 is a schematic diagram of the configuration of the verification signal field of the present creation; and Fig. 3 is a flowchart showing the operation of the first embodiment of the present creation; 4 is a schematic structural view of a second embodiment of the present creation; FIG. 5 is a flowchart showing the operation of the second embodiment of the present creation. [Main component symbol description] 1〇First guard 12 First wireless transceiver module ΗPower component 16 Start switch 20 Second protector 22 Second wireless transceiver module 24 Electronic switch 26 Control program M427595 30 Electronic device 32 Power device 34 designation device 36 basic input and output system 40 verification signal 42 identification tag 46 area identification field 44 device identification field 12

Claims (1)

M427595 第100 2 13140號替換頁曰期:丨00年丨2月2|日 六、申請專利範圍: 1·種用於電子设備的防遵裝置,係配置在一使用者及一具有電 力裝置的電子設備,其包含: 一第一防護器’係配置給該使用者,其具有—第_無線收發模 組; 一第二防«II,係配置在該電子設備’其具有—第二無線收發 模組及-電子_,魏子_係電氣躲連減電子設備的電 力裝置及該第二無線收發模組; -驗證信號,係以無線雜方式在該帛—無狀麵組與該第 二無線收發模組間進行周期性的信號傳送與接收; 其中該驗證健的驗證結果用以控繼電子關形成通路或 與斷路’以使該電子設備成為開機或關機狀態。M427595 No. 100 2 13140 Replacement page 曰 丨 丨 丨 丨 丨 丨 丨 2 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 The electronic device comprises: a first protector configured to the user, having a -th wireless transceiver module; a second protection «II, configured in the electronic device - having - a second wireless Transceiver module and -Electronic_, Weizi_Electric device for escaping electronic equipment and the second wireless transceiver module; - Verification signal, in the wireless hybrid mode in the 帛-nothing group and the first Periodic signal transmission and reception are performed between the two wireless transceiver modules; wherein the verification result of the verification is used to control the electronic shutdown to form a path or to open the circuit to enable the electronic device to be turned on or off. 2·如申請專利範圍第1項所述之用於電子設備的防護裝置,其中 該驗證信號包含身份識別欄。 - 3. 如申請專娜圍第1項所狀麟電子設備的防魏置,其中 該驗證信號包含設備識別攔。 4. 如申請專利範_丨項所述之麟電子設備的防護裝置,其中 該驗證信號包含區域識別攔。 5. 如申請專利範圍第丨項所述之用於電子設備的防護裝置,其中 該第一無線收發模組與該第二無線收發模組為射頻模組。 6, 一種用於電子設備的防護裝置,係配置在一使用者及一具有艽 本輸入輸出系統的電子設備,其包含: 13 第-防護器’係配置給該使用者,其具有一第一無線收發模 一第二防護器,j 模組及一控制程式, 出系統; 係配置在該電子設備,其具有-第二無線收發 ’該控制程式係連結該電子設備的基本輸入輸 -驗號係、以無線傳輸方式在該第一無線收發模組與該第 二無線收發模組間進行周期性的信號傳送與接收; 、其中該驗證輯的驗證結果用以控_基本輸人輸出系統的 運作’使得觀子設财形成_或_狀態。 如申明專利圍第6項所述之用於電子設備的防護裝置,其中 該控制程式被建立在該第二防護器内。 如申明專利範圍第6項所述之用於電子設備的防護裝置,其中 該控制程式被寫入該基本輸入輸出系統。 如申印專利範圍第6項所述之用於電子設備的防護裝置,其中 該第二防護器被製作成插件以插置在該電子設備。 如申4專利範圍第6項所述之用於電子設備的防護裝置,其中 該驗證信號包含身份識別攔。 L如申晴專利範圍第6項所述之用於電子設備的防護裝置,其中 %驗證信號包含設備識別攔。 2·如申凊專利範圍第6項所述之用於電子設備的防護裝置,其中 該驗證信號包含區域識別攔。2. The protective device for an electronic device of claim 1, wherein the verification signal comprises an identification field. - 3. For example, if you apply for the anti-Wei equipment of the No. 1 item of the special equipment, the verification signal includes the equipment identification barrier. 4. The protection device of the cymbal electronic device as claimed in the patent application, wherein the verification signal comprises an area identification block. 5. The protection device for an electronic device according to the invention of claim 2, wherein the first wireless transceiver module and the second wireless transceiver module are radio frequency modules. 6. A protection device for an electronic device, configured in a user and an electronic device having a data input/output system, comprising: 13 a first-protector configured to the user, having a first a wireless transceiver module, a second protector, a j-module and a control program, and an output system; the electronic device having a second wireless transceiver, the control program is coupled to the basic input and output of the electronic device Performing periodic signal transmission and reception between the first wireless transceiver module and the second wireless transceiver module by wireless transmission; wherein the verification result of the verification sequence is used to control the basic input output system Operation 'makes the view of the wealth formation _ or _ state. A protective device for an electronic device according to claim 6, wherein the control program is built in the second protector. A guard device for an electronic device according to claim 6 wherein the control program is written to the basic input/output system. A protective device for an electronic device according to the invention of claim 6, wherein the second protector is formed as a plug-in to be inserted in the electronic device. The protection device for an electronic device according to claim 6, wherein the verification signal comprises an identification barrier. L. The protective device for an electronic device according to claim 6, wherein the % verification signal includes a device identification block. 2. The protective device for an electronic device according to claim 6, wherein the verification signal comprises an area identification block.
TW100213140U 2011-07-18 2011-07-18 Protective device for electric equipment TWM427595U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100213140U TWM427595U (en) 2011-07-18 2011-07-18 Protective device for electric equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100213140U TWM427595U (en) 2011-07-18 2011-07-18 Protective device for electric equipment

Publications (1)

Publication Number Publication Date
TWM427595U true TWM427595U (en) 2012-04-21

Family

ID=46464692

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100213140U TWM427595U (en) 2011-07-18 2011-07-18 Protective device for electric equipment

Country Status (1)

Country Link
TW (1) TWM427595U (en)

Similar Documents

Publication Publication Date Title
US10289996B2 (en) Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
TWI643133B (en) Fingerprint recognition card and method for operating fingerprint recognition card
CN110062933B (en) Fingerprint identification card and power supply operation method using same
KR101607042B1 (en) System and method for storing a password recovery secret
US20150113481A1 (en) Electronic device and method for unlocking screen of electronic device
JP6029592B2 (en) Storage device
CN104766206B (en) A kind of NFC payment and device based on mobile terminal
KR20160070061A (en) Apparatus and Methods for Identity Verification
US9485655B1 (en) Providing power control to an electronic device using authentication
CN105765594A (en) Method and apparatus for authenticating access to a multi-level secure environment of an electronic system
JP2008527444A5 (en)
KR101896163B1 (en) Method and device for facilitating mutual authentication between a server and a user using haptic feedback
US20150074798A1 (en) Electronic Device and Method for Unlocking Screen of Electronic Device
WO2022012616A1 (en) Near-field communication (nfc) information display method and apparatus, and electronic device
CN106951754A (en) A kind of frame display methods and device
CN109657448A (en) A kind of method, apparatus, electronic equipment and storage medium obtaining Root authority
CN110457965A (en) A kind of radio frequency card function call method and device
US20150254624A1 (en) Settlement terminal device and settlement process method using the same
CN110730065B (en) Token device for key backup device and key backup system
US20240152931A1 (en) Methods, mediums, and systems for document authorization
JP2015171105A (en) Settlement terminal
CN108038365A (en) Laptop
US11836561B2 (en) Key fob duplication device
KR101879326B1 (en) Method and device for transmitting and receiving instruction information
TWM427595U (en) Protective device for electric equipment

Legal Events

Date Code Title Description
MM4K Annulment or lapse of a utility model due to non-payment of fees